Community Research and Development Information Service - CORDIS


Excalibur 2.0 Report Summary

Project ID: 684168

Periodic Reporting for period 1 - Excalibur 2.0 (Revolutionary trustworthy platform for seamless authentication of Internet users)

Reporting period: 2015-06-01 to 2015-08-31

Summary of the context and overall objectives of the project

The main objective of this project is to provide a continuous multi-factor contextual authentication solution optimized for being integrated with the enterprise environment to allow seamless authentication of employees.

Work performed from the beginning of the project to the end of the period covered by the report and main results achieved so far

Our detailed feasibility study covered a number of tasks.
Task 1: In-depth Assessment of Market. Throughout this task we evaluated macro environment conducting PESTL analysis, analysed microenvironment identifying internal and external stakeholders and assessed their impact, we evaluated our competition and estimated potential market investigating into end users as well potential resellers fitting into our B2B2C business model. We also defined purchase scenarios and formulated our key value proposition. This task also included in depth analysis of competitive solutions and companies along with their pricing strategies.
Task 2: Technical Feasibility Study. In this part of the project we used beta testers to validate current beta version of our application testing various features including proximity detection based on Bluetooth, virtual browser, and behaviometrics bases on key stroke analysis. We identified existing technology gaps and proposed relevant routes and technological solutions which can bridge them within the timeframes of a Phase 2 project.
Task 3: Business Model Simulations. In this task we critically evaluated our initial business model which resulted in modification to our pricing tactics and identification of a new sales channel /a new group of resellers acting in the B2B22C model.
Task 4: Intellectual Property (IP) Protection. This task was assisted by the subcontracted attorney office who helped us to assess the regulatory framework at different target markets, conducted audit of our IP assets, understand relevant IPR protection mechanisms at our target markers, and prepared drafts of EULA documents addressing challenges and specifics of enterprise market.
Task 5: Key Market Application Identification Including Customer Validation. Within this we managed to precisely identify key applications for our authentication platform and commenced business talks with four small IT system integrators who can become our business partners in the sales channel. We also continued our dialogue with the large service provider from Germany.
Task 6: Assessment of Risk Factors. We have evaluated both technological and business related (commercial) risks identifying and quantifying their impact and probability. Each identified risk was subject to risk management analysis which resulted in relevant contingency plans.
Task 7: Detailed Work plan for Phase 2. Having proven technological feasibility of the concept and based on feedback from beta testers we prepared a detailed work plan for Phase 2 characterizing work packages, tasks and their relations, timelines, deliverables and milestones.

Progress beyond the state of the art and expected potential impact (including the socio-economic impact and the wider societal implications of the project so far)

Execution of the Phase 1 proved that our innovative project is feasible from the technological perspective (confirmed with beta version testing with 12,000 testers) and has a great commercial value. Having determined the technological and commercial feasibility of the objectives studied in Phase 1, and being guided by the EEN coach we have developed a detailed work plan to reach these objectives for Phase 2 and beyond to mature the Excalibur 2.0 solution to reach TRL9 making it ready to market. Our final product clearly addresses exiting challenges related to security breaches in enterprises and has the potential to minimize inevitable costs related to such incidents while providing seamless authentication for employees accessing corporate resources.

Related information

Record Number: 186281 / Last updated on: 2016-07-08
Follow us on: RSS Facebook Twitter YouTube Managed by the EU Publications Office Top