60 likes | 74 Views
Virtual identity service leveraging social networks, web of trust, and age verification to protect minors globally while respecting privacy. Three-stage testing process with strong theoretical support.
E N D
Presentation to ISTTF September 23, 2008 AssertID ISTTF Presentation 9/23/2008
Overview • Purpose: virtual identity and age verification service to protect minors and children • Target beta launch: 11/1/2008 • Description: • Uses social network profile as the core credential • Verifies by using social graph as a “web of trust” • Supplemental, targeted identity proofing processes • Key Advantage: addresses key limitation of existing approaches: inability to verify minors identities/ages • A new data source must be created, AssertID is designed to: • Be all-ages and global • Achieve scale quickly • Minimize user friction as much as possible • Respect user privacy ISTTF Presentation 9/23/2008
Testing Process and Results • Current Status: has developed/filed intellectual property • Builds on 50 years of research on social networks • Strong theoretical support for core analytical algorithm • Testing Progress: three stages • Stage 1: exploratory beta test on a Bay Area high school • Stage 2: confirmatory test on a larger, statistically-valid sample of users using multivariate regression • Stage 3: once product has been launched, continually test and improve algorithm using built-in analytical tools • Precedents: school registration process piloted in similar fashion in 2001 with ISAFE, a strategic partner
Verification Procedure #1:Social Network Process • Process: users verify each other • Resembles adding friends in a social network profile • Users typically verify parts of requestor’s identity prior to accepting friendship • AssertID leverages a similar process in a “Web of Trust” verification framework • Users claim an age range (<18 or over >18) in addition to other identity attributes (e.g. name, photo, location) • Analysis: quantifies process into a confidence score • Score reflects the degree of confidence to which relying parties can trust self-asserted attributes • Scores increase with (1) the size of the verification network and (2) more-reliable network structures
Verification Procedures #2 and #3 • Trusted Anchors • AssertID will use select processes to seed AssertID’s verification network with highly trusted members • (2) School Registration Process • AssertID/ISAFE developed process based upon I-STIK pilot to provide AssertID credentials to ISAFE member students via school education programs • (3) Supplemental Adult processes • Leverage existing methods for adult verification to supplement social network profile verification • Goal is remove any dependency on a person’s financial identity as part of its system
Q&A Kevin Trilli, CEO, Product Guy • kevin@assertid.com • (415)734-8514, San Francisco Joon Nak Choi, PhD Candidate, Chief Scientist • jnchoi@stanford.edu • (917) 922-6259, Stanford, CA ISTTF Presentation 9/23/2008