SlideShare a Scribd company logo
1 of 14
Download to read offline
Cloud Identity Summit
Matthew Thompson and Ryan Fox: July 20, 2014
Your Identity. Your Rewards
§  Founded by two Army Rangers in 2010 to help brands offer special loyalty programs
to affinity groups like: Military, Students, Influencers and Professionals
§  Capable of securing offers delivered online, in-store and via mobile channels
§  Consumer-centric network empowers a consumer to bring their own identity to third
party apps in order to receive personalized offers and experience.
§  More than 100 partners and 500,000 users are on the ID.me network after a year in
production.
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me
WHO WE ARE
Leaders in Digital Identity Technology
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 2
AWARD WINNING SOLUTIONS
Our Accomplishments	
  
§  Department of Commerce for a $2.8M grant as one of the five companies in America
with the most advanced digital Identity technology
§  Finalist for 2013 Wall Street Journal Startup of the Year
§  Named US Chamber of Commerce & Spike TV’s “Most Veteran-Friendly Small
Business in America” in 2013
§  March 2013 Raised Series A round of $10 million led by USAA, Silicon Valley Bank
§  Recognized in Entrepreneur Magazine’s 2014 edition of 100 Brilliant Companies
§  2014 Finalist for LinkShare Advertiser’s Choice Golden Link Award
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 5
Digital Identity 1.0: Broken, Inefficient and
Troubling to Consumers	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 6
Digital Identity 2.0: Transparent, Permissions
Based Interactions	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 7
Veteran verifies with ID.me
to receive discount
Member claim is verified
and account is registered
Veteran sees button
on UnderArmour.com
1 2 3
Users Establish Credentials Across a Network
and Bring Their Identity to Network RPs	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 8
Amy finds Under Armour’s
military discount
Amy creates an ID.me account
and verifies veteran status
Sensitive PII tokenized and
securely encrypted at rest
Amy encounters Mariott’s
MOAA ID.me program
Amy receives Marriott discount without
need to present card in-person
ID.me issues MOAA
credential to Amy
ID.me decrypts relevant PII fields
and preforms match with MOAA
Amy provides her MOAA number
manually or through a card image
Amy comes across 5.11’s
First Responder discount
Amy signs in with ID.me and
provides her EMT number
ID.me decrypts relevant PII fields
and preforms match with registry
ID.me issues First Responder
credential to Amy
Members “Trust Elevate” across network
9
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me
Prevents fraud and allows access to higher value, higher risk transactions
Amy verifies Military service
on UnderArmour.com
Amy receives a 15%
discount off her entire
purchase
Amy needs access to her VA
medical records online
She upgrades her account with
multi-factor authentication
BestBuy.com asks Amy to
verify with ID.me
Amy uses her fingerprint or
voice to authenticate
Best Buy process
transaction for Amy
Amy attempts to purchase a
$2,000 item from Best Buy
Core Identity Service Supports a Growing
Number of Product offerings	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 10
Product	
  Offerings	
  
Core	
  Pla3orm	
  
Mobile App
Affinity
Events
EDU
Auth
Attribute
Val
Voice Bio & OTP Access Management Data Services Identity Verification App Identity/Attribute Data Providers
White Label
Card
Link
Groups MgtMarketplaceIdentity as a Service
CASE STUDY
Under Armour Military Loyalty Program 	
  
§  Under Armour
integrated ID.me
technology to create an
omni-channel customer
experience
§  Customer verifies
affinity in real-time and
claims discount
directly in cart
§  Under Armour had a
military discount
program in-store but was
unable to provide the
program online because
they couldn’t verify
customer affinity
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 11
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 14
Q&A

Matt Thompson Ryan Fox
COO, Co-Founder VP Product Strategy
matt@id.me ryan@id.me
703-992-8382 703-795-4776
Internet Retailer Case Study:
http://www.internetretailer.com/registration-forms/
case-study-under-armour-honors-heroes/	
  

More Related Content

Similar to CIS14: Id.me

CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA Research Corporation
 
Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008
eComm2008
 
Memberguid erevised
Memberguid erevisedMemberguid erevised
Memberguid erevised
EmilyKPope
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
Don Grauel
 
Data Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity ManagementData Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity Management
Ryan Hogarth
 

Similar to CIS14: Id.me (20)

CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
 
Digital Identities
Digital IdentitiesDigital Identities
Digital Identities
 
Kicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
Kicking Off Your Identity-Driven Marketing Strategy with MLS and GigyaKicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
Kicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
 
Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
IC Group Capabilities
IC Group CapabilitiesIC Group Capabilities
IC Group Capabilities
 
Bloggers and Brand Advocates - Telling the Insurance Story
Bloggers and Brand Advocates - Telling the Insurance StoryBloggers and Brand Advocates - Telling the Insurance Story
Bloggers and Brand Advocates - Telling the Insurance Story
 
Memberguid erevised
Memberguid erevisedMemberguid erevised
Memberguid erevised
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
Secured touch
Secured touchSecured touch
Secured touch
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshure
 
Data Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity ManagementData Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity Management
 
Life Lock Employee Benefit Presentation
Life Lock Employee Benefit PresentationLife Lock Employee Benefit Presentation
Life Lock Employee Benefit Presentation
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
 

More from CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

CIS14: Id.me

  • 1. Cloud Identity Summit Matthew Thompson and Ryan Fox: July 20, 2014 Your Identity. Your Rewards
  • 2. §  Founded by two Army Rangers in 2010 to help brands offer special loyalty programs to affinity groups like: Military, Students, Influencers and Professionals §  Capable of securing offers delivered online, in-store and via mobile channels §  Consumer-centric network empowers a consumer to bring their own identity to third party apps in order to receive personalized offers and experience. §  More than 100 partners and 500,000 users are on the ID.me network after a year in production. CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me WHO WE ARE Leaders in Digital Identity Technology CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 2
  • 3.
  • 4.
  • 5. AWARD WINNING SOLUTIONS Our Accomplishments   §  Department of Commerce for a $2.8M grant as one of the five companies in America with the most advanced digital Identity technology §  Finalist for 2013 Wall Street Journal Startup of the Year §  Named US Chamber of Commerce & Spike TV’s “Most Veteran-Friendly Small Business in America” in 2013 §  March 2013 Raised Series A round of $10 million led by USAA, Silicon Valley Bank §  Recognized in Entrepreneur Magazine’s 2014 edition of 100 Brilliant Companies §  2014 Finalist for LinkShare Advertiser’s Choice Golden Link Award CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 5
  • 6. Digital Identity 1.0: Broken, Inefficient and Troubling to Consumers   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 6
  • 7. Digital Identity 2.0: Transparent, Permissions Based Interactions   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 7 Veteran verifies with ID.me to receive discount Member claim is verified and account is registered Veteran sees button on UnderArmour.com 1 2 3
  • 8. Users Establish Credentials Across a Network and Bring Their Identity to Network RPs   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 8 Amy finds Under Armour’s military discount Amy creates an ID.me account and verifies veteran status Sensitive PII tokenized and securely encrypted at rest Amy encounters Mariott’s MOAA ID.me program Amy receives Marriott discount without need to present card in-person ID.me issues MOAA credential to Amy ID.me decrypts relevant PII fields and preforms match with MOAA Amy provides her MOAA number manually or through a card image Amy comes across 5.11’s First Responder discount Amy signs in with ID.me and provides her EMT number ID.me decrypts relevant PII fields and preforms match with registry ID.me issues First Responder credential to Amy
  • 9. Members “Trust Elevate” across network 9 CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me Prevents fraud and allows access to higher value, higher risk transactions Amy verifies Military service on UnderArmour.com Amy receives a 15% discount off her entire purchase Amy needs access to her VA medical records online She upgrades her account with multi-factor authentication BestBuy.com asks Amy to verify with ID.me Amy uses her fingerprint or voice to authenticate Best Buy process transaction for Amy Amy attempts to purchase a $2,000 item from Best Buy
  • 10. Core Identity Service Supports a Growing Number of Product offerings   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 10 Product  Offerings   Core  Pla3orm   Mobile App Affinity Events EDU Auth Attribute Val Voice Bio & OTP Access Management Data Services Identity Verification App Identity/Attribute Data Providers White Label Card Link Groups MgtMarketplaceIdentity as a Service
  • 11. CASE STUDY Under Armour Military Loyalty Program   §  Under Armour integrated ID.me technology to create an omni-channel customer experience §  Customer verifies affinity in real-time and claims discount directly in cart §  Under Armour had a military discount program in-store but was unable to provide the program online because they couldn’t verify customer affinity CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 11
  • 12.
  • 13.
  • 14. CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 14 Q&A Matt Thompson Ryan Fox COO, Co-Founder VP Product Strategy matt@id.me ryan@id.me 703-992-8382 703-795-4776 Internet Retailer Case Study: http://www.internetretailer.com/registration-forms/ case-study-under-armour-honors-heroes/