16
Company Confidential

Company Confidential. Identity Checkpoint is “The End to Identity Theft”

Embed Size (px)

Citation preview

Page 1: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

Company Confidential

Page 2: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

Identity Checkpoint is “The End to Identity Theft”

Page 3: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

Identity Theft costs individuals and institutions over $225 billion each year.

It devastates personal well being as well as sense of security and impacts the quality of life almost indefinitely. Worst, there was no foreseeable solution on the horizon.

The Problem of Identity Theft

Page 4: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

Today there is a solution which can end Identity Theft. The missing element has been our participation in the authorization of use of our personal identifiers and financial instruments.

Identity Checkpoint puts the individual back in control of their identity and helps them prove “they are who they say they are” and verify “they have authorized the use of their accounts and assets.”

The Solution

Page 5: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

There are two solution components:

• Identity Checkpoint will provide a free phone app to everyone for managing their personal identity and financial instruments use.

• Identity Checkpoint will provide a open platform for business, financial networks and governments to implement “multi-factor identity and financial instrument use authorization.”

How It Works

Page 6: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

With these components inin place, the financial networks, businesses and governments will connect toIdentity Checkpoint for “authorization of use” of personal identifiersand financial instruments from their ownersusing the “Sentry”application.

How It Works

Page 7: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

With this solution in place, the actual identity checkpoint becomes “you”.

Use of the “Sentry” application will guard identities and controlall transactions 24/7.

Important Points

Page 8: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

Identity Checkpoint is based on pending U.S. Patent Application 14/288,282, “System for Managing Personal Identifiers and Financial Instrument Use”.

A prototype of that patent has been developed and demonstrated to a large cross section of business executives and technologists with very positive feedback.

The Progress

Page 9: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

No known direct competitors have been identified at this time. The competitive landscape includes post use reactive companies like LifeLock which provide monitoring services and insurance, but not proactive, direct use management.

Patent searches have failed to reveal any existing patents that may have be infringed upon or covered similar intellectual properties.

The Competitive Lanscape

Page 10: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

• The heart of all business is the transfer of funds from one entity to another entity.

• Each transfer of funds has a composite transactional cost which is paid to third parties.

• Becoming part of that transactional process as the third party providing authorization services is the business goal.

• Being paid as part of the transactional cost of all transactions is the basis of this business model.

The Basis of the Business Model

Page 11: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

Nilson Predicts 288 Billion Purchase Transactions per Year by 2018

The Basis of the Business Model

Page 12: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

Identity Use Protection Fee

The basis of this business model is to be paid as one of the fees which comprise the transactional cost incurred in all card transactions.

This fee is potentially marked up by the card processors acting as the distributors of our services from the cost to them, i.e. $0.01/transaction. Time Elements        

Sec/Minute Sec/Hour Sec/Day Sec/Month Sec/Year60 3,600 86,400 2,628,000 31,536,000

Transactions        Trans/Sec Trans/Minute Trans/Hour Trans/Day Trans/Month Trans/Year

9,000 540,000 32,400,000 777,600,000 23,652,000,000 283,824,000,000

Income          $/Trans $/Minute $/Hour $/Day $/Month $/Year

0.010 $5,400.00 $324,000.00 $7,776,000.00 $236,520,000.00 $2,838,240,000.00

The Basis of the Business Model

Page 13: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

The expected costs for development and full deployment were based on 3 year hardware leasing by phase, 3 year leasing of data center space and virtual system management operations. A comprehensive financial projection is available.

Phase Primary Activity Expense

1 Development – Deployment #1 $2,200,761 (3 mo.)

2 Beta Testing $3,103,207 (3 mo.)

3 Beta Testing – Deployment #2 $3,362,575 (3 mo.)

4 Deployment #3 $9,082,924 (6 mo.)

5 Deployment #4 $12,474,692 (6 mo.)

The Basis of the Business Model

Page 14: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

Founder and CEO

During the past 34 years, Founder and CEOMarc George has lead major projects, taught, mentored and consulted at the US Office of Personnel Management (OPM), US Department of Health and Human Services (HHS), the National Institutes of Health (NIH), US Department of Labor (DOL), The World Bank, Dow Jones, Aetna, American Red Cross, CareFirst BCBS, John Deere, WellPoint, Fannie Mae, GMAC Insurance and numerous other companies.

Page 15: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

Name Role Bio

Peter Engstrom

Advisor / interim CKO

Co-founder, At Home - ChesapeakeVP, Federal Knowledge Business, SAIC

Jon Tholen Advisor VP, Customer Service, BCBS CaliforniaGlobal Head Operations, VISA

Ryan Lee Advisor Senior Director, Business Development, VISA

John Parkinson

Advisor / Interim CIO

Partner, Waterstone Management GroupCTO, TransUnion

Peter Alsberg Advisor Co-Founder, eCD MarketCIO, Lawson Products

Thomas Erisman

CFO CFO, 180sCFO, Reborn Beauty

Advisors and Prospective Staff

Page 16: Company Confidential. Identity Checkpoint is “The End to Identity Theft”

“The End to Identity Theft”