
New personal identification and authentication technologies have the potential to transform the way that entertainment services are delivered, accessed, and experienced. These technologies offer a high level of security, often incorporating biometrics, such as voice, fingerprint, iris or retinal features, and facial characteristics. They also have the potential to support truly personalized entertainment experiences. This report explores such technologies’ readiness for market deployment, analyze best-fit use cases, and profile major players that provide authentication and identification technologies or solutions.
Ìý

1.0ÌýÌýÌýÌýÌýÌýÌý Report Summary
1.1ÌýÌýÌýÌýÌýÌýÌý Purpose of Report
1.2ÌýÌýÌýÌýÌýÌýÌý Burning Questions Addressed by this Research
1.3ÌýÌýÌýÌýÌýÌýÌý Research Approach/Sources
2.0ÌýÌýÌýÌýÌýÌýÌý Authentication Today
2.1ÌýÌýÌýÌýÌýÌýÌý Current Types and Uses
2.2ÌýÌýÌýÌýÌýÌýÌý Challenges
2.3ÌýÌýÌýÌýÌýÌýÌý Needs
3.0ÌýÌýÌýÌýÌýÌýÌý Authentication Technologies
3.1ÌýÌýÌýÌýÌýÌýÌý Passwords/Physical Security Keys
3.2ÌýÌýÌýÌýÌýÌýÌý Voice
3.3ÌýÌýÌýÌýÌýÌýÌý Single-factor Biometrics
3.4ÌýÌýÌýÌýÌýÌýÌý Behavioral/Multi-factor Biometrics
3.5ÌýÌýÌýÌýÌýÌýÌý Geographic
4.0ÌýÌýÌýÌýÌýÌýÌý The Future of Authentication
4.1ÌýÌýÌýÌýÌýÌýÌý Areas of Innovation in Authentication
4.2ÌýÌýÌýÌýÌýÌýÌý Key Innovation Factors and Requirements
4.3ÌýÌýÌýÌýÌýÌýÌý Future Authentication Use Cases
4.4ÌýÌýÌýÌýÌýÌýÌý Impact of Authentication on Personalization
4.5ÌýÌýÌýÌýÌýÌýÌý Barriers to Mainstream
5.0ÌýÌýÌýÌýÌýÌýÌý Authentication Technologies in Life Cycle
6.0ÌýÌýÌýÌýÌýÌýÌý Implications and Recommendations
7.0ÌýÌýÌýÌýÌýÌýÌý Appendix
7.1ÌýÌýÌýÌýÌýÌýÌý Glossary
7.2ÌýÌýÌýÌýÌýÌýÌý Index
List of Figures
Total Average Number of Connected Devices Owned Per BB HH (2010-2018)
Penetration of Pay-TV Channels/OTT Services (Q1/18)
Authentication Ecosystem
Username/Password Data Flow
Token Authentication
Biometric Authentication
Network Authentication
Challenges of Authentication Types
Physical Security Key
Online Video Password Sharing (Q3/17)
Authentication Method Preference (Q3/17)
LastPass Vault
Major Physical Security Keys Brands and Products
Concerns about Personal Information Security (Q1/18)
Entertainment Functions: Most Desired Function to Perform Using Voice Control (Q3/17)
Samsung Fingerprint Scan
Adoption of Emerging Devices (2016-2018)
Home Networking Devices (2010-2018)
Google Home
Authentication Life Cycle Graph
Authentication Life Cycle Table
Ìý
Ìý
*If Applicable.
