SlideShare a Scribd company logo
1 of 12
Download to read offline
From Authentication to
                         Identity Recognition
        Cyrille Bataller - Accenture Technology Labs




Copyright © 2012 Accenture All rights reserved.        1
Limits to Authentication…
        •   Something you have, something you know, something you are
             Too many cards, PINs, usernames and Pa55w0rds!


        •   Are my social security number, mother’s maiden name or
            my first school’s name really secrets?


        •   Why different schemes for different channels – password for
            web, PIN for ATM, shared secrets for call centre, ID doc in
            person?


        •   Why so many discrete authentication schemes?


Copyright © 2012 Accenture All rights reserved.                           2
We Can Do Better
        •   Authentication: wasted time and energy, barrier to do
            business (e.g. IVR)


        •   Too hard to remember – here comes the sticky note!
            50-75% of support calls = password reset


        •   Discrete, siloed authentication schemes are inherently
            weak – very narrow view of a person!


        •   Leads to inconvenience, user frustration, inefficiencies,
            and fraud
Copyright © 2012 Accenture All rights reserved.                         3
Identity Recognition!
        •   Holistic identity recognition – over time and across
            encounters


        •   Customer centricity – not system centricity


        •   Finally converging digital and physical ID


        •   Helping people conveniently assert their identity,
            while protecting their privacy and their right to
            anonymity!
Copyright © 2012 Accenture All rights reserved.                    4
Identity Recognition Benefits

     Improving customer experience and loyalty, and quality of service…




Copyright © 2012 Accenture All rights reserved.                           5
Identity Recognition Benefits

     Increasing operational efficiency and cost effectiveness…




Copyright © 2012 Accenture All rights reserved.                  6
Identity Recognition Benefits
                                                                        Improve effectiveness, reduce deficit
     Reducing fraud…                              “Identity fraud cost the UK economy £1.2 billion in one year (Identity Fraud Steering
                                                  Committee figures, 2008)” “The UK Department for Work and Pensions estimated that £800m
                                                  was lost to benefit fraud in 2006/7” “Identity fraud accounts for a criminal cash flow of
                                                  £10m per day.” “In March 2008 there were 76.8 million National Insurance numbers in the UK,
                                                  with a population of 61 million.” Source: CIFAS UK
  “The U.S. Internal Revenue Service may have delivered more than $5 billion in refund checks to identity
  thieves who filed fraudulent tax returns for 2011, Treasury Department investigators said. They estimate another
  $21 billion could make its way to ID thieves' pockets over the next five years.” Source: Federal News Radio

  “Identity theft rose 33% from 2005 to 2010 in the US, with 8.6M U.S. households experiencing $13.3 billion in
  direct financial losses in 2010” Source: US Dept of Justice

                                                                                                                           Source: US FTC
                                                    Build for the future
   “While it should be noted that in the developed world there continues to be resistance to national ID programs for
   various reasons, in the developing world, the national ID is increasingly becoming the cornerstone of a
   secure and trusted ecosystem, where the ultimate goal is for the ID card or the ID number to act as the single
   unique identifier in the country that supports multiple purposes and multiple applications in the private and
   public spheres. These could include tax filings, salary and pension payments, border crossings, voter
   verification, banking, land title registration, and so on. Very few examples of this exist today, but industry
   analysts expect that within 5 years, most countries will have some form of a national ID system in place
   and that these national ID systems will include biometrics.” Centre for Global Development.
Copyright © 2012 Accenture All rights reserved.                                                                                                 7
What Constitutes Identity?
        •   A collection of data that can uniquely describe a person.
        •   Identity gets richer over time – with information continually associated with a person, from cradle to
            grave. Granularity increases (from life events to every day life events).
        •   What sort of information?
            – What a person has, knows, is
            – But also context: where she is, what she’s doing, how she’s doing it, why she’s doing it, who she’s with,
              in what environment, under what circumstances, what her social network says, what her transaction
              history is…
                                     What a person has         What a person knows             What a person is
                                                The context within which this information is captured


        •   This information changes over time and across encounters  continuous enrolment
                                                  Event 1                                           Event 2
                                         Badge                 Fingerprint          Credit card #             Exp. date
                                                                                                                           …   Timeline

                                                  Location                         Browser data               IP address

                                                  at time t1                                    at time t2

Copyright © 2012 Accenture All rights reserved.                                                                                           8
Where’s Privacy Gone?
        •   Legitimate concerns on how data will be used and
            safeguarded
        •   Changing cultural attitudes, selective trust, clear benefits
        •   “Privacy by design”; “Privacy Impact Assessments” –
            ensuring proportionality, scope control, anonymisation,
            auditing, redress
        •   Procedural, technological, educational, regulatory
            mitigations
        •   Conveniently assert identity while preserving anonymity
         Identity recognition can lead to enhanced privacy,
        protection from identity theft

                       See Accenture’s “point of view on Biometrics and Privacy”
Copyright © 2012 Accenture All rights reserved.                                    9
Examples
        •   I call my bank with my mobile: caller ID (identity claim) + voice biometrics 
            I’m recognised and dealt with immediately, with knowledge of my context


        •   I walk into my airline lounge: I’m booked to fly today, they have my face
            photograph  I’m recognised and greeted by name


        •   I arrive at immigration, coming back into the country: API data says I’m
            arriving, system says my plane has landed, they have my passport photo 
            I’m recognised and welcomed back home


        •   I use my tablet for shopping, it’s my home IP address, my tablet’s device ID,
            the camera sees my face  I’m recognised and can do one-click purchase




Copyright © 2012 Accenture All rights reserved.                                              10
In Closing…
        Identity Recognition as the Foundation of Trust
     • Businesses and governments increasingly see value in moving away from (weak) discrete
     authentication, challenge-response methods, towards seamless, holistic identity recognition over
     time and across encounters.


     • This means using all data points known about a person to recognise them.


     • This enables customer centricity, finally converging physical and digital ID.


     • This helps improve customer experience and loyalty, and quality of service, while
     increasing cost effectiveness and reducing fraud.


     • It helps people conveniently assert their identity while protecting their privacy, preserving
     their right to anonymity.
Copyright © 2012 Accenture All rights reserved.                                                         11
Thank You

                                                             Cyrille Bataller
                                                             Partner


                                                             Accenture
                                                             400 avenue de Roumanille, Bât 1A
                                                             06902 Sophia Antipolis, France


                                                             Tel: +33 4 92 94 88 46
                                                             Fax: +3 4 92 94 67 99
                                                             Mobile: +33 6 85 54 24 14
                                                             cyrille.bataller@accenture.com


                                      www.accenture.com/biometrics
Copyright © 2012 Accenture All rights reserved.                                                 12

More Related Content

What's hot

Distra empowers mobile payments
Distra empowers mobile paymentsDistra empowers mobile payments
Distra empowers mobile paymentsDistraslides
 
2013 feb13 introduction to ppi generic
2013 feb13 introduction to ppi   generic2013 feb13 introduction to ppi   generic
2013 feb13 introduction to ppi genericRichard O'Brien
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012The Texas Network, LLC
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspectiveFuture Agenda
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kitupsettinginfo
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)spy007s
 
Aluminum wallet
Aluminum walletAluminum wallet
Aluminum walletTony
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of DataMomina Mateen
 

What's hot (20)

Side-event: Telenor - CRVS How Mobile Operators Can Help
Side-event: Telenor - CRVS How Mobile Operators Can HelpSide-event: Telenor - CRVS How Mobile Operators Can Help
Side-event: Telenor - CRVS How Mobile Operators Can Help
 
Distra empowers mobile payments
Distra empowers mobile paymentsDistra empowers mobile payments
Distra empowers mobile payments
 
Ramy appt
Ramy apptRamy appt
Ramy appt
 
2013 feb13 introduction to ppi generic
2013 feb13 introduction to ppi   generic2013 feb13 introduction to ppi   generic
2013 feb13 introduction to ppi generic
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Sabett: ESRA Identity Management 11-09-10
Sabett:  ESRA Identity Management 11-09-10Sabett:  ESRA Identity Management 11-09-10
Sabett: ESRA Identity Management 11-09-10
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspective
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Mental Models of Employment
Mental Models of EmploymentMental Models of Employment
Mental Models of Employment
 
20120510 università
20120510 università20120510 università
20120510 università
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Finger print
Finger printFinger print
Finger print
 
Aluminum wallet
Aluminum walletAluminum wallet
Aluminum wallet
 
Facing the Challenge of Enrolment
Facing the Challenge of EnrolmentFacing the Challenge of Enrolment
Facing the Challenge of Enrolment
 
The Development of a Federal Digital Identity
The Development of a Federal Digital IdentityThe Development of a Federal Digital Identity
The Development of a Federal Digital Identity
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data
 

Similar to OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs

Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
Evolution of identity Stoyan Kenderov - MAC 2014 conference
Evolution of identity   Stoyan Kenderov - MAC 2014 conferenceEvolution of identity   Stoyan Kenderov - MAC 2014 conference
Evolution of identity Stoyan Kenderov - MAC 2014 conferenceStoyan Kenderov
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?sorenpeter
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
World Digital Finance Hub.pptx
World Digital Finance Hub.pptxWorld Digital Finance Hub.pptx
World Digital Finance Hub.pptxElbekXolmatov
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG UpdateIan Glazer
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCloudIDSummit
 

Similar to OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs (20)

Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Evolution of identity Stoyan Kenderov - MAC 2014 conference
Evolution of identity   Stoyan Kenderov - MAC 2014 conferenceEvolution of identity   Stoyan Kenderov - MAC 2014 conference
Evolution of identity Stoyan Kenderov - MAC 2014 conference
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
World Digital Finance Hub.pptx
World Digital Finance Hub.pptxWorld Digital Finance Hub.pptx
World Digital Finance Hub.pptx
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
 

More from Accenture the Netherlands

Achieving Success in Digital for Manufacturing & Operations
Achieving Success in Digital for Manufacturing & OperationsAchieving Success in Digital for Manufacturing & Operations
Achieving Success in Digital for Manufacturing & OperationsAccenture the Netherlands
 
Digital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologiesDigital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologiesAccenture the Netherlands
 
The Digital Consumer: Know me, Inform me, Make it easy and Get it to me
The Digital Consumer: Know me, Inform me, Make it easy and Get it to meThe Digital Consumer: Know me, Inform me, Make it easy and Get it to me
The Digital Consumer: Know me, Inform me, Make it easy and Get it to meAccenture the Netherlands
 
Using simulations and serious games for enabling transformational change
Using simulations and serious games for enabling transformational changeUsing simulations and serious games for enabling transformational change
Using simulations and serious games for enabling transformational changeAccenture the Netherlands
 
Infographic - Digitizing Energy: Unlocking business value with digital techno...
Infographic - Digitizing Energy: Unlocking business value with digital techno...Infographic - Digitizing Energy: Unlocking business value with digital techno...
Infographic - Digitizing Energy: Unlocking business value with digital techno...Accenture the Netherlands
 
HPMC 2014 - How Analytics can improve your customer experience - SAS
HPMC 2014 - How Analytics can improve your customer experience - SASHPMC 2014 - How Analytics can improve your customer experience - SAS
HPMC 2014 - How Analytics can improve your customer experience - SASAccenture the Netherlands
 
HPMC 2014 - Optimizing customer value - Pega Systems
HPMC 2014 - Optimizing customer value - Pega SystemsHPMC 2014 - Optimizing customer value - Pega Systems
HPMC 2014 - Optimizing customer value - Pega SystemsAccenture the Netherlands
 
HPMC 2014 - CX and Mobility showcase - Oracle
HPMC 2014 - CX and Mobility showcase - OracleHPMC 2014 - CX and Mobility showcase - Oracle
HPMC 2014 - CX and Mobility showcase - OracleAccenture the Netherlands
 
HPMC 2014 - How the customer 2.0 changed marketing - Microsoft
HPMC 2014 - How the customer 2.0 changed marketing - MicrosoftHPMC 2014 - How the customer 2.0 changed marketing - Microsoft
HPMC 2014 - How the customer 2.0 changed marketing - MicrosoftAccenture the Netherlands
 
HPMC 2014 - Annual trends service design 2014 - Fjord
HPMC 2014 - Annual trends service design 2014 - FjordHPMC 2014 - Annual trends service design 2014 - Fjord
HPMC 2014 - Annual trends service design 2014 - FjordAccenture the Netherlands
 
HPMC 2014 - Thirteen tenets of a successful digital business - Acquity group
HPMC 2014 - Thirteen tenets of a successful digital business - Acquity groupHPMC 2014 - Thirteen tenets of a successful digital business - Acquity group
HPMC 2014 - Thirteen tenets of a successful digital business - Acquity groupAccenture the Netherlands
 
HPMC 2014 - Digital business edge - Accenture
HPMC 2014 - Digital business edge - AccentureHPMC 2014 - Digital business edge - Accenture
HPMC 2014 - Digital business edge - AccentureAccenture the Netherlands
 
HPMC 2014 - The New Energy Consumer - Accenture Netherlands
HPMC 2014 - The New Energy Consumer - Accenture NetherlandsHPMC 2014 - The New Energy Consumer - Accenture Netherlands
HPMC 2014 - The New Energy Consumer - Accenture NetherlandsAccenture the Netherlands
 

More from Accenture the Netherlands (20)

Gaining Momentum for IaaS
Gaining Momentum for IaaSGaining Momentum for IaaS
Gaining Momentum for IaaS
 
Achieving Success in Digital for Manufacturing & Operations
Achieving Success in Digital for Manufacturing & OperationsAchieving Success in Digital for Manufacturing & Operations
Achieving Success in Digital for Manufacturing & Operations
 
Digital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologiesDigital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologies
 
High Performance Business Study 2015 H1
High Performance Business Study 2015 H1High Performance Business Study 2015 H1
High Performance Business Study 2015 H1
 
The Digital Consumer: Know me, Inform me, Make it easy and Get it to me
The Digital Consumer: Know me, Inform me, Make it easy and Get it to meThe Digital Consumer: Know me, Inform me, Make it easy and Get it to me
The Digital Consumer: Know me, Inform me, Make it easy and Get it to me
 
Using simulations and serious games for enabling transformational change
Using simulations and serious games for enabling transformational changeUsing simulations and serious games for enabling transformational change
Using simulations and serious games for enabling transformational change
 
Infographic - Digitizing Energy: Unlocking business value with digital techno...
Infographic - Digitizing Energy: Unlocking business value with digital techno...Infographic - Digitizing Energy: Unlocking business value with digital techno...
Infographic - Digitizing Energy: Unlocking business value with digital techno...
 
Innovation in maintenance - Accenture
Innovation in maintenance - AccentureInnovation in maintenance - Accenture
Innovation in maintenance - Accenture
 
Digital Business - Accenture
Digital Business - AccentureDigital Business - Accenture
Digital Business - Accenture
 
HPMC 2014 - How Analytics can improve your customer experience - SAS
HPMC 2014 - How Analytics can improve your customer experience - SASHPMC 2014 - How Analytics can improve your customer experience - SAS
HPMC 2014 - How Analytics can improve your customer experience - SAS
 
HPMC 2014 - Optimizing customer value - Pega Systems
HPMC 2014 - Optimizing customer value - Pega SystemsHPMC 2014 - Optimizing customer value - Pega Systems
HPMC 2014 - Optimizing customer value - Pega Systems
 
HPMC 2014 - The value of analytics - SAS
HPMC 2014 - The value of analytics - SASHPMC 2014 - The value of analytics - SAS
HPMC 2014 - The value of analytics - SAS
 
HPMC 2014 - CX and Mobility showcase - Oracle
HPMC 2014 - CX and Mobility showcase - OracleHPMC 2014 - CX and Mobility showcase - Oracle
HPMC 2014 - CX and Mobility showcase - Oracle
 
HPMC 2014 - How the customer 2.0 changed marketing - Microsoft
HPMC 2014 - How the customer 2.0 changed marketing - MicrosoftHPMC 2014 - How the customer 2.0 changed marketing - Microsoft
HPMC 2014 - How the customer 2.0 changed marketing - Microsoft
 
HPMC 2014 - Annual trends service design 2014 - Fjord
HPMC 2014 - Annual trends service design 2014 - FjordHPMC 2014 - Annual trends service design 2014 - Fjord
HPMC 2014 - Annual trends service design 2014 - Fjord
 
HPMC 2014 - Thirteen tenets of a successful digital business - Acquity group
HPMC 2014 - Thirteen tenets of a successful digital business - Acquity groupHPMC 2014 - Thirteen tenets of a successful digital business - Acquity group
HPMC 2014 - Thirteen tenets of a successful digital business - Acquity group
 
HPMC 2014 - Digital business edge - Accenture
HPMC 2014 - Digital business edge - AccentureHPMC 2014 - Digital business edge - Accenture
HPMC 2014 - Digital business edge - Accenture
 
HPMC 2014 - The New Energy Consumer - Accenture Netherlands
HPMC 2014 - The New Energy Consumer - Accenture NetherlandsHPMC 2014 - The New Energy Consumer - Accenture Netherlands
HPMC 2014 - The New Energy Consumer - Accenture Netherlands
 
HPMC 2013 - Philips
HPMC 2013 - PhilipsHPMC 2013 - Philips
HPMC 2013 - Philips
 
HPMC 2013 - Nationale Nederlanden
HPMC 2013 - Nationale NederlandenHPMC 2013 - Nationale Nederlanden
HPMC 2013 - Nationale Nederlanden
 

OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs

  • 1. From Authentication to Identity Recognition Cyrille Bataller - Accenture Technology Labs Copyright © 2012 Accenture All rights reserved. 1
  • 2. Limits to Authentication… • Something you have, something you know, something you are  Too many cards, PINs, usernames and Pa55w0rds! • Are my social security number, mother’s maiden name or my first school’s name really secrets? • Why different schemes for different channels – password for web, PIN for ATM, shared secrets for call centre, ID doc in person? • Why so many discrete authentication schemes? Copyright © 2012 Accenture All rights reserved. 2
  • 3. We Can Do Better • Authentication: wasted time and energy, barrier to do business (e.g. IVR) • Too hard to remember – here comes the sticky note! 50-75% of support calls = password reset • Discrete, siloed authentication schemes are inherently weak – very narrow view of a person! • Leads to inconvenience, user frustration, inefficiencies, and fraud Copyright © 2012 Accenture All rights reserved. 3
  • 4. Identity Recognition! • Holistic identity recognition – over time and across encounters • Customer centricity – not system centricity • Finally converging digital and physical ID • Helping people conveniently assert their identity, while protecting their privacy and their right to anonymity! Copyright © 2012 Accenture All rights reserved. 4
  • 5. Identity Recognition Benefits Improving customer experience and loyalty, and quality of service… Copyright © 2012 Accenture All rights reserved. 5
  • 6. Identity Recognition Benefits Increasing operational efficiency and cost effectiveness… Copyright © 2012 Accenture All rights reserved. 6
  • 7. Identity Recognition Benefits Improve effectiveness, reduce deficit Reducing fraud… “Identity fraud cost the UK economy £1.2 billion in one year (Identity Fraud Steering Committee figures, 2008)” “The UK Department for Work and Pensions estimated that £800m was lost to benefit fraud in 2006/7” “Identity fraud accounts for a criminal cash flow of £10m per day.” “In March 2008 there were 76.8 million National Insurance numbers in the UK, with a population of 61 million.” Source: CIFAS UK “The U.S. Internal Revenue Service may have delivered more than $5 billion in refund checks to identity thieves who filed fraudulent tax returns for 2011, Treasury Department investigators said. They estimate another $21 billion could make its way to ID thieves' pockets over the next five years.” Source: Federal News Radio “Identity theft rose 33% from 2005 to 2010 in the US, with 8.6M U.S. households experiencing $13.3 billion in direct financial losses in 2010” Source: US Dept of Justice Source: US FTC Build for the future “While it should be noted that in the developed world there continues to be resistance to national ID programs for various reasons, in the developing world, the national ID is increasingly becoming the cornerstone of a secure and trusted ecosystem, where the ultimate goal is for the ID card or the ID number to act as the single unique identifier in the country that supports multiple purposes and multiple applications in the private and public spheres. These could include tax filings, salary and pension payments, border crossings, voter verification, banking, land title registration, and so on. Very few examples of this exist today, but industry analysts expect that within 5 years, most countries will have some form of a national ID system in place and that these national ID systems will include biometrics.” Centre for Global Development. Copyright © 2012 Accenture All rights reserved. 7
  • 8. What Constitutes Identity? • A collection of data that can uniquely describe a person. • Identity gets richer over time – with information continually associated with a person, from cradle to grave. Granularity increases (from life events to every day life events). • What sort of information? – What a person has, knows, is – But also context: where she is, what she’s doing, how she’s doing it, why she’s doing it, who she’s with, in what environment, under what circumstances, what her social network says, what her transaction history is… What a person has What a person knows What a person is The context within which this information is captured • This information changes over time and across encounters  continuous enrolment Event 1 Event 2 Badge Fingerprint Credit card # Exp. date … Timeline Location Browser data IP address at time t1 at time t2 Copyright © 2012 Accenture All rights reserved. 8
  • 9. Where’s Privacy Gone? • Legitimate concerns on how data will be used and safeguarded • Changing cultural attitudes, selective trust, clear benefits • “Privacy by design”; “Privacy Impact Assessments” – ensuring proportionality, scope control, anonymisation, auditing, redress • Procedural, technological, educational, regulatory mitigations • Conveniently assert identity while preserving anonymity  Identity recognition can lead to enhanced privacy, protection from identity theft See Accenture’s “point of view on Biometrics and Privacy” Copyright © 2012 Accenture All rights reserved. 9
  • 10. Examples • I call my bank with my mobile: caller ID (identity claim) + voice biometrics  I’m recognised and dealt with immediately, with knowledge of my context • I walk into my airline lounge: I’m booked to fly today, they have my face photograph  I’m recognised and greeted by name • I arrive at immigration, coming back into the country: API data says I’m arriving, system says my plane has landed, they have my passport photo  I’m recognised and welcomed back home • I use my tablet for shopping, it’s my home IP address, my tablet’s device ID, the camera sees my face  I’m recognised and can do one-click purchase Copyright © 2012 Accenture All rights reserved. 10
  • 11. In Closing… Identity Recognition as the Foundation of Trust • Businesses and governments increasingly see value in moving away from (weak) discrete authentication, challenge-response methods, towards seamless, holistic identity recognition over time and across encounters. • This means using all data points known about a person to recognise them. • This enables customer centricity, finally converging physical and digital ID. • This helps improve customer experience and loyalty, and quality of service, while increasing cost effectiveness and reducing fraud. • It helps people conveniently assert their identity while protecting their privacy, preserving their right to anonymity. Copyright © 2012 Accenture All rights reserved. 11
  • 12. Thank You Cyrille Bataller Partner Accenture 400 avenue de Roumanille, Bât 1A 06902 Sophia Antipolis, France Tel: +33 4 92 94 88 46 Fax: +3 4 92 94 67 99 Mobile: +33 6 85 54 24 14 cyrille.bataller@accenture.com www.accenture.com/biometrics Copyright © 2012 Accenture All rights reserved. 12