SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Shaping the U.S. NFC Eco-System


  Presentation Subtitle 22pt
  Arial Regular

Humphrey Chen
03.28.2012


PID#

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
What do we want Verizon Wireless phones
                                                                                                           to uniquely “unlock” and “gain access to”?

                                                                                                          Identify the most valuable use cases and Partners
                                                                                                          to feed into our NFC secure element requirements




                      ID                                       Payment




                 Loyalty
                 cards                                               Keys                                                             Verizon will create a comprehensive
                                                                                                                                      suite of services using the personal
                                                                                                                                       information stored in the phone to
                                                                                                                                          interact with the environment

                                   Transportation
                                       ticket



                                                                                                                                                                                                                                    2
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.       2
Hotel room access using secure NFC

     At Home or Work:                                                                                                                                                    At the hotel




      Circumvent long lines, and manage your                                                                                             A mobile key is sent to the device, enabling room
      employees time more efficiently and effectively.                                                                                   access via the NFC phone to the hotel room.




Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.   3
“Mobile Key” Home Access Using secure NFC



                                                                                                                       Verizon trusted
                                                                                                                       service manager




Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.   4
Mass Transit “Mobile Ticketing” Using secure NFC


     Julia is planning a day trip                                                                                            Verizon trusted
                                                                                                                             service manager
     to Boston to visit several
     museums.




                                                                                                       She has purchased a
                                                                                                       local train ticket online
                                                                                                       and downloaded the
                                                                                                       ticket to her smartphone
                                                                                                       over the internet.




                                                                                                                                                       Upon arriving at the train
                                                                                                                                                         station, Julia uses her
                                                                                                                                                          smartphone to ‘tap’ a
                                                                                                                                                      reader, redeem her ticket,
                                                                                                                                                           and board the train.




Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.   5
Road Map Evolution

               Today                                                                             Classic disparate, disconnected and more expensive

       Physical Access                                             Logical Access                                         Biometric Access                                      Remote Access & Authentication




    ~ $1B revenues                                                                                                                                                                                    ~$300M

                                               One vendor, fewer devices, lower cost to provision, maintain & support with
                                                                         cross-carrier support



Petrochemical, critical infrastructure, healthcare, financial services

Physical Access                                           Logical Access                                         Biometric Access
                                                                                                                 Time & attendance
                                                                                                                 monitoring                                                                                           PIV,
                                           +                                                                                                                                              Inventory tracking
                                                                                                                                                                                                                      Secure ID

                    FIPS, government legislation
 Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.   6
The I.C.E.S. framework




Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.   7
Droid Activation




Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.   8
Droid Market Share




Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.   9

Contenu connexe

Plus de MIT Enterprise Forum Cambridge

Plus de MIT Enterprise Forum Cambridge (20)

Make yourself financing ready - may 19 2020
Make yourself financing ready - may 19 2020Make yourself financing ready - may 19 2020
Make yourself financing ready - may 19 2020
 
Cleantech Startups: Navigating the Mass Cleantech Landscape
Cleantech Startups: Navigating the Mass Cleantech LandscapeCleantech Startups: Navigating the Mass Cleantech Landscape
Cleantech Startups: Navigating the Mass Cleantech Landscape
 
Cleantech Startups: Navigating the Massachusetts Cleantech Landscape
Cleantech Startups: Navigating the Massachusetts Cleantech LandscapeCleantech Startups: Navigating the Massachusetts Cleantech Landscape
Cleantech Startups: Navigating the Massachusetts Cleantech Landscape
 
​Generating Sales with Facebook Advertising
​Generating Sales with Facebook Advertising​Generating Sales with Facebook Advertising
​Generating Sales with Facebook Advertising
 
Get Smart on Bookkeeping and Taxes for Startups
Get Smart on Bookkeeping and Taxes for StartupsGet Smart on Bookkeeping and Taxes for Startups
Get Smart on Bookkeeping and Taxes for Startups
 
MITEF Launch Smart Clinic AR/VR - Bernard Francois, Preview Labs
MITEF Launch Smart Clinic AR/VR - Bernard Francois, Preview LabsMITEF Launch Smart Clinic AR/VR - Bernard Francois, Preview Labs
MITEF Launch Smart Clinic AR/VR - Bernard Francois, Preview Labs
 
Cannabis Technology
Cannabis TechnologyCannabis Technology
Cannabis Technology
 
Emerging Applications of Blockchain for Supply Chains
Emerging Applications of Blockchain for Supply ChainsEmerging Applications of Blockchain for Supply Chains
Emerging Applications of Blockchain for Supply Chains
 
Gavin Bauman, Technical Evangelist, Microsoft presentation
Gavin Bauman, Technical Evangelist, Microsoft presentationGavin Bauman, Technical Evangelist, Microsoft presentation
Gavin Bauman, Technical Evangelist, Microsoft presentation
 
Eric Janszen, CEO and Co-Founder, Virzoom
Eric Janszen, CEO and Co-Founder, VirzoomEric Janszen, CEO and Co-Founder, Virzoom
Eric Janszen, CEO and Co-Founder, Virzoom
 
Neil Gupta, a VR/AR enthusiast and a key organizer of the Boston AR and VR Me...
Neil Gupta, a VR/AR enthusiast and a key organizer of the Boston AR and VR Me...Neil Gupta, a VR/AR enthusiast and a key organizer of the Boston AR and VR Me...
Neil Gupta, a VR/AR enthusiast and a key organizer of the Boston AR and VR Me...
 
Josh Weaver, Senior Engineer, Google VR, presentation
Josh Weaver,  Senior Engineer, Google VR, presentationJosh Weaver,  Senior Engineer, Google VR, presentation
Josh Weaver, Senior Engineer, Google VR, presentation
 
Justin Lutz, Lead Innovation Technologist, Primacy, presentation
Justin Lutz, Lead Innovation Technologist,  Primacy, presentationJustin Lutz, Lead Innovation Technologist,  Primacy, presentation
Justin Lutz, Lead Innovation Technologist, Primacy, presentation
 
Sarah Downey, Principal, Accomplice VC Presentation
Sarah Downey, Principal, Accomplice VC PresentationSarah Downey, Principal, Accomplice VC Presentation
Sarah Downey, Principal, Accomplice VC Presentation
 
Connected Health: Emerging Technologies Poised to Make our Lives Better
Connected Health: Emerging Technologies Poised to Make our Lives Better  Connected Health: Emerging Technologies Poised to Make our Lives Better
Connected Health: Emerging Technologies Poised to Make our Lives Better
 
Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...
Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...
Mac Devine, VP & CTO, Emerging Technology & Advanced Innovation, IBM Cloud Di...
 
Connected Retail: Running the Store with IoT
Connected Retail: Running the Store with IoTConnected Retail: Running the Store with IoT
Connected Retail: Running the Store with IoT
 
Harel Kodesh, Vice President, Predix and CTO, GE Digital
Harel Kodesh, Vice President, Predix and CTO, GE DigitalHarel Kodesh, Vice President, Predix and CTO, GE Digital
Harel Kodesh, Vice President, Predix and CTO, GE Digital
 
Intro to keynote David Friend, CEO, BlueArchive
Intro to keynote David Friend, CEO, BlueArchiveIntro to keynote David Friend, CEO, BlueArchive
Intro to keynote David Friend, CEO, BlueArchive
 
IoT Analytics: Using Analytics to Generate High Value from IoT in the Real World
IoT Analytics: Using Analytics to Generate High Value from IoT in the Real WorldIoT Analytics: Using Analytics to Generate High Value from IoT in the Real World
IoT Analytics: Using Analytics to Generate High Value from IoT in the Real World
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Shaping the us nfc eco system -- verizon presentation from auto-id expo 032812

  • 1. Shaping the U.S. NFC Eco-System Presentation Subtitle 22pt Arial Regular Humphrey Chen 03.28.2012 PID# Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
  • 2. What do we want Verizon Wireless phones to uniquely “unlock” and “gain access to”? Identify the most valuable use cases and Partners to feed into our NFC secure element requirements ID Payment Loyalty cards Keys Verizon will create a comprehensive suite of services using the personal information stored in the phone to interact with the environment Transportation ticket 2 Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 2
  • 3. Hotel room access using secure NFC At Home or Work: At the hotel Circumvent long lines, and manage your A mobile key is sent to the device, enabling room employees time more efficiently and effectively. access via the NFC phone to the hotel room. Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 3
  • 4. “Mobile Key” Home Access Using secure NFC Verizon trusted service manager Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 4
  • 5. Mass Transit “Mobile Ticketing” Using secure NFC Julia is planning a day trip Verizon trusted service manager to Boston to visit several museums. She has purchased a local train ticket online and downloaded the ticket to her smartphone over the internet. Upon arriving at the train station, Julia uses her smartphone to ‘tap’ a reader, redeem her ticket, and board the train. Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 5
  • 6. Road Map Evolution Today Classic disparate, disconnected and more expensive Physical Access Logical Access Biometric Access Remote Access & Authentication ~ $1B revenues ~$300M One vendor, fewer devices, lower cost to provision, maintain & support with cross-carrier support Petrochemical, critical infrastructure, healthcare, financial services Physical Access Logical Access Biometric Access Time & attendance monitoring PIV, + Inventory tracking Secure ID FIPS, government legislation Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 6
  • 7. The I.C.E.S. framework Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 7
  • 8. Droid Activation Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 8
  • 9. Droid Market Share Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 9