SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Internet Safety Technical Task Force
                                    Technology Submission Template
                                                     BeenVerified Inc.
                                               http://www.beenverified.com


ABSTRACT                                                       PROPOSED SOLUTION
BeenVerified Inc. provides a seamless, easy to use             BeenVerified is built for online communities, businesses,
environment for online identity and credential                 employers and individuals. However, making the process
verification. Specifically, individuals, businesses, and       easy to use and simple to understand for the end-user is
online communities can use the BeenVerified platform           the critical success factor. The end user process of
with custom tailored solutions to solve specific needs.        BeenVerified is very similar to the process of sending and
                                                               receiving money through PayPal, only in the case of
BeenVerifiedʼs true value proposition is its portability.      BeenVerified, users are securely sending and managing
Similar to PayPal, a user needs to go through the              personal information. Initially, BeenVerified operates as a
verification process just once. Thereafter, as a               background checking company that performs voluntary
BeenVerified user visits websites or businesses that           background checks on someone looking to display and
requires identity or credential verification and accepts the   share their identity or credentials with a third-party
BeenVerified API the user can simply authenticate to           business, online community or employer. Examples of
BeenVerified and instantly validate their true identity and    credential verifications that can be performed include
credentials.                                                   identity, education, work experience, criminal checks,
                                                               professional license and many more.
Keywords                                                       The BeenVerified solution includes a proprietary API that
Identity, portable, user-centric, verification, credentials    follows the OAuth protocol for securely sharing and

                                                              managing end-user credentials. The BeenVerified API
Functional Goals                                               was built to allows third-parties to request personal
 Limit harmful contact between adults and minors              information from an individual but allow the individual
 Limit harmful contact between minors                         control of the authorization of such requests and also
 Other – please specify                                       providing for granularity in the release of what pieces of
Facilitate trusted user interactions between adults            personal information the individual would like to release.
                                                               Additionally, the individual has the ability to update their
                                                               personal information and edit the settings and
PROBLEM INTRODUCTION                                           authorizations should they choose to “unrelease” their
Problems involving online identity are being reported in       information at anytime.
the national headlines every day – and with good reason.
In recent years, the Internet has created an explosion in      The most important thing to recognize about
the development of methods for networking online for           BeenVerified is that it is a user-centric approach to
social and business purposes. Communities and blogs            solving many of the online identity problems, meaning
have been formed for every area of human interest and to       the end-user is always in control of the who, what, when,
service numerous niches. These communities and blogs           where, why, and how their information is being displayed.
have facilitated an instantaneous process of meeting and
communicating with people. In an instant, users can be         USE CASES
speaking with someone that they wish to work with,             The BeenVerified API was built using the OAuth protocol
explore a potential romance, or find someone to rent their     (http://oauth.net/) to securely manage the user’s
apartment; among thousands of other tasks.                     credentials (username/password) and SSL encryption for
                                                               sharing of data between BeenVerified and the third-party
                                                               requesting information.
While this rush to create a massive infrastructure for
meeting people has resulted in numerous benefits, it was
                                                               Use Case- The “Kids Only” Chat Room
built with zero attention to the infrastructure for handling
                                                               A community has been set up to allow children to interact
the ability to verify or trust the validity of information
                                                               with one another. Our technology will allow all parents
submitted in an online form, profile, blog, resume, etc.


                                                               of the community to have their identity and age verified
                                                               before allowing their child to enter a chat room. The
                                                               result of this process is that the Adult and the child are
                                                               linked together on one account that provides for
accountability of any misuse or inappropriate actions that      The Individual Proves
take place. Additionally, further checks could be made to       An individual can proactively verify their own identity
verify that the adult is not a Sexual Offender or other         and credentials and use their BeenVerified account as a
standards that the community may choose to uphold.              portable marketing tool to share their information with the
                                                                newspaper.
The Community Connects
Communities, web sites, and businesses can easily               The Employer Requests
implement the BeenVerified web service directly into            The employer can use BeenVerified to send a “Get
their own look and feel. The individual can have their          Verified Request” to each applicant, which would send
ages verified directly on the community and share it with       the applicant over to BeenVerified where we then provide
the appropriate people, on a real-time basis.                   the employer with an easy way to manage, view, and pay
                                                                for the verifications.
Use Case- The Online Dater
A young man is looking to secure a date using a popular         The Job Board Connects
online dating site. He is proud of his accomplishments, as      Communities, web sites, and businesses can easily
he is a graduate of Harvard Law and now works for one           implement the BeenVerified web service directly into
of the best law firms in the city. He wants to be able to       their own look and feel. The individual can have their
separate himself from the countless other people on the         information verified directly on the job board and shared
dating site who misrepresent themselves. He wants               with the employer on the job board as well, on a real-time
potential daters to know he is who he says he is and has        basis.
accomplished what he claims.
                                                                ADDITIONAL INFORMATION
The Young Man Proves
This young man can proactively verify his own identity          What the technology successfully solves and what it
and credentials and use his BeenVerified account as a           does not.
portable marketing tool to share verified information with          •    Not a silver bullet to solve all of the current
potential dates. This includes a criminal background                     online identity issues.
check as well as verified personal information such as              •    Unable to currently verify the identity of
age, occupation, or education.                                           International individuals effectively.
                                                                    •    Does not solve if someone will commit a crime
The Potential Dater Requests                                             in the future.
A female dater interested in dating this young man can              •    Costly to access every criminal database in the
use BeenVerified to send a “Get Verified Request” to a                   US and Internationally.
suitor which would send the young man over to                       •    Fallible to human error and also to potential
BeenVerified where we then provide the dater with an                     misrepresentations within the databases that are
easy way to manage, view, and pay for the verifications.                 accessed, even though BeenVerified is just a
                                                                         conduit to access said databases.
The Dating Site Connects
Communities, web sites, and businesses can easily               Strengths-weaknesses analysis
implement the BeenVerified web service directly into            Strengths                                                     Office 2004 Test Driv…, 6/23/08 11:44 AM
their own look and feel. The individual can have their              •    Easy for the end user to use and appreciate the      Formatted: Bullets and Numbering
information verified directly on the dating site and share it            added value of getting verified.
with other members on the dating site, on a real-time               •    Really easy for a website or community to
basis.                                                                   implement. Most programmers should be able to
                                                                         have BeenVerified up and running within their
                                                                         community within one day and then just need
Use Case- The Online Job Seeker                                          additional time for CSS/HTML and user flow
A west coast newspaper is looking for a freelancer writer                customization.
in the South Beach area on a job board known for having             •    One source for multiple verification types
a good amount of writersʼ resumes. The newspaper                         (identity, work experience, education, etc.)
receives over one hundred resumes for this one                           instead of needing to code and provide user
assignment and would naturally like to verify the                        flows for each verification. Extremely important
credentials of these applicants. Currently, employers have               given most communities resource crunch.
only a few expensive, time wasting, and cumbersome                  •    Cost effective for each community or user to
options for doing so. With BeenVerified, there exist three               purchase the verifications most important to
easy options for quickly and cost-effectively verifying                  them. (ex. Sexual offender for Children’s social
their credentials.                                                       network vs. Education for a Job Site)
Weaknesses                                                   Amster, was the head of Interactive Development for
    •    Expensive to access all criminal databases          L’Oreal/Redken and our development team is comprised
    •    International verifications                         of all seasoned veterans. Eran Hammer-Lahav, the lead
                                                             writer of the OAuth spec, provided advice when
Implementation requirements                                  structuring our API. Bill Washburn the Executive
In order for a website or community to implement the         Director of OpenID is on our board of advisor, has a PhD       Office 2004 Test Driv…, 6/23/08 11:44 AM
BeenVerified API they must have an understanding of          in Policy and Ethics from Stanford and is a big proponent      Formatted: Bullets and Numbering
how APIs work and also have an understanding of the          of our technology, process, and ideals.
mechanics behind OAuth. There are no other
implementation requirements other than understanding         COMPANY OVERVIEW
how to interact with a web service.                          A prototype for the BeenVerified service was launched in
                                                             October 2007 and was used for further research and
End user requirements are low and the end-user would         feedback from potential partners, users, and investors.
need to have the online aptitude capable of filling out an   This prototype was demoed at the Sun Microsystems
online form.                                                 Startup Camp and was selected from nearly one hundred
                                                             entrants as one of the top three most promising
Technical standards used                                     technologies. After raising Angel Funding, the company
The major standard protocols that are used is OAuth,         then spent the next few months through April 2008,             Office 2004 Test Driv…, 6/22/08 11:03 PM
SSL, XML.                                                    vetting and shaping the platforms capabilities and ease of     Formatted: Bullets and Numbering
                                                             use. In late May of 2008, BeenVerified released the
Use of law and policy for success                            platform (API) that provides the seamless and scalable
BeenVerified falls under the FCRA when being used by         web service for partner integration.                           Office 2004 Test Driv…, 6/22/08 10:33 PM
employers for conducting background checks on a                                                                             Formatted: Bullets and Numbering
potential candidate. Outside of that, due to the fact that   In May 2008 Bill Washburn, Executive Director of the
the end-user is the one in control of requesting and         Open ID Foundation, considered a guru of online identity
sharing their background information there are not many      and open protocols, reviewed our company, plans, and
policy or legal frameworks to navigate. Naturally,           technology, and agreed to join our Board of Advisors. In
BeenVerified does have to maintain standards as of to        July of 2008, the company completed a Series A round of
where and how we verify individual data and as such,         financing which is being used for continued development
below each verification we display the source of the         and marketing purposes.
verified the information.
                                                             BUSINESS MODEL OVERVIEW
Viability in the US and international                        The business model is flexible in the sense that one of the
BeenVerified has a successful “hit rate” within the US of    three interested parties can pay for the service a) the end    jtatlock 6/18/08 10:54 AM
over 90% due to the fact that we combine technologies        user b) the website or community implementing the              Formatted: Bullets and Numbering
and are an aggregator of identity and credential services    service or c) the receiver of verified information (ex. an
and not a main repository. For example, we combine           employer). The core functionality is independent of who
credit card verification technologies, with RSA’s public     pays for the service and in the case of implanting this
identity verification product, and Equifax’s Identity        service as an API it is very much business development
Credit Report product. At the moment we are not              driven on who bears the cost. Identity verification (name,
accessing or supporting international end-users due to the   age, address, etc.) is roughly $1 per user and may in some
complexity of doing so. However, going forward and as        cases be waived. Credential verifications (education, work
international data providers continue to improve services,   experience, professional license, etc.) are roughly $10 per
BeenVerified will partner or license their technologies as   verification.
well.
                                                             MORE INFORMATION
Effectiveness to Date                                        Please visit www.BeenVerified.com for more information
To date BeenVerified has been in Beta and has been used      about our overall service. Our main thesis is that in order    jtatlock 6/18/08 10:54 AM
by a small set of users with no major flaws noticed and no   to to solve some of the issues being addressed by this task    Formatted: Bullets and Numbering
hurdles seem apparent in the scaling sense. The “failures”   force, some larger issues of overall online identity need to
of the technology are more of a result of the lack of        be addressed and solutions provided. There is a 40
information within existing databases or more importantly    second video on the homepage explaining our main
lack of centralization by the government of criminal         vision. Our core principles can be found by reading
records.                                                     “User Bill of Rights”

EXPERTISE
The core development team has been building and
operating online businesses since 1996. Our CTO, Jason
Full API specifications can be accessed by receiving a               236 5th Avenue 9th Floor | New York, New York 10001
developer key:                                                       P: 212-738-9374 | M: 646-417-3239
https://www.beenverified.com/developer/new.                          josh@beenverified.com | www.beenverified.com

CONTACT INFORMATION
Joshua Levy


CERTIFICATION
“I certify that I have read and agree to the terms of the Internet Safety Technical Task Force Intellectual Property Policy.”




Contenu connexe

En vedette

BeenVerified Berkman Center Submission
BeenVerified Berkman Center SubmissionBeenVerified Berkman Center Submission
BeenVerified Berkman Center Submissioncanarickd
 
Control capacitive measurement
Control capacitive measurementControl capacitive measurement
Control capacitive measurementAzlin lolin
 
Deferred rendering in Dying Light
Deferred rendering in Dying LightDeferred rendering in Dying Light
Deferred rendering in Dying LightMaciej Jamrozik
 
Conical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cstConical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cstAzlin lolin
 
Engineers in society
Engineers in societyEngineers in society
Engineers in societyAzlin lolin
 
Capacitive sensor
Capacitive sensorCapacitive sensor
Capacitive sensorAzlin lolin
 
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433Muoivy Wm
 

En vedette (10)

Overview
OverviewOverview
Overview
 
BeenVerified Berkman Center Submission
BeenVerified Berkman Center SubmissionBeenVerified Berkman Center Submission
BeenVerified Berkman Center Submission
 
Control capacitive measurement
Control capacitive measurementControl capacitive measurement
Control capacitive measurement
 
Ppt0000000
Ppt0000000Ppt0000000
Ppt0000000
 
Usmle step 3
Usmle step 3Usmle step 3
Usmle step 3
 
Deferred rendering in Dying Light
Deferred rendering in Dying LightDeferred rendering in Dying Light
Deferred rendering in Dying Light
 
Conical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cstConical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cst
 
Engineers in society
Engineers in societyEngineers in society
Engineers in society
 
Capacitive sensor
Capacitive sensorCapacitive sensor
Capacitive sensor
 
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433
 

Similaire à BeenVerified Berkman Submission

Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008eComm2008
 
5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docxSameerShaik43
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
 
Agencies - Talking to Clients about Digital Accessibility
Agencies - Talking to Clients about Digital AccessibilityAgencies - Talking to Clients about Digital Accessibility
Agencies - Talking to Clients about Digital AccessibilityTeresa Huber
 
Trusting the internet
Trusting the internetTrusting the internet
Trusting the internetAireen Sinong
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
Hablando de blockchain en la Uniandes de Colombia
Hablando de blockchain en la Uniandes  de ColombiaHablando de blockchain en la Uniandes  de Colombia
Hablando de blockchain en la Uniandes de ColombiaPablo Junco
 
Authentication in 2020 - Predictions by the neXus CTO
Authentication in 2020 - Predictions by the neXus CTOAuthentication in 2020 - Predictions by the neXus CTO
Authentication in 2020 - Predictions by the neXus CTOhagero
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
 

Similaire à BeenVerified Berkman Submission (20)

Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
 
5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Wk White Paper
Wk White PaperWk White Paper
Wk White Paper
 
NetCare Overview
NetCare OverviewNetCare Overview
NetCare Overview
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
 
ProofeasyPPT.pptx
ProofeasyPPT.pptxProofeasyPPT.pptx
ProofeasyPPT.pptx
 
Agencies - Talking to Clients about Digital Accessibility
Agencies - Talking to Clients about Digital AccessibilityAgencies - Talking to Clients about Digital Accessibility
Agencies - Talking to Clients about Digital Accessibility
 
Trusting the internet
Trusting the internetTrusting the internet
Trusting the internet
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Hablando de blockchain en la Uniandes de Colombia
Hablando de blockchain en la Uniandes  de ColombiaHablando de blockchain en la Uniandes  de Colombia
Hablando de blockchain en la Uniandes de Colombia
 
Password Management
Password ManagementPassword Management
Password Management
 
Transaction&process integrity
Transaction&process integrityTransaction&process integrity
Transaction&process integrity
 
Authentication in 2020 - Predictions by the neXus CTO
Authentication in 2020 - Predictions by the neXus CTOAuthentication in 2020 - Predictions by the neXus CTO
Authentication in 2020 - Predictions by the neXus CTO
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Digital Identities
Digital IdentitiesDigital Identities
Digital Identities
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart cities
 

Dernier

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Dernier (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

BeenVerified Berkman Submission

  • 1. Internet Safety Technical Task Force Technology Submission Template BeenVerified Inc. http://www.beenverified.com ABSTRACT PROPOSED SOLUTION BeenVerified Inc. provides a seamless, easy to use BeenVerified is built for online communities, businesses, environment for online identity and credential employers and individuals. However, making the process verification. Specifically, individuals, businesses, and easy to use and simple to understand for the end-user is online communities can use the BeenVerified platform the critical success factor. The end user process of with custom tailored solutions to solve specific needs. BeenVerified is very similar to the process of sending and receiving money through PayPal, only in the case of BeenVerifiedʼs true value proposition is its portability. BeenVerified, users are securely sending and managing Similar to PayPal, a user needs to go through the personal information. Initially, BeenVerified operates as a verification process just once. Thereafter, as a background checking company that performs voluntary BeenVerified user visits websites or businesses that background checks on someone looking to display and requires identity or credential verification and accepts the share their identity or credentials with a third-party BeenVerified API the user can simply authenticate to business, online community or employer. Examples of BeenVerified and instantly validate their true identity and credential verifications that can be performed include credentials. identity, education, work experience, criminal checks, professional license and many more. Keywords The BeenVerified solution includes a proprietary API that Identity, portable, user-centric, verification, credentials follows the OAuth protocol for securely sharing and 
 managing end-user credentials. The BeenVerified API Functional Goals was built to allows third-parties to request personal  Limit harmful contact between adults and minors information from an individual but allow the individual  Limit harmful contact between minors control of the authorization of such requests and also  Other – please specify providing for granularity in the release of what pieces of Facilitate trusted user interactions between adults personal information the individual would like to release. Additionally, the individual has the ability to update their personal information and edit the settings and PROBLEM INTRODUCTION authorizations should they choose to “unrelease” their Problems involving online identity are being reported in information at anytime. the national headlines every day – and with good reason. In recent years, the Internet has created an explosion in The most important thing to recognize about the development of methods for networking online for BeenVerified is that it is a user-centric approach to social and business purposes. Communities and blogs solving many of the online identity problems, meaning have been formed for every area of human interest and to the end-user is always in control of the who, what, when, service numerous niches. These communities and blogs where, why, and how their information is being displayed. have facilitated an instantaneous process of meeting and communicating with people. In an instant, users can be USE CASES speaking with someone that they wish to work with, The BeenVerified API was built using the OAuth protocol explore a potential romance, or find someone to rent their (http://oauth.net/) to securely manage the user’s apartment; among thousands of other tasks. credentials (username/password) and SSL encryption for sharing of data between BeenVerified and the third-party requesting information. While this rush to create a massive infrastructure for meeting people has resulted in numerous benefits, it was Use Case- The “Kids Only” Chat Room built with zero attention to the infrastructure for handling A community has been set up to allow children to interact the ability to verify or trust the validity of information with one another. Our technology will allow all parents submitted in an online form, profile, blog, resume, etc.

 of the community to have their identity and age verified before allowing their child to enter a chat room. The result of this process is that the Adult and the child are linked together on one account that provides for
  • 2. accountability of any misuse or inappropriate actions that The Individual Proves take place. Additionally, further checks could be made to An individual can proactively verify their own identity verify that the adult is not a Sexual Offender or other and credentials and use their BeenVerified account as a standards that the community may choose to uphold. portable marketing tool to share their information with the newspaper. The Community Connects Communities, web sites, and businesses can easily The Employer Requests implement the BeenVerified web service directly into The employer can use BeenVerified to send a “Get their own look and feel. The individual can have their Verified Request” to each applicant, which would send ages verified directly on the community and share it with the applicant over to BeenVerified where we then provide the appropriate people, on a real-time basis. the employer with an easy way to manage, view, and pay for the verifications. Use Case- The Online Dater A young man is looking to secure a date using a popular The Job Board Connects online dating site. He is proud of his accomplishments, as Communities, web sites, and businesses can easily he is a graduate of Harvard Law and now works for one implement the BeenVerified web service directly into of the best law firms in the city. He wants to be able to their own look and feel. The individual can have their separate himself from the countless other people on the information verified directly on the job board and shared dating site who misrepresent themselves. He wants with the employer on the job board as well, on a real-time potential daters to know he is who he says he is and has basis. accomplished what he claims. ADDITIONAL INFORMATION The Young Man Proves This young man can proactively verify his own identity What the technology successfully solves and what it and credentials and use his BeenVerified account as a does not. portable marketing tool to share verified information with • Not a silver bullet to solve all of the current potential dates. This includes a criminal background online identity issues. check as well as verified personal information such as • Unable to currently verify the identity of age, occupation, or education. International individuals effectively. • Does not solve if someone will commit a crime The Potential Dater Requests in the future. A female dater interested in dating this young man can • Costly to access every criminal database in the use BeenVerified to send a “Get Verified Request” to a US and Internationally. suitor which would send the young man over to • Fallible to human error and also to potential BeenVerified where we then provide the dater with an misrepresentations within the databases that are easy way to manage, view, and pay for the verifications. accessed, even though BeenVerified is just a conduit to access said databases. The Dating Site Connects Communities, web sites, and businesses can easily Strengths-weaknesses analysis implement the BeenVerified web service directly into Strengths Office 2004 Test Driv…, 6/23/08 11:44 AM their own look and feel. The individual can have their • Easy for the end user to use and appreciate the Formatted: Bullets and Numbering information verified directly on the dating site and share it added value of getting verified. with other members on the dating site, on a real-time • Really easy for a website or community to basis. implement. Most programmers should be able to have BeenVerified up and running within their community within one day and then just need Use Case- The Online Job Seeker additional time for CSS/HTML and user flow A west coast newspaper is looking for a freelancer writer customization. in the South Beach area on a job board known for having • One source for multiple verification types a good amount of writersʼ resumes. The newspaper (identity, work experience, education, etc.) receives over one hundred resumes for this one instead of needing to code and provide user assignment and would naturally like to verify the flows for each verification. Extremely important credentials of these applicants. Currently, employers have given most communities resource crunch. only a few expensive, time wasting, and cumbersome • Cost effective for each community or user to options for doing so. With BeenVerified, there exist three purchase the verifications most important to easy options for quickly and cost-effectively verifying them. (ex. Sexual offender for Children’s social their credentials. network vs. Education for a Job Site)
  • 3. Weaknesses Amster, was the head of Interactive Development for • Expensive to access all criminal databases L’Oreal/Redken and our development team is comprised • International verifications of all seasoned veterans. Eran Hammer-Lahav, the lead writer of the OAuth spec, provided advice when Implementation requirements structuring our API. Bill Washburn the Executive In order for a website or community to implement the Director of OpenID is on our board of advisor, has a PhD Office 2004 Test Driv…, 6/23/08 11:44 AM BeenVerified API they must have an understanding of in Policy and Ethics from Stanford and is a big proponent Formatted: Bullets and Numbering how APIs work and also have an understanding of the of our technology, process, and ideals. mechanics behind OAuth. There are no other implementation requirements other than understanding COMPANY OVERVIEW how to interact with a web service. A prototype for the BeenVerified service was launched in October 2007 and was used for further research and End user requirements are low and the end-user would feedback from potential partners, users, and investors. need to have the online aptitude capable of filling out an This prototype was demoed at the Sun Microsystems online form. Startup Camp and was selected from nearly one hundred entrants as one of the top three most promising Technical standards used technologies. After raising Angel Funding, the company The major standard protocols that are used is OAuth, then spent the next few months through April 2008, Office 2004 Test Driv…, 6/22/08 11:03 PM SSL, XML. vetting and shaping the platforms capabilities and ease of Formatted: Bullets and Numbering use. In late May of 2008, BeenVerified released the Use of law and policy for success platform (API) that provides the seamless and scalable BeenVerified falls under the FCRA when being used by web service for partner integration. Office 2004 Test Driv…, 6/22/08 10:33 PM employers for conducting background checks on a Formatted: Bullets and Numbering potential candidate. Outside of that, due to the fact that In May 2008 Bill Washburn, Executive Director of the the end-user is the one in control of requesting and Open ID Foundation, considered a guru of online identity sharing their background information there are not many and open protocols, reviewed our company, plans, and policy or legal frameworks to navigate. Naturally, technology, and agreed to join our Board of Advisors. In BeenVerified does have to maintain standards as of to July of 2008, the company completed a Series A round of where and how we verify individual data and as such, financing which is being used for continued development below each verification we display the source of the and marketing purposes. verified the information. BUSINESS MODEL OVERVIEW Viability in the US and international The business model is flexible in the sense that one of the BeenVerified has a successful “hit rate” within the US of three interested parties can pay for the service a) the end jtatlock 6/18/08 10:54 AM over 90% due to the fact that we combine technologies user b) the website or community implementing the Formatted: Bullets and Numbering and are an aggregator of identity and credential services service or c) the receiver of verified information (ex. an and not a main repository. For example, we combine employer). The core functionality is independent of who credit card verification technologies, with RSA’s public pays for the service and in the case of implanting this identity verification product, and Equifax’s Identity service as an API it is very much business development Credit Report product. At the moment we are not driven on who bears the cost. Identity verification (name, accessing or supporting international end-users due to the age, address, etc.) is roughly $1 per user and may in some complexity of doing so. However, going forward and as cases be waived. Credential verifications (education, work international data providers continue to improve services, experience, professional license, etc.) are roughly $10 per BeenVerified will partner or license their technologies as verification. well. MORE INFORMATION Effectiveness to Date Please visit www.BeenVerified.com for more information To date BeenVerified has been in Beta and has been used about our overall service. Our main thesis is that in order jtatlock 6/18/08 10:54 AM by a small set of users with no major flaws noticed and no to to solve some of the issues being addressed by this task Formatted: Bullets and Numbering hurdles seem apparent in the scaling sense. The “failures” force, some larger issues of overall online identity need to of the technology are more of a result of the lack of be addressed and solutions provided. There is a 40 information within existing databases or more importantly second video on the homepage explaining our main lack of centralization by the government of criminal vision. Our core principles can be found by reading records. “User Bill of Rights” EXPERTISE The core development team has been building and operating online businesses since 1996. Our CTO, Jason
  • 4. Full API specifications can be accessed by receiving a 236 5th Avenue 9th Floor | New York, New York 10001 developer key: P: 212-738-9374 | M: 646-417-3239 https://www.beenverified.com/developer/new. josh@beenverified.com | www.beenverified.com CONTACT INFORMATION Joshua Levy 
 CERTIFICATION “I certify that I have read and agree to the terms of the Internet Safety Technical Task Force Intellectual Property Policy.”