Ifbd Phase1 Report Team Cluster Cuss March 19
-
Upload
guestc46e14bc -
Category
Technology
-
view
409 -
download
0
description
Transcript of Ifbd Phase1 Report Team Cluster Cuss March 19
PHASE 1DISCOVERYIFBD TERM PROJECT
2
INTRODUCTION
MARKET RESEARCH
SCENARIOS
THE OPPORTUNITY
WHERE WILL IT TAKE US
3
4
5
7
8
Stop and take a moment to think. How many cards do you have in your wallet? How soon do you have to get your passport renewed? How many times a day do you deal with locks, passwords, and other protections in order to protect your possessions, information and identity? How many days will you take off work to maintain your “identity” this year?
Access to your information is being controlled by various entities. The government, credit card companies and Google are keeping track of your health, your finances, your purchasing behaviour and your interests. With all this information being passed around, sold to third parties, leaked accidentally, how much say do you have over who gets to know the “real” you?
We have granted strangers free access to our lives. We feel entitled to personal information of our friends, rather than privileged. The internet has become our playground. But how safe is it?
There are 7 billion people in the world. How can you not get lost in the crowd?
The number of U.S. identity fraud victims increased 22 percent in 2008 to 9.9 million adults.3
3
Canadians lost $10.8M to
identity theft in 2009 alone.
This figure has been growing at
29 percent a year.4
582M Smart Cards in circulation
worldwide, 20071
The authentication, mobile device security and
identity market is worth over $5B2
(1) Smart Cards in the US, Contactless Payment Cards, May 2007 (2) Internet Security, Privacy, and Fraud, Packaged Facts, Oct 2005 (3) Javelin Strategy & Research, February 2009 study (4) http://www.phonebusters.com/english/documents/AnnualStatisticalReport2009_001.pdf
35% of banks had a biometric
authentication program... In 2005
introduction
4
Nations the world over are switching to biometric passports to identify travelers. Manchester Airport uses facial recognition to allow travelers to bypass lineups and governments to check anyone against international watchlists.
Lockheed Martin is giving 1 million maritime workers access to secure areas of ports via finger and iris scans, stored on biometric ID cards.
The US, Australia, Britain, and Canada have created a biometric database to help combat terrorism and rapidly identify victims in large-scale disasters.
PositiveID markets FDA-approved RFID microchip implants for patient identification applications, and is developing implantable glucose sensing microchip
Source: BusinessWeek Online; 5/21/2009, p2-2, 1p
Biometric passports
Security speed
access Finger & iris scans
biometric database combat terrorism identify victims
Implantable glucose sensors
RFID microchips
The world as we know it is changing before our eyes...
market research
5
Meet Richard. He is 50 years old. Richard works in for a large multinational company. He has been travelling between 4 different countries for the past 7 years working on various projects. He’s tired of waiting in lines at airports and getting his passport renewed.
Meet Margareth, she is a 23-year old administrative assistant in Port-au-Prince and a native of Haiti. After the earthquake, she could not locate her husband Roméo, who was a peacekeeper for the
hundreds of hours wasted
inefficient processes
tired of waiting
lack of awareness
can’t trust anyone
anymore
“hate this way of living”
No matter who you are and where you live, nothing is more important than your identity.
passport renewed. “I’ve wasted hundreds of hours going through the same, inefficient processes,” Richard says. “System glitches and human error have cost me countless of dollars in terms of time and wages. I’m tired of this.” He is a member of different VIP travellers groups, and despite their promises of time savings and line bypasses, John continues to waste countless of precious hours in queues.
scenarios
UN. She was unable to find him in the chaos, since the UN headquarters had collapsed in the earthquake, as well as their home in the outskirts of the city. She searched through the rubble of her home for days, but was not able to find his body. The area around his office building was far too dangerous, and none of the authorities or police were able to give her a clue as to whether he was still living, potentially injured in some hospital without a way to communicate with her, or whether she should grieve his loss. She kept on hanging on to hope, wishing there was some way to know for sure where he was, and how he was doing. She wanted answers, so that she could be reunited, or find his body so that she could give him a proper burial.
6
How do you define living? Do you exist if no one knows who you are?
...plans to travel to Asia this summer.
...needs a summer job to pay for school
and new car.
...will soon require emergency services
at hospital.
work
travel
health care
food
living expenses
paycheques
the common need
Without ID will governments believe you exist?
7
introducing
Constient your key towards complete digital awareness
the ability to be digitally aware of others, and have others digitally
aware of you
what if technology could flawlessly identify you?
wouldn’t that change everything about how
we live, work, and play?
the technology is out there
biometric databases
facial recognition
human RFID implants
sensor networks
subdermal health sensors
it is freedom from worry
of fraud or theft,
of the hassle of PIN codes and passwords
of carrying ID and forgetting it
of misplacing your keys
of lineups and hours wasted updating IDs
and government documents
identifying the opportunity
what is Constient? how is it possible?
Why do we need it?
what is the future of Constient? A world where all your data, from government documents, to your car keys and your gmail account are all centralized in one location – YOU. Forget having to carrying 50 different keys, cards and passwords to access 50 different locations and services. This will be one key giving you instant access, instant recognition, and perfect service – just the way you like it. Let us open the way for you, it will be the last ID you’ll ever need.
8
IMPACTINTENSIFICATION
Arms Length
Installation Tool
Com. Protocols
Processing
Auto-Friending
BEHAVIOR
TOOLS
Guarded
Standards
Wireless
Loyalty
Personal Firewall
Profiling
Hacking
Understanding
Enforcement
Personal Apps
Alliances
Shopping
Biometric dataProgrammers
Scanners
SecurityAlgorithms
Encryption
Data Aggregation
Off The Grid
Food Selects You
D.I.Y.
Carefree
Data Aggravation
Data Civil Rights
Privacy Laws
Data ConservationLife Regression Modeling
Semantic Reviews
Data Snooping
Learning
Gesturing
InsuranceUnderwriters
Personal MarketingCampaigns
IndependentConfident
Wallet-less
Cookies
Meta DataAnalysis
Fishbowl
Lifecycle ManagementClones
Hacking
Tribalism
Profile Management
Real-time Promotions
Predictive Services
Selective Memory
Non MassTransit
Social Norms
Credibility Auditing
Credibility Bureaus
Trends
Black Market
Individual Price Discrimination
Data ProfilingInfo Piracy
One-think Shopping
Random Acts of Randomness
Prediction
India/China
Manipulation
Smart Relationships
Consumer RFPs
Smart Medical
Micro Testing
Behavior Recommendations
Data Mining
Personalized Branding
Data Junkies
Corporatacracy
Big Brother
Smart Product Design
Negotiation
iLawyer
Indiscretion
History
Personal Data
Constient
Design
Simulation
Preemptive Purchase
Nano-Segmentation
Social Engineering
Data Mgmt.
Boredom
Risk Mitigation
Trustworthiness
Personalized Consumerism
Trend Analysis
Boundary Conditions
Relationship Ratings
Digital Identity
Virtual Democracy
Interactive Flora & Fauna
Rating Agencies
Etiquette
Custom Manufacturing
Artificial Intelligence
Pro
UnobtrusiveJurisprudence
Proxy Management
Permissions
Software
Life Evaluation
Password
Verification
Digital Freedom
Genealogy
Constraints
Memory
Interactive Virtual AncestorsIterative Social Contract
where will it take us?
9
DISRUPTIONAMPLIFICATION
BEHAVIOR
TOOLS
age sensitive screening
Micro RFID
Miniaturization +nanotechnology
securID
Document digitization
The Cloud
Elite bypass
Personal Apps
subdermal installBio sensors
Tamper resistanthardware
Electro-mechanic powerMulti-layer encryption
Proximityscanningpatriot act
biometric IDs
Micro-segmentation
Privacy Laws
Implantable phones
Biofeedback alerts
Airport bioscanners
Virtual reality
Personal worlds
Real-time stimulation
Neocortical interfaces
Hearing override
Instant learning by upload
Global translation for VR interactions
PrivacyLitigation
Profile Management
Real-time video tracking
intelligent drugdosages
Reality overrides
Personal algorithms
Holo band
Perfect personal product positioning
Virtual clonesBackdoor
code
GPS
Digitized personas
Global real-timepositioning
Personal Data
Constient
NEXUS passes
Personal data storage
Random number generators
Neural integration
Jawbone readers
Implant app store
Automated Threat Assessment
Payment for clone access
Computer viruses attack you
Genomic targeted viruses
Scanning blockers
Personal insurance premiumsBiometric monitoring
Smart cards
Digital Angel
Wireless datatransfers
PersonalHistory
data
FishbowlGoogle AdSense
Coordinate large crowds
Payment
Behaviour cessation
Personalized Insurance premium
Real-time purchase monitoring
Identity Theft
Stalking 2.0
Digital Alibi
Backgroundprofiling
Financial security
Personalized recommendations
Fatigue monitoring Travelling
ProtectionControl
Monitor Kids
Gene warfare
Health 2.0
Proactive health
Digital Mimicry
Health scan for roller-coasters
Search and rescue
Find Friends
Data Profiling
Preventative medical tracking
Going “Dark”
Battle drugs
Search and rescue
Access personal history
Location-aware commerce
Anti-terrorism
Retail analysis
.Corporate espionage
Chip engaged ignition
Big Brother
National security
Viral warefare
Hacking
Marriage 2.0Exercise diet aid
VIP GuestsEmployee tracking
Virtual Reality
Sex offender registry
Getting “chipped”Selling Data
Health monitoring
No Customs Line
Addiction cessation
Perimeter Alert
Traffic coordination
Where will it take us?
10
MARKETMAXIMIZATION
Mass customization
Cloud computing
Online avatars
Biotech
Biomimicry
Real-time promotions
identity theft
Social engineering
DESIRE
ECONOMY
Nanotechnology
ImplantsIdentification
Government
Progress
Freedom
Safety
Smart Products
Consumerism
Chip cards
Banks
Media dependence
Smart Services
Health
Carefree
Me-focus
Monitor
Big Brother
Interactivity
Apps
Non-invasiveIVF
Hackers
Survival
Security
Internal Apps
Privacy Laws
Gratification
Smart relationship
Personalized media
Customized
Community
Marketplace
PleasureControl
Training
Un-Think
Transparency
Perfectionism
Desire
ConditioningUnbounded
Utopia
Carnality
Conformity
Rebellion
Media spin
Education
Religion
Resistance Reality TV
RFID
Intelligent packaging
Personal shopping
Personalization
Escapism
Crowd sourcing
Social media
Always on
Eternal youth
Stem cell research
3D
Prosumerism
Personal Data
Constient
privacy
Fear
Thrift
where will it take us?
11
IMPACT
PredictionPersonalized Consumerism
Digital IdentityDigital Freedom
Data Aggregation
Data Profiling
Negotiation
Virtual Democracy
Crowd sourcing
Miniaturization +nanotechnology
Automated Threat Assessment
Genomic Viruses
Neocortical interfaces
Virtual RealityNeural integration
DISRUPTION
ResistanceMARKET
ImplantsIdentification
Smart Products
Smart relationship
Freedom
Big Brother
Customized
Personal shopping
MAJORMAP INSIGHTS
the future of digital identification
12
APPENDIX
• Inconvenience to users: – 36 % of users have between six and 15
passwords to remember– 18% have more than 15 unique identifiers
to memorize
• Costs to Firms:– 25 to 35 per cent of calls made to IT
helpdesks are password related at an estimated cost of around $25 to $30 a call
Appendix
Passwords cost money
Source: http://www.securitypark.co.uk/security-market.asp
Existing Market Estimated size
Enterprise IT security market $20bn
Secure Content Management market $15bn
Worldwide security hardware $14bn
Biometrics market $6bn
Total $55bn
Source: http://www.securitypark.co.uk/security-market.asp
Disrupted Industries
Avoidable costs to society Estimated size
Cost of identity theft $56bn
Passwords – IT center cost $??bn
Shoplifting / retail theft $115bn
Total $100-200 bn
Value loss avoided
A 100 Billion dollar ideaAppendix