SlideShare une entreprise Scribd logo
1  sur  17
atural id   Natural ID: When Usability meets Security
            at the Frontier of the Digital World

            Sebastien Taveau, CTO
            Validity Inc.
Natural ID and Cloud




  Source: The PC-DOC Systems Consulting
Security Options
Natural ID and User Options
Digital and Physical Use Cases
Natural ID common use cases
The World revolves around You.
Fingerprint is the key to unlock many personalized services

                                                Payment
                                                    Travel
                                               4-screens
                                               Domotics
                                                   Access
                                          Infotainment
                                             v


                                          Digital Goods
Concrete Usability
Natural ID and Commerce Simplicity
                           User & Payment flow




  Device & Service flow
Natural ID and NFC
                                  User
                                Validation



        Content     Content           Content
        Access     Assignment         Sharing




  Application     Payment           Application
   Activation                         Vetting




 Temporary
                     RF             Token
    DRM
                  Activation      Generation
 Assignment
Risk Management
Natural ID and Risk Modeling
Increasing Revenues & Reducing churn / losses
                          Cart Abandonment
                          • Mobile: Each additional screen increase cart abandonment by
                             15%
                          • Average abandonment rate is: 65.23%
                          • Amazon created the 1-click check out to solve this issue
                          • Amazon’s Trailing 12 month revenue is $51.4B*.
                          • Projected for mobile is $4B+
                          • No-show: Losing 15% of just mobile business would be $600M.
                          • PayPal: $119B** TPV; $10B Mobile; no-show TPV: $1.5B


                           Fraudulent Transaction Reduction

                           •   Commerce: Total market size is $10T ***
                           •   Cash/check vs eMoney: 50% or $5T TAM
                           •   Mobile representing 6% of TAM: $300B
                           •   Accepted online fraud rate is 200bsp / 2%
                           •   Potential exposure is: $6B (today) to $100B (mainstream)
                           •   Reducing even by 1bsp results in $30M to $500M reduction


(source: *Yahoo Finance, **eBay Analyst Day report, ***Economist Intelligence Unit)
FIDO: REINVENTING STRONG
AUTHENTICATION
ENTERPRISE PLAYERS                      CONSUMER PLAYERS
    ENHANCE SECURITY                    BETTER PROTECTION
        REDUCE COSTS                    SUPERIOR EXPERIENCE
 LOWER SUPPORT ISSUES                   NEW REVENUE MODELS


                        FIDO ALLIANCE
      DEVICE OEMS                       TOKEN VENDORS
      EMBED SECURITY                    INCREASE ATTACH RATE
        DIFFERENTIATE                   ACCELERATE ADOPTION
  THOUGHT LEADERSHIP                    MOBILE COVERAGE

                                                 FINGERPRINT,
  SUPPORTING ANY                                 TPM, VOICE &
DEVICE, ANYWHERE                                 FACE
THANK YOU

SebastienTaveau
+1 408 387 5362
staveau@validityinc.com
Twitter: frogtwitt


your identity naturally accessible




                                     validity

Contenu connexe

Tendances

Mr Deturche Gemalto The Mobile
Mr Deturche Gemalto The MobileMr Deturche Gemalto The Mobile
Mr Deturche Gemalto The MobileIDATE DigiWorld
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
M Banking- Take the Money With You
M Banking- Take the Money With YouM Banking- Take the Money With You
M Banking- Take the Money With YouSabbir Mahmud
 
Monetizing Mobile - Intuit Financial Services Case Study
Monetizing Mobile - Intuit Financial Services Case StudyMonetizing Mobile - Intuit Financial Services Case Study
Monetizing Mobile - Intuit Financial Services Case StudyIntuit Inc.
 
Ivytalk presents mobile payments
Ivytalk presents mobile paymentsIvytalk presents mobile payments
Ivytalk presents mobile paymentsMary Jesse
 
Mobile payment - what mobiles can do for you
Mobile payment - what mobiles can do for youMobile payment - what mobiles can do for you
Mobile payment - what mobiles can do for youBenjamin Joffe
 
Will Mobile Payments Ever Replace Cash in the Last Mile? Where, when, and how?
Will Mobile Payments Ever Replace Cash in the Last Mile?  Where, when, and how?Will Mobile Payments Ever Replace Cash in the Last Mile?  Where, when, and how?
Will Mobile Payments Ever Replace Cash in the Last Mile? Where, when, and how?Menekse Gencer
 
The Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontierThe Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontierIsabelle Berner
 
E To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationE To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationCDB Consultancy LLC
 
CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPPGroup Plc
 
IBM Software Day 2013. Defending against cyber threats with security intellig...
IBM Software Day 2013. Defending against cyber threats with security intellig...IBM Software Day 2013. Defending against cyber threats with security intellig...
IBM Software Day 2013. Defending against cyber threats with security intellig...IBM (Middle East and Africa)
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalClubHack
 
Where do we go from here?
Where do we go from here?Where do we go from here?
Where do we go from here?cVidya Networks
 
Dogs and demons in mobile - what mobile operators don't tell about 3G
Dogs and demons in mobile - what mobile operators don't tell about 3GDogs and demons in mobile - what mobile operators don't tell about 3G
Dogs and demons in mobile - what mobile operators don't tell about 3GBenjamin Joffe
 
Newsletter Edwards October
Newsletter Edwards OctoberNewsletter Edwards October
Newsletter Edwards Octoberdavid1edwards
 

Tendances (20)

Mr Deturche Gemalto The Mobile
Mr Deturche Gemalto The MobileMr Deturche Gemalto The Mobile
Mr Deturche Gemalto The Mobile
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
M Banking- Take the Money With You
M Banking- Take the Money With YouM Banking- Take the Money With You
M Banking- Take the Money With You
 
Mobile Payments
Mobile PaymentsMobile Payments
Mobile Payments
 
Monetizing Mobile - Intuit Financial Services Case Study
Monetizing Mobile - Intuit Financial Services Case StudyMonetizing Mobile - Intuit Financial Services Case Study
Monetizing Mobile - Intuit Financial Services Case Study
 
Ivytalk presents mobile payments
Ivytalk presents mobile paymentsIvytalk presents mobile payments
Ivytalk presents mobile payments
 
Mobile payment - what mobiles can do for you
Mobile payment - what mobiles can do for youMobile payment - what mobiles can do for you
Mobile payment - what mobiles can do for you
 
Will Mobile Payments Ever Replace Cash in the Last Mile? Where, when, and how?
Will Mobile Payments Ever Replace Cash in the Last Mile?  Where, when, and how?Will Mobile Payments Ever Replace Cash in the Last Mile?  Where, when, and how?
Will Mobile Payments Ever Replace Cash in the Last Mile? Where, when, and how?
 
The Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontierThe Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontier
 
Presentation1
Presentation1Presentation1
Presentation1
 
E To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationE To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
 
CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011
 
IBM Software Day 2013. Defending against cyber threats with security intellig...
IBM Software Day 2013. Defending against cyber threats with security intellig...IBM Software Day 2013. Defending against cyber threats with security intellig...
IBM Software Day 2013. Defending against cyber threats with security intellig...
 
Legal nuances to the cloud
Legal nuances to the cloudLegal nuances to the cloud
Legal nuances to the cloud
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara Agrawal
 
Where do we go from here?
Where do we go from here?Where do we go from here?
Where do we go from here?
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
 
Dogs and demons in mobile - what mobile operators don't tell about 3G
Dogs and demons in mobile - what mobile operators don't tell about 3GDogs and demons in mobile - what mobile operators don't tell about 3G
Dogs and demons in mobile - what mobile operators don't tell about 3G
 
Newsletter Edwards October
Newsletter Edwards OctoberNewsletter Edwards October
Newsletter Edwards October
 
Banking trends
Banking trendsBanking trends
Banking trends
 

Similaire à Taveau cartes2012 speaker

OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsAccenture the Netherlands
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
 
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!Identive
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
Future of Location - Street Fight Summit 2012
Future of Location - Street Fight Summit 2012Future of Location - Street Fight Summit 2012
Future of Location - Street Fight Summit 2012Amber Case
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneIDpii2011
 
Mobile Banking Conference Southern Africa 130312
Mobile Banking Conference Southern Africa  130312Mobile Banking Conference Southern Africa  130312
Mobile Banking Conference Southern Africa 130312DSG
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind MalwareSophos
 
JunglePay - Alternative Billing Solution
JunglePay - Alternative Billing SolutionJunglePay - Alternative Billing Solution
JunglePay - Alternative Billing SolutionJunglePay
 
Product/Market Fit - Twists and Turns
Product/Market Fit - Twists and TurnsProduct/Market Fit - Twists and Turns
Product/Market Fit - Twists and TurnsDavid Jones
 
Anil Malhotra presents Bango
Anil Malhotra presents BangoAnil Malhotra presents Bango
Anil Malhotra presents BangoCanvas8
 
Stefan Savage Cyber Cafe
Stefan Savage Cyber CafeStefan Savage Cyber Cafe
Stefan Savage Cyber CafeAmy Lenzo
 
Real Disruption: Stepping Back and Solving the Hard Problems
Real Disruption: Stepping Back and Solving the Hard ProblemsReal Disruption: Stepping Back and Solving the Hard Problems
Real Disruption: Stepping Back and Solving the Hard ProblemsAmber Case
 
Digital Directions 21st Century Media (Gigi Wang)
Digital Directions 21st Century Media (Gigi Wang)Digital Directions 21st Century Media (Gigi Wang)
Digital Directions 21st Century Media (Gigi Wang)Gigi Wang
 
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...BodeGeorge
 
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)Niraj Vaidya
 

Similaire à Taveau cartes2012 speaker (20)

Stu w25 a
Stu w25 aStu w25 a
Stu w25 a
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Future of Location - Street Fight Summit 2012
Future of Location - Street Fight Summit 2012Future of Location - Street Fight Summit 2012
Future of Location - Street Fight Summit 2012
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneID
 
Mobile Banking Conference Southern Africa 130312
Mobile Banking Conference Southern Africa  130312Mobile Banking Conference Southern Africa  130312
Mobile Banking Conference Southern Africa 130312
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
JunglePay - Alternative Billing Solution
JunglePay - Alternative Billing SolutionJunglePay - Alternative Billing Solution
JunglePay - Alternative Billing Solution
 
Product/Market Fit - Twists and Turns
Product/Market Fit - Twists and TurnsProduct/Market Fit - Twists and Turns
Product/Market Fit - Twists and Turns
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
 
Anil Malhotra presents Bango
Anil Malhotra presents BangoAnil Malhotra presents Bango
Anil Malhotra presents Bango
 
Stefan Savage Cyber Cafe
Stefan Savage Cyber CafeStefan Savage Cyber Cafe
Stefan Savage Cyber Cafe
 
Real Disruption: Stepping Back and Solving the Hard Problems
Real Disruption: Stepping Back and Solving the Hard ProblemsReal Disruption: Stepping Back and Solving the Hard Problems
Real Disruption: Stepping Back and Solving the Hard Problems
 
Digital Directions 21st Century Media (Gigi Wang)
Digital Directions 21st Century Media (Gigi Wang)Digital Directions 21st Century Media (Gigi Wang)
Digital Directions 21st Century Media (Gigi Wang)
 
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
 
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)
 

Taveau cartes2012 speaker

  • 1. atural id Natural ID: When Usability meets Security at the Frontier of the Digital World
 Sebastien Taveau, CTO Validity Inc.
  • 2. Natural ID and Cloud Source: The PC-DOC Systems Consulting
  • 4. Natural ID and User Options
  • 5.
  • 6.
  • 8. Natural ID common use cases
  • 9. The World revolves around You. Fingerprint is the key to unlock many personalized services Payment Travel 4-screens Domotics Access Infotainment v Digital Goods
  • 11. Natural ID and Commerce Simplicity User & Payment flow Device & Service flow
  • 12. Natural ID and NFC User Validation Content Content Content Access Assignment Sharing Application Payment Application Activation Vetting Temporary RF Token DRM Activation Generation Assignment
  • 14. Natural ID and Risk Modeling
  • 15. Increasing Revenues & Reducing churn / losses Cart Abandonment • Mobile: Each additional screen increase cart abandonment by 15% • Average abandonment rate is: 65.23% • Amazon created the 1-click check out to solve this issue • Amazon’s Trailing 12 month revenue is $51.4B*. • Projected for mobile is $4B+ • No-show: Losing 15% of just mobile business would be $600M. • PayPal: $119B** TPV; $10B Mobile; no-show TPV: $1.5B Fraudulent Transaction Reduction • Commerce: Total market size is $10T *** • Cash/check vs eMoney: 50% or $5T TAM • Mobile representing 6% of TAM: $300B • Accepted online fraud rate is 200bsp / 2% • Potential exposure is: $6B (today) to $100B (mainstream) • Reducing even by 1bsp results in $30M to $500M reduction (source: *Yahoo Finance, **eBay Analyst Day report, ***Economist Intelligence Unit)
  • 16. FIDO: REINVENTING STRONG AUTHENTICATION ENTERPRISE PLAYERS CONSUMER PLAYERS ENHANCE SECURITY BETTER PROTECTION REDUCE COSTS SUPERIOR EXPERIENCE LOWER SUPPORT ISSUES NEW REVENUE MODELS FIDO ALLIANCE DEVICE OEMS TOKEN VENDORS EMBED SECURITY INCREASE ATTACH RATE DIFFERENTIATE ACCELERATE ADOPTION THOUGHT LEADERSHIP MOBILE COVERAGE FINGERPRINT, SUPPORTING ANY TPM, VOICE & DEVICE, ANYWHERE FACE
  • 17. THANK YOU SebastienTaveau +1 408 387 5362 staveau@validityinc.com Twitter: frogtwitt your identity naturally accessible validity

Notes de l'éditeur

  1. Manual approx less than 2 monthsJailbreak iPhone About 20h (less than a day)
  2. Verify location of device and userPaymentActivate NFC chipGenerate user token and deliver itTemporary assigned and release content/DRMMulti sign-on across devices / credential delegationVetting / binding of applications / deviceSort/store/file new content under proper user (cloud assignment
  3. Note: In its Annual Report for 2010, eBay mentioned that its subsidiary in Korea, IAC, had to deal with a potential exposure of 200M users in 2008 and put the price tag at $200/user to fix the situation Abandonment rate: 72.31% according to
Fireclick / DigitalRiver in
2012 62.31% according to
Coremetrics / IBM in
2011 72.00% according to
SeeWhy in
2011 71.00% according to
SeeWhy in
2010 55.00% according to
Forrester Research & Shop.org in
2010 63.68% according to
Coremetrics / IBM in
2010 69.38% according to
Fireclick / DigitalRiver in
2010 62.14% according to
MarketLive in
2009 71.00% according to
Forrester Research in
2009 63.19% according to
Coremetrics / IBM in
2009 68.00% according to
SeeWhy in
2009 62.01% according to
Coremetrics / IBM in
2008 61.36% according to
Coremetrics / IBM in
2007 59.80% according to
MarketingSherpa in
2006Average: 65.23% abandonment rateLast updated: February 25, 2012
  4. Add examples of each?