Innovations in Authentication and Personalization Technologies

New personal identification and authentication technologies have the potential to transform the way that entertainment services are delivered, accessed, and experienced. These technologies offer a high level of security, often incorporating biometrics, such as voice, fingerprint, iris or retinal features, and facial characteristics. They also have the potential to support truly personalized entertainment experiences. This report explores such technologies’ readiness for market deployment, analyze best-fit use cases, and profile major players that provide authentication and identification technologies or solutions.

This report is not available for purchase

Questions?

- click image to enlarge -

Download Table of Contents (PDF)

1.0        Report Summary

1.1        Purpose of Report

1.2        Burning Questions Addressed by this Research

1.3        Research Approach/Sources

2.0        Authentication Today

2.1        Current Types and Uses

2.2        Challenges

2.3        Needs

3.0        Authentication Technologies

3.1        Passwords/Physical Security Keys

3.2        Voice

3.3        Single-factor Biometrics

3.4        Behavioral/Multi-factor Biometrics

3.5        Geographic

4.0        The Future of Authentication

4.1        Areas of Innovation in Authentication

4.2        Key Innovation Factors and Requirements

4.3        Future Authentication Use Cases

4.4        Impact of Authentication on Personalization

4.5        Barriers to Mainstream

5.0        Authentication Technologies in Life Cycle

6.0        Implications and Recommendations

7.0        Appendix

7.1        Glossary

7.2        Index

Total Average Number of Connected Devices Owned Per BB HH (2010-2018)
Penetration of Pay-TV Channels/OTT Services (Q1/18)
Authentication Ecosystem
Username/Password Data Flow
Token Authentication
Biometric Authentication
Network Authentication
Challenges of Authentication Types
Physical Security Key
Online Video Password Sharing (Q3/17)
Authentication Method Preference (Q3/17)
LastPass Vault
Major Physical Security Keys Brands and Products
Concerns about Personal Information Security (Q1/18)
Entertainment Functions: Most Desired Function to Perform Using Voice Control (Q3/17)
Samsung Fingerprint Scan
Adoption of Emerging Devices (2016-2018)
Home Networking Devices (2010-2018)
Google Home
Authentication Life Cycle Graph
Authentication Life Cycle Table
 

Publish Date: 4Q 2018

Pages: 35


Authored By:
Billy Nayden - Research Analyst

© December 2018 Parks Associates
All rights reserved.  No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher.

Printed in the United States of America. 

Disclaimer
Parks Associates has made every reasonable effort to ensure that all information in this report is correct.  We assume no responsibility for any inadvertent errors.

© 1998-2018 Parks Associates. All Rights Reserved.