Browse Prior Art Database

Personal Information Verification and Credential Service

IP.com Disclosure Number: IPCOM000179735D
Original Publication Date: 2009-Feb-24
Included in the Prior Art Database: 2009-Feb-24
Document File: 4 page(s) / 95K

Publishing Venue

IBM

Abstract

Described is a solution providing verification and credentialing services allowing subscribing users can verify identity along with selected personal attributes and information. The user has the ability to expose to others for verification and identification purposes, only those attributes desired for releas (such as age and gender, but not name, address and phone number) such that the exposed attributes can be identified and validated on an individual or group bases in person-to-person communication mechanisms, such as social networks, userid profiles, text messages, e-mail, Voice-over-IP, etc. This could enhance on-line social communities by offering a degree of assurance that the persons communicating with each other are represented truthfully. This could improve social networks and chat rooms, where individuals of all ages, who have never physically met one another, can still remain somewhat anonymous yet have some degree of verification of attibutes performed.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 35% of the total text.

Page 1 of 4

Personal Information Verification and Credential Service

An often mentioned problem in communicating with others in various on-line social communities is the often total lack of assurance that the persons communicating with each other are represented truthfully. The most obvious example of this issue involves on-line social networks and chat rooms, such as MySpace and Internet Relay Chat (IRC) where individuals of all ages, who have never physically met one another, can converse about all manner of topics.

This can create some difficulty for those involved because there is no direct assurance that the people communicating are represented truthfully. In particular, age, gender, locale, etc. Numerous examples exist of people impersonating individuals completely different from reality, often to the potential detriment of those communicated with. See below for some examples.

On the other hand, there is a desire to remain anonymous, often for the same reasons stated above -- to protect one's self from people who are not represented truthfully. Between the two extremes where there is complete anonymity and full disclosure, there must be a middle ground -- a method by which individuals can credential certain aspects of identity to certify being appropriate/eligible/etc. to participate in conversations of various sorts. Describing a means by which individuals can do so is the problem which this article seeks to solve.

The described solution is to provide a verification and credentialing service where by subscribing users can verify identity along with selected personal attributes and information. The user then has the ability to expose to others for verification and identification purposes, only those attributes desired (such as age and gender, but not name, address and phone number) such that the exposed attributes can be identified and validated on an individual or group basis in person-to-person communication mechanisms, such as social networks, userid profiles, text messages, e-mail, Voice-over-IP (VoIP), etc. Along with the profile attributes, a badge, credential, or

1

[This page contains 1 picture or other non-text object]

Page 2 of 4

shared identity token can be made available that would allow a person or progra

wishing to validate an exposed attribute to do so through either programmatic means, or by visiting the web site of the credentialing service. The user can verify identity and attributes at various levels and that verification level is expressed via distinguishing characteristics on the badge, such as color or stars. Thus, this disclosure extends the current model of credentialing by allowing the user to expose certain attributes on an individual or group basis explicitly under the user's control.

In an appropriate embodiment, the system would be fully configurable such that owners could verify themselves...