Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
From Authentication to                         Identity Recognition        Cyrille Bataller - Accenture Technology LabsCop...
Limits to Authentication…        •   Something you have, something you know, something you are             Too many cards...
We Can Do Better        •   Authentication: wasted time and energy, barrier to do            business (e.g. IVR)        • ...
Identity Recognition!        •   Holistic identity recognition – over time and across            encounters        •   Cus...
Identity Recognition Benefits     Improving customer experience and loyalty, and quality of service…Copyright © 2012 Accen...
Identity Recognition Benefits     Increasing operational efficiency and cost effectiveness…Copyright © 2012 Accenture All ...
Identity Recognition Benefits                                                                        Improve effectiveness...
What Constitutes Identity?        •   A collection of data that can uniquely describe a person.        •   Identity gets r...
Where’s Privacy Gone?        •   Legitimate concerns on how data will be used and            safeguarded        •   Changi...
Examples        •   I call my bank with my mobile: caller ID (identity claim) + voice biometrics             I’m recognis...
In Closing…        Identity Recognition as the Foundation of Trust     • Businesses and governments increasingly see value...
Thank You                                                             Cyrille Bataller                                    ...
Upcoming SlideShare
Loading in …5
×

OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs

1,786 views

Published on

Presented during the Open Source Conference 2012, organized by Accenture and Redhat on December 14th 2012. This presentation discusses Identity Analytics.

By Cyrille Bataller, Managing Director, Accenture Technology Labs

  • Be the first to comment

  • Be the first to like this

OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs

  1. 1. From Authentication to Identity Recognition Cyrille Bataller - Accenture Technology LabsCopyright © 2012 Accenture All rights reserved. 1
  2. 2. Limits to Authentication… • Something you have, something you know, something you are  Too many cards, PINs, usernames and Pa55w0rds! • Are my social security number, mother’s maiden name or my first school’s name really secrets? • Why different schemes for different channels – password for web, PIN for ATM, shared secrets for call centre, ID doc in person? • Why so many discrete authentication schemes?Copyright © 2012 Accenture All rights reserved. 2
  3. 3. We Can Do Better • Authentication: wasted time and energy, barrier to do business (e.g. IVR) • Too hard to remember – here comes the sticky note! 50-75% of support calls = password reset • Discrete, siloed authentication schemes are inherently weak – very narrow view of a person! • Leads to inconvenience, user frustration, inefficiencies, and fraudCopyright © 2012 Accenture All rights reserved. 3
  4. 4. Identity Recognition! • Holistic identity recognition – over time and across encounters • Customer centricity – not system centricity • Finally converging digital and physical ID • Helping people conveniently assert their identity, while protecting their privacy and their right to anonymity!Copyright © 2012 Accenture All rights reserved. 4
  5. 5. Identity Recognition Benefits Improving customer experience and loyalty, and quality of service…Copyright © 2012 Accenture All rights reserved. 5
  6. 6. Identity Recognition Benefits Increasing operational efficiency and cost effectiveness…Copyright © 2012 Accenture All rights reserved. 6
  7. 7. Identity Recognition Benefits Improve effectiveness, reduce deficit Reducing fraud… “Identity fraud cost the UK economy £1.2 billion in one year (Identity Fraud Steering Committee figures, 2008)” “The UK Department for Work and Pensions estimated that £800m was lost to benefit fraud in 2006/7” “Identity fraud accounts for a criminal cash flow of £10m per day.” “In March 2008 there were 76.8 million National Insurance numbers in the UK, with a population of 61 million.” Source: CIFAS UK “The U.S. Internal Revenue Service may have delivered more than $5 billion in refund checks to identity thieves who filed fraudulent tax returns for 2011, Treasury Department investigators said. They estimate another $21 billion could make its way to ID thieves pockets over the next five years.” Source: Federal News Radio “Identity theft rose 33% from 2005 to 2010 in the US, with 8.6M U.S. households experiencing $13.3 billion in direct financial losses in 2010” Source: US Dept of Justice Source: US FTC Build for the future “While it should be noted that in the developed world there continues to be resistance to national ID programs for various reasons, in the developing world, the national ID is increasingly becoming the cornerstone of a secure and trusted ecosystem, where the ultimate goal is for the ID card or the ID number to act as the single unique identifier in the country that supports multiple purposes and multiple applications in the private and public spheres. These could include tax filings, salary and pension payments, border crossings, voter verification, banking, land title registration, and so on. Very few examples of this exist today, but industry analysts expect that within 5 years, most countries will have some form of a national ID system in place and that these national ID systems will include biometrics.” Centre for Global Development.Copyright © 2012 Accenture All rights reserved. 7
  8. 8. What Constitutes Identity? • A collection of data that can uniquely describe a person. • Identity gets richer over time – with information continually associated with a person, from cradle to grave. Granularity increases (from life events to every day life events). • What sort of information? – What a person has, knows, is – But also context: where she is, what she’s doing, how she’s doing it, why she’s doing it, who she’s with, in what environment, under what circumstances, what her social network says, what her transaction history is… What a person has What a person knows What a person is The context within which this information is captured • This information changes over time and across encounters  continuous enrolment Event 1 Event 2 Badge Fingerprint Credit card # Exp. date … Timeline Location Browser data IP address at time t1 at time t2Copyright © 2012 Accenture All rights reserved. 8
  9. 9. Where’s Privacy Gone? • Legitimate concerns on how data will be used and safeguarded • Changing cultural attitudes, selective trust, clear benefits • “Privacy by design”; “Privacy Impact Assessments” – ensuring proportionality, scope control, anonymisation, auditing, redress • Procedural, technological, educational, regulatory mitigations • Conveniently assert identity while preserving anonymity  Identity recognition can lead to enhanced privacy, protection from identity theft See Accenture’s “point of view on Biometrics and Privacy”Copyright © 2012 Accenture All rights reserved. 9
  10. 10. Examples • I call my bank with my mobile: caller ID (identity claim) + voice biometrics  I’m recognised and dealt with immediately, with knowledge of my context • I walk into my airline lounge: I’m booked to fly today, they have my face photograph  I’m recognised and greeted by name • I arrive at immigration, coming back into the country: API data says I’m arriving, system says my plane has landed, they have my passport photo  I’m recognised and welcomed back home • I use my tablet for shopping, it’s my home IP address, my tablet’s device ID, the camera sees my face  I’m recognised and can do one-click purchaseCopyright © 2012 Accenture All rights reserved. 10
  11. 11. In Closing… Identity Recognition as the Foundation of Trust • Businesses and governments increasingly see value in moving away from (weak) discrete authentication, challenge-response methods, towards seamless, holistic identity recognition over time and across encounters. • This means using all data points known about a person to recognise them. • This enables customer centricity, finally converging physical and digital ID. • This helps improve customer experience and loyalty, and quality of service, while increasing cost effectiveness and reducing fraud. • It helps people conveniently assert their identity while protecting their privacy, preserving their right to anonymity.Copyright © 2012 Accenture All rights reserved. 11
  12. 12. Thank You Cyrille Bataller Partner Accenture 400 avenue de Roumanille, Bât 1A 06902 Sophia Antipolis, France Tel: +33 4 92 94 88 46 Fax: +3 4 92 94 67 99 Mobile: +33 6 85 54 24 14 cyrille.bataller@accenture.com www.accenture.com/biometricsCopyright © 2012 Accenture All rights reserved. 12

×