Identiv’s Post Password Era Solutions Gaining Traction

(Source: Investing.com)  This had access to the credit cards prior to encrypted storage. … and the processor on the device are used to generate private keys inside the hardware itself.