A New Approach for Social Media ID Verification

Government-Side Identity Verification

  1. A user visits a website or application. They request to sign up. They simply click on a sign-in with government verification button.
  2. The service forwards the user to a government portal. This portal is secured and encrypted with high-level security.
  3. The Government Portal prompts the user for their identifying documents (license, ssn, etc.)
  4. The user enters their information and send it through a secure channel to the portal.
  5. The Government Portal processes the information. This could either be an instant process, or something that requires human verification to read. Ideally, the information could be immediately read and verified from a government database. Once complete, the portal sends a response to the service with either a confirmation or failure. If confirmed, a specialized token is granted to the service. This token allows for account verification in the future and is unique and only effective on the service.
  6. Upon receiving the token, the service continues as usual with account signup.

Questions and Answers:





Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Crypto Bank Coin Airdrop 500 CBC (~$50)

A smart security feature for Samsung’s A-series phones in India — Alt Z nation.

Mailfence’s OpenPGP keystore gives full control over key management

How to Secure Your Platforms from Web Hackers

WLK Token Sale Closed!

4 key challenges for cybersecurity leaders

{UPDATE} Blue Whale Survival Challenge Hack Free Resources Generator

Hackers in Bogotá: A Talk with Offray Luna Cárdenas

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Dylan Sapienza

Dylan Sapienza


More from Medium

Intel’s New Arc Family Of Discrete Mobile Graphics Is AMomentous Messaging Opportunity

Spectre3D V2.0 is here!

It’s Time to Take IoT Security Seriously

Making Cents of News Subscriptions