Inseparable Keys: Phase III High-Tech Product Innovation (45-827) James Duan, Eric Lin, Ray Loo, Minh Vuong April 17, 2008.

Slides:



Advertisements
Similar presentations
Alex Smoler Features Update for ASSET-id. Pain in the Rear to Track Paper Log Is Basically Worthless Lots of Paperwork Generated When Loaning to Third.
Advertisements

Doc.: IEEE /661r0 Submission November 2002 Ziv Belsky, WavionSlide 1 Proposal for the 5 criteria for the HT SG.
NexSentry Imaging Solutions
Knells Door and Hardware SINCE 1906 Electronic Access Control Presentation.
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
Adaptive Solutions Inc. ADAPTIVE SOLUTIONS, INC. Mobile, Alabama Proudly Presents Technology for individuals with Special Needs.
Blue Eye T E C H N O L G Y.
XT30/XT50 Basic Training System Overview
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
EVOLUTION® Hands-On Demo This guide is meant to help lead a hands-on demo or presentation. The items listed are a suggestion for things to review, please.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
The Gestetner F104 Series Product Launch Training.
By: Monika Achury and Shuchita Singh
Page16/2/2015 Sirlan Usage and usability considerations for SIRLAN solution success.
SmartSystems™ Foundation Product Overview
Submitted by: Rahul Rastogi, CS Department.  Introduction  What is a smart card?  Better than magnetic stripe card.  Technology What’s in a card?
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
University of Massachusetts Amherst InteLock TM Advisor: Professor Ganz Team: Emmanuel Seguin Christos Tsiokos Josh Coffin Anh-Kiet Huynh Remote Access.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Your Interactive Guide to the Digital World Discovering Computers 2012.
+ Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba.
Restricted © Siemens AG 2013 All rights reserved.siemens.com/answers Multifactor Iris Recognition Biometric Reader.
© 2007 Avaya Inc. All rights reserved. 1 Advanced Communicationsystem PARTNER® Advanced Communications System Simply powerful. Powerfully simple.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
High-Tech Product Innovation Challenge Problem #2 Password Manager Group 1 Jason Chen Karthik Karuppasamy.
Ten Reasons to Buy a Network Camera. Focus 10 of the most important functional differences between analog and network cameras.
Home Automation Overview George Gober Assistive Technology Associate.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
InteLock Emmanuel Seguin, Kit Huynh, Joshua Coffin, Christos Tsiokos Faculty Advisor: Professor Aura Ganz Background Currently, there have been many keyless.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Experience you can trust. Knowledge2006 – Technology Roundtable Dan Ruiz
Gauteng Provincial Government
Why are input devices useful? By: Gaby, Pili and Leopi.
Module 14: Configuring Server Security Compliance
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
The use and application of sensors for energy management of a small school with 30 PC’s USB controlled Power ml.
The group will focus on the design of a “smart” device. This includes researching the best method of design and fabricating the design to create a working.
1 AutoCAD Electrical 2008 What’s New Name Company AutoCAD Electrical 2008 What’s New AMS CAD Solutions
HTSC High Tech Shopping Cart Project Vincent Declercq GSBA 573 Fall 2006 USD.
Biometrics.
Chapter 2 Securing Network Server and User Workstations.
+ Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba.
By Rashid Khan Lesson 6-Building a Directory Service.
Mobile Electronic Medical Records James T. Monastra Virginia Wesleyan College August 6, 2007.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Home Phone Service February, CONFIDENTIAL AND PROPRIETARY | What is Ooma? The smartest home phone is the one that gives you exactly what you want.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Home Security Solution Market.
CLOUDENTIFY.
Basic Settings Last update: February 2017
BioLock (Biometric Home Entry System)
Cisco Unity Connection 2.0 Phone View Configuration
Microcontroller Based Digital Code Lock
Avast Confidential.
Intorduction Manufacturing company establish with a group of engineers, management Graduates, manufacturing experts and other specialized manufacturing.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
APPLE TWO STEP VERIFICATION CHANGE PHONE NUMBER Please read the following presentation on any help on Apple two step verification change phone number.
Getting Started.
Getting Started.
"Cloud services" - what it is.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Business Document Platform
Presentation transcript:

Inseparable Keys: Phase III High-Tech Product Innovation (45-827) James Duan, Eric Lin, Ray Loo, Minh Vuong April 17, 2008

2HONEYWELL - CONFIDENTIAL File Number Product Opportunity Statement Inseparable Keys fills an opportunity to create keys that cannot be easily lost, stolen, forgotten, or otherwise separated from their rightful owners. The solution shall be secure, reliable, and easier to use than traditional keys. Furthermore, an Inseparable Key can replace several separate keys that serve different purposes, reducing key clutter and improving carrying comfort.

3HONEYWELL - CONFIDENTIAL File Number Value Opportunity Analysis Recap Customizable solution that is easy to use and program Added security through redundancy Greater confidence through using an inseparable intelligent key system Improved comfort by not carrying extra keys Enable access to other home automation technologies though intelligent identification system Low wear and tear for a long-lasting and reliable solution Build brand awareness though leveraging partnerships and establishing new industry standards

4HONEYWELL - CONFIDENTIAL File Number Product Concept Candidates Fingerprint scanner built into doorknob/handle RFID key “rock” Touch-less fingerprint scanning Embed or attach RFID tags to clothes, cell phone, iPod, etc. Credit card or ID card scanner

5HONEYWELL - CONFIDENTIAL File Number Our Solution: Voice Recognition Uses voice authentication and speech recognition Verifies identity and receives commands through spoken words Key Attributes - Inseparability: No physical object functioning as the key - Security: Two-factor authentication - Reliability: Fewer moving parts; May require battery power or physical backup - Ease-of-use: No physical keys are necessary, so a user can easily use the lock when hands are full or in the dark - Number of Keys: Reduces number of keys - Cost: Installation is a one-time cost and will not cost significantly more than a traditional solution Exceeds all product opportunity specifications

6HONEYWELL - CONFIDENTIAL File Number Stakeholder Analysis I Kevin, the Consumer - No physical key to carry/lose - Voice recognition easy to use and to configure - Increased convenience with optional automated doors Jack, the Homeowner - Easy, one-time installation - Secure, inseparable keys - Confidence in using a secure locking solution - Reduces number of keys

7HONEYWELL - CONFIDENTIAL File Number Stakeholder Analysis II Kim, an Apartment Lease Manager - Easily customizable for tenants - Track who has access - No more keys to organize Honeywell Security Group - Easy to develop and push to market - Extendable to home automation systems - Opens new markets

8HONEYWELL - CONFIDENTIAL File Number Commercial Feasibility Convenient, cheap, secure, and reliable security solution Estimated cost of solution: $100 Projected product lifespan: 10 years Installation similar to that of standard locks Little or no maintenance required Leverage partnerships with retail outlets and home security providers

9HONEYWELL - CONFIDENTIAL File Number Prototype Considerations Usage scenarios - Unlock - Lock - Open - Close - Configure – add/remove users, activity log, reset to defaults Homeowner Interface - Integrated keypad or touchscreen Building Owner Interface - Control console to program multiple locks simultaneously - Ability to track usage - Remote updating - Wireless versus wired connectivity for power/configuration

10HONEYWELL - CONFIDENTIAL File Number How The Concept Works Approach Door and Give Command Command? Open Door or Unlock Close Door Close Door Voice and Password Verified? Verification Failure Indicated Lock Success Indicated Unlock Open Door No Yes Lock Command? Open Door Unlock

11HONEYWELL - CONFIDENTIAL File Number Homeowner Solution How do you do the user interface for setup and maintenance? Are the locks user- friendly?

12HONEYWELL - CONFIDENTIAL File Number Building Owner Solution Can a building owner easily program multiple locks simultaneously? Are remote updates possible? Are locks user-friendly?

13HONEYWELL - CONFIDENTIAL File Number Conclusions From Prototyping Lock, unlock, open door, and close door commands are supported Configured differently depending on usage: - Homeowner: keypad & voice commands on the lock itself - Building owner: tablet console to update multiple locks simultaneously Equipped with dual keypad & voice command programming to accommodate consumers with heavy accents Powered by batteries or low-watt power line Easily installed in standard door jam Automated opening/closing with power arm

14HONEYWELL - CONFIDENTIAL File Number Further Questions Access for emergency personnel? Reliability of voice recognition? Usage in noisy/private areas? Handicapped accessible? Computer interface for programming? How to extend into home automation?

15HONEYWELL - CONFIDENTIAL File Number Our Vision Honeywell Inseparable Keys Questions?

16HONEYWELL - CONFIDENTIAL File Number Task Analysis of Inseparable Keys vs. Traditional Keys Start: Approach Door Place groceries on the ground Find keys Push key into keyhole Strain to turn key Push door open Hang key on hook Hold door open Grab groceries Step throughClose door Finish: Lock Door Use voice recognition Door unlocks, opens, walk through, door locks Finish: Walk away Start: Approach Door Traditional locking solution = 12 steps! Inseparable Keys with optional automated doors = 4 steps