Date post: | 12-Feb-2017 |
Category: |
Presentations & Public Speaking |
Upload: | dynatec-sa-especialistas-en-proyectos-de-ingenieria-a-nivel-mundial |
View: | 413 times |
Download: | 0 times |
Jim Novackeyebee Talent Swarmwww.talentswarm.comJune 8, 2015
How to Manage Enterprise AR Safety & Risks
5/18/15 2www.theAREA.org
5/18/15 www.theAREA.org 3
Airbnb is rolling out a new identity verification program that will eventually require all users around the world to connect their online identities with conventional forms of identification.Users have the choice of confirming their birthdate and partial social security number or uploading a scanned copy of a government ID and linking it with an online login through Airbnb, Facebook or LinkedIn. A ‘Verified ID’ badge will appear on profiles of users who have completed the process.“Trust is the key to our community. There is no place for anonymity in a trusted community,” Airbnb said in a blog post.The company said it would ask a quarter of its users in the United States to verify their IDs starting today, but will soon “expand this requirement to users around the world.”
5/18/15 www.theAREA.org 4
Intrusion Protection (Perimeter defense)
5/18/15 www.theAREA.org 5
Playboy Mansion secret access
5/18/15 www.theAREA.org 6
A new electronic personal identity card will be introduced in Germany on 1 November 2010. The complex overall system for managing the mandatory card and its contactless chip is on display at CeBIT 2010. The card has three functions: 1. biometric identity verification, 2. electronic identity verification, 3. authenticated electronic signature. Identity Verification (Only Authorized Enter)
5/18/15 www.theAREA.org 7
Identity TheftTailgating
5/18/15 www.theAREA.org 8Trojan Horse
5/18/15 www.theAREA.org 9
5/18/15 www.theAREA.org 10
Mimetic Polyalloy
5/18/15 www.theAREA.org 11
Biometric Verification
5/18/15 www.theAREA.org 12
Minority Report
5/18/15 www.theAREA.org 13
• Telepresence (a remote viewer)
5/18/15 www.theAREA.org 14
5/18/15 www.theAREA.org 15Robonaut
5/18/15 www.theAREA.org 16
The Jedi Council Room - the ultimate telepresence conference room
This sounds like an extension of a Microsoft Research project, Viewport, that was first announced in 2012. The team in charge of Viewport proposed a system that included a camera rig that had a number of color and infrared cameras, along with a series of infrared projectors. The project said that the goal was to "reconstruct a 3D representation in real-time, which will be rendered in a shared virtual environment for immersive telecommunication."
http://gajitz.com/2-places-at-once-telexistence-bot-has-3-human-senses/
• Augmented Reality (receiving information from a third party)
5/18/15 www.theAREA.org 17
http://umbra.sandia.gov/applications.html
DaqriODG
• Virtual Reality (artificial environment)
5/18/15 www.theAREA.org 18
5/18/15 www.theAREA.org 19Talent Swarm
5/18/15 www.theAREA.org 20
215/18/15
How to Manage Enterprise AR Safety & Risks?
5/18/15 www.theAREA.org 22
How to Manage Enterprise AR Safety & Risks?
• Confidentiality (Authentication and Encryption and Private / Confidential)
• Integrity(Message not Modified)
• Availability(Usable)
5/18/15 www.theAREA.org 23
http://cacm.acm.org/magazines/2014/4/173222-security-and-privacy-for-augmented-reality-systems/abstract
Data Security Basics:
AR “Laws” Should Minimally Account for:7. Do No Harm (3 Laws…)6. Respect privacy5. Activity Auditing (Intention Proper and DNH)4. Provide accuracy and source of information (level of trust and affinity to user)3. Verify identity of transmitter and receiver2. Trusted network with Confidentiality, Integrity of Messaging and Availability7. Unalterable Device ID (like cell phone IMEI)
5/18/15 www.theAREA.org 24
5/18/15 www.theAREA.org 25
● User identification● Key seed generation● Centralized Management ● Statistics Management
Encrypted message through regular communications network.
Authentication and seeds through Central Authority.
Central Authority (CA)
5/18/15 www.theAREA.org 26
All information is encrypted.
The central server contains information on the agenda, the keys and is responsible for verifying the identity of users and devices.
Communications (messages) never go through the central server.
The control packets are also encrypted communication.
5/18/15 www.theAREA.org 27
Who is providing the info?
Who has access to the video and audio streams?
Activity Auditing (Intention Proper and Do No Harm)
5/18/15 www.theAREA.org 28
5/18/15 www.theAREA.org 29
5/18/15 www.theAREA.org 30
5/18/15 www.theAREA.org 31
5/18/15 www.theAREA.org 32
5/18/15 www.theAREA.org 33
5/18/15 www.theAREA.org 34
“Soft Landing”
5/18/15 www.theAREA.org 35
Booth 84 – AWE 2015Jim [email protected]
Come see us on July 1 in Sheffield, England at AR in the Strategic Enterprise (ARise)
Thank you!
Talent SwarmCollaborative Work Environment
eyebee AR Certification Services