omaka. - Digital security system
ABSTRACT
Nowadays, data theft and lack of data protection has become ubiquitous. The transformation from auditory to thought-based communication could reach a higher level of misuse with uncontrolled development. What if when data theft turns into thought theft?
That is why we want to prevent it with omaka. We created a system that lets users decide which data is collected and released. In the long term, our vision is to enable a secure, thought-based communication both with people and machines.
STRATEGY
As pioneers, we pursue a long-term goal of implementing secure control via thoughts in everyday life. To achieve our vision the project is divided into three milestones. The first milestone describes market entry. It is divided into three phases:
Phase 1 - Trust through security: With our products ring and data blocker we intervene specifically in the data collection of voice controls, create security, and thereby gain the trust of the user.
Phase 2 - Control through speech and thoughts: The further development of the control by thoughts and speech creates a new form of privacy.
Phase 3 - Control through thoughts: This phase presents a pure control through thoughts. Existing voice control systems are functionally surpassed.
PRODUCT
The focus of our project is on phase 2: Control through speech and thought. In this phase, the connect system of omaka consists of four components: control ring, EEG headset, data blocker, application.
In phase 1, the ring serves as a tool to control if data is transferred. By touching and pressing the ring, a signal is sent to the data blocker and the currently recorded data is then released. The EEG headset is placed behind the ear. Then the headset measures the brain waves when the ring is touched and translates them into commands. The user can take it off at any time to physically disconnect from the system.
System
Currently, voice control and a router stand between the user and the Internet. The voice control in the form of Alexa or a smartphone records uncontrolled data and sends it unhindered to the Internet. The data blocker is plugged into the router and immediately blocks all the data traffic. Mobile data can also be controlled via a VPN. With the ring, the user controls the blocker and thus also the data flow. Via the EEG headset, thought control is implemented parallel to voice control. Via the application, the user can configure the system, and the data flow of the data blocker and brain waves can be visualized.
Business modell
With the help of various tools such as Business Model Canvas, Value Proposition Canvas etc. we have additionally developed the business models for our products in each phase. Here I take an example in phase 2.
COMMUNICATION
The goal of the design canvas is to create a clear guideline for communication.
Together with our users, we would like to build up an interest group. This is positioned in the area of data and thought protection because regulations and legal must be made before products appear on the market. We obtain a revised DSGVO 2.0 and basic regulation of thought protection - briefly GSGVO. Thus we anticipate thought theft legally.
VIDEO
Project partner: Johannes Kempkes, Nils Riesenberg, Niklas Rimmler
Supervision: Prof. Gabriele N. Reichert, Prof. Dr. Susanne Schade, Thomas Schönweitz, Prof. Günther Biste
Winter Semester 2018/19 | HfG Schwäbisch Gmünd