SlideShare uma empresa Scribd logo
1 de 22
1



ATTRIBUTE QUALITY ASSURED
AUTHENTICATION
Dr. Rachel O’Connell
GroovyFuture.com
2

WHO AM I?


PhD online criminal activity: implications for investigative strategies



Chief Security Officer Bebo, VP AOL



Research Consultant



Oxford Internet Institute:
 Effective Age Verification Techniques: Lessons to be Learnt from the Online
Gambling Industry



Ctrl_Shift

A market analyst and consulting: changing personal data landscape.



Member of OIX and the GSMA’s UK Assured legal working group



Advisor to commercial organisations on both the policy requirements and business
opportunities associated with digital and mobile ID



Co-founder of GroovyFuture.com.
3

KEY POINTS:


Traditional data sources for ID and age verification:





Increase in the number of data sources: Tipping point




Age is simply an attribute of identity: permissioned, quality assured attributes.

Age related attributes enable the following:







Artificial barriers
COPPA compliance

Improvements in customer acquisition and on-boarding processes
Uplift in, and/or generation of new revenue streams
Creation of new business development opportunities
Effective compliance with consumer protection and data protection regulation

Benefits to a number of business sectors including mobile operators, payment
providers, retailers, platform providers, digital media producers and advertisers-
4

TRADITIONAL ID AND AGE VERIFICATION
5

BELOW 18 YEARS


Guarantor model - leveraged traditional data sources



Burdensome compliance cost



Little or no elevation in assurance



Open to repudiation



Privacy concerns



No viable commercial or liability models



Not scalable, absence of standards



Not an effective means to mitigate risks



Barrier to innovation



View of a child online
6

EUROPEAN E-ID LANDSCAPE


Electronic ID cards exist in:
Belgium, Estonia, Finland, Germany, Italy, P
ortugal and Spain.



Other forms of e-ID, like citizen cards and
access tokens are used in: Austria, Czech
Republic, Denmark, Lithuania, Luxembourg
, The Netherlands, Slovakia, Slovenia and
Sweden.



17 EU countries also participate in a
project called STORK which has proven
that e-IDs can be safely recognised across
borders.

https://www.eid-stork.eu/index.php?option=com_processes&act=list_documents&s=1&Itemid=60&id=312
7

PRACTICAL APPLICATIONS


Austria and Iceland enable 'Safer Chat' for 1418 year olds where users need their e-ID card
to enter chat rooms for 14-18 year olds.



SaferChat has been tested as a platform for
safer online communication cross
borders, providing useful eID services for elearning.



Pilot can be taken as an illustration of attribute
based authentication with maximum data
protection.



Businesses or governmental organizations can
utilise this approach, adapting it for specific
purposes.



Open Source.
8

Scalability/Flexibility Various National Credentials

 The SaferChat pilot has proven to be very flexible in terms of

scalability, both smart cards and SIM cards are used to access pilot
applications.
 At the outset Icelandic and Austrian credentials were supported

 During pilot lifetime support for further cross border electronic

identities was added
(Estonia, Spain, Italy, Latvia, Luxembourg, Portugal, Slovenia and
Finland).
 ‘This could be done without any serious effort due to sufficiently

flexible and scalable STORK project specifications’.
9

STORK 2.0: AQAA
 Attribute Quality Authentication

Assurance (AQAA) framework
 Multiple Data Sources
 Business Needs /business rules
 Legal Framework
MINOR’S TRUST FRAMEWORK
11

DATA SOURCES
 IDaaS platform e.g. Avoco

Secure, provide a user centric
approach (SFA)

 Academic attribute providers: SAML
 International Student Card: Mobile ID

(pilot project)

 Banks – miicard

 Payments infrastructure –

Vocalink, Zapp
12

DATA SOURCES
 Government issued ID docs –
 Secure key
 OCR – ID Checker
 Digital Life Data – Trulioo
 Personal Data Empowerment Tools and

Services

 Biometrics

 Traditional data bureaus and CRA’s
13

BankID NORWAY


Age attributes accessible
Examples of when you can use BankID:











BankAxess (a new payment service for
online shopping)
Log-in and payment via internet bank
Change of address with the postal service
Placing a bid when buying property
Login on municipal websites
Purchasing units in equities funds

BankID can be used as an electronic proof
of identity, for example logging in at a
BankID user site.
DOB data was originally included so
students could avail of discounts.
14

ECONOMIC SOCIALISATION
15
16

BUSINESS NEEDS


COPPA 2.0 Email+


20%-40% SPAM FOLDER



Permissioned attributes



Spending limits



Diversity of product offerings



Shared devices

4.4 m -

2.7m

4.8 m
17

AGE GATING AND ENGAGEMENT ADVERTISING
18

EVOLUTION OF PARAMETERS
AGE VERIFICATION: 2008
Burdensome compliance cost
Little or no elevation in assurance

ATTRIBUTE QUALITY ASSURED: 2013
Business enabler / return on investment
Attribute Quality Authentication Assurance

Open to repudiation

Granular assurance / business rules

Privacy concerns

Privacy preserving, data minimisation principles

No viable commercial or liability models

Legal framework / scope for viable commercial
models
Trust frameworks /interoperable standards

Not scalable, absence of standards
Not effective personal safety risk
mitigation
Barrier to innovation

Augments security / business risk

View of children: passive, vulnerable

Active participant, economic socialisation,

Data Protection Act: Free market

Proposed DP: Human rights, Consumer Protection
Directive, Digital Agenda 2020

Foster innovation, product diversity, virtuous cycle
19

AQAA:VIRTUOUS CYCLE
Attribute
assurance
/token reuse within
ecosystem

Higher
sales, profit
margins
=Return on
investment

Consumer
satisfaction

Improved
service
delivery

Customer
loyalty

Customer
satisfaction

Regulatory
compliance
20

BUSINESS ENABLER


A greater variety of data sources will be accessible and
permissioned, these can be cross checked and combined to
meet specific business rules.

Higher levels of customer acquisition














Remote on-boarding
Seamless customer experience

Trust elevation – LOA’s, as per business rules
Low integration costs
Modular, highly configurable
Scalable, viable low cost
Reusable tokens
UX
Reputation, foster brand loyalty

Challenges: Cross sectorial consensus, time
frames, information security, Information
security, managing the processes of
accreditation, oversight, redress
21

 Thank You
 rachel@technologist.com
 Twitter: @racheloconnell

 www.GroovyFuture.com
22

Mais conteúdo relacionado

Mais procurados

Electronic and mobile commerce
Electronic and mobile commerceElectronic and mobile commerce
Electronic and mobile commerce
yham manansala
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
Future Agenda
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
Eric BILLIAERT
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
Pragati Rai
 

Mais procurados (19)

E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systems
 
Electronic and mobile commerce
Electronic and mobile commerceElectronic and mobile commerce
Electronic and mobile commerce
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content Regulation
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018
 
E-Commerce: Digital Markets, Digital Goods
E-Commerce: Digital Markets, Digital GoodsE-Commerce: Digital Markets, Digital Goods
E-Commerce: Digital Markets, Digital Goods
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
Iti
ItiIti
Iti
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
 
Fintech.
Fintech.Fintech.
Fintech.
 
Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)
 
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesIT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Nxtd
NxtdNxtd
Nxtd
 
Iti
ItiIti
Iti
 
E commerce class 2
E commerce class 2E commerce class 2
E commerce class 2
 
Fintech Simplified
Fintech SimplifiedFintech Simplified
Fintech Simplified
 
E-Commerce
 E-Commerce E-Commerce
E-Commerce
 

Semelhante a 5 nov gsma_eema

Semelhante a 5 nov gsma_eema (20)

SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
 
How a Top Bank Improved Customer Experience Through Digital Transformation
How a Top Bank Improved Customer Experience Through Digital TransformationHow a Top Bank Improved Customer Experience Through Digital Transformation
How a Top Bank Improved Customer Experience Through Digital Transformation
 
The Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationThe Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity Verification
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
 
Identity Trust Framework Survey
Identity Trust Framework SurveyIdentity Trust Framework Survey
Identity Trust Framework Survey
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital Identity
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
 
The-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptx
The-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptxThe-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptx
The-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptx
 
The Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechThe Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTech
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
Identity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docxIdentity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docx
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Mini Project- Shopping Cart Development
Mini Project- Shopping Cart DevelopmentMini Project- Shopping Cart Development
Mini Project- Shopping Cart Development
 
Dictao Company Presentation
Dictao Company PresentationDictao Company Presentation
Dictao Company Presentation
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

5 nov gsma_eema

  • 1. 1  ATTRIBUTE QUALITY ASSURED AUTHENTICATION Dr. Rachel O’Connell GroovyFuture.com
  • 2. 2 WHO AM I?  PhD online criminal activity: implications for investigative strategies  Chief Security Officer Bebo, VP AOL  Research Consultant  Oxford Internet Institute:  Effective Age Verification Techniques: Lessons to be Learnt from the Online Gambling Industry  Ctrl_Shift  A market analyst and consulting: changing personal data landscape.  Member of OIX and the GSMA’s UK Assured legal working group  Advisor to commercial organisations on both the policy requirements and business opportunities associated with digital and mobile ID  Co-founder of GroovyFuture.com.
  • 3. 3 KEY POINTS:  Traditional data sources for ID and age verification:    Increase in the number of data sources: Tipping point   Age is simply an attribute of identity: permissioned, quality assured attributes. Age related attributes enable the following:      Artificial barriers COPPA compliance Improvements in customer acquisition and on-boarding processes Uplift in, and/or generation of new revenue streams Creation of new business development opportunities Effective compliance with consumer protection and data protection regulation Benefits to a number of business sectors including mobile operators, payment providers, retailers, platform providers, digital media producers and advertisers-
  • 4. 4 TRADITIONAL ID AND AGE VERIFICATION
  • 5. 5 BELOW 18 YEARS  Guarantor model - leveraged traditional data sources  Burdensome compliance cost  Little or no elevation in assurance  Open to repudiation  Privacy concerns  No viable commercial or liability models  Not scalable, absence of standards  Not an effective means to mitigate risks  Barrier to innovation  View of a child online
  • 6. 6 EUROPEAN E-ID LANDSCAPE  Electronic ID cards exist in: Belgium, Estonia, Finland, Germany, Italy, P ortugal and Spain.  Other forms of e-ID, like citizen cards and access tokens are used in: Austria, Czech Republic, Denmark, Lithuania, Luxembourg , The Netherlands, Slovakia, Slovenia and Sweden.  17 EU countries also participate in a project called STORK which has proven that e-IDs can be safely recognised across borders. https://www.eid-stork.eu/index.php?option=com_processes&act=list_documents&s=1&Itemid=60&id=312
  • 7. 7 PRACTICAL APPLICATIONS  Austria and Iceland enable 'Safer Chat' for 1418 year olds where users need their e-ID card to enter chat rooms for 14-18 year olds.  SaferChat has been tested as a platform for safer online communication cross borders, providing useful eID services for elearning.  Pilot can be taken as an illustration of attribute based authentication with maximum data protection.  Businesses or governmental organizations can utilise this approach, adapting it for specific purposes.  Open Source.
  • 8. 8 Scalability/Flexibility Various National Credentials  The SaferChat pilot has proven to be very flexible in terms of scalability, both smart cards and SIM cards are used to access pilot applications.  At the outset Icelandic and Austrian credentials were supported  During pilot lifetime support for further cross border electronic identities was added (Estonia, Spain, Italy, Latvia, Luxembourg, Portugal, Slovenia and Finland).  ‘This could be done without any serious effort due to sufficiently flexible and scalable STORK project specifications’.
  • 9. 9 STORK 2.0: AQAA  Attribute Quality Authentication Assurance (AQAA) framework  Multiple Data Sources  Business Needs /business rules  Legal Framework
  • 11. 11 DATA SOURCES  IDaaS platform e.g. Avoco Secure, provide a user centric approach (SFA)  Academic attribute providers: SAML  International Student Card: Mobile ID (pilot project)  Banks – miicard  Payments infrastructure – Vocalink, Zapp
  • 12. 12 DATA SOURCES  Government issued ID docs –  Secure key  OCR – ID Checker  Digital Life Data – Trulioo  Personal Data Empowerment Tools and Services  Biometrics  Traditional data bureaus and CRA’s
  • 13. 13 BankID NORWAY  Age attributes accessible Examples of when you can use BankID:         BankAxess (a new payment service for online shopping) Log-in and payment via internet bank Change of address with the postal service Placing a bid when buying property Login on municipal websites Purchasing units in equities funds BankID can be used as an electronic proof of identity, for example logging in at a BankID user site. DOB data was originally included so students could avail of discounts.
  • 15. 15
  • 16. 16 BUSINESS NEEDS  COPPA 2.0 Email+  20%-40% SPAM FOLDER  Permissioned attributes  Spending limits  Diversity of product offerings  Shared devices 4.4 m - 2.7m 4.8 m
  • 17. 17 AGE GATING AND ENGAGEMENT ADVERTISING
  • 18. 18 EVOLUTION OF PARAMETERS AGE VERIFICATION: 2008 Burdensome compliance cost Little or no elevation in assurance ATTRIBUTE QUALITY ASSURED: 2013 Business enabler / return on investment Attribute Quality Authentication Assurance Open to repudiation Granular assurance / business rules Privacy concerns Privacy preserving, data minimisation principles No viable commercial or liability models Legal framework / scope for viable commercial models Trust frameworks /interoperable standards Not scalable, absence of standards Not effective personal safety risk mitigation Barrier to innovation Augments security / business risk View of children: passive, vulnerable Active participant, economic socialisation, Data Protection Act: Free market Proposed DP: Human rights, Consumer Protection Directive, Digital Agenda 2020 Foster innovation, product diversity, virtuous cycle
  • 19. 19 AQAA:VIRTUOUS CYCLE Attribute assurance /token reuse within ecosystem Higher sales, profit margins =Return on investment Consumer satisfaction Improved service delivery Customer loyalty Customer satisfaction Regulatory compliance
  • 20. 20 BUSINESS ENABLER  A greater variety of data sources will be accessible and permissioned, these can be cross checked and combined to meet specific business rules.  Higher levels of customer acquisition           Remote on-boarding Seamless customer experience Trust elevation – LOA’s, as per business rules Low integration costs Modular, highly configurable Scalable, viable low cost Reusable tokens UX Reputation, foster brand loyalty Challenges: Cross sectorial consensus, time frames, information security, Information security, managing the processes of accreditation, oversight, redress
  • 21. 21  Thank You  rachel@technologist.com  Twitter: @racheloconnell  www.GroovyFuture.com
  • 22. 22

Notas do Editor

  1. The Avoco IDP is both user-centric and privacy enabled. Underpinning the capability to scale and handle large volumes of transactions is an architecture that incorporates much of what has been learnt from social networking systems that have the ability to handle a billion identities. This avoids the limiting factors, that are prevalent in Enterprise identity systems, which have been adapted to try and deliver consumer mass market identity. Avoco offer several variants of Identity Provider Platforms. Each enables you to issue and manage online digital identities which are user centric, privacy enabled, simple to deploy in the cloud, or a local network, totally customisable and scalable to millions of users. Information Card (WS- Trust), Saml and OpenID digital identities are all supported by Avoco identity services. These services are based on an attribute/claims based architecture. The issued identities can be used with many types of credential including social network federated login, digital certificates, Mobile phone SMS text, username and password, etc. A service to issue and manage online digital identities that can then be used to access online services, secure documents and sign HTML web forms.Avoco Secure is an innovation company whose areas of focus are solutions for cloud identity, security, and privacy. Using an Avoco identity, you can access online services from iPads, mobile phones, PCs etc. in a simple, secure and easy to use way. Users can seamlessly log in and send data to online services. This is done in a secure manner that both mirrors and extends their everyday experience with social networks and webmail. Avoco solutions are user centric, enhanced by security and incorporate privacy by design.Vocalink study: Younger adults are especially likely to be mobile payment users (41% of 16 to 24 year olds), and around half of those who are not already using the service are interested in doing so.