SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Cloud Identity Summit
Matthew Thompson and Ryan Fox: July 20, 2014
Your Identity. Your Rewards
§  Founded by two Army Rangers in 2010 to help brands offer special loyalty programs
to affinity groups like: Military, Students, Influencers and Professionals
§  Capable of securing offers delivered online, in-store and via mobile channels
§  Consumer-centric network empowers a consumer to bring their own identity to third
party apps in order to receive personalized offers and experience.
§  More than 100 partners and 500,000 users are on the ID.me network after a year in
production.
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me
WHO WE ARE
Leaders in Digital Identity Technology
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 2
AWARD WINNING SOLUTIONS
Our Accomplishments	
  
§  Department of Commerce for a $2.8M grant as one of the five companies in America
with the most advanced digital Identity technology
§  Finalist for 2013 Wall Street Journal Startup of the Year
§  Named US Chamber of Commerce & Spike TV’s “Most Veteran-Friendly Small
Business in America” in 2013
§  March 2013 Raised Series A round of $10 million led by USAA, Silicon Valley Bank
§  Recognized in Entrepreneur Magazine’s 2014 edition of 100 Brilliant Companies
§  2014 Finalist for LinkShare Advertiser’s Choice Golden Link Award
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 5
Digital Identity 1.0: Broken, Inefficient and
Troubling to Consumers	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 6
Digital Identity 2.0: Transparent, Permissions
Based Interactions	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 7
Veteran verifies with ID.me
to receive discount
Member claim is verified
and account is registered
Veteran sees button
on UnderArmour.com
1 2 3
Users Establish Credentials Across a Network
and Bring Their Identity to Network RPs	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 8
Amy finds Under Armour’s
military discount
Amy creates an ID.me account
and verifies veteran status
Sensitive PII tokenized and
securely encrypted at rest
Amy encounters Mariott’s
MOAA ID.me program
Amy receives Marriott discount without
need to present card in-person
ID.me issues MOAA
credential to Amy
ID.me decrypts relevant PII fields
and preforms match with MOAA
Amy provides her MOAA number
manually or through a card image
Amy comes across 5.11’s
First Responder discount
Amy signs in with ID.me and
provides her EMT number
ID.me decrypts relevant PII fields
and preforms match with registry
ID.me issues First Responder
credential to Amy
Members “Trust Elevate” across network
9
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me
Prevents fraud and allows access to higher value, higher risk transactions
Amy verifies Military service
on UnderArmour.com
Amy receives a 15%
discount off her entire
purchase
Amy needs access to her VA
medical records online
She upgrades her account with
multi-factor authentication
BestBuy.com asks Amy to
verify with ID.me
Amy uses her fingerprint or
voice to authenticate
Best Buy process
transaction for Amy
Amy attempts to purchase a
$2,000 item from Best Buy
Core Identity Service Supports a Growing
Number of Product offerings	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 10
Product	
  Offerings	
  
Core	
  Pla3orm	
  
Mobile App
Affinity
Events
EDU
Auth
Attribute
Val
Voice Bio & OTP Access Management Data Services Identity Verification App Identity/Attribute Data Providers
White Label
Card
Link
Groups MgtMarketplaceIdentity as a Service
CASE STUDY
Under Armour Military Loyalty Program 	
  
§  Under Armour
integrated ID.me
technology to create an
omni-channel customer
experience
§  Customer verifies
affinity in real-time and
claims discount
directly in cart
§  Under Armour had a
military discount
program in-store but was
unable to provide the
program online because
they couldn’t verify
customer affinity
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 11
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 14
Q&A

Matt Thompson Ryan Fox
COO, Co-Founder VP Product Strategy
matt@id.me ryan@id.me
703-992-8382 703-795-4776
Internet Retailer Case Study:
http://www.internetretailer.com/registration-forms/
case-study-under-armour-honors-heroes/	
  

Más contenido relacionado

Similar a CIS14: Id.me

CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA Research Corporation
 
Kicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
Kicking Off Your Identity-Driven Marketing Strategy with MLS and GigyaKicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
Kicking Off Your Identity-Driven Marketing Strategy with MLS and GigyaSalesforce Marketing Cloud
 
Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008eComm2008
 
IC Group Capabilities
IC Group CapabilitiesIC Group Capabilities
IC Group Capabilitiesdanconroy9600
 
Bloggers and Brand Advocates - Telling the Insurance Story
Bloggers and Brand Advocates - Telling the Insurance StoryBloggers and Brand Advocates - Telling the Insurance Story
Bloggers and Brand Advocates - Telling the Insurance StoryThomas H. Wetzel & Associates
 
Memberguid erevised
Memberguid erevisedMemberguid erevised
Memberguid erevisedEmilyKPope
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...Precisely
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshureTrustIDnow
 
Data Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity ManagementData Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity ManagementRyan Hogarth
 
Life Lock Employee Benefit Presentation
Life Lock Employee Benefit PresentationLife Lock Employee Benefit Presentation
Life Lock Employee Benefit PresentationCheryl Miller
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthemamason04
 

Similar a CIS14: Id.me (20)

CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
 
Digital Identities
Digital IdentitiesDigital Identities
Digital Identities
 
Kicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
Kicking Off Your Identity-Driven Marketing Strategy with MLS and GigyaKicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
Kicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
 
Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
IC Group Capabilities
IC Group CapabilitiesIC Group Capabilities
IC Group Capabilities
 
Bloggers and Brand Advocates - Telling the Insurance Story
Bloggers and Brand Advocates - Telling the Insurance StoryBloggers and Brand Advocates - Telling the Insurance Story
Bloggers and Brand Advocates - Telling the Insurance Story
 
Memberguid erevised
Memberguid erevisedMemberguid erevised
Memberguid erevised
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
Secured touch
Secured touchSecured touch
Secured touch
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshure
 
Data Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity ManagementData Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity Management
 
Life Lock Employee Benefit Presentation
Life Lock Employee Benefit PresentationLife Lock Employee Benefit Presentation
Life Lock Employee Benefit Presentation
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
 

Más de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Más de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

CIS14: Id.me

  • 1. Cloud Identity Summit Matthew Thompson and Ryan Fox: July 20, 2014 Your Identity. Your Rewards
  • 2. §  Founded by two Army Rangers in 2010 to help brands offer special loyalty programs to affinity groups like: Military, Students, Influencers and Professionals §  Capable of securing offers delivered online, in-store and via mobile channels §  Consumer-centric network empowers a consumer to bring their own identity to third party apps in order to receive personalized offers and experience. §  More than 100 partners and 500,000 users are on the ID.me network after a year in production. CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me WHO WE ARE Leaders in Digital Identity Technology CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 2
  • 3.
  • 4.
  • 5. AWARD WINNING SOLUTIONS Our Accomplishments   §  Department of Commerce for a $2.8M grant as one of the five companies in America with the most advanced digital Identity technology §  Finalist for 2013 Wall Street Journal Startup of the Year §  Named US Chamber of Commerce & Spike TV’s “Most Veteran-Friendly Small Business in America” in 2013 §  March 2013 Raised Series A round of $10 million led by USAA, Silicon Valley Bank §  Recognized in Entrepreneur Magazine’s 2014 edition of 100 Brilliant Companies §  2014 Finalist for LinkShare Advertiser’s Choice Golden Link Award CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 5
  • 6. Digital Identity 1.0: Broken, Inefficient and Troubling to Consumers   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 6
  • 7. Digital Identity 2.0: Transparent, Permissions Based Interactions   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 7 Veteran verifies with ID.me to receive discount Member claim is verified and account is registered Veteran sees button on UnderArmour.com 1 2 3
  • 8. Users Establish Credentials Across a Network and Bring Their Identity to Network RPs   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 8 Amy finds Under Armour’s military discount Amy creates an ID.me account and verifies veteran status Sensitive PII tokenized and securely encrypted at rest Amy encounters Mariott’s MOAA ID.me program Amy receives Marriott discount without need to present card in-person ID.me issues MOAA credential to Amy ID.me decrypts relevant PII fields and preforms match with MOAA Amy provides her MOAA number manually or through a card image Amy comes across 5.11’s First Responder discount Amy signs in with ID.me and provides her EMT number ID.me decrypts relevant PII fields and preforms match with registry ID.me issues First Responder credential to Amy
  • 9. Members “Trust Elevate” across network 9 CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me Prevents fraud and allows access to higher value, higher risk transactions Amy verifies Military service on UnderArmour.com Amy receives a 15% discount off her entire purchase Amy needs access to her VA medical records online She upgrades her account with multi-factor authentication BestBuy.com asks Amy to verify with ID.me Amy uses her fingerprint or voice to authenticate Best Buy process transaction for Amy Amy attempts to purchase a $2,000 item from Best Buy
  • 10. Core Identity Service Supports a Growing Number of Product offerings   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 10 Product  Offerings   Core  Pla3orm   Mobile App Affinity Events EDU Auth Attribute Val Voice Bio & OTP Access Management Data Services Identity Verification App Identity/Attribute Data Providers White Label Card Link Groups MgtMarketplaceIdentity as a Service
  • 11. CASE STUDY Under Armour Military Loyalty Program   §  Under Armour integrated ID.me technology to create an omni-channel customer experience §  Customer verifies affinity in real-time and claims discount directly in cart §  Under Armour had a military discount program in-store but was unable to provide the program online because they couldn’t verify customer affinity CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 11
  • 12.
  • 13.
  • 14. CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 14 Q&A Matt Thompson Ryan Fox COO, Co-Founder VP Product Strategy matt@id.me ryan@id.me 703-992-8382 703-795-4776 Internet Retailer Case Study: http://www.internetretailer.com/registration-forms/ case-study-under-armour-honors-heroes/