1 / 13

Computer Password Manager

Computer Password Manager. Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba. Agenda. Refined POG Value Opportunity Analysis Product Attributes Short List of Product Concepts Selected Product Concept Prototype. Refined POG. Background

ulf
Download Presentation

Computer Password Manager

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba

  2. Agenda • Refined POG • Value Opportunity Analysis • Product Attributes • Short List of Product Concepts • Selected Product Concept • Prototype

  3. Refined POG • Background • Increase in the use of password protected applications • Varying password security policies • Challenge • Difficulty for consumers to remember security combinations • Opportunity Gap • Assist customers with remembering their passwords • Create a safe and reliable manner for all internet passwords

  4. Value Opportunity Analysis - users want to feel secure that there information is safe. - users need to feel confident that the product will work - product needs to be bug free and safe holding users information - light users need to be able to easily use this product - Look of product should be simple and stylish - Core technology must be reliable and actually save users time - Product needs to be well made and bug free. Users need to know it will last.

  5. Product Attributes • Be secure and safe. • Be able to be used on multiple computer systems. • Be easy to use. • Seamless platform integration. • Encourages unique passwords and prompts if password change needed. • Have excellent Brand reputation.

  6. Analysis of Product Attributes

  7. Analysis of Stakeholders

  8. Short List of Product Concepts • Wireless Security Key • USB Key With Fingerprint Scanner • Java Enabled Website • Cell Phone with Blue Tooth Enabled Password Manager

  9. Key Challenges/Questions • Portability • Are consumers going to want to carry it with them? • Can we design it so consumers will carry it with them? • How big does it have to be? • Design/GUI Interface • What would the prompts look like on computer? • What is the user experience on the computer like? • How secure is the fingerprint security?

  10. Final Product Concept Example user scenario: • Judith uses several online applications with different password requirements. • Her secure USB device is plugged into her laptop. • The USB asks for fingerprint authentication. • After successful recognition by the software, a browser opens up for a second level of authentication (password only). • After successful authentication, the software provides the userid/password for each of the applications stored in the USB device. • After 15 minutes of inactivity, the device turns itself off.

  11. Prototype Flowchart 1) User inserts USB and scans fingerprint 2) Second level password authentication

  12. Lessons Learned

  13. QUESTIONS?

More Related