ExpectID® Product Suite Presentation to ISTTF September 23, 2008 IDology, Inc. / ExpectID Product Suite ISTTF Presentation 9/23/2008.

Slides:



Advertisements
Similar presentations
Co-Registration.  Industry’s Most Advanced System  Real-Time Data Hygiene Dynamic Offer Targeting/Optimization Secondary Questions & B2B Support XML.
Advertisements

Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
S CENARIOS FOR THE F UTURE OF THE C ANADIAN P AYMENTS S YSTEM A UTHENTICATION AND I DENTITY W ORKSHOP N OVEMBER 3, 2010 Greg Wolfond.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Use your IRA to Invest in Real Estate. Contents Purpose Facts and History Benefits and Guidelines Security Trust Company Investment examples Summary and.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Aristotle International Integrity™ Age and ID Verification Presentation to ISTTF September 23, 2008 Aristotle’s Integrity™ ISTTF Presentation 9/23/2008.
Phillip Hallam-Baker Extended Validation Presentation to ISTTF September 23, 2008 VeriSign/Extended Validation ISTTF Presentation 9/23/2008.
Making the Web a safer place for children AGR™ Cutting-Edge Biometrics System For Online Age Verification, In Real-Time Presentation to ISTTF Boston, September.
© 2004 TransUnion LLC. All Rights Reserved. August 10, 2005 Seven Easy Steps to Fraud Prevention Northwestern University Clifton M. O’Neal Director, Corporate.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Identity October 9, 2008.
EGuardian, Inc. eGuardian Child Verification Presentation to ISTTF September 23, 2008 eGuardian, Inc. eGuardian Child Verification ISTTF Presentation 9/23/2008.
Presentation to ISTTF September 23, 2008 AssertID ISTTF Presentation 9/23/2008.
VECO MULTI FAMILY OFFICE (ASIA) LTD
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Overview Our Company Founded in 2003, Opt-Intelligence operates a leading Opt-In Ad Solution built on our patent-pending Clear-Request™ technology platform.
Biometrics: Voice Recognition
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
Sapient Insurance Partners. Overview & Services We have almost four decades of combined experience in the property & casualty insurance and reinsurance.
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
© 2011 Aristotle, Inc. All Rights Reserved. Why Johnny Can't Play: Creating Websites for Grown Ups.
African Banking Technology Conference 3 April 2008 Nairobi - Kenya Patrick Mburu Director, ATS - Africa.
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Andrew Nash Senior Director of Identity Services Topics in Identity and Payments.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
A History of WEP The Ups and Downs of Wireless Security.
Sanzi-1 CSE5 810 CSE5810: Intro to Biomedical Informatics Dynamically Generated Adaptive Credentials for Health Information Exchange Eugene Sanzi.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Identity and biometrics.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
DigitalPersona, Inc. Biometric Authentication for Digital Authentication Presented by: Brian Farley, Western Sales Regional Manager DigitalPersona.
Identity Management 20/01/2005 Abhai Chaudhary. Facts Today, many organizations routinely create and manage user identities and access privileges in 25.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Consumer Protection Shop Safely and Guard Your Financial Information.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Sapient Insurance Partners. Overview & Services We have almost four decades of combined experience in the property & casualty insurance and reinsurance.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Transaction Generators: Root Kits for Web By: Collin Jackson, Dan Bonch, John Mitchell Presented by Jeff Wheeler.
Key Management in AAA Russ Housley Incoming Security Area Director.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
11 | Managing User Info Jeremy Foster Michael Palermo
Gift Card Risk Mitigation – Presentation A
50-STATE STUDYAND REPORT ON TELECOMMUNICATIONS TAXATION
Fraud Mobility Ken Meiser VP- Identity Solutions.
Tokens & Proofing De-Mystified
Have Wordpress Technical Issues Wordpress Technical Support is avail at toll free number
Jack J. Bensimon Countering Identity Theft and Synthetic Identities:
BY GAWARE S.R. DEPT.OF COMP.SCI
50-STATE STUDYAND REPORT ON TELECOMMUNICATIONS TAXATION
Top-of-the-line Security Services for Commercial Setups.
Sustainable Development Goals
Cyber Security and Consumer Financial Transactions Data Security
Cyber Issues Facing Medical Practice Managers
Who Uses Encryption? Module 7 Section 3.
Azure AD Deployment Are you maximising your Azure AD investment?
Overview of Zero-Knowledge Systems Inc
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Presentation transcript:

ExpectID® Product Suite Presentation to ISTTF September 23, 2008 IDology, Inc. / ExpectID Product Suite ISTTF Presentation 9/23/2008

Overview of ExpectID Product Suite Identity and Age Verification Available since 2003 Effectively verifies the identity and age of consumers-not –present in a safe, secure way Allows SNS to create a walled garden for adults without compromising consumer privacy. – Some SNS today have unverified walled gardens ISTTF Presentation 9/23/2008

Overview of ExpectID Product Suite Idology’s solutions are being used in multiple industries concerned with protecting minors including social networks, e-commerce, financial services, telecommunications and more – Clients include IMVU, Kendall Jackson, ZoeysRoom, TigerDirect and more IDology verifies people 18+ through a quick and safe process – Captures consumer name and address – Accesses public records data in real-time – Performs analytics to determine if the attributes of the identity are real – Escalates to a higher level of verification (KBA) if needed – Returns a result ISTTF Presentation 9/23/2008

Overview of ExpectID Product Suite Knowledge-based Authentication (KBA) – Used in situations requiring a higher level of verification – Verifies someone is who they claim to be Dynamically generates questions based on information within a consumer’s data file Types of questions include property, people you know, cars owned – Uses today Account openings, password resets, access to medical records, wire transfers, etc. Can be combined with Information Cards to establish a verified Trusted Identity ISTTF Presentation 9/23/2008

Q&A Jodi Florence, Marketing Director John Dancu, CEO & President ISTTF Presentation 9/23/2008