Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presentation to ISTTF September 23, 2008 AssertID ISTTF Presentation 9/23/2008.

Similar presentations


Presentation on theme: "Presentation to ISTTF September 23, 2008 AssertID ISTTF Presentation 9/23/2008."— Presentation transcript:

1 Presentation to ISTTF September 23, 2008 AssertID ISTTF Presentation 9/23/2008

2 Overview ISTTF Presentation 9/23/2008 Purpose: virtual identity and age verification service to protect minors and children Target beta launch: 11/1/2008 Description: – Uses social network profile as the core credential – Verifies by using social graph as a “web of trust” – Supplemental, targeted identity proofing processes Key Advantage: addresses key limitation of existing approaches: inability to verify minors identities/ages – A new data source must be created, AssertID is designed to: Be all-ages and global Achieve scale quickly Minimize user friction as much as possible Respect user privacy

3 Testing Process and Results Current Status: has developed/filed intellectual property – Builds on 50 years of research on social networks – Strong theoretical support for core analytical algorithm Testing Progress: three stages – Stage 1: exploratory beta test on a Bay Area high school – Stage 2: confirmatory test on a larger, statistically-valid sample of users using multivariate regression – Stage 3: once product has been launched, continually test and improve algorithm using built-in analytical tools Precedents: school registration process piloted in similar fashion in 2001 with ISAFE, a strategic partner

4 Verification Procedure #1: Social Network Process Process: users verify each other – Resembles adding friends in a social network profile Users typically verify parts of requestor’s identity prior to accepting friendship – AssertID leverages a similar process in a “Web of Trust” verification framework – Users claim an age range ( 18) in addition to other identity attributes (e.g. name, photo, location) Analysis: quantifies process into a confidence score – Score reflects the degree of confidence to which relying parties can trust self-asserted attributes – Scores increase with (1) the size of the verification network and (2) more-reliable network structures

5 Verification Procedures #2 and #3 Trusted Anchors – AssertID will use select processes to seed AssertID’s verification network with highly trusted members (2) School Registration Process – AssertID/ISAFE developed process based upon I-STIK pilot to provide AssertID credentials to ISAFE member students via school education programs (3) Supplemental Adult processes – Leverage existing methods for adult verification to supplement social network profile verification – Goal is remove any dependency on a person’s financial identity as part of its system

6 Q&A Kevin Trilli, CEO, Product Guy kevin@assertid.com (415)734-8514, San Francisco Joon Nak Choi, PhD Candidate, Chief Scientist jnchoi@stanford.edu (917) 922-6259, Stanford, CA ISTTF Presentation 9/23/2008


Download ppt "Presentation to ISTTF September 23, 2008 AssertID ISTTF Presentation 9/23/2008."

Similar presentations


Ads by Google