+ Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba.

Slides:



Advertisements
Similar presentations
Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
Advertisements

Online Examination System CLASS MARKER University of Pune Helios Cloud Services.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Digital Wallet Alberto Almonte (CPE) Miles Curiotto (CPE) Michael Stross (EE) The new, compact, secure and efficient way to carry all your credit and debit.
Kimberley Correia 15 th November, 2005 QuickAddress Pro Web V5.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Personal Technology Celeste M. Combs, President The Experience Group
School Management Software
Cloud Usability Framework
Persuasive Presentation Vins Chacko. Portable Storage Product Pocket-sized and light weight Can Carry on your key chain Encrypt portion of drive with.
Max, Abbie, Kalen, and Cassie Members of B.U.N.S.
Certificate and Key Storage Tokens and Software
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Authentication Approaches over Internet Jia Li
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
High-Tech Product Innovation Challenge Problem #2 Password Manager Group 1 Jason Chen Karthik Karuppasamy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
What do you get when you combine two leaders in their respective fields?
Google cloud Vs Apple Cloud Made By: Pooja Dubey (ITSNS)
ADVANTAGES & DISADVANTAGES OF INTERNET STORAGE Advantage: Easy Access  Online storage websites are important to people who travel and don't always have.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Explain the purpose of an operating system
The next generation of payments is here. Is your business ready?
Inseparable Keys: Phase III High-Tech Product Innovation (45-827) James Duan, Eric Lin, Ray Loo, Minh Vuong April 17, 2008.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
FCNS – Technology NEW TECHNOLOGY SOFTWARE: COMING SOON!
Lesson 3 Data Storage. Objectives Define data storage Identify the difference between short-term and long-term data storage Understand cloud storage and.
Driving Business Online Wed 15 August 2012 Canberra Online Business in Australia (PayPal Market Research)
+ Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Knut S-C Öjermark K enmark International Pleasanton Senior Center.
Understand The Use Of Technologies In Fashion Merchandising And Marketing FM 3.02.
Value – From a Lean Perspective
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Information Systems Design and Development Technical Implications (Storage) Computing Science.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
The Benefits of Using Virtual Merchant. EMV cards have been extremely popular in recent times and it’s one of the greatest technological advances in recent.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Internet of Things – Getting Started
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
This presentation uses a free template provided by FPPT.com Kaspersky Antivirus software: Multiple additions, same integrity.
CLOUDENTIFY.
Understand The Use Of Technologies In Fashion Merchandising And Marketing FM 3.02.
Computer Information Systems
Section II Terms Emily Stepp.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Biometrics.
BY GAWARE S.R. DEPT.OF COMP.SCI
Education – Partnership – Solutions
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Max, Abbie, Kalen, and Cassie Members of B.U.N.S
Biometrics.
Lesson 3 Data Storage.
Unit 4 IT Security Kerris Davies.
Understand The Use Of Technologies In Fashion Merchandising And Marketing FM 3.02.
Internet Safety Sixth Grade.
Presentation transcript:

+ Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba

+ Agenda Refined POG Value Opportunity Analysis Product Attributes Short List of Product Concepts Selected Product Concept Prototype

+ Refined POG Background Increase in the use of password protected applications Varying password security policies Challenge Difficulty for consumers to remember security combinations Opportunity Gap Assist customers with remembering their passwords Create a safe and reliable manner for all internet passwords

+ Value Opportunity Analysis LowMedHigh Emotion adventureNA independenceNA security sensualityNA confidence power User Interface comfortNA safety ease of use Aesthetics visual auditoryNA tactileNA olfactoryNA gustatoryNA Identity point in time sense of place personality Impact social environmental Core Technology reliable enabling Quality craftsmanship durability Profit Impact Brand Impact Extendable - users want to feel secure that there information is safe. - users need to feel confident that the product will work - product needs to be bug free and safe holding users information - light users need to be able to easily use this product - Look of product should be simple and stylish - Core technology must be reliable and actually save users time - Product needs to be well made and bug free. Users need to know it will last.

+ Product Attributes Be secure and safe. Be able to be used on multiple computer systems. Be easy to use. Seamless platform integration. Encourages unique passwords and prompts if password change needed. Have excellent Brand reputation.

+ Analysis of Product Attributes WeightProduct Attributes (out of 10)Secure IdUSB KeyWebsiteCell Phone 40% Be secure and safe % Be able to be used on multiple computer systems % Be easy to use % Seamless platform integration % Encourages unique passwords and prompts if password change needed. 10 Total

+ Analysis of Stakeholders StakeholderSecure IDUSB KeyWebsiteCell Phone Individual ConsumersPOS Web DepartmentsNEGNEU Credit Card CompaniesPOSNEUNEG Consumer Advocacy GroupsNEU NEG BusinessesNEGNEU Overall ResponseNEUPOSNEG

+ Short List of Product Concepts Wireless Security Key USB Key With Fingerprint Scanner Java Enabled Website Cell Phone with Blue Tooth Enabled Password Manager

+ Key Challenges/Questions Portability Are consumers going to want to carry it with them? Can we design it so consumers will carry it with them? How big does it have to be? Design/GUI Interface What would the prompts look like on computer? What is the user experience on the computer like? How secure is the fingerprint security?

+ Final Product Concept Example user scenario: Judith uses several online applications with different password requirements. Her secure USB device is plugged into her laptop. The USB asks for fingerprint authentication. Successful recognition by the software, pops a second level of authentication (password only). After successful authentication, the software provides the userid/password for each of the applications stored in the USB device. After 15 minutes of inactivity, the device turns itself off.

+ Prototype Flowchart 1) User inserts USB and scans fingerprint 2) Second level password authentication

+ Lessons Learned Ensure process is completely streamlined for the consumer. Integrate USB with objects users normally carry with them. Additional functionality of USB. Backup for USB drive.

QUESTIONS?