International consulting and investments.

The Next Wave Of Campus Security


When it comes to new technology that advances campus security at colleges and universities, successful adoption is a no brainer if campus life is improved for every participant. Such is the case with the Usher Mobile Identity Network, a groundbreaking solution developed by Microstrategy. Usher offers a staggering number of benefits for students, faculty, administrators, visitors and essentially anyone who is due access to campus. Because we live in a modern mobile world, “campus” includes physical spaces and cyberspace equally.

Passwords Put Out To Pasture

Usher Screen ShotLogging into a system with ID and Password is a poor form of access control and one that will soon be eliminated universally. The average American has 35 accounts with passwords, therefore most passwords are easy to remember and less than cryptic. Usher increases cybersecurity with minimum effort required.  The Mobile Identity Network provides users with a one-time, time-limited access code – a four digit number or QR code – valid for 120 seconds only. In the case of system login, the computer display presents a four digit field and/or QR code (the app has a QR reader). Once the code is submitted, Usher determines whether access is granted or denied. Once logged in, the user leaves a footprint of all actions – files, media and the school’s intellectual property accessed, modified and shared.  Obviously, users tethered to their identity have zero options for conducting harmful or fraudulent activity without repercussions.

Objects Dematerialized

The number and variety of items stored in the Usher wallet are limitless. From ID badges and swipe keys, to meal plan accounts, insurance cards, parking passes, event tickets and commerce tokens – all easily and securely accessed via the user’s smart phone. Unlike their physical counterparts that can be lost, stolen or duplicated, credentials only render for the rightful owner.

Usher Open Doors

Usher keys tighten campus security. Whereas physical keys and proximity cards represent security breaches when misplaced, lost, copied or stolen, Usher mobile keys are always easily accessible to their rightful owners. Such keys only materialize for the individual due access. These keys can be distributed or revoked instantly, anytime from anywhere. They are considerably smarter than traditional keys. Usher keys can be used for specific times only, and can even be available only if in proximity to another specific key holder. Schools can email time-limited keys to prospective students or alumni visiting campus. Security is enhanced because Usher provides an audit trail of time stamps revealing how many, and which users, access specific spaces at any given time.

Lost or Stolen Phone?

Unlike traditional forms of identification and access tokens, in the case of a missing phone, ID is never compromised. This is due to multifactor authentication needed to access the application. Biometrics, such as voice print, ensure that only the rightful owner is able to access his or her Usher ID.

Peer to Peer Validation

Peer-to-PeerUsing the Usher Identity Network provides a gold standard level of customer service and personal security. Because every Usher user can provide a code to quickly and securely confirm identity, administrators, faculty and campus security personnel can quickly establish the identity of an individual reaching them via telephone or other mode of communication. No need to ask for final four digits of social security number, mother’s maiden name or other time-consuming and less secure methods of verification. Additionally, a student can confirm the identity (and have it on record) of the individual with whom they’ve had contact – be it another student, a professor, a Resident Advisor, administrator or campus security officer. When interactions are secure and “on record,” there’s diminished opportunity for inappropriate and/or illegal activity to transpire.

Digital Signature

To sign an official document remotely, all an Usher user needs to do is attach their digital signature, which is provided by the application. Financial Aid, interoffice memos, changes to policy and procedures – in every department of higher education − millions of dollars worth of resources, including time, travel, postage and paper expenses are saved within months of adopting secure digital signature technology

Abnormal Activity Revealed

Usher-Mobile-IntelligenceUsher Intelligence provides campus security and cyber-security with the data necessary to do the job better than ever. Usher can provide proactive alerts for anomalies, such as consecutive uses too far apart (within a given time frame), atypical high usage frequency, repetitive action usage or same user in two places at once. Likewise, any sort of threshold related to time, location, trend, pattern or any number of relevant statistics can be programmed to alert security officers about potentially suspicious behavior far before human investigation would be likely to take place. Wouldn’t it be nice to be notified if three hundred students have gathered in an unlikely location on campus at 4 AM? If someone has been reported missing, what security department wouldn’t want immediate access to statistical evidence revealing where the missing individual last performed a campus-related action? And, also have immediate evidence regarding who else performed the same action within a close proximity of space and time?

Campus Life and Beyond

Just as Usher will soon change how we experience sporting events, travel & leisure activities and corporate processes, so will campus life be significantly improved through adoption of the Usher Mobile Identity Network. To explore how Usher can facilitate top notch security and services on your campus, contact Keith Gallant –

Loyalty Grows Up

The past fifteen years have brought consumers tons of loyalty programs, from airline and hotel chains to clothiers and big box stores.  The majority of them are seriously flawed and ineffective in garnering true loyalty, primarily because they’re tedious for the consumer and are offered begrudgingly. The general feeling is, “We offer a loyalty programContinue Reading

Cybercrime Costs the Global Economy 300B a Year

The Washington Times reported today that cybercrime is costing the global economy $300 Billion a year.  How much is it costing you?  Wouldn’t you like to know more about a solution for identity verification that actually works and can’t be circumvented by a couple of smart hackers with some time on their hands? We haveContinue Reading

Baseball goes high-tech

If baseball is going high-tech, isn’t it time YOU went high tech?  Jokes aside, we are seeing industries that usually lag behind the technological curve wake up to the fact that they need to be getting an edge wherever possible in order to survive. Read more about what baseball is doing with high tech inContinue Reading

Sign Up to Get the New Facebook News Feed Early!

Facebook is changing again, with a total redesign of the newsfeed section.  We think it looks beautiful, and that it will particularly be much better for brands.  You can sign up to get it before everybody else here.  Continue Reading

Facebook Likes Actually DO Reveal Personal Information

This study on Facebook likes revealing personal information is worth a read.  One of the questions we get asked all the time is “OK, that’s great that you have a tool which can tell me if someone has Liked something on Facebook, but what does that really MEAN?” We think it means that the personContinue Reading

#1 Trend at South By South West Education (SXSWEdu)? Data and Analytics.

The Hechinger Report, with boots-on-the-ground assessment of this year’s SXSWEdu: Data and analytics are even big in the Education world – which is known for slow adoption of new approaches.Continue Reading

Microstrategy World Conference Videos and Slides

Dasoph is proud to be a strategic partner of Microstrategy, one of the most innovative business intelligent firms on the planet. They hold a world conference every year, and have posted the videos and slides from most of their presentations here. Of  particular note is the keynote given by Michael Saylor, CEO of Microstrategy.  HeContinue Reading

Facebook Social Search

Facebook made a big announcement today – rolling out “social search,” which provides the opportunity for people to search their social graphs.  For those that aren’t aware, the Facebook social graph is one of the most powerful datasets on earth.  They capture a staggering amount of personal information – preferences, age, marital status, places visited,Continue Reading


Welcome to dasoph.  We cannot wait to begin sharing more information with you about big data, Facebook, and how you can take advantage of the unique opportunity that we are bringing to market!Continue Reading