Top Banner
PHASE 1 DISCOVERY IFBD TERM PROJECT
14

Ifbd Phase1 Report Team Cluster Cuss March 19

May 18, 2015

Download

Technology

guestc46e14bc

IFBD Report March 19
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ifbd Phase1 Report Team Cluster Cuss March 19

PHASE 1DISCOVERYIFBD TERM PROJECT

Page 2: Ifbd Phase1 Report Team Cluster Cuss March 19

2

INTRODUCTION

MARKET RESEARCH

SCENARIOS

THE OPPORTUNITY

WHERE WILL IT TAKE US

3

4

5

7

8

Page 3: Ifbd Phase1 Report Team Cluster Cuss March 19

Stop and take a moment to think. How many cards do you have in your wallet? How soon do you have to get your passport renewed? How many times a day do you deal with locks, passwords, and other protections in order to protect your possessions, information and identity? How many days will you take off work to maintain your “identity” this year?

Access to your information is being controlled by various entities. The government, credit card companies and Google are keeping track of your health, your finances, your purchasing behaviour and your interests. With all this information being passed around, sold to third parties, leaked accidentally, how much say do you have over who gets to know the “real” you?

We have granted strangers free access to our lives. We feel entitled to personal information of our friends, rather than privileged. The internet has become our playground. But how safe is it?

There are 7 billion people in the world. How can you not get lost in the crowd?

The number of U.S. identity fraud victims increased 22 percent in 2008 to 9.9 million adults.3

3

Canadians lost $10.8M to

identity theft in 2009 alone.

This figure has been growing at

29 percent a year.4

582M Smart Cards in circulation

worldwide, 20071

The authentication, mobile device security and

identity market is worth over $5B2

(1) Smart Cards in the US, Contactless Payment Cards, May 2007 (2) Internet Security, Privacy, and Fraud, Packaged Facts, Oct 2005 (3) Javelin Strategy & Research, February 2009 study (4) http://www.phonebusters.com/english/documents/AnnualStatisticalReport2009_001.pdf

35% of banks had a biometric

authentication program... In 2005

introduction

Page 4: Ifbd Phase1 Report Team Cluster Cuss March 19

4

Nations the world over are switching to biometric passports to identify travelers. Manchester Airport uses facial recognition to allow travelers to bypass lineups and governments to check anyone against international watchlists.

Lockheed Martin is giving 1 million maritime workers access to secure areas of ports via finger and iris scans, stored on biometric ID cards.

The US, Australia, Britain, and Canada have created a biometric database to help combat terrorism and rapidly identify victims in large-scale disasters.

PositiveID markets FDA-approved RFID microchip implants for patient identification applications, and is developing implantable glucose sensing microchip

Source: BusinessWeek Online; 5/21/2009, p2-2, 1p

Biometric passports

Security speed

access Finger & iris scans

biometric database combat terrorism identify victims

Implantable glucose sensors

RFID microchips

The world as we know it is changing before our eyes...

market research

Page 5: Ifbd Phase1 Report Team Cluster Cuss March 19

5

Meet Richard. He is 50 years old. Richard works in for a large multinational company. He has been travelling between 4 different countries for the past 7 years working on various projects. He’s tired of waiting in lines at airports and getting his passport renewed.

Meet Margareth, she is a 23-year old administrative assistant in Port-au-Prince and a native of Haiti. After the earthquake, she could not locate her husband Roméo, who was a peacekeeper for the

hundreds of hours wasted

inefficient processes

tired of waiting

lack of awareness

can’t trust anyone

anymore

“hate this way of living”

No matter who you are and where you live, nothing is more important than your identity.

passport renewed. “I’ve wasted hundreds of hours going through the same, inefficient processes,” Richard says. “System glitches and human error have cost me countless of dollars in terms of time and wages. I’m tired of this.” He is a member of different VIP travellers groups, and despite their promises of time savings and line bypasses, John continues to waste countless of precious hours in queues.

scenarios

UN. She was unable to find him in the chaos, since the UN headquarters had collapsed in the earthquake, as well as their home in the outskirts of the city. She searched through the rubble of her home for days, but was not able to find his body. The area around his office building was far too dangerous, and none of the authorities or police were able to give her a clue as to whether he was still living, potentially injured in some hospital without a way to communicate with her, or whether she should grieve his loss. She kept on hanging on to hope, wishing there was some way to know for sure where he was, and how he was doing. She wanted answers, so that she could be reunited, or find his body so that she could give him a proper burial.

Page 6: Ifbd Phase1 Report Team Cluster Cuss March 19

6

How do you define living? Do you exist if no one knows who you are?

...plans to travel to Asia this summer.

...needs a summer job to pay for school

and new car.

...will soon require emergency services

at hospital.

work

travel

health care

food

living expenses

paycheques

the common need

Without ID will governments believe you exist?

Page 7: Ifbd Phase1 Report Team Cluster Cuss March 19

7

introducing

Constient your key towards complete digital awareness

the ability to be digitally aware of others, and have others digitally

aware of you

what if technology could flawlessly identify you?

wouldn’t that change everything about how

we live, work, and play?

the technology is out there

biometric databases

facial recognition

human RFID implants

sensor networks

subdermal health sensors

it is freedom from worry

of fraud or theft,

of the hassle of PIN codes and passwords

of carrying ID and forgetting it

of misplacing your keys

of lineups and hours wasted updating IDs

and government documents

identifying the opportunity

what is Constient?  how is it possible? 

Why do we need it?

what is the future of Constient? A world where all your data, from government documents, to your car keys and your gmail account are all centralized in one location – YOU. Forget having to carrying 50 different keys, cards and passwords to access 50 different locations and services. This will be one key giving you instant access, instant recognition, and perfect service – just the way you like it. Let us open the way for you, it will be the last ID you’ll ever need.

Page 8: Ifbd Phase1 Report Team Cluster Cuss March 19

8

IMPACTINTENSIFICATION

Arms Length

Installation Tool

Com. Protocols

Processing

Auto-Friending

BEHAVIOR

TOOLS

Guarded

Standards

Wireless

Loyalty

Personal Firewall

Profiling

Hacking

Understanding

Enforcement

Personal Apps

Alliances

Shopping

Biometric dataProgrammers

Scanners

SecurityAlgorithms

Encryption

Data Aggregation

Off The Grid

Food Selects You

D.I.Y.

Carefree

Data Aggravation

Data Civil Rights

Privacy Laws

Data ConservationLife Regression Modeling

Semantic Reviews

Data Snooping

Learning

Gesturing

InsuranceUnderwriters

Personal MarketingCampaigns

IndependentConfident

Wallet-less

Cookies

Meta DataAnalysis

Fishbowl

Lifecycle ManagementClones

Hacking

Tribalism

Profile Management

Real-time Promotions

Predictive Services

Selective Memory

Non MassTransit

Social Norms

Credibility Auditing

Credibility Bureaus

Trends

Black Market

Individual Price Discrimination

Data ProfilingInfo Piracy

One-think Shopping

Random Acts of Randomness

Prediction

India/China

Manipulation

Smart Relationships

Consumer RFPs

Smart Medical

Micro Testing

Behavior Recommendations

Data Mining

Personalized Branding

Data Junkies

Corporatacracy

Big Brother

Smart Product Design

Negotiation

iLawyer

Indiscretion

History

Personal Data

Constient

Design

Simulation

Preemptive Purchase

Nano-Segmentation

Social Engineering

Data Mgmt.

Boredom

Risk Mitigation

Trustworthiness

Personalized Consumerism

Trend Analysis

Boundary Conditions

Relationship Ratings

Digital Identity

Virtual Democracy

Interactive Flora & Fauna

Rating Agencies

Etiquette

Custom Manufacturing

Artificial Intelligence

Pro

UnobtrusiveJurisprudence

Proxy Management

Permissions

Software

Life Evaluation

Password

Verification

Digital Freedom

Genealogy

Constraints

Memory

Interactive Virtual AncestorsIterative Social Contract

where will it take us?

Page 9: Ifbd Phase1 Report Team Cluster Cuss March 19

9

DISRUPTIONAMPLIFICATION

BEHAVIOR

TOOLS

age sensitive screening

Micro RFID

Miniaturization +nanotechnology

securID

Document digitization

The Cloud

Elite bypass

Personal Apps

subdermal installBio sensors

Tamper resistanthardware

Electro-mechanic powerMulti-layer encryption

Proximityscanningpatriot act

biometric IDs

Micro-segmentation

Privacy Laws

Implantable phones

Biofeedback alerts

Airport bioscanners

Virtual reality

Personal worlds

Real-time stimulation

Neocortical interfaces

Hearing override

Instant learning by upload

Global translation for VR interactions

PrivacyLitigation

Profile Management

Real-time video tracking

intelligent drugdosages

Reality overrides

Personal algorithms

Holo band

Perfect personal product positioning

Virtual clonesBackdoor

code

GPS

Digitized personas

Global real-timepositioning

Personal Data

Constient

NEXUS passes

Personal data storage

Random number generators

Neural integration

Jawbone readers

Implant app store

Automated Threat Assessment

Payment for clone access

Computer viruses attack you

Genomic targeted viruses

Scanning blockers

Personal insurance premiumsBiometric monitoring

Smart cards

Digital Angel

Wireless datatransfers

PersonalHistory

data

FishbowlGoogle AdSense

Coordinate large crowds

Payment

Behaviour cessation

Personalized Insurance premium

Real-time purchase monitoring

Identity Theft

Stalking 2.0

Digital Alibi

Backgroundprofiling

Financial security

Personalized recommendations

Fatigue monitoring Travelling

ProtectionControl

Monitor Kids

Gene warfare

Health 2.0

Proactive health

Digital Mimicry

Health scan for roller-coasters

Search and rescue

Find Friends

Data Profiling

Preventative medical tracking

Going “Dark”

Battle drugs

Search and rescue

Access personal history

Location-aware commerce

Anti-terrorism

Retail analysis

.Corporate espionage

Chip engaged ignition

Big Brother

National security

Viral warefare

Hacking

Marriage 2.0Exercise diet aid

VIP GuestsEmployee tracking

Virtual Reality

Sex offender registry

Getting “chipped”Selling Data

Health monitoring

No Customs Line

Addiction cessation

Perimeter Alert

Traffic coordination

Where will it take us?

Page 10: Ifbd Phase1 Report Team Cluster Cuss March 19

10

MARKETMAXIMIZATION

Mass customization

Cloud computing

Online avatars

Biotech

Biomimicry

Real-time promotions

identity theft

Social engineering

DESIRE

ECONOMY

Nanotechnology

ImplantsIdentification

Government

Progress

Freedom

Safety

Smart Products

Consumerism

Chip cards

Banks

Media dependence

Smart Services

Health

Carefree

Me-focus

Monitor

Big Brother

Interactivity

Apps

Non-invasiveIVF

Hackers

Survival

Security

Internal Apps

Privacy Laws

Gratification

Smart relationship

Personalized media

Customized

Community

Marketplace

PleasureControl

Training

Un-Think

Transparency

Perfectionism

Desire

ConditioningUnbounded

Utopia

Carnality

Conformity

Rebellion

Media spin

Education

Religion

Resistance Reality TV

RFID

Intelligent packaging

Personal shopping

Personalization

Escapism

Crowd sourcing

Social media

Always on

Eternal youth

Stem cell research

3D

Prosumerism

Personal Data

Constient

privacy

Fear

Thrift

where will it take us?

Page 11: Ifbd Phase1 Report Team Cluster Cuss March 19

11

IMPACT

PredictionPersonalized Consumerism

Digital IdentityDigital Freedom

Data Aggregation

Data Profiling

Negotiation

Virtual Democracy

Crowd sourcing

Miniaturization +nanotechnology

Automated Threat Assessment

Genomic Viruses

Neocortical interfaces

Virtual RealityNeural integration

DISRUPTION

ResistanceMARKET

ImplantsIdentification

Smart Products

Smart relationship

Freedom

Big Brother

Customized

Personal shopping

MAJORMAP INSIGHTS

the future of digital identification

Page 12: Ifbd Phase1 Report Team Cluster Cuss March 19

12

APPENDIX

Page 13: Ifbd Phase1 Report Team Cluster Cuss March 19

• Inconvenience to users: – 36 % of users have between six and 15

passwords to remember– 18% have more than 15 unique identifiers

to memorize

• Costs to Firms:– 25 to 35 per cent of calls made to IT

helpdesks are password related at an estimated cost of around $25 to $30 a call

Appendix

Passwords cost money

Source: http://www.securitypark.co.uk/security-market.asp

Page 14: Ifbd Phase1 Report Team Cluster Cuss March 19

Existing Market Estimated size

Enterprise IT security market $20bn

Secure Content Management market $15bn

Worldwide security hardware $14bn

Biometrics market $6bn

Total $55bn

Source: http://www.securitypark.co.uk/security-market.asp

Disrupted Industries

Avoidable costs to society Estimated size

Cost of identity theft $56bn

Passwords – IT center cost $??bn

Shoplifting / retail theft $115bn

Total $100-200 bn

Value loss avoided

A 100 Billion dollar ideaAppendix