3. 5/18/15 www.theAREA.org 3
Airbnb is rolling out a new identity
verification program that will eventually
require all users around the world to
connect their online identities with
conventional forms of identification.
Users have the choice of confirming their
birthdate and partial social security
number or uploading a scanned copy of a
government ID and linking it with an online
login through Airbnb, Facebook or
LinkedIn. A ‘Verified ID’ badge will appear
on profiles of users who have completed
the process.
“Trust is the key to our community. There
is no place for anonymity in a trusted
community,” Airbnb said in a blog post.
The company said it would ask a quarter of
its users in the United States to verify
their IDs starting today, but will soon
“expand this requirement to users around
the world.”
6. 5/18/15 www.theAREA.org 6
A new electronic personal identity card will be introduced in Germany on 1 November 2010.
The complex overall system for managing the mandatory card and its contactless chip is on
display at CeBIT 2010. The card has three functions: 1. biometric identity verification, 2.
electronic identity verification, 3. authenticated electronic signature.
Identity Verification (Only Authorized Enter)
16. 5/18/15 www.theAREA.org 16
The Jedi Council Room - the ultimate telepresence conference room
This sounds like an
extension of a Microsoft
Research project,
Viewport, that was first
announced in 2012. The
team in charge of
Viewport proposed a
system that included a
camera rig that had a
number of color and
infrared cameras, along
with a series of infrared
projectors. The project
said that the goal was to
"reconstruct a 3D
representation in real-
time, which will be
rendered in a shared
virtual environment for
immersive
telecommunication."
http://gajitz.com/2-places-at-once-telexistence-bot-has-3-human-senses/
17. • Augmented Reality
(receiving information from a third party)
5/18/15 www.theAREA.org 17
http://umbra.sandia.gov/applications.html
Daqri
ODG
23. • Confidentiality
(Authentication and Encryption and Private / Confidential)
• Integrity
(Message not Modified)
• Availability
(Usable)
5/18/15 www.theAREA.org 23
http://cacm.acm.org/magazines/2014/4/173222-security-and-
privacy-for-augmented-reality-systems/abstract
Data Security Basics:
24. AR “Laws” Should Minimally Account for:
7. Do No Harm (3 Laws…)
6. Respect privacy
5. Activity Auditing (Intention Proper and DNH)
4. Provide accuracy and source of information
(level of trust and affinity to user)
3. Verify identity of transmitter and receiver
2. Trusted network with Confidentiality, Integrity
of Messaging and Availability
1. Unalterable Device ID (like cell phone IMEI)
5/18/15 www.theAREA.org 24
25. 5/18/15 www.theAREA.org 25
● User identification
● Key seed generation
● Centralized Management
● Statistics Management
Encrypted message through
regular communications network.
Authentication and seeds
through Central Authority.
Central Authority (CA)
26. 5/18/15 www.theAREA.org 26
All information is
encrypted.
The central server
contains information on
the agenda, the keys and
is responsible for verifying
the identity of users and
devices.
Communications
(messages) never go
through the central
server.
The control packets are
also encrypted
communication.
35. 5/18/15 www.theAREA.org 35
Booth 84 – AWE 2015
Jim Novack
jim.novack@talentswarm.com
Come see us on July 1 in
Sheffield, England at
AR in the Strategic Enterprise
(ARise)
Thank you!
Talent Swarm
Collaborative Work Environment
eyebee AR Certification Services