OCTAVE has delivered an access control platform through a trusted biometric authentication service (TBAS) for use in data-sensitive and mission-critical applications in real business/commercial environments. While simultaneously relieving end-users from the inconvenience of dealing with textual passwords, the OCTAVE platform will reduce the economic and practical burden of service providers related to password loss and recovery. Through the use of biometrics, OCTAVE delivers operational, interoperable technology, installed and tested in a broad-band network, managing secure access to diverse and trustworthy smart services. Exploitation task paves the way for bringing research and innovation project outcomes to real market and explores the best routes for exploiting commercial opportunities that may appear after project life. In this regard, this deliverable is the first of two deliverables devoted to task 2.5 Exploitation Analysis and Business Models, that belongs to WP2 Dissemination and Exploitation and its main purpose is to summarize exploitation activities carried out during project life. These activities have been initiated and executed according to the project Description of Work and concretely to the objectives of T2.5, this is, analysing market possibilities and potential viability for OCTAVE project’s outcomes; and defining an exploitation strategy that maximise the potential impact of OCTAVE outcomes in the real market and in the research and innovation area.

This document exposes:

  • The description and categorization of OCTAVE outcomes (exploitable results and knowledge),
  • an exhaustive market analysis in the context of Cybersecurity and Biometrics, including a SWOT analysis and the identification of target market, the description of OCTAVE value proposition against competitors’ solutions, IP allocation and exploitation claims of partners over OCTAVE results,
  • and finally, the analysis and definition of the potential business model for the OCTAVE platform, including financial estimates.

Source: WP 2 Dissemination and Exploitation

Dissemination level: Confidential

To know more about the document, you may place a request in the ‘Contact’ section of this site. We reserve the right to decide how much we can disclose.