This page is optimized for AI. For the human-readable: Self-Sovereign based Curriculum Vitae

Self-Sovereign based Curriculum Vitae

Challenge Metadata

Challenge Description

Anti-counterfeit CVs


Create a CV based on the principle of self-sovereign identity. It allows for its recipients to validate the veracity of a candidate’s claims from his or her professional qualifications to his or her work history.



Keywords

architecture solution, technical solution, market solution


Submit your project idea to us by creating a jointcreate venture. We will guide your project through the process.




What’s in it for you?


  1. We help you to further develop your idea and to build a team around the project.
  2. We connect you with corporate partners and mentors from academia who can help you take your idea to the next level.
  3. You may get invited to the incubation program of our partner CV VC, which comes with the opportunity to receive up to CHF 125,000 in funding from CV VC in exchange for 10% equity.




Details of the Challenge


Resumes and CVs are used in job applications to show someone’s education and work achievements, not limited to academic qualifications and publications, but also work experience. Such claims made by an applicant for a job brings several challenges and fraud potential for multiple actors within the job application process.

Hiring processes of companies are complex and tedious. Hiring the wrong person may harm the organization and lead to actual loss of productivity, mistakes and may require extra training. Because of that, HR employees are interested in detecting fraud and misrepresentations as quickly as possible and thus eliminating them from the application process. This results in large amounts of time and money spent on this task.

As introduced before, the job application process faces a multitude of challenges. Fraud with academic qualifications is possible by an applicant that provide false information, e.g. by using a degree that was never obtained and can be provided in a resume in the form of fake diplomas. Another fraud option is that grades could be upgraded by the applicant to show higher certification scores than the score that was actually achieved. More sophisticated forms of fraud can be achieved by using a certificate of a university that the applicant has never graduated from or simply using a university that does not exist.

Improving the applicants’ chances of getting hired can be done by listing fake responsibilities or job titles in past employments or inflating the duration of work experience or positions. To make the application process more secure, it must be possible to provide qualifications and experience information in such a way that the authenticity and genuineness of such information can easily be verified. To reduce the load and dependency of former employers, it must be possible for a job-offering company to verify claims without direct interactions with former employers and certifying universities.

The aim of this challenge is to build a Self-Sovereign Identity-based Curriculum Vitae (CV). It should allow companies academic- and other institutions to validate claims that a person has finished a certain education or worked in a specific company. Furthermore, work certificates should also be included. To ensure GDPR compliance, data should not be stored on a central server but remain in the possession of the CV holder.



Targets of the challenge


1. Identify all stakeholders and determine their role (rights & duties) within such a solution. Describe how the roles are distributed / claimed.

2. Design the system architecture and elaborate which technical SSI Blockchain solution you plan to use.

3. Describe the governance structure of the platform.

4. Outline a potential business model on how the costs of creating and operating such a platform can be covered, without having to sell data.

5. Build a Proof of Concept.

6. Describe how you plan to onboard academic and private institutions.



Requirements of the solution


ID Requirement Description

R1 Claims reflect user behavior

R2 Data should be stored in a structured way

R3 The system should prevent malicious or fake claims

R4 Manipulation of claims should not be possible

R5 The system should differentiate between interaction scopes

R6 The system should preserve privacy of involved actors

R7 Ratings should be verifiable

R8 Actors should be verifiable

Claims made by an actor should target another actor of the system (R1). By establishing a trust relation between the issuer and verifier of a claim (R7), the verifier can trust the ratings made by an issuer (R2). Tampering of ratings (R3, R6) can be prevented by relying on cryptographic mechanisms, such as digital signatures. Depending on the issuer, different types of claims can be made (R4), e.g. identification claims, work experience claims and education claims. Personally, identifiable information should be stored in a way, such that privacy is maintained. The application should follow the W3C standards on Decentralized Identifiers https://www.w3.org/TR/did-core/ .



Competition


There are already several solutions on the market that aim at solving the outlined problem. However, in all cases the focus on keeping track of authenticity by storing hash values of images. This is not a very efficient approach, given that data processing algorithms have issues coping with images (unstructured data). Hence, the solution MUST focus on storing the relevant data in a text-based, fully standardized and machine interpretable. Existing solutions include SWITCH-Verify and Proxeus among others.