SlideShare a Scribd company logo
1 of 14
Download to read offline
Cloud Identity Summit
Matthew Thompson and Ryan Fox: July 20, 2014
Your Identity. Your Rewards
§  Founded by two Army Rangers in 2010 to help brands offer special loyalty programs
to affinity groups like: Military, Students, Influencers and Professionals
§  Capable of securing offers delivered online, in-store and via mobile channels
§  Consumer-centric network empowers a consumer to bring their own identity to third
party apps in order to receive personalized offers and experience.
§  More than 100 partners and 500,000 users are on the ID.me network after a year in
production.
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me
WHO WE ARE
Leaders in Digital Identity Technology
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 2
AWARD WINNING SOLUTIONS
Our Accomplishments	
  
§  Department of Commerce for a $2.8M grant as one of the five companies in America
with the most advanced digital Identity technology
§  Finalist for 2013 Wall Street Journal Startup of the Year
§  Named US Chamber of Commerce & Spike TV’s “Most Veteran-Friendly Small
Business in America” in 2013
§  March 2013 Raised Series A round of $10 million led by USAA, Silicon Valley Bank
§  Recognized in Entrepreneur Magazine’s 2014 edition of 100 Brilliant Companies
§  2014 Finalist for LinkShare Advertiser’s Choice Golden Link Award
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 5
Digital Identity 1.0: Broken, Inefficient and
Troubling to Consumers	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 6
Digital Identity 2.0: Transparent, Permissions
Based Interactions	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 7
Veteran verifies with ID.me
to receive discount
Member claim is verified
and account is registered
Veteran sees button
on UnderArmour.com
1 2 3
Users Establish Credentials Across a Network
and Bring Their Identity to Network RPs	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 8
Amy finds Under Armour’s
military discount
Amy creates an ID.me account
and verifies veteran status
Sensitive PII tokenized and
securely encrypted at rest
Amy encounters Mariott’s
MOAA ID.me program
Amy receives Marriott discount without
need to present card in-person
ID.me issues MOAA
credential to Amy
ID.me decrypts relevant PII fields
and preforms match with MOAA
Amy provides her MOAA number
manually or through a card image
Amy comes across 5.11’s
First Responder discount
Amy signs in with ID.me and
provides her EMT number
ID.me decrypts relevant PII fields
and preforms match with registry
ID.me issues First Responder
credential to Amy
Members “Trust Elevate” across network
9
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me
Prevents fraud and allows access to higher value, higher risk transactions
Amy verifies Military service
on UnderArmour.com
Amy receives a 15%
discount off her entire
purchase
Amy needs access to her VA
medical records online
She upgrades her account with
multi-factor authentication
BestBuy.com asks Amy to
verify with ID.me
Amy uses her fingerprint or
voice to authenticate
Best Buy process
transaction for Amy
Amy attempts to purchase a
$2,000 item from Best Buy
Core Identity Service Supports a Growing
Number of Product offerings	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 10
Product	
  Offerings	
  
Core	
  Pla3orm	
  
Mobile App
Affinity
Events
EDU
Auth
Attribute
Val
Voice Bio & OTP Access Management Data Services Identity Verification App Identity/Attribute Data Providers
White Label
Card
Link
Groups MgtMarketplaceIdentity as a Service
CASE STUDY
Under Armour Military Loyalty Program 	
  
§  Under Armour
integrated ID.me
technology to create an
omni-channel customer
experience
§  Customer verifies
affinity in real-time and
claims discount
directly in cart
§  Under Armour had a
military discount
program in-store but was
unable to provide the
program online because
they couldn’t verify
customer affinity
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 11
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 14
Q&A

Matt Thompson Ryan Fox
COO, Co-Founder VP Product Strategy
matt@id.me ryan@id.me
703-992-8382 703-795-4776
Internet Retailer Case Study:
http://www.internetretailer.com/registration-forms/
case-study-under-armour-honors-heroes/	
  

More Related Content

Similar to Cloud Identity Summit: ID.me's Digital Identity Solutions

CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA Research Corporation
 
Kicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
Kicking Off Your Identity-Driven Marketing Strategy with MLS and GigyaKicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
Kicking Off Your Identity-Driven Marketing Strategy with MLS and GigyaSalesforce Marketing Cloud
 
Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008eComm2008
 
IC Group Capabilities
IC Group CapabilitiesIC Group Capabilities
IC Group Capabilitiesdanconroy9600
 
Bloggers and Brand Advocates - Telling the Insurance Story
Bloggers and Brand Advocates - Telling the Insurance StoryBloggers and Brand Advocates - Telling the Insurance Story
Bloggers and Brand Advocates - Telling the Insurance StoryThomas H. Wetzel & Associates
 
Memberguid erevised
Memberguid erevisedMemberguid erevised
Memberguid erevisedEmilyKPope
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...Precisely
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshureTrustIDnow
 
Data Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity ManagementData Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity ManagementRyan Hogarth
 
Life Lock Employee Benefit Presentation
Life Lock Employee Benefit PresentationLife Lock Employee Benefit Presentation
Life Lock Employee Benefit PresentationCheryl Miller
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthemamason04
 

Similar to Cloud Identity Summit: ID.me's Digital Identity Solutions (20)

CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
 
Digital Identities
Digital IdentitiesDigital Identities
Digital Identities
 
Kicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
Kicking Off Your Identity-Driven Marketing Strategy with MLS and GigyaKicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
Kicking Off Your Identity-Driven Marketing Strategy with MLS and Gigya
 
Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008Koushik Chatterjee''s presentation at eComm 2008
Koushik Chatterjee''s presentation at eComm 2008
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
IC Group Capabilities
IC Group CapabilitiesIC Group Capabilities
IC Group Capabilities
 
Bloggers and Brand Advocates - Telling the Insurance Story
Bloggers and Brand Advocates - Telling the Insurance StoryBloggers and Brand Advocates - Telling the Insurance Story
Bloggers and Brand Advocates - Telling the Insurance Story
 
Memberguid erevised
Memberguid erevisedMemberguid erevised
Memberguid erevised
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
Secured touch
Secured touchSecured touch
Secured touch
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshure
 
Data Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity ManagementData Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity Management
 
Life Lock Employee Benefit Presentation
Life Lock Employee Benefit PresentationLife Lock Employee Benefit Presentation
Life Lock Employee Benefit Presentation
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Cloud Identity Summit: ID.me's Digital Identity Solutions

  • 1. Cloud Identity Summit Matthew Thompson and Ryan Fox: July 20, 2014 Your Identity. Your Rewards
  • 2. §  Founded by two Army Rangers in 2010 to help brands offer special loyalty programs to affinity groups like: Military, Students, Influencers and Professionals §  Capable of securing offers delivered online, in-store and via mobile channels §  Consumer-centric network empowers a consumer to bring their own identity to third party apps in order to receive personalized offers and experience. §  More than 100 partners and 500,000 users are on the ID.me network after a year in production. CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me WHO WE ARE Leaders in Digital Identity Technology CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 2
  • 3.
  • 4.
  • 5. AWARD WINNING SOLUTIONS Our Accomplishments   §  Department of Commerce for a $2.8M grant as one of the five companies in America with the most advanced digital Identity technology §  Finalist for 2013 Wall Street Journal Startup of the Year §  Named US Chamber of Commerce & Spike TV’s “Most Veteran-Friendly Small Business in America” in 2013 §  March 2013 Raised Series A round of $10 million led by USAA, Silicon Valley Bank §  Recognized in Entrepreneur Magazine’s 2014 edition of 100 Brilliant Companies §  2014 Finalist for LinkShare Advertiser’s Choice Golden Link Award CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 5
  • 6. Digital Identity 1.0: Broken, Inefficient and Troubling to Consumers   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 6
  • 7. Digital Identity 2.0: Transparent, Permissions Based Interactions   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 7 Veteran verifies with ID.me to receive discount Member claim is verified and account is registered Veteran sees button on UnderArmour.com 1 2 3
  • 8. Users Establish Credentials Across a Network and Bring Their Identity to Network RPs   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 8 Amy finds Under Armour’s military discount Amy creates an ID.me account and verifies veteran status Sensitive PII tokenized and securely encrypted at rest Amy encounters Mariott’s MOAA ID.me program Amy receives Marriott discount without need to present card in-person ID.me issues MOAA credential to Amy ID.me decrypts relevant PII fields and preforms match with MOAA Amy provides her MOAA number manually or through a card image Amy comes across 5.11’s First Responder discount Amy signs in with ID.me and provides her EMT number ID.me decrypts relevant PII fields and preforms match with registry ID.me issues First Responder credential to Amy
  • 9. Members “Trust Elevate” across network 9 CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me Prevents fraud and allows access to higher value, higher risk transactions Amy verifies Military service on UnderArmour.com Amy receives a 15% discount off her entire purchase Amy needs access to her VA medical records online She upgrades her account with multi-factor authentication BestBuy.com asks Amy to verify with ID.me Amy uses her fingerprint or voice to authenticate Best Buy process transaction for Amy Amy attempts to purchase a $2,000 item from Best Buy
  • 10. Core Identity Service Supports a Growing Number of Product offerings   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 10 Product  Offerings   Core  Pla3orm   Mobile App Affinity Events EDU Auth Attribute Val Voice Bio & OTP Access Management Data Services Identity Verification App Identity/Attribute Data Providers White Label Card Link Groups MgtMarketplaceIdentity as a Service
  • 11. CASE STUDY Under Armour Military Loyalty Program   §  Under Armour integrated ID.me technology to create an omni-channel customer experience §  Customer verifies affinity in real-time and claims discount directly in cart §  Under Armour had a military discount program in-store but was unable to provide the program online because they couldn’t verify customer affinity CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 11
  • 12.
  • 13.
  • 14. CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 14 Q&A Matt Thompson Ryan Fox COO, Co-Founder VP Product Strategy matt@id.me ryan@id.me 703-992-8382 703-795-4776 Internet Retailer Case Study: http://www.internetretailer.com/registration-forms/ case-study-under-armour-honors-heroes/