+ Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba
Dec 23, 2015
+
Computer Password ManagerColin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba
+Agenda
Refined POG
Value Opportunity Analysis
Product Attributes
Short List of Product Concepts
Selected Product Concept
Prototype
+Refined POG
Background Increase in the use of password protected applications Varying password security policies
Challenge Difficulty for consumers to remember security combinations
Opportunity Gap Assist customers with remembering their passwords Create a safe and reliable manner for all internet passwords
+Value Opportunity Analysis
Low Med High
Emotion
adventure NA independence NA
securitysensuality NA
confidence power
User Interfacecomfort NA
safetyease of use
Aesthetics
visual auditory NA
tactile NA olfactory NA
gustatory NA
Identitypoint in time
sense of place personality
Impactsocial
environmental Core
Technologyreliable
enabling
Qualitycraftsmanship
durability Profit Impact
Brand Impact Extendable
- users want to feel secure that there information is safe.
- users need to feel confident that the product will work
- product needs to be bug free and safe holding users information- light users need to be able to easily use this product- Look of product should be simple and stylish
- Core technology must be reliable and actually save users time
- Product needs to be well made and bug free. Users need to know it will last.
+Product Attributes
Be secure and safe.
Be able to be used on multiple computer systems.
Be easy to use.
Seamless platform integration.
Encourages unique passwords and prompts if password change needed.
Have excellent Brand reputation.
+Analysis of Product Attributes
Weight Product Attributes (out of 10) Secure Id USB Key Website Cell Phone
40% Be secure and safe. 9 8 4 7
20% Be able to be used on multiple computer systems.
10 8 10 5
10% Be easy to use. 8 8 9 6
25% Seamless platform integration. 4 8 10 6
5%Encourages unique passwords and prompts if password change needed.
10 10 10 10
Total 7.9 8.1 7.5 6.4
+Analysis of Stakeholders
Stakeholder Secure ID USB Key Website Cell Phone
Individual Consumers POS POS POS POS
Web Departments NEG NEU NEU NEU
Credit Card Companies POS NEU NEG NEG
Consumer Advocacy Groups NEU NEU NEG NEG
Businesses NEG NEU NEU NEU
Overall Response NEU POS NEG NEG
+Short List of Product Concepts
Wireless Security Key
USB Key With Fingerprint Scanner
Java Enabled Website
Cell Phone with Blue Tooth Enabled Password Manager
+Key Challenges/Questions
Portability Are consumers going to want to carry it with them? Can we design it so consumers will carry it with them? How big does it have to be?
Design/GUI Interface What would the prompts look like on computer? What is the user experience on the computer like?
How secure is the fingerprint security?
+Final Product ConceptExample user scenario:
Judith uses several online applications with different password requirements.
Her secure USB device is plugged into her laptop.
The USB asks for fingerprint authentication.
Successful recognition by the software, pops a second level of authentication (password only).
After successful authentication, the software provides the userid/password for each of the applications stored in the USB device.
After 15 minutes of inactivity, the device turns itself off.
+Prototype Flowchart
1) User inserts USB and scans fingerprint
2) Second level password authentication
+Lessons Learned
Ensure process is completely streamlined for the consumer.
Integrate USB with objects users normally carry with them.
Additional functionality of USB.
Backup for USB drive.
QUESTIONS?