So, yes, I'm, I'm a technical director, so has a global platform. So we working for of different industries, which most of them are graduated services. The idea is to be able to define a platform sector platform that will be embedded in plenty of different objects and that provide security services and to be able to deploy a banking authentication services. So today we are coming from, again, the smart, the business, 15 years ago, we have switched to mobile and today we are one of the most successful and for part on technology. And my idea today is to share a few tools that can use to deploy your services.
And, and again, to like few issue that the community is, is analyzing working. So, or you already listen a different point of view about GPDR, which is not so simple, nobody so far was talking about. And they, for me, it's very, very bad idea. I dunno, you know, it is of it's crazy now. So they are decided to go to value of all the citizens. So 1 billion and 300 million that will be ready to be used by any knowing that it's bio. So you have two ice. If you use one, Iris, you have only one chance after authenticator. So if they're taking fingers, you are using one finger it's okay, you still have 10 solutions to authenticate, but they are taking Iris. So they will have 2 billion, 600 millions of ire in one. And today's main question, is that okay? It's a government, but when the government will use it, do the government is able to take your, or to ire in the street and start to try the people not. So this is raising lot of questions.
So I have put this title and you will see that. Not as I should have better question mark, cause I'm not sure yet how much policy will impact the, the growth. Cause there is a lot of things that is changing. So again, you know, global platform, so we'll go very quickly. We are really working on two blocks standardization of the citrus services and certification because for service provider, when you are reaching your end user, that is using an object, whatever a smartphone device, you need to be to home confidence of the quality of the object. And today there is some different ecosystem, but typically you don't know if it's very high level unweight for or very low rate for you. Dunno if it's broken. It has been cracked. So sensitation is very important to bring confidence to the size. And of course, to be able to ensure because when you have a brand and you are, you are starting to have a certain level of quality terms of the services you want to sure that you're able to provide this level of services in different devices.
And today, again, it's quite difficult, right? So let me go quickly. So this is the people that I'm representing. It's a strong community of cheap that maker or trusted us maker or onset manufacturer sales provider for all the geographics. So this is something very exciting. My job that when I'm here, I'm talking, I'm only about a lot about, but I'm going to China. I'm going to, I'm going to us privacy. It's very cultural terms. So everybody has its own view on privacy. And this is one of the value of the discussion we have in the platform that really we are representing all the communities with the S and in my role of the director, I'm talking a lot with different organization. So here also, you see lot of hooks in term of authentication and identification. There is two that are working very accurately on that.
It's I find China internet financial alliances, and of course the fi that are working to implement authenticators. And I will come back to that. So just few figures, because a lot of people think that there is no solution on the market. So we try to give you some few points here. So from 2010 and 16 zoom, all the members have produced 22 billions of central components. So component it's the sync card, credit cards, smart card. And of course, right now, in most of the premium iPhone, you have limited. So you have a, a little T computer that costs not so much, and that I going to have a very level of security. Okay. So, and we are also working in another platform, thet execution that currently the tribe, 1 billion oft enabled processors, every quarter that provide security, of course, on the mobile world, cause most cheap are supporting the T, but also in a lot of devices, which are set boxes, TVs, and also gentlement.
So I don't know if you know this bridge level index, it's a very good website to go there. You will just see the number of data that has been leaked. So of course it's always difficult or something interactive here, but the number of data that growing and see most of the databases are able to be cracked with sometime a lot of issues for the user, sometime a lot of financial impact. So typically in us target, they lose a few millions of credit cards, but in fact, they have to pay the impact in term of brand damage for the lung. They have to pay even brand damage of visa. They need to pay the brand damage of MasterCard. They need to bond the brand of discover and they need to reshoot all the guard. So all the cost cost related to the has been. So this is why the CEO of target has been fire because finally it was not just using data and just adding some issue with the end user it's has financial cost.
And this is new GPD is putting even more impact on that. I do not want to come back here because you talk a lot, but from the rest of my presentation, the content, it's something very important in, and again, I would like to, to, to just highlight that not only your hope is pushing for some stuff like that. China is pushing for big cyber law with new, but informal data and fines. Also Russia, as a strong data regulation, I went recently in Australia and they were bridging a new policy act there. So I put here one of the site that you can get more information about. So database are today under a lot of attacks. And the question that we try to serve in your platform is this one, most of the today want to reach the end user yesterday was in front of the post system or in front of now it's on the tablet on smartphone, but very quickly they want to move to car.
So typically, I don't know, maybe 10 years ago you go to the, the booth of visa. They were showing the car, the transport home car, the plastic of, if you go to the visa booth right now, the mobile they're showing car. Cause they think that the guns and the way to pay you will enter inside the gas station. And ultimately simply you will have your visa account on the screen and you will be able to pay with your visa account. So all the people today are taking any objects that is connected as a way to discuss with the end user and to provide services. And the question that today, you don't know what is in needle. Of course there is big guys that say that I have a very strong cloud. So there is a lot of I IOT cloud or cloud systems, but for the, the sales provider globally, what they want to be able is what the end to end sector communication, and to be able to encrypt the data on the edge.
So this is where home is working, and this is where we are providing solutions today. So in the car, you will able to store or clean applications or in the tablet or set box or whatever, whatever the object the end user is using. So just to go early in the table, as you see, it's very, very clear. We are providing platforms. So they are developed by of course, a lot of actors. And today we are able to isolate each and every application to stop data and to manage the same platform, different application. You, you need to understand that most of the they're working in the silo. And as soon you're talking about security, each market, they have their own requirements. Typically for years, government are using PT technology and four years, the banks are using C three keys, right? Some wants to a strong authentication like this.
So on other stuff, etcetera. So the, the technology is very simple. We are creating inside the and government silo where you are going to store the data and the of decision. So this is a starting point. So we are starting to work into, okay, privacy, how to manage that. So we did a lot of analysis. And in fact, again, privacy is something that everybody think that they have their own vision. They are not using the same criteria. So very quickly, even working with ISO ISO, they are work a lot, but we have started to say, okay, today, most of the people are deploying applications that are not privacy by design. Okay? So we need to help them to move from a solution that is not privacy by design to something which is better. And again, we are managing different type of application each moving to a privacy design in the different base.
Okay. So I'm back to my previous slide. And what we did is to be able to have some privacy extension data at the platform level, what are the platform event? Because if you have one application which is leaking one clinical data, you are lost, right? You fail typically, if you don't want to be able to track by your unique it, and if only one application is sharing the unique, it, of course your able to answer to the requirement. So you need to protect all S application and inside this privacy extension part, then you be able to say that S application is able to be started, or this application, you, I need to add additional security requirements to be able to manage my call. So this has been promoted mainly in the government higher for the new rich application card. And today it's clear that very government are looking at because most of the government today are issuing model application card, might mobile driving license.
As a example, it cap, they are not putting a lot of application inside the same object and today in the mobile world. So in the smartphone, and they're not today's story, any idea, we are idea the smartphone, cause of course the platform not creating in China, in Korea for France. So it's not possible that the accept, this kind of object, so it's not started, but the technology it's here in term of user center, we have started also to create a model which is consumer, and to verify that every modification of the, of the C is managed by end user or there an end user authorization. So typically this is a use case, right? I'm going to the market, I'm buying a SD, which is the residual. And then I, I want to create my own it. So you are able to take the ownership of the it, and then after to store all the it, you want on your micro, so micro or USB token or, or fiber to.
So we have been working on this model, which is the consumercentric model and everything is ready. But in fact, as soon you're managing the privacy, something is becoming very, very important it's who is the user. Okay? And then you need to have a strong authentication cause more ity of putting on your product more. You need to be sure that you are talking to the right end user. Okay. And this is something that we are working on strongly today. It's biometrics. And again, this is to close. The loop is my tradition about the Indian bio database. And today, a lot of people during the day are talking about frictionless and a lot of people are using BIOX to make it more simple for the end user. And it's in one ad is very cooler for the end user. In another end, it's very difficult because I don't know if you know, this one, someone was able to take the fingerprint because the prime minister or the prime minister, the defense minister in Germany was like that.
And in the screen, they able to take the screen of the fingerprint and to make a fingerprint of the difference is there. So this is just an example of how difficult is to use play. Of course, it's super frictionless. It's very cool and putting my finger, but you are putting your finger everywhere. You have seen that the new iPhone treaty has been cracked already. Someone has got the, the fake mask and they're able to unlock the iPhone on fake ID. There is 10,000 pointers inside your face. And we even this, all this pointer, they able to fake with the static mask. So this is today. Something that it's a limit of what people are trying to do. If you go too frictionless, finally, you have solution that are not secure. And of course, I'm not saying that we need to come back to a P with 20 charact, not at all, but it's maybe a, a dream to say that everything will be cool and easy and extra. If you want to have strong security and strong privacy, because user needs to understand user needs to be involved on that. And typically when you are doing something, which is very simple, I'm just, just touching most of the time, you don't reach the right level security.
So again, it's sometimes difficult to, to present what we are doing global platform, but our next wave, again, we have been developed in deploying most of the smartphone on your pocket. We have at least the one or two solution of global platform. Your is based on global platform. And most of the on way after all are using ization development. So it's very a solution. And today, again, most of the site provider wants to be on the next wave of objects. So object and all subject data old. And typically if you're taking wherever, whenever they're doing a scale data from you, typically in France, we don't care too much, but you go in the country where you are paying the fees of the social scale based on your birth and this data as a value I was in Korea, I was joking with my Earth's information, but the Korean colleagues were not very happy because depending of the quality of your body, you are paying less money or more holiday, less money.
So typically whenever the earth beat rate, how many time you were information that the LCAP company are looking. So typically here in the us and Korea, it's very, very important data. Maybe not in France. If you are looking at the transportation, the car, all the data that are stored about your localization, where you store, it's very easy for an employer to, to say, okay, you are not working because you were completely outside using the car express for. So all this subject today, even if they're storing a little data at the end of the day, there there's data are personal data and are very important for you. So this is where we are working today in global platform to be able to increase this data for two reasons. First of all, of course protected data. But also it was a point that about the quality of the, data's not possible to move to a big data, if you are not sure the ity of the data.
So even if sensor, so you need to be sure that the data blood pressure extra are coming from the right and identified sensor. If not, you will not be able to use it. So this is our next frontier in the platform. I have a question if I may, yes. You're actually talking about, you know, personal data stores yes. On the, on the, on the chip. How do you manage synchronization across the device, but do you need it that this is typically if, if you're looking final, final, they are competing with the database of, because they say that there is no value to synchronize the somewhere, what you need to be sharing that the end user is the one which is authenticated. So local storage in most of the cases, it centers, you don't need the fingerprint of the people. You want to be sure that it's me or it's you.
Right? So in most of the cases, encryption inside the, the, the device or storage inside device, it's in us, if you're able to provide the, the, the result of the question. So you're really limiting this to very few attributes, someone, I think it's part of the discussion. You, you, we need to try to avoid the data and transparent the data that you don't care. So yes, of course you want to have plenty of information, but what you will do with that, right. So it's better to say that our user, I want, yes, you older than 21. Yes. Things like that. It's more simple than trying to keep the data and make that analytics. Of course, there is a lot of company that are making a lot of money with the data and they are in the opposite view. I'm trying to, to get as many data that that is possible in platform or school. We're trying to say that in the edge, we can do a lot things to protect the data and maybe to offer some solutions to provide the, the, the analytic data from the edge to the, to the cloud questions.
No questions. Well, I guess then, unless you want to add anything, of course, no, I was talking and talking, I skip my first slides about the organization, because again, if you can go to org, it's, it's a very, it's fine because in the organization, of course you have big guys that are taking a lot of data. And there is guys that are more to protect the privacy of the user. I think there is no clear vision in the organization, depending on the use cases, there is different solutions. And this is what is interesting today in the community. But have you seen the first applications out you are leveraging this capability, or I think I know it's really good use cases that really people decided to say, okay, we need to change something. And because ation and identification are completely different. Okay. The is very important.
And before it was very connected and then after to do something more secure, more efficient, less it's too used by Netflix, but we need to avoid central. And I think phys definitely something which is very future proof in term of the, the mindset to say, okay, we can do stuff from the, now all the smartphone, they have fingerprint sensor, or they have good Analyst to be able to, to do Iris recognition. So the technology so here, but I think by it's the new type of some season that are deploying this, the edge as a, as a way strong quality of thank you very much.