User Verification Cross-Verification System
Short Answer Question
What is the purpose of the application?
What role does cross-verification play in this system?
Describe the two different types of user identification information used in this system.
What is DUID and how is it used in the system?
Explain how the system leverages blockchain or trust tools to protect user data.
How can Company A request access to a verified user document held by Company B?
What role does the user play in granting access to a verified document?
What is the function of the "receive verified document component"?
How does the system leverage biometric data?
Besides blockchain, what other distributed ledger technologies can be used in this system?
Short Answer Question
The purpose of the application is to provide a universal and decentralized user verification solution with cross-verification capabilities that allows user information, especially information related to user documents, to be securely shared and verified between enterprises.
Cross-verification refers to a system in which one entity (such as a company) can request information from another entity that verifies the identity of a specific user. This ensures multi-party verification before sensitive user information is shared.
The system uses two main types of user identification information: (1) traditional identification documents such as passports, driver's licenses, and utility bills, and (2) biometric data such as fingerprints, iris scans, and facial recognition data.
DUID refers to "Digital Unique Identifier" and is used in the system to create a unique, verifiable identity for each user on the blockchain or trust tool.
The system leverages the decentralized and tamper-proof nature of the blockchain or trust tool to securely store and verify user data. Each user's verified document is associated with their DUID and stored on the blockchain, creating a secure and auditable record.
Company A can request access to a verified user document held by Company B by sending a request to the trust tool that specifies the user and the required information they wish to access. The system then prompts the user to approve or deny the request.
The user plays a vital role in granting access to verified documents. Before any access is granted, the system notifies the user of the request and requires the user to explicitly consent to share their information.
The "Receive Verified Document Component" is responsible for receiving verified documents associated with a user from an entity (such as a company or organization). These documents can include identification documents, proof of address or any other relevant documents used to verify the identity of the user.
The system utilizes biometric data to enhance its security measures and provide a reliable method of user authentication. It allows the use of fingerprint scanning, facial recognition or other biometric methods to verify the identity of users and authorize access to their data.
In addition to blockchain, other distributed ledger technologies such as Hashgraph, DAG (Directed Acyclic Graph) and distributed databases can also be used in this system to provide a secure and decentralized data management solution.
Key Glossary
Term Definitions Blockchain A decentralized and distributed database that records transactions and maintains a tamper-proof record shared between all participants. Trust Instrument A system or mechanism designed to establish trust between different parties, usually by providing a secure, transparent and verifiable means of transaction. Cross-Authentication A method of verification in which one entity can request information from another entity to confirm the validity of a user's identity or data. Digital Unique Identifier (DUID) A unique identifier assigned to each user in the system that allows for secure and verifiable identification of their identity. Authenticated Document A document that has been verified for authenticity and validity by an authorized entity, such as a passport, driver's license or utility bill. Biometric data Unique biological characteristics used to identify and authenticate an individual, such as fingerprints, facial recognition, or iris scans. Smart contracts Self-executing contracts stored on a blockchain and executed automatically, triggering specific actions when predefined conditions are met. Anti-Money Laundering (AML) A collection of laws, regulations, and procedures designed to prevent illegal activity through the financial system. Know Your Customer (KYC) A due diligence process used by financial institutions and businesses to verify the identity of their customers and assess potential risks. Distributed databases A database distributed across multiple locations or network nodes, allowing for data redundancy and improved data availability.