SlideShare a Scribd company logo
1 of 4
Download to read offline
Internet Safety Technical Task Force
                                    Technology Submission Template
                                                     BeenVerified Inc.
                                               http://www.beenverified.com


ABSTRACT                                                       PROPOSED SOLUTION
BeenVerified Inc. provides a seamless, easy to use             BeenVerified is built for online communities, businesses,
environment for online identity and credential                 employers and individuals. However, making the process
verification. Specifically, individuals, businesses, and       easy to use and simple to understand for the end-user is
online communities can use the BeenVerified platform           the critical success factor. The end user process of
with custom tailored solutions to solve specific needs.        BeenVerified is very similar to the process of sending and
                                                               receiving money through PayPal, only in the case of
BeenVerifiedʼs true value proposition is its portability.      BeenVerified, users are securely sending and managing
Similar to PayPal, a user needs to go through the              personal information. Initially, BeenVerified operates as a
verification process just once. Thereafter, as a               background checking company that performs voluntary
BeenVerified user visits websites or businesses that           background checks on someone looking to display and
requires identity or credential verification and accepts the   share their identity or credentials with a third-party
BeenVerified API the user can simply authenticate to           business, online community or employer. Examples of
BeenVerified and instantly validate their true identity and    credential verifications that can be performed include
credentials.                                                   identity, education, work experience, criminal checks,
                                                               professional license and many more.
Keywords                                                       The BeenVerified solution includes a proprietary API that
Identity, portable, user-centric, verification, credentials    follows the OAuth protocol for securely sharing and

                                                              managing end-user credentials. The BeenVerified API
Functional Goals                                               was built to allows third-parties to request personal
 Limit harmful contact between adults and minors              information from an individual but allow the individual
 Limit harmful contact between minors                         control of the authorization of such requests and also
 Other – please specify                                       providing for granularity in the release of what pieces of
Facilitate trusted user interactions between adults            personal information the individual would like to release.
                                                               Additionally, the individual has the ability to update their
                                                               personal information and edit the settings and
PROBLEM INTRODUCTION                                           authorizations should they choose to “unrelease” their
Problems involving online identity are being reported in       information at anytime.
the national headlines every day – and with good reason.
In recent years, the Internet has created an explosion in      The most important thing to recognize about
the development of methods for networking online for           BeenVerified is that it is a user-centric approach to
social and business purposes. Communities and blogs            solving many of the online identity problems, meaning
have been formed for every area of human interest and to       the end-user is always in control of the who, what, when,
service numerous niches. These communities and blogs           where, why, and how their information is being displayed.
have facilitated an instantaneous process of meeting and
communicating with people. In an instant, users can be         USE CASES
speaking with someone that they wish to work with,             The BeenVerified API was built using the OAuth protocol
explore a potential romance, or find someone to rent their     (http://oauth.net/) to securely manage the user’s
apartment; among thousands of other tasks.                     credentials (username/password) and SSL encryption for
                                                               sharing of data between BeenVerified and the third-party
                                                               requesting information.
While this rush to create a massive infrastructure for
meeting people has resulted in numerous benefits, it was
                                                               Use Case- The “Kids Only” Chat Room
built with zero attention to the infrastructure for handling
                                                               A community has been set up to allow children to interact
the ability to verify or trust the validity of information
                                                               with one another. Our technology will allow all parents
submitted in an online form, profile, blog, resume, etc.


                                                               of the community to have their identity and age verified
                                                               before allowing their child to enter a chat room. The
                                                               result of this process is that the Adult and the child are
                                                               linked together on one account that provides for
accountability of any misuse or inappropriate actions that      The Individual Proves
take place. Additionally, further checks could be made to       An individual can proactively verify their own identity
verify that the adult is not a Sexual Offender or other         and credentials and use their BeenVerified account as a
standards that the community may choose to uphold.              portable marketing tool to share their information with the
                                                                newspaper.
The Community Connects
Communities, web sites, and businesses can easily               The Employer Requests
implement the BeenVerified web service directly into            The employer can use BeenVerified to send a “Get
their own look and feel. The individual can have their          Verified Request” to each applicant, which would send
ages verified directly on the community and share it with       the applicant over to BeenVerified where we then provide
the appropriate people, on a real-time basis.                   the employer with an easy way to manage, view, and pay
                                                                for the verifications.
Use Case- The Online Dater
A young man is looking to secure a date using a popular         The Job Board Connects
online dating site. He is proud of his accomplishments, as      Communities, web sites, and businesses can easily
he is a graduate of Harvard Law and now works for one           implement the BeenVerified web service directly into
of the best law firms in the city. He wants to be able to       their own look and feel. The individual can have their
separate himself from the countless other people on the         information verified directly on the job board and shared
dating site who misrepresent themselves. He wants               with the employer on the job board as well, on a real-time
potential daters to know he is who he says he is and has        basis.
accomplished what he claims.
                                                                ADDITIONAL INFORMATION
The Young Man Proves
This young man can proactively verify his own identity          What the technology successfully solves and what it
and credentials and use his BeenVerified account as a           does not.
portable marketing tool to share verified information with          •    Not a silver bullet to solve all of the current
potential dates. This includes a criminal background                     online identity issues.
check as well as verified personal information such as              •    Unable to currently verify the identity of
age, occupation, or education.                                           International individuals effectively.
                                                                    •    Does not solve if someone will commit a crime
The Potential Dater Requests                                             in the future.
A female dater interested in dating this young man can              •    Costly to access every criminal database in the
use BeenVerified to send a “Get Verified Request” to a                   US and Internationally.
suitor which would send the young man over to                       •    Fallible to human error and also to potential
BeenVerified where we then provide the dater with an                     misrepresentations within the databases that are
easy way to manage, view, and pay for the verifications.                 accessed, even though BeenVerified is just a
                                                                         conduit to access said databases.
The Dating Site Connects
Communities, web sites, and businesses can easily               Strengths-weaknesses analysis
implement the BeenVerified web service directly into            Strengths                                                     Office 2004 Test Driv…, 6/23/08 11:44 AM
their own look and feel. The individual can have their              •    Easy for the end user to use and appreciate the      Formatted: Bullets and Numbering
information verified directly on the dating site and share it            added value of getting verified.
with other members on the dating site, on a real-time               •    Really easy for a website or community to
basis.                                                                   implement. Most programmers should be able to
                                                                         have BeenVerified up and running within their
                                                                         community within one day and then just need
Use Case- The Online Job Seeker                                          additional time for CSS/HTML and user flow
A west coast newspaper is looking for a freelancer writer                customization.
in the South Beach area on a job board known for having             •    One source for multiple verification types
a good amount of writersʼ resumes. The newspaper                         (identity, work experience, education, etc.)
receives over one hundred resumes for this one                           instead of needing to code and provide user
assignment and would naturally like to verify the                        flows for each verification. Extremely important
credentials of these applicants. Currently, employers have               given most communities resource crunch.
only a few expensive, time wasting, and cumbersome                  •    Cost effective for each community or user to
options for doing so. With BeenVerified, there exist three               purchase the verifications most important to
easy options for quickly and cost-effectively verifying                  them. (ex. Sexual offender for Children’s social
their credentials.                                                       network vs. Education for a Job Site)
Weaknesses                                                   Amster, was the head of Interactive Development for
    •    Expensive to access all criminal databases          L’Oreal/Redken and our development team is comprised
    •    International verifications                         of all seasoned veterans. Eran Hammer-Lahav, the lead
                                                             writer of the OAuth spec, provided advice when
Implementation requirements                                  structuring our API. Bill Washburn the Executive
In order for a website or community to implement the         Director of OpenID is on our board of advisor, has a PhD       Office 2004 Test Driv…, 6/23/08 11:44 AM
BeenVerified API they must have an understanding of          in Policy and Ethics from Stanford and is a big proponent      Formatted: Bullets and Numbering
how APIs work and also have an understanding of the          of our technology, process, and ideals.
mechanics behind OAuth. There are no other
implementation requirements other than understanding         COMPANY OVERVIEW
how to interact with a web service.                          A prototype for the BeenVerified service was launched in
                                                             October 2007 and was used for further research and
End user requirements are low and the end-user would         feedback from potential partners, users, and investors.
need to have the online aptitude capable of filling out an   This prototype was demoed at the Sun Microsystems
online form.                                                 Startup Camp and was selected from nearly one hundred
                                                             entrants as one of the top three most promising
Technical standards used                                     technologies. After raising Angel Funding, the company
The major standard protocols that are used is OAuth,         then spent the next few months through April 2008,             Office 2004 Test Driv…, 6/22/08 11:03 PM
SSL, XML.                                                    vetting and shaping the platforms capabilities and ease of     Formatted: Bullets and Numbering
                                                             use. In late May of 2008, BeenVerified released the
Use of law and policy for success                            platform (API) that provides the seamless and scalable
BeenVerified falls under the FCRA when being used by         web service for partner integration.                           Office 2004 Test Driv…, 6/22/08 10:33 PM
employers for conducting background checks on a                                                                             Formatted: Bullets and Numbering
potential candidate. Outside of that, due to the fact that   In May 2008 Bill Washburn, Executive Director of the
the end-user is the one in control of requesting and         Open ID Foundation, considered a guru of online identity
sharing their background information there are not many      and open protocols, reviewed our company, plans, and
policy or legal frameworks to navigate. Naturally,           technology, and agreed to join our Board of Advisors. In
BeenVerified does have to maintain standards as of to        July of 2008, the company completed a Series A round of
where and how we verify individual data and as such,         financing which is being used for continued development
below each verification we display the source of the         and marketing purposes.
verified the information.
                                                             BUSINESS MODEL OVERVIEW
Viability in the US and international                        The business model is flexible in the sense that one of the
BeenVerified has a successful “hit rate” within the US of    three interested parties can pay for the service a) the end    jtatlock 6/18/08 10:54 AM
over 90% due to the fact that we combine technologies        user b) the website or community implementing the              Formatted: Bullets and Numbering
and are an aggregator of identity and credential services    service or c) the receiver of verified information (ex. an
and not a main repository. For example, we combine           employer). The core functionality is independent of who
credit card verification technologies, with RSA’s public     pays for the service and in the case of implanting this
identity verification product, and Equifax’s Identity        service as an API it is very much business development
Credit Report product. At the moment we are not              driven on who bears the cost. Identity verification (name,
accessing or supporting international end-users due to the   age, address, etc.) is roughly $1 per user and may in some
complexity of doing so. However, going forward and as        cases be waived. Credential verifications (education, work
international data providers continue to improve services,   experience, professional license, etc.) are roughly $10 per
BeenVerified will partner or license their technologies as   verification.
well.
                                                             MORE INFORMATION
Effectiveness to Date                                        Please visit www.BeenVerified.com for more information
To date BeenVerified has been in Beta and has been used      about our overall service. Our main thesis is that in order    jtatlock 6/18/08 10:54 AM
by a small set of users with no major flaws noticed and no   to to solve some of the issues being addressed by this task    Formatted: Bullets and Numbering
hurdles seem apparent in the scaling sense. The “failures”   force, some larger issues of overall online identity need to
of the technology are more of a result of the lack of        be addressed and solutions provided. There is a 40
information within existing databases or more importantly    second video on the homepage explaining our main
lack of centralization by the government of criminal         vision. Our core principles can be found by reading
records.                                                     “User Bill of Rights”

EXPERTISE
The core development team has been building and
operating online businesses since 1996. Our CTO, Jason
Full API specifications can be accessed by receiving a               236 5th Avenue 9th Floor | New York, New York 10001
developer key:                                                       P: 212-738-9374 | M: 646-417-3239
https://www.beenverified.com/developer/new.                          josh@beenverified.com | www.beenverified.com

CONTACT INFORMATION
Joshua Levy


CERTIFICATION
“I certify that I have read and agree to the terms of the Internet Safety Technical Task Force Intellectual Property Policy.”




More Related Content

Viewers also liked

BeenVerified Berkman Submission
BeenVerified Berkman SubmissionBeenVerified Berkman Submission
BeenVerified Berkman Submissioncanarickd
 
Control capacitive measurement
Control capacitive measurementControl capacitive measurement
Control capacitive measurementAzlin lolin
 
Deferred rendering in Dying Light
Deferred rendering in Dying LightDeferred rendering in Dying Light
Deferred rendering in Dying LightMaciej Jamrozik
 
Conical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cstConical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cstAzlin lolin
 
Engineers in society
Engineers in societyEngineers in society
Engineers in societyAzlin lolin
 
Capacitive sensor
Capacitive sensorCapacitive sensor
Capacitive sensorAzlin lolin
 
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433Muoivy Wm
 

Viewers also liked (10)

Ppt0000000
Ppt0000000Ppt0000000
Ppt0000000
 
Overview
OverviewOverview
Overview
 
BeenVerified Berkman Submission
BeenVerified Berkman SubmissionBeenVerified Berkman Submission
BeenVerified Berkman Submission
 
Control capacitive measurement
Control capacitive measurementControl capacitive measurement
Control capacitive measurement
 
Usmle step 3
Usmle step 3Usmle step 3
Usmle step 3
 
Deferred rendering in Dying Light
Deferred rendering in Dying LightDeferred rendering in Dying Light
Deferred rendering in Dying Light
 
Conical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cstConical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cst
 
Engineers in society
Engineers in societyEngineers in society
Engineers in society
 
Capacitive sensor
Capacitive sensorCapacitive sensor
Capacitive sensor
 
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433
Tai lieu huong_dan_hoc_matlab_danh_cho_mon_xu_ly_anh_rat_hay_2264_7433
 

Similar to BeenVerified Berkman Center Submission

Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008eComm2008
 
5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docxSameerShaik43
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
 
Agencies - Talking to Clients about Digital Accessibility
Agencies - Talking to Clients about Digital AccessibilityAgencies - Talking to Clients about Digital Accessibility
Agencies - Talking to Clients about Digital AccessibilityTeresa Huber
 
Trusting the internet
Trusting the internetTrusting the internet
Trusting the internetAireen Sinong
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
Hablando de blockchain en la Uniandes de Colombia
Hablando de blockchain en la Uniandes  de ColombiaHablando de blockchain en la Uniandes  de Colombia
Hablando de blockchain en la Uniandes de ColombiaPablo Junco
 
Authentication in 2020 - Predictions by the neXus CTO
Authentication in 2020 - Predictions by the neXus CTOAuthentication in 2020 - Predictions by the neXus CTO
Authentication in 2020 - Predictions by the neXus CTOhagero
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
 

Similar to BeenVerified Berkman Center Submission (20)

Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
 
5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Wk White Paper
Wk White PaperWk White Paper
Wk White Paper
 
NetCare Overview
NetCare OverviewNetCare Overview
NetCare Overview
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
 
ProofeasyPPT.pptx
ProofeasyPPT.pptxProofeasyPPT.pptx
ProofeasyPPT.pptx
 
Agencies - Talking to Clients about Digital Accessibility
Agencies - Talking to Clients about Digital AccessibilityAgencies - Talking to Clients about Digital Accessibility
Agencies - Talking to Clients about Digital Accessibility
 
Trusting the internet
Trusting the internetTrusting the internet
Trusting the internet
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Hablando de blockchain en la Uniandes de Colombia
Hablando de blockchain en la Uniandes  de ColombiaHablando de blockchain en la Uniandes  de Colombia
Hablando de blockchain en la Uniandes de Colombia
 
Password Management
Password ManagementPassword Management
Password Management
 
Transaction&process integrity
Transaction&process integrityTransaction&process integrity
Transaction&process integrity
 
Authentication in 2020 - Predictions by the neXus CTO
Authentication in 2020 - Predictions by the neXus CTOAuthentication in 2020 - Predictions by the neXus CTO
Authentication in 2020 - Predictions by the neXus CTO
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Digital Identities
Digital IdentitiesDigital Identities
Digital Identities
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart cities
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

BeenVerified Berkman Center Submission

  • 1. Internet Safety Technical Task Force Technology Submission Template BeenVerified Inc. http://www.beenverified.com ABSTRACT PROPOSED SOLUTION BeenVerified Inc. provides a seamless, easy to use BeenVerified is built for online communities, businesses, environment for online identity and credential employers and individuals. However, making the process verification. Specifically, individuals, businesses, and easy to use and simple to understand for the end-user is online communities can use the BeenVerified platform the critical success factor. The end user process of with custom tailored solutions to solve specific needs. BeenVerified is very similar to the process of sending and receiving money through PayPal, only in the case of BeenVerifiedʼs true value proposition is its portability. BeenVerified, users are securely sending and managing Similar to PayPal, a user needs to go through the personal information. Initially, BeenVerified operates as a verification process just once. Thereafter, as a background checking company that performs voluntary BeenVerified user visits websites or businesses that background checks on someone looking to display and requires identity or credential verification and accepts the share their identity or credentials with a third-party BeenVerified API the user can simply authenticate to business, online community or employer. Examples of BeenVerified and instantly validate their true identity and credential verifications that can be performed include credentials. identity, education, work experience, criminal checks, professional license and many more. Keywords The BeenVerified solution includes a proprietary API that Identity, portable, user-centric, verification, credentials follows the OAuth protocol for securely sharing and 
 managing end-user credentials. The BeenVerified API Functional Goals was built to allows third-parties to request personal  Limit harmful contact between adults and minors information from an individual but allow the individual  Limit harmful contact between minors control of the authorization of such requests and also  Other – please specify providing for granularity in the release of what pieces of Facilitate trusted user interactions between adults personal information the individual would like to release. Additionally, the individual has the ability to update their personal information and edit the settings and PROBLEM INTRODUCTION authorizations should they choose to “unrelease” their Problems involving online identity are being reported in information at anytime. the national headlines every day – and with good reason. In recent years, the Internet has created an explosion in The most important thing to recognize about the development of methods for networking online for BeenVerified is that it is a user-centric approach to social and business purposes. Communities and blogs solving many of the online identity problems, meaning have been formed for every area of human interest and to the end-user is always in control of the who, what, when, service numerous niches. These communities and blogs where, why, and how their information is being displayed. have facilitated an instantaneous process of meeting and communicating with people. In an instant, users can be USE CASES speaking with someone that they wish to work with, The BeenVerified API was built using the OAuth protocol explore a potential romance, or find someone to rent their (http://oauth.net/) to securely manage the user’s apartment; among thousands of other tasks. credentials (username/password) and SSL encryption for sharing of data between BeenVerified and the third-party requesting information. While this rush to create a massive infrastructure for meeting people has resulted in numerous benefits, it was Use Case- The “Kids Only” Chat Room built with zero attention to the infrastructure for handling A community has been set up to allow children to interact the ability to verify or trust the validity of information with one another. Our technology will allow all parents submitted in an online form, profile, blog, resume, etc.

 of the community to have their identity and age verified before allowing their child to enter a chat room. The result of this process is that the Adult and the child are linked together on one account that provides for
  • 2. accountability of any misuse or inappropriate actions that The Individual Proves take place. Additionally, further checks could be made to An individual can proactively verify their own identity verify that the adult is not a Sexual Offender or other and credentials and use their BeenVerified account as a standards that the community may choose to uphold. portable marketing tool to share their information with the newspaper. The Community Connects Communities, web sites, and businesses can easily The Employer Requests implement the BeenVerified web service directly into The employer can use BeenVerified to send a “Get their own look and feel. The individual can have their Verified Request” to each applicant, which would send ages verified directly on the community and share it with the applicant over to BeenVerified where we then provide the appropriate people, on a real-time basis. the employer with an easy way to manage, view, and pay for the verifications. Use Case- The Online Dater A young man is looking to secure a date using a popular The Job Board Connects online dating site. He is proud of his accomplishments, as Communities, web sites, and businesses can easily he is a graduate of Harvard Law and now works for one implement the BeenVerified web service directly into of the best law firms in the city. He wants to be able to their own look and feel. The individual can have their separate himself from the countless other people on the information verified directly on the job board and shared dating site who misrepresent themselves. He wants with the employer on the job board as well, on a real-time potential daters to know he is who he says he is and has basis. accomplished what he claims. ADDITIONAL INFORMATION The Young Man Proves This young man can proactively verify his own identity What the technology successfully solves and what it and credentials and use his BeenVerified account as a does not. portable marketing tool to share verified information with • Not a silver bullet to solve all of the current potential dates. This includes a criminal background online identity issues. check as well as verified personal information such as • Unable to currently verify the identity of age, occupation, or education. International individuals effectively. • Does not solve if someone will commit a crime The Potential Dater Requests in the future. A female dater interested in dating this young man can • Costly to access every criminal database in the use BeenVerified to send a “Get Verified Request” to a US and Internationally. suitor which would send the young man over to • Fallible to human error and also to potential BeenVerified where we then provide the dater with an misrepresentations within the databases that are easy way to manage, view, and pay for the verifications. accessed, even though BeenVerified is just a conduit to access said databases. The Dating Site Connects Communities, web sites, and businesses can easily Strengths-weaknesses analysis implement the BeenVerified web service directly into Strengths Office 2004 Test Driv…, 6/23/08 11:44 AM their own look and feel. The individual can have their • Easy for the end user to use and appreciate the Formatted: Bullets and Numbering information verified directly on the dating site and share it added value of getting verified. with other members on the dating site, on a real-time • Really easy for a website or community to basis. implement. Most programmers should be able to have BeenVerified up and running within their community within one day and then just need Use Case- The Online Job Seeker additional time for CSS/HTML and user flow A west coast newspaper is looking for a freelancer writer customization. in the South Beach area on a job board known for having • One source for multiple verification types a good amount of writersʼ resumes. The newspaper (identity, work experience, education, etc.) receives over one hundred resumes for this one instead of needing to code and provide user assignment and would naturally like to verify the flows for each verification. Extremely important credentials of these applicants. Currently, employers have given most communities resource crunch. only a few expensive, time wasting, and cumbersome • Cost effective for each community or user to options for doing so. With BeenVerified, there exist three purchase the verifications most important to easy options for quickly and cost-effectively verifying them. (ex. Sexual offender for Children’s social their credentials. network vs. Education for a Job Site)
  • 3. Weaknesses Amster, was the head of Interactive Development for • Expensive to access all criminal databases L’Oreal/Redken and our development team is comprised • International verifications of all seasoned veterans. Eran Hammer-Lahav, the lead writer of the OAuth spec, provided advice when Implementation requirements structuring our API. Bill Washburn the Executive In order for a website or community to implement the Director of OpenID is on our board of advisor, has a PhD Office 2004 Test Driv…, 6/23/08 11:44 AM BeenVerified API they must have an understanding of in Policy and Ethics from Stanford and is a big proponent Formatted: Bullets and Numbering how APIs work and also have an understanding of the of our technology, process, and ideals. mechanics behind OAuth. There are no other implementation requirements other than understanding COMPANY OVERVIEW how to interact with a web service. A prototype for the BeenVerified service was launched in October 2007 and was used for further research and End user requirements are low and the end-user would feedback from potential partners, users, and investors. need to have the online aptitude capable of filling out an This prototype was demoed at the Sun Microsystems online form. Startup Camp and was selected from nearly one hundred entrants as one of the top three most promising Technical standards used technologies. After raising Angel Funding, the company The major standard protocols that are used is OAuth, then spent the next few months through April 2008, Office 2004 Test Driv…, 6/22/08 11:03 PM SSL, XML. vetting and shaping the platforms capabilities and ease of Formatted: Bullets and Numbering use. In late May of 2008, BeenVerified released the Use of law and policy for success platform (API) that provides the seamless and scalable BeenVerified falls under the FCRA when being used by web service for partner integration. Office 2004 Test Driv…, 6/22/08 10:33 PM employers for conducting background checks on a Formatted: Bullets and Numbering potential candidate. Outside of that, due to the fact that In May 2008 Bill Washburn, Executive Director of the the end-user is the one in control of requesting and Open ID Foundation, considered a guru of online identity sharing their background information there are not many and open protocols, reviewed our company, plans, and policy or legal frameworks to navigate. Naturally, technology, and agreed to join our Board of Advisors. In BeenVerified does have to maintain standards as of to July of 2008, the company completed a Series A round of where and how we verify individual data and as such, financing which is being used for continued development below each verification we display the source of the and marketing purposes. verified the information. BUSINESS MODEL OVERVIEW Viability in the US and international The business model is flexible in the sense that one of the BeenVerified has a successful “hit rate” within the US of three interested parties can pay for the service a) the end jtatlock 6/18/08 10:54 AM over 90% due to the fact that we combine technologies user b) the website or community implementing the Formatted: Bullets and Numbering and are an aggregator of identity and credential services service or c) the receiver of verified information (ex. an and not a main repository. For example, we combine employer). The core functionality is independent of who credit card verification technologies, with RSA’s public pays for the service and in the case of implanting this identity verification product, and Equifax’s Identity service as an API it is very much business development Credit Report product. At the moment we are not driven on who bears the cost. Identity verification (name, accessing or supporting international end-users due to the age, address, etc.) is roughly $1 per user and may in some complexity of doing so. However, going forward and as cases be waived. Credential verifications (education, work international data providers continue to improve services, experience, professional license, etc.) are roughly $10 per BeenVerified will partner or license their technologies as verification. well. MORE INFORMATION Effectiveness to Date Please visit www.BeenVerified.com for more information To date BeenVerified has been in Beta and has been used about our overall service. Our main thesis is that in order jtatlock 6/18/08 10:54 AM by a small set of users with no major flaws noticed and no to to solve some of the issues being addressed by this task Formatted: Bullets and Numbering hurdles seem apparent in the scaling sense. The “failures” force, some larger issues of overall online identity need to of the technology are more of a result of the lack of be addressed and solutions provided. There is a 40 information within existing databases or more importantly second video on the homepage explaining our main lack of centralization by the government of criminal vision. Our core principles can be found by reading records. “User Bill of Rights” EXPERTISE The core development team has been building and operating online businesses since 1996. Our CTO, Jason
  • 4. Full API specifications can be accessed by receiving a 236 5th Avenue 9th Floor | New York, New York 10001 developer key: P: 212-738-9374 | M: 646-417-3239 https://www.beenverified.com/developer/new. josh@beenverified.com | www.beenverified.com CONTACT INFORMATION Joshua Levy 
 CERTIFICATION “I certify that I have read and agree to the terms of the Internet Safety Technical Task Force Intellectual Property Policy.”