SlideShare a Scribd company logo
From Authentication to
                         Identity Recognition
        Cyrille Bataller - Accenture Technology Labs




Copyright © 2012 Accenture All rights reserved.        1
Limits to Authentication…
        •   Something you have, something you know, something you are
             Too many cards, PINs, usernames and Pa55w0rds!


        •   Are my social security number, mother’s maiden name or
            my first school’s name really secrets?


        •   Why different schemes for different channels – password for
            web, PIN for ATM, shared secrets for call centre, ID doc in
            person?


        •   Why so many discrete authentication schemes?


Copyright © 2012 Accenture All rights reserved.                           2
We Can Do Better
        •   Authentication: wasted time and energy, barrier to do
            business (e.g. IVR)


        •   Too hard to remember – here comes the sticky note!
            50-75% of support calls = password reset


        •   Discrete, siloed authentication schemes are inherently
            weak – very narrow view of a person!


        •   Leads to inconvenience, user frustration, inefficiencies,
            and fraud
Copyright © 2012 Accenture All rights reserved.                         3
Identity Recognition!
        •   Holistic identity recognition – over time and across
            encounters


        •   Customer centricity – not system centricity


        •   Finally converging digital and physical ID


        •   Helping people conveniently assert their identity,
            while protecting their privacy and their right to
            anonymity!
Copyright © 2012 Accenture All rights reserved.                    4
Identity Recognition Benefits

     Improving customer experience and loyalty, and quality of service…




Copyright © 2012 Accenture All rights reserved.                           5
Identity Recognition Benefits

     Increasing operational efficiency and cost effectiveness…




Copyright © 2012 Accenture All rights reserved.                  6
Identity Recognition Benefits
                                                                        Improve effectiveness, reduce deficit
     Reducing fraud…                              “Identity fraud cost the UK economy £1.2 billion in one year (Identity Fraud Steering
                                                  Committee figures, 2008)” “The UK Department for Work and Pensions estimated that £800m
                                                  was lost to benefit fraud in 2006/7” “Identity fraud accounts for a criminal cash flow of
                                                  £10m per day.” “In March 2008 there were 76.8 million National Insurance numbers in the UK,
                                                  with a population of 61 million.” Source: CIFAS UK
  “The U.S. Internal Revenue Service may have delivered more than $5 billion in refund checks to identity
  thieves who filed fraudulent tax returns for 2011, Treasury Department investigators said. They estimate another
  $21 billion could make its way to ID thieves' pockets over the next five years.” Source: Federal News Radio

  “Identity theft rose 33% from 2005 to 2010 in the US, with 8.6M U.S. households experiencing $13.3 billion in
  direct financial losses in 2010” Source: US Dept of Justice

                                                                                                                           Source: US FTC
                                                    Build for the future
   “While it should be noted that in the developed world there continues to be resistance to national ID programs for
   various reasons, in the developing world, the national ID is increasingly becoming the cornerstone of a
   secure and trusted ecosystem, where the ultimate goal is for the ID card or the ID number to act as the single
   unique identifier in the country that supports multiple purposes and multiple applications in the private and
   public spheres. These could include tax filings, salary and pension payments, border crossings, voter
   verification, banking, land title registration, and so on. Very few examples of this exist today, but industry
   analysts expect that within 5 years, most countries will have some form of a national ID system in place
   and that these national ID systems will include biometrics.” Centre for Global Development.
Copyright © 2012 Accenture All rights reserved.                                                                                                 7
What Constitutes Identity?
        •   A collection of data that can uniquely describe a person.
        •   Identity gets richer over time – with information continually associated with a person, from cradle to
            grave. Granularity increases (from life events to every day life events).
        •   What sort of information?
            – What a person has, knows, is
            – But also context: where she is, what she’s doing, how she’s doing it, why she’s doing it, who she’s with,
              in what environment, under what circumstances, what her social network says, what her transaction
              history is…
                                     What a person has         What a person knows             What a person is
                                                The context within which this information is captured


        •   This information changes over time and across encounters  continuous enrolment
                                                  Event 1                                           Event 2
                                         Badge                 Fingerprint          Credit card #             Exp. date
                                                                                                                           …   Timeline

                                                  Location                         Browser data               IP address

                                                  at time t1                                    at time t2

Copyright © 2012 Accenture All rights reserved.                                                                                           8
Where’s Privacy Gone?
        •   Legitimate concerns on how data will be used and
            safeguarded
        •   Changing cultural attitudes, selective trust, clear benefits
        •   “Privacy by design”; “Privacy Impact Assessments” –
            ensuring proportionality, scope control, anonymisation,
            auditing, redress
        •   Procedural, technological, educational, regulatory
            mitigations
        •   Conveniently assert identity while preserving anonymity
         Identity recognition can lead to enhanced privacy,
        protection from identity theft

                       See Accenture’s “point of view on Biometrics and Privacy”
Copyright © 2012 Accenture All rights reserved.                                    9
Examples
        •   I call my bank with my mobile: caller ID (identity claim) + voice biometrics 
            I’m recognised and dealt with immediately, with knowledge of my context


        •   I walk into my airline lounge: I’m booked to fly today, they have my face
            photograph  I’m recognised and greeted by name


        •   I arrive at immigration, coming back into the country: API data says I’m
            arriving, system says my plane has landed, they have my passport photo 
            I’m recognised and welcomed back home


        •   I use my tablet for shopping, it’s my home IP address, my tablet’s device ID,
            the camera sees my face  I’m recognised and can do one-click purchase




Copyright © 2012 Accenture All rights reserved.                                              10
In Closing…
        Identity Recognition as the Foundation of Trust
     • Businesses and governments increasingly see value in moving away from (weak) discrete
     authentication, challenge-response methods, towards seamless, holistic identity recognition over
     time and across encounters.


     • This means using all data points known about a person to recognise them.


     • This enables customer centricity, finally converging physical and digital ID.


     • This helps improve customer experience and loyalty, and quality of service, while
     increasing cost effectiveness and reducing fraud.


     • It helps people conveniently assert their identity while protecting their privacy, preserving
     their right to anonymity.
Copyright © 2012 Accenture All rights reserved.                                                         11
Thank You

                                                             Cyrille Bataller
                                                             Partner


                                                             Accenture
                                                             400 avenue de Roumanille, Bât 1A
                                                             06902 Sophia Antipolis, France


                                                             Tel: +33 4 92 94 88 46
                                                             Fax: +3 4 92 94 67 99
                                                             Mobile: +33 6 85 54 24 14
                                                             cyrille.bataller@accenture.com


                                      www.accenture.com/biometrics
Copyright © 2012 Accenture All rights reserved.                                                 12

More Related Content

PDF
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
PDF
Health 2 0 & ultrabook services
PPT
Listening data collection concerns and ethics, rappaport, arf
PPT
Social media ethics and concerns
PPT
Listening data collection concerns and ethics, rappaport, qi
PPTX
Bridging the divide between legacy and mobile payments
PDF
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Health 2 0 & ultrabook services
Listening data collection concerns and ethics, rappaport, arf
Social media ethics and concerns
Listening data collection concerns and ethics, rappaport, qi
Bridging the divide between legacy and mobile payments
28032012 Irma vander Ploeg: e portfolio als digitale identiteit

What's hot (20)

PPT
Side-event: Telenor - CRVS How Mobile Operators Can Help
PPTX
Distra empowers mobile payments
DOC
Ramy appt
PPTX
2013 feb13 introduction to ppi generic
PDF
Future of digital identity initial perspective - final lr
PDF
SmartCard Forum 2009 - New trends in smart-cards technology
PDF
Sabett: ESRA Identity Management 11-09-10
PPTX
Identity Theft and Data Compromise - TWCA Fall 2012
PDF
The future of digital identity initial perspective
PDF
Ftc identity theft kit
PPTX
Per.fin.7.03 p ptb
PPTX
Mental Models of Employment
PPTX
20120510 università
DOCX
Ict project (1)
DOCX
Finger print
PDF
Aluminum wallet
PDF
Facing the Challenge of Enrolment
PDF
The Development of a Federal Digital Identity
DOCX
Preventing Internet Fraud By Preventing Identity Theft
PPTX
3.5 Online Services and Security and Privacy of Data
Side-event: Telenor - CRVS How Mobile Operators Can Help
Distra empowers mobile payments
Ramy appt
2013 feb13 introduction to ppi generic
Future of digital identity initial perspective - final lr
SmartCard Forum 2009 - New trends in smart-cards technology
Sabett: ESRA Identity Management 11-09-10
Identity Theft and Data Compromise - TWCA Fall 2012
The future of digital identity initial perspective
Ftc identity theft kit
Per.fin.7.03 p ptb
Mental Models of Employment
20120510 università
Ict project (1)
Finger print
Aluminum wallet
Facing the Challenge of Enrolment
The Development of a Federal Digital Identity
Preventing Internet Fraud By Preventing Identity Theft
3.5 Online Services and Security and Privacy of Data
Ad

Similar to OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs (20)

PPTX
Presentation on Information Privacy
PPT
How To Prevent The World Wild Web Identity Crisis
PDF
Privacy - Principles, PrimeLife and Identity Mixer - Thomas Gross
PDF
Identity Trust Framework Survey
PDF
Identity Insights: Social, Local and Mobile Identity
PDF
Идентификация - Identity Management (Германия - Fraunhofer FOKUS 2011)
PDF
Mobile Identity Whitepaper
PDF
Security And Privacy Cagliari 2012
PDF
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
PDF
WEF - Personal Data New Asset Report2011
PPT
Digital Privacy Revisited
PPT
Unit 6 Privacy technological impacts.ppt
PDF
Health Data Encryption: The Seven Principals of Privacy
PPTX
Callcredit's Fraud Summit - Customer experience stream
PDF
Keynote oracle entitlement-driven idm
PDF
2010 Biometrics Conf: Biometrics, From High-Stakes Exams To Loyalty Cards
PDF
Magazine Feature
PDF
Effective Cyber Security: Successful Approaches and Experiences
PPTX
Jan Keil - Identity and access management Facts. Challenges. Solution
PPTX
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
Presentation on Information Privacy
How To Prevent The World Wild Web Identity Crisis
Privacy - Principles, PrimeLife and Identity Mixer - Thomas Gross
Identity Trust Framework Survey
Identity Insights: Social, Local and Mobile Identity
Идентификация - Identity Management (Германия - Fraunhofer FOKUS 2011)
Mobile Identity Whitepaper
Security And Privacy Cagliari 2012
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
WEF - Personal Data New Asset Report2011
Digital Privacy Revisited
Unit 6 Privacy technological impacts.ppt
Health Data Encryption: The Seven Principals of Privacy
Callcredit's Fraud Summit - Customer experience stream
Keynote oracle entitlement-driven idm
2010 Biometrics Conf: Biometrics, From High-Stakes Exams To Loyalty Cards
Magazine Feature
Effective Cyber Security: Successful Approaches and Experiences
Jan Keil - Identity and access management Facts. Challenges. Solution
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
Ad

More from Accenture the Netherlands (20)

PDF
Gaining Momentum for IaaS
PPTX
Achieving Success in Digital for Manufacturing & Operations
PPTX
Digital grid: Disruptive digital technologies
PDF
High Performance Business Study 2015 H1
PDF
The Digital Consumer: Know me, Inform me, Make it easy and Get it to me
PDF
Using simulations and serious games for enabling transformational change
PDF
Infographic - Digitizing Energy: Unlocking business value with digital techno...
PPTX
Innovation in maintenance - Accenture
PPTX
Digital Business - Accenture
PDF
HPMC 2014 - How Analytics can improve your customer experience - SAS
PDF
HPMC 2014 - Optimizing customer value - Pega Systems
PDF
HPMC 2014 - The value of analytics - SAS
PDF
HPMC 2014 - CX and Mobility showcase - Oracle
PDF
HPMC 2014 - How the customer 2.0 changed marketing - Microsoft
PDF
HPMC 2014 - Annual trends service design 2014 - Fjord
PDF
HPMC 2014 - Thirteen tenets of a successful digital business - Acquity group
PDF
HPMC 2014 - Digital business edge - Accenture
PDF
HPMC 2014 - The New Energy Consumer - Accenture Netherlands
PDF
HPMC 2013 - Philips
PDF
HPMC 2013 - Nationale Nederlanden
Gaining Momentum for IaaS
Achieving Success in Digital for Manufacturing & Operations
Digital grid: Disruptive digital technologies
High Performance Business Study 2015 H1
The Digital Consumer: Know me, Inform me, Make it easy and Get it to me
Using simulations and serious games for enabling transformational change
Infographic - Digitizing Energy: Unlocking business value with digital techno...
Innovation in maintenance - Accenture
Digital Business - Accenture
HPMC 2014 - How Analytics can improve your customer experience - SAS
HPMC 2014 - Optimizing customer value - Pega Systems
HPMC 2014 - The value of analytics - SAS
HPMC 2014 - CX and Mobility showcase - Oracle
HPMC 2014 - How the customer 2.0 changed marketing - Microsoft
HPMC 2014 - Annual trends service design 2014 - Fjord
HPMC 2014 - Thirteen tenets of a successful digital business - Acquity group
HPMC 2014 - Digital business edge - Accenture
HPMC 2014 - The New Energy Consumer - Accenture Netherlands
HPMC 2013 - Philips
HPMC 2013 - Nationale Nederlanden

OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs

  • 1. From Authentication to Identity Recognition Cyrille Bataller - Accenture Technology Labs Copyright © 2012 Accenture All rights reserved. 1
  • 2. Limits to Authentication… • Something you have, something you know, something you are  Too many cards, PINs, usernames and Pa55w0rds! • Are my social security number, mother’s maiden name or my first school’s name really secrets? • Why different schemes for different channels – password for web, PIN for ATM, shared secrets for call centre, ID doc in person? • Why so many discrete authentication schemes? Copyright © 2012 Accenture All rights reserved. 2
  • 3. We Can Do Better • Authentication: wasted time and energy, barrier to do business (e.g. IVR) • Too hard to remember – here comes the sticky note! 50-75% of support calls = password reset • Discrete, siloed authentication schemes are inherently weak – very narrow view of a person! • Leads to inconvenience, user frustration, inefficiencies, and fraud Copyright © 2012 Accenture All rights reserved. 3
  • 4. Identity Recognition! • Holistic identity recognition – over time and across encounters • Customer centricity – not system centricity • Finally converging digital and physical ID • Helping people conveniently assert their identity, while protecting their privacy and their right to anonymity! Copyright © 2012 Accenture All rights reserved. 4
  • 5. Identity Recognition Benefits Improving customer experience and loyalty, and quality of service… Copyright © 2012 Accenture All rights reserved. 5
  • 6. Identity Recognition Benefits Increasing operational efficiency and cost effectiveness… Copyright © 2012 Accenture All rights reserved. 6
  • 7. Identity Recognition Benefits Improve effectiveness, reduce deficit Reducing fraud… “Identity fraud cost the UK economy £1.2 billion in one year (Identity Fraud Steering Committee figures, 2008)” “The UK Department for Work and Pensions estimated that £800m was lost to benefit fraud in 2006/7” “Identity fraud accounts for a criminal cash flow of £10m per day.” “In March 2008 there were 76.8 million National Insurance numbers in the UK, with a population of 61 million.” Source: CIFAS UK “The U.S. Internal Revenue Service may have delivered more than $5 billion in refund checks to identity thieves who filed fraudulent tax returns for 2011, Treasury Department investigators said. They estimate another $21 billion could make its way to ID thieves' pockets over the next five years.” Source: Federal News Radio “Identity theft rose 33% from 2005 to 2010 in the US, with 8.6M U.S. households experiencing $13.3 billion in direct financial losses in 2010” Source: US Dept of Justice Source: US FTC Build for the future “While it should be noted that in the developed world there continues to be resistance to national ID programs for various reasons, in the developing world, the national ID is increasingly becoming the cornerstone of a secure and trusted ecosystem, where the ultimate goal is for the ID card or the ID number to act as the single unique identifier in the country that supports multiple purposes and multiple applications in the private and public spheres. These could include tax filings, salary and pension payments, border crossings, voter verification, banking, land title registration, and so on. Very few examples of this exist today, but industry analysts expect that within 5 years, most countries will have some form of a national ID system in place and that these national ID systems will include biometrics.” Centre for Global Development. Copyright © 2012 Accenture All rights reserved. 7
  • 8. What Constitutes Identity? • A collection of data that can uniquely describe a person. • Identity gets richer over time – with information continually associated with a person, from cradle to grave. Granularity increases (from life events to every day life events). • What sort of information? – What a person has, knows, is – But also context: where she is, what she’s doing, how she’s doing it, why she’s doing it, who she’s with, in what environment, under what circumstances, what her social network says, what her transaction history is… What a person has What a person knows What a person is The context within which this information is captured • This information changes over time and across encounters  continuous enrolment Event 1 Event 2 Badge Fingerprint Credit card # Exp. date … Timeline Location Browser data IP address at time t1 at time t2 Copyright © 2012 Accenture All rights reserved. 8
  • 9. Where’s Privacy Gone? • Legitimate concerns on how data will be used and safeguarded • Changing cultural attitudes, selective trust, clear benefits • “Privacy by design”; “Privacy Impact Assessments” – ensuring proportionality, scope control, anonymisation, auditing, redress • Procedural, technological, educational, regulatory mitigations • Conveniently assert identity while preserving anonymity  Identity recognition can lead to enhanced privacy, protection from identity theft See Accenture’s “point of view on Biometrics and Privacy” Copyright © 2012 Accenture All rights reserved. 9
  • 10. Examples • I call my bank with my mobile: caller ID (identity claim) + voice biometrics  I’m recognised and dealt with immediately, with knowledge of my context • I walk into my airline lounge: I’m booked to fly today, they have my face photograph  I’m recognised and greeted by name • I arrive at immigration, coming back into the country: API data says I’m arriving, system says my plane has landed, they have my passport photo  I’m recognised and welcomed back home • I use my tablet for shopping, it’s my home IP address, my tablet’s device ID, the camera sees my face  I’m recognised and can do one-click purchase Copyright © 2012 Accenture All rights reserved. 10
  • 11. In Closing… Identity Recognition as the Foundation of Trust • Businesses and governments increasingly see value in moving away from (weak) discrete authentication, challenge-response methods, towards seamless, holistic identity recognition over time and across encounters. • This means using all data points known about a person to recognise them. • This enables customer centricity, finally converging physical and digital ID. • This helps improve customer experience and loyalty, and quality of service, while increasing cost effectiveness and reducing fraud. • It helps people conveniently assert their identity while protecting their privacy, preserving their right to anonymity. Copyright © 2012 Accenture All rights reserved. 11
  • 12. Thank You Cyrille Bataller Partner Accenture 400 avenue de Roumanille, Bât 1A 06902 Sophia Antipolis, France Tel: +33 4 92 94 88 46 Fax: +3 4 92 94 67 99 Mobile: +33 6 85 54 24 14 cyrille.bataller@accenture.com www.accenture.com/biometrics Copyright © 2012 Accenture All rights reserved. 12