O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

Money2020 Identity Workshop (Introduction Only)

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Carregando em…3
×

Confira estes a seguir

1 de 12 Anúncio
Anúncio

Mais Conteúdo rRelacionado

Diapositivos para si (20)

Anúncio

Semelhante a Money2020 Identity Workshop (Introduction Only) (20)

Anúncio

Mais recentes (20)

Money2020 Identity Workshop (Introduction Only)

  1. 1. www.chyp.comPlease copy and distribute25/10/20171 Digital Identity – Why Now? the opportunity for banks David G.W. Birch Director, Consult Hyperion Money 2020 Las Vegas, October 2017
  2. 2. www.chyp.comPlease copy and distribute David G.W. Birch An internationally-recognised thought leader in digital identity and digital money; Named one of the global top 15 favourite sources of business information (Wired magazine); In the London FinTech top ten (City A.M.); most influential commentators Ranked one of the top five Leaders in IDentity (Rise); One of the top ten Twitter accounts followed by innovators, along with Bill Gates and Richard Branson (PR Daily); One of the top ten most influential voices in banking (Financial Brand); Ranked Europe’s most influential commentator on emerging payments (Total Payments magazine). 2
  3. 3. www.chyp.comPlease copy and distribute Available at all good bookshops… > 3
  4. 4. www.chyp.comPlease copy and distribute Identity as a Strategy “It’s not about payment. It’s about identity” Jack Dorsey, Founder of Square and Twitter (New York Times, 22nd December 2013) 4
  5. 5. www.chyp.comPlease copy and distribute A Three Domain Model 5
  6. 6. www.chyp.comPlease copy and distribute Identification Domain Binding a digital identity to a mundane identity is expensive 6
  7. 7. www.chyp.comPlease copy and distribute Authorisation Domain Allow me to… get on a plane 7
  8. 8. www.chyp.comPlease copy and distribute Authentication Domain Establishing the right to use an identity 8
  9. 9. www.chyp.comPlease copy and distribute Visit our website: http://www.chyp.com Follow us on Twitter: @chyppings Email us: info@chyp.com Read: Tomorrow's Transactions Blog Listen: Consult Hyperion Podcasts Consult Hyperion UK Tweed House, 12 The Mount Guildford, Surrey GU24HN, UK. +44 1483 301793 Consult Hyperion USA 535 Madison Avenue, 19th Floor New York, NY 10022, USA. +1 888 835 6124 Contact 25/10/20179
  10. 10. www.chyp.comPlease copy and distribute Who Are Consult Hyperion? Consult Hyperion specialises in working out the opportunities and threats which result from the harmony and collision of security, networks and transactions. We are constantly assessing these factors, as they change continuously, and delivering ideas, solutions and products to our clients 10
  11. 11. www.chyp.comPlease copy and distribute What Do We Do? We have a structured and practical approach to secure electronic transaction systems from the local to the global 11 Strategy Roadmapping Market Analysis Business Modelling Prototyping Requirements Analysis Risk Analysis System Architecture Technical Specification Procurement Support Software Development Vendor Management Project Management Certification Management Acceptance Testing Evaluation We can help clients in all phases of the product and service lifecycle, from the whiteboard scribble to the person in the street’s everyday use
  12. 12. www.chyp.comPlease copy and distribute Who do we do it For? 12 25/10/2017

Notas do Editor

  • All the things you are
    The number of proposed biometric technologies increases daily. Starting with the well-established fingerprint systems to the more esoteric such as ear geometry (commonly left by listeners at crime scenes in Switzerland, apparently), gait (the way you walk) and body odour. How should you go about deciding the most appropriate technology for any given application?
    Biometric technologies are useful means of identifying people against databases or verifying that they are who they say they are. A small number of technologies are good at the former function (e.g. iris and fingerprint) whereas many are capable of verification against a biometric template stored on a token such as a smart card or travel document.
    There are many different applications for these two functions within UK government such as:
    Verifying that a document holder is the legitimate document holder by matching them against a biometric held within the document.
    Preventing duplicate applications for documents by searching against the database of currently issued documents.
    Preventing people holding different identities on different systems (e.g. Driving License vs Passport) by sharing and cross-checking biometric data.
    Ensuring that only legitimate members of staff have access to secure areas and systems.
    The complexity of the individual requirements of each application coupled with the speed of advance of biometric technologies means that there is no single best biometric for all applications.
  • All the things you are
    The number of proposed biometric technologies increases daily. Starting with the well-established fingerprint systems to the more esoteric such as ear geometry (commonly left by listeners at crime scenes in Switzerland, apparently), gait (the way you walk) and body odour. How should you go about deciding the most appropriate technology for any given application?
    Biometric technologies are useful means of identifying people against databases or verifying that they are who they say they are. A small number of technologies are good at the former function (e.g. iris and fingerprint) whereas many are capable of verification against a biometric template stored on a token such as a smart card or travel document.
    There are many different applications for these two functions within UK government such as:
    Verifying that a document holder is the legitimate document holder by matching them against a biometric held within the document.
    Preventing duplicate applications for documents by searching against the database of currently issued documents.
    Preventing people holding different identities on different systems (e.g. Driving License vs Passport) by sharing and cross-checking biometric data.
    Ensuring that only legitimate members of staff have access to secure areas and systems.
    The complexity of the individual requirements of each application coupled with the speed of advance of biometric technologies means that there is no single best biometric for all applications.

×