Computer Password Manager
description
Transcript of Computer Password Manager
![Page 1: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/1.jpg)
+
Computer Password ManagerColin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba
![Page 2: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/2.jpg)
+Agenda
Refined POG
Value Opportunity Analysis
Product Attributes
Short List of Product Concepts
Selected Product Concept
Prototype
![Page 3: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/3.jpg)
+Refined POG
Background Increase in the use of password protected applications Varying password security policies
Challenge Difficulty for consumers to remember security combinations
Opportunity Gap Assist customers with remembering their passwords Create a safe and reliable manner for all internet passwords
![Page 4: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/4.jpg)
+Value Opportunity Analysis
Low Med High
Emotion
adventure NA independence NA
securitysensuality NA
confidence power
User Interfacecomfort NA
safetyease of use
Aesthetics
visual auditory NA
tactile NA olfactory NA
gustatory NA
Identitypoint in time
sense of place personality
Impactsocial
environmental Core
Technologyreliable
enabling
Qualitycraftsmanship
durability Profit Impact
Brand Impact Extendable
- users want to feel secure that there information is safe.
- users need to feel confident that the product will work
- product needs to be bug free and safe holding users information- light users need to be able to easily use this product- Look of product should be simple and stylish
- Core technology must be reliable and actually save users time
- Product needs to be well made and bug free. Users need to know it will last.
![Page 5: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/5.jpg)
+Product Attributes
Be secure and safe.
Be able to be used on multiple computer systems.
Be easy to use.
Seamless platform integration.
Encourages unique passwords and prompts if password change needed.
Have excellent Brand reputation.
![Page 6: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/6.jpg)
+Analysis of Product Attributes
Weight Product Attributes (out of 10) Secure Id USB Key Website Cell Phone
40% Be secure and safe. 9 8 4 7
20% Be able to be used on multiple computer systems.
10 8 10 5
10% Be easy to use. 8 8 9 6
25% Seamless platform integration. 4 8 10 6
5%Encourages unique passwords and prompts if password change needed.
10 10 10 10
Total 7.9 8.1 7.5 6.4
![Page 7: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/7.jpg)
+Analysis of Stakeholders
Stakeholder Secure ID USB Key Website Cell Phone
Individual Consumers POS POS POS POS
Web Departments NEG NEU NEU NEU
Credit Card Companies POS NEU NEG NEG
Consumer Advocacy Groups NEU NEU NEG NEG
Businesses NEG NEU NEU NEU
Overall Response NEU POS NEG NEG
![Page 8: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/8.jpg)
+Short List of Product Concepts
Wireless Security Key
USB Key With Fingerprint Scanner
Java Enabled Website
Cell Phone with Blue Tooth Enabled Password Manager
![Page 9: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/9.jpg)
+Key Challenges/Questions
Portability Are consumers going to want to carry it with them? Can we design it so consumers will carry it with them? How big does it have to be?
Design/GUI Interface What would the prompts look like on computer? What is the user experience on the computer like?
How secure is the fingerprint security?
![Page 10: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/10.jpg)
+Final Product ConceptExample user scenario:
Judith uses several online applications with different password requirements.
Her secure USB device is plugged into her laptop.
The USB asks for fingerprint authentication.
After successful recognition by the software, a browser opens up for a second level of authentication (password only).
After successful authentication, the software provides the userid/password for each of the applications stored in the USB device.
After 15 minutes of inactivity, the device turns itself off.
![Page 11: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/11.jpg)
+Prototype Flowchart
1) User inserts USB and scans fingerprint
2) Second level password authentication
![Page 12: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/12.jpg)
+Lessons Learned
![Page 13: Computer Password Manager](https://reader035.fdocuments.in/reader035/viewer/2022062314/56813dc5550346895da78c1e/html5/thumbnails/13.jpg)
QUESTIONS?