1 / 6

Presentation to ISTTF September 23, 2008

Presentation to ISTTF September 23, 2008. Overview. Purpose : virtual identity and age verification service to protect minors and children Target beta launch : 11/1/2008 Description : Uses social network profile as the core credential Verifies by using social graph as a “web of trust”

rnorris
Download Presentation

Presentation to ISTTF September 23, 2008

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presentation to ISTTF September 23, 2008 AssertID ISTTF Presentation 9/23/2008

  2. Overview • Purpose: virtual identity and age verification service to protect minors and children • Target beta launch: 11/1/2008 • Description: • Uses social network profile as the core credential • Verifies by using social graph as a “web of trust” • Supplemental, targeted identity proofing processes • Key Advantage: addresses key limitation of existing approaches: inability to verify minors identities/ages • A new data source must be created, AssertID is designed to: • Be all-ages and global • Achieve scale quickly • Minimize user friction as much as possible • Respect user privacy ISTTF Presentation 9/23/2008

  3. Testing Process and Results • Current Status: has developed/filed intellectual property • Builds on 50 years of research on social networks • Strong theoretical support for core analytical algorithm • Testing Progress: three stages • Stage 1: exploratory beta test on a Bay Area high school • Stage 2: confirmatory test on a larger, statistically-valid sample of users using multivariate regression • Stage 3: once product has been launched, continually test and improve algorithm using built-in analytical tools • Precedents: school registration process piloted in similar fashion in 2001 with ISAFE, a strategic partner

  4. Verification Procedure #1:Social Network Process • Process: users verify each other • Resembles adding friends in a social network profile • Users typically verify parts of requestor’s identity prior to accepting friendship • AssertID leverages a similar process in a “Web of Trust” verification framework • Users claim an age range (<18 or over >18) in addition to other identity attributes (e.g. name, photo, location) • Analysis: quantifies process into a confidence score • Score reflects the degree of confidence to which relying parties can trust self-asserted attributes • Scores increase with (1) the size of the verification network and (2) more-reliable network structures

  5. Verification Procedures #2 and #3 • Trusted Anchors • AssertID will use select processes to seed AssertID’s verification network with highly trusted members • (2) School Registration Process • AssertID/ISAFE developed process based upon I-STIK pilot to provide AssertID credentials to ISAFE member students via school education programs • (3) Supplemental Adult processes • Leverage existing methods for adult verification to supplement social network profile verification • Goal is remove any dependency on a person’s financial identity as part of its system

  6. Q&A Kevin Trilli, CEO, Product Guy • kevin@assertid.com • (415)734-8514, San Francisco Joon Nak Choi, PhD Candidate, Chief Scientist • jnchoi@stanford.edu • (917) 922-6259, Stanford, CA ISTTF Presentation 9/23/2008

More Related