Presentation to ISTTF September 23, 2008 AssertID ISTTF Presentation 9/23/2008.

Slides:



Advertisements
Similar presentations
Next Generation Athens Services Ed Zedlewski UK e-Science Town Meeting, London, 11 April 2005.
Advertisements

 Ways for people to communicate via computers  Two main types  Internal Social Networking  External Social Networking.
EURIM Personal Identity Group Data Sharing Model for Public Services 13 th January 2005 Jim Lound © Experian Ltd 2005.
ABC Company John Entrepreneur President and CEO. 2 Company Overview Provide descriptive but succinct statement about your business.
Richard Lane, Natural History Museum, London Scientific Collections International (SciColl) An international coordinating mechanism OECD GSF Krakow Oct.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Functional component terminology - thoughts C. Tilton.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Connecticut Ave NW, Washington, DC Direct Exchange from Provider to Patient/Consumer ….and Back! David C. Kibbe, MD MBA.
1 Authentication Trustworthiness The Next Stage in Identity-Based Access and Security Tom Board, NUIT.
How Do You Establish Student Identity Remotely: A Survey Keith Hazelton, University of Wisconsin-Madison Ann West, Internet2/InCommon Federation 2010 Fall.
Aristotle International Integrity™ Age and ID Verification Presentation to ISTTF September 23, 2008 Aristotle’s Integrity™ ISTTF Presentation 9/23/2008.
Ganguly & Associates July, Ganguly & Associates We add value to your business, practically 2 Ganguly & Associates Agenda  About Us  Service Offerings.
Phillip Hallam-Baker Extended Validation Presentation to ISTTF September 23, 2008 VeriSign/Extended Validation ISTTF Presentation 9/23/2008.
Yusuf Simonson Title Suggesting Friends Using the Implicit Social Graph.
Presentation to ISTTF September 23, Trustworthy Computing Category of concept: Age Verification / Digital Identity Launch Status: Nether launched.
Authentication Policy David Kelsey CCLRC/RAL 15 April 2004, Dublin
ExpectID® Product Suite Presentation to ISTTF September 23, 2008 IDology, Inc. / ExpectID Product Suite ISTTF Presentation 9/23/2008.
EGuardian, Inc. eGuardian Child Verification Presentation to ISTTF September 23, 2008 eGuardian, Inc. eGuardian Child Verification ISTTF Presentation 9/23/2008.
Privacy Issues with Social Networking Sites Ai Ho, Abdou Maiga, Esma Aïmeur Département d'informatique et de recherche opérationnelle Université de Montréal.
Methodology Conceptual Database Design
Beyond the Edge of Settlement Dan Duffy Chairman and CEO Are You Ready?
Use Case Development Scott Shorter, Electrosoft Services January/February 2013.
1 MSP-Motivation Assessment Program (MSP-MAP) Tools for the Evaluation of Motivation-Related Outcomes of Math and Science Instruction Martin Maehr
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
Functional Model Workstream 1: Functional Element Development.
Andrew Nash Senior Director of Identity Services Topics in Identity and Payments.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Single Sign-On Multiple Benefits via Alaska K20 Identity Federation 20 May 2011 BTOP Partner Meeting Anchorage, Alaska 20 May 2011 BTOP Partner Meeting.
...From Collaboration to Integration... Page: 1 November 2, 2006 Welcome and Introduction James Dyche Systems Manager 5 Technology Park Harrisburg, PA.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Data Commons Progress Report on a Data Exchange Network Medbiquitous Annual Meeting April 2013 Dana BostromLen Armstrong Executive DirectorDirector, Information.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
How to address underage gaming? Who should take responsibility? Responsible Gaming Day 17 th April 2008 How to address underage gaming? Who should take.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Identity in the Virtual World: Creating Virtual Certainty David L. Wasley Information Resources & Communications UC Office of the President.
Actuarial Overview of Premium Rate Development Presented by Susan E. Pantely, FSA, MAAA Milliman, Inc. San Francisco, CA
Page 1 ©1999 InfoGard Laboratories, Inc Centre for Applied Cryptographic Research workshop, Nov. 8, 1999 Third party evaluations of CA cryptographic implementations.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Bologna self-certification Implications and challenges.
Actualog Social PIM Helps Companies to Manage and Share Product Information Using Secure, Scalable Ease of Microsoft Azure MICROSOFT AZURE ISV PROFILE:
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Professional Registers for the Technical Community HEaTED East of England Network 21 May 2013 Ali Orr, Registrar.
Built on the Microsoft Azure Platform, Prudena Provides Users with the Ideas and Confidence to Make Sound Investment Decisions MICROSOFT AZURE APP BUILDER.
1 How Serious Are Financial Institutions About Electronic Identity? -- for -- Educause Policy 2005 Conference Jim Gross Wells Fargo April 7, 2005.
Achieving Semantic Interoperability at the World Bank Designing the Information Architecture and Programmatically Processing Information Denise Bedford.
August 14-15, 2003 Crystal Gateway Marriott Arlington, VA Software Developers Conference.
A Solution Perspective An Open Source Collaborative and Foundational Solution Targeted at Non-OECD Member Countries February 9, 2016.
Picturex Secures and Scales Event-Photo Sharing for Enterprise and Private Customers by Relying on the Powerful, Scalable Microsoft Azure Platform MICROSOFT.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
GEO Work Programme 2016 WGISS#40 HARWELL (UKSA) 28 SEP - 02 OCT 2015 MIRKO ALBANI, ESA.
Internet Recruitment and Selection System (IRiSS) SoftwareTraining.
WHAT WE OFFER Go-To-Market Services Microsoft Azure Brings to Life Citizen Assistance, the Tech Solution That Improves Communication Between the People.
GEO Implementation Mechanisms Giovanni Rum, GEO Secretariat GEO Work Programme Symposium Geneva, 2-4 May 2016.
Avoiding (Un)Intentional Discrimination When Recruiting via Social Media Stephanie R. Thomas, Ph.D. Thomas Econometrics
1 David C. Kibbe, MD MBA DirectTrust Collaborating to Build the Security and Trust Framework for Direct Exchange June 20, 2013.
Call-Center Agents, Customers Communicate More Conveniently with SMS Chat App COMPANY PROFILE: EARLY CONNECT Early Connect is a regional SaaS ISV founded.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Bob Jones EGEE Technical Director
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Youthlink Members Network
HIMSS National Conference New Orleans Convention Center
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Presentation to ISTTF September 23, 2008 AssertID ISTTF Presentation 9/23/2008

Overview ISTTF Presentation 9/23/2008 Purpose: virtual identity and age verification service to protect minors and children Target beta launch: 11/1/2008 Description: – Uses social network profile as the core credential – Verifies by using social graph as a “web of trust” – Supplemental, targeted identity proofing processes Key Advantage: addresses key limitation of existing approaches: inability to verify minors identities/ages – A new data source must be created, AssertID is designed to: Be all-ages and global Achieve scale quickly Minimize user friction as much as possible Respect user privacy

Testing Process and Results Current Status: has developed/filed intellectual property – Builds on 50 years of research on social networks – Strong theoretical support for core analytical algorithm Testing Progress: three stages – Stage 1: exploratory beta test on a Bay Area high school – Stage 2: confirmatory test on a larger, statistically-valid sample of users using multivariate regression – Stage 3: once product has been launched, continually test and improve algorithm using built-in analytical tools Precedents: school registration process piloted in similar fashion in 2001 with ISAFE, a strategic partner

Verification Procedure #1: Social Network Process Process: users verify each other – Resembles adding friends in a social network profile Users typically verify parts of requestor’s identity prior to accepting friendship – AssertID leverages a similar process in a “Web of Trust” verification framework – Users claim an age range ( 18) in addition to other identity attributes (e.g. name, photo, location) Analysis: quantifies process into a confidence score – Score reflects the degree of confidence to which relying parties can trust self-asserted attributes – Scores increase with (1) the size of the verification network and (2) more-reliable network structures

Verification Procedures #2 and #3 Trusted Anchors – AssertID will use select processes to seed AssertID’s verification network with highly trusted members (2) School Registration Process – AssertID/ISAFE developed process based upon I-STIK pilot to provide AssertID credentials to ISAFE member students via school education programs (3) Supplemental Adult processes – Leverage existing methods for adult verification to supplement social network profile verification – Goal is remove any dependency on a person’s financial identity as part of its system

Q&A Kevin Trilli, CEO, Product Guy (415) , San Francisco Joon Nak Choi, PhD Candidate, Chief Scientist (917) , Stanford, CA ISTTF Presentation 9/23/2008