View
37
Download
1
Category
Tags:
Preview:
DESCRIPTION
Computer Password Manager. Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba. Agenda. Refined POG Value Opportunity Analysis Product Attributes Short List of Product Concepts Selected Product Concept Prototype. Refined POG. Background - PowerPoint PPT Presentation
Citation preview
+
Computer Password ManagerColin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba
+Agenda
Refined POG Value Opportunity Analysis Product Attributes Short List of Product Concepts Selected Product Concept Prototype
+Refined POG
Background Increase in the use of password protected applications Varying password security policies
Challenge Difficulty for consumers to remember security combinations
Opportunity Gap Assist customers with remembering their passwords Create a safe and reliable manner for all internet passwords
+Value Opportunity Analysis
Low Med High
Emotion
adventure NA independence NA
securitysensuality NA
confidence power
User Interfacecomfort NA
safetyease of use
Aesthetics
visual auditory NA
tactile NA olfactory NA
gustatory NA
Identitypoint in time
sense of place personality
Impact social environmental
Core Technology
reliableenabling
Quality craftsmanship durability
Profit Impact Brand Impact
Extendable
- users want to feel secure that there information is safe.
- users need to feel confident that the product will work
- product needs to be bug free and safe holding users information- light users need to be able to easily use this product- Look of product should be simple and stylish
- Core technology must be reliable and actually save users time- Product needs to be well made and bug free. Users need to know it will last.
+Product Attributes
Be secure and safe. Be able to be used on multiple computer systems. Be easy to use. Seamless platform integration. Encourages unique passwords and prompts if password
change needed. Have excellent Brand reputation.
+Analysis of Product Attributes
Weight Product Attributes (out of 10) Secure Id USB Key Website Cell Phone
40% Be secure and safe. 9 8 4 7
20% Be able to be used on multiple computer systems.
10 8 10 5
10% Be easy to use. 8 8 9 6
25% Seamless platform integration. 4 8 10 6
5%Encourages unique passwords and prompts if password change needed.
10 10 10 10
Total 7.9 8.1 7.5 6.4
+Analysis of Stakeholders
Stakeholder Secure ID USB Key Website Cell Phone
Individual Consumers POS POS POS POS
Web Departments NEG NEU NEU NEU
Credit Card Companies POS NEU NEG NEG
Consumer Advocacy Groups NEU NEU NEG NEG
Businesses NEG NEU NEU NEU
Overall Response NEU POS NEG NEG
+Short List of Product Concepts
Wireless Security Key USB Key With Fingerprint Scanner Java Enabled Website Cell Phone with Blue Tooth Enabled Password Manager
+Key Challenges/Questions
Portability Are consumers going to want to carry it with them? Can we design it so consumers will carry it with them? How big does it have to be?
Design/GUI Interface What would the prompts look like on computer? What is the user experience on the computer like?
How secure is the fingerprint security?
+Final Product ConceptExample user scenario: Judith uses several online applications with different password
requirements. Her secure USB device is plugged into her laptop. The USB asks for fingerprint authentication. Successful recognition by the software, pops a second level of
authentication (password only). After successful authentication, the software provides the
userid/password for each of the applications stored in the USB device.
After 15 minutes of inactivity, the device turns itself off.
+Prototype Flowchart1) User inserts USB and scans fingerprint
2) Second level password authentication
+Lessons Learned
Ensure process is completely streamlined for the consumer.
Integrate USB with objects users normally carry with them.
Additional functionality of USB. Backup for USB drive.
QUESTIONS?
Recommended