This document proposes a Trusted Profile Identification and Validation Model for social networking sites. The model has two main components: 1) An Authentication Protocol that verifies user profiles as genuine or duplicate at login/registration using techniques like CAPTCHAs and monitors profile activity to validate profiles over time. 2) A Monitoring System that tracks user behaviors like posts, friends, locations and reports anomalies to the Authentication Protocol. The goal is to reduce profile cloning by authenticating users and using monitoring to identify trusted profiles while preventing bots from creating fake accounts.