140 likes | 282 Views
Computer Password Manager. Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba. Agenda. Refined POG Value Opportunity Analysis Product Attributes Short List of Product Concepts Selected Product Concept Prototype. Refined POG. Background
E N D
Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba
Agenda • Refined POG • Value Opportunity Analysis • Product Attributes • Short List of Product Concepts • Selected Product Concept • Prototype
Refined POG • Background • Increase in the use of password protected applications • Varying password security policies • Challenge • Difficulty for consumers to remember security combinations • Opportunity Gap • Assist customers with remembering their passwords • Create a safe and reliable manner for all internet passwords
Value Opportunity Analysis - users want to feel secure that there information is safe. - users need to feel confident that the product will work - product needs to be bug free and safe holding users information - light users need to be able to easily use this product - Look of product should be simple and stylish - Core technology must be reliable and actually save users time - Product needs to be well made and bug free. Users need to know it will last.
Product Attributes • Be secure and safe. • Be able to be used on multiple computer systems. • Be easy to use. • Seamless platform integration. • Encourages unique passwords and prompts if password change needed. • Have excellent Brand reputation.
Short List of Product Concepts • Wireless Security Key • USB Key With Fingerprint Scanner • Java Enabled Website • Cell Phone with Blue Tooth Enabled Password Manager
Key Challenges/Questions • Portability • Are consumers going to want to carry it with them? • Can we design it so consumers will carry it with them? • How big does it have to be? • Design/GUI Interface • What would the prompts look like on computer? • What is the user experience on the computer like? • How secure is the fingerprint security?
Final Product Concept Example user scenario: • Judith uses several online applications with different password requirements. • Her secure USB device is plugged into her laptop. • The USB asks for fingerprint authentication. • After successful recognition by the software, a browser opens up for a second level of authentication (password only). • After successful authentication, the software provides the userid/password for each of the applications stored in the USB device. • After 15 minutes of inactivity, the device turns itself off.
Prototype Flowchart 1) User inserts USB and scans fingerprint 2) Second level password authentication