Part I - New Age Enterprise Identity Architecture
Copyright Toda Network

Part I - New Age Enterprise Identity Architecture

May 2, 2024 Note: This series of articles is currently being rewritten and updated. I strongly suggest readers skim these articles instead:


This post, will be the first of several, where I begin to explore rethinking enterprise identity architecture to meet the needs of the new age we're entering. The architecture proposed allows for:

  • Digital identification of the actual enterprise itself
  • Leveraging legal self-sovereign physical identities for customers, employees, contractors, etc.
  • Legal self-sovereign smart digital entity identities of customers, employees and contractors e.g. AI virtual selves etc.
  • Leveraging a new AI legal registration system for AI systems and bot entities interacting with the enterprise
  • Creation of decentralized authorization models

In short, what's proposed is a radical rethink of the old days of LDAP directories, federated identity from identity providers, centralized IAM systems controlling identity interactions, etc.

Toda - A Powerful Decentralized Management Tool

For the past five years, I, an old identity architect, have been looking for a tool to us to create a "Legal Self-Sovereign Identity" (LSSI). I considered Blockchain, but didn't like the fact it wasn't confidential, required third parties to verify transaction, was slow and couldn't rapidly scale. Then, this past spring, I was introduced to Toufi Saliba and my world changed.

A few years ago, Toufi and Dann Toliver were struggling with the problems I just described. They came up with a better mousetrap - Toda. It leverages Merkle math, hashes, tries and cycles, to create a confidential, secure, immutable proof a transaction occurred, the contents weren't change, which can perform at high transaction rates, and quickly scale. Within their protocol, it allows for a "Toda file" which could be anything. When I saw this, I realized I was looking at the core of a new legal self-sovereign identity framework.

I strongly suggest readers read these papers to understand Toda:

If you're still keen after reading the above, then read these three blogs to see how Toda's being used in AI:

Applying This to Legal Human Identity

In the summer of 2020, I assembled a small group of diverse experts, and we worked our way through many different identity use cases using Toda. From this, I could see a high-level architecture for creating a legal self-sovereign identity (LSSI) from birth to grave for a person, both physically and digitally, which would be interoperable, planet wide.

February 2022 Update:

I strongly suggest readers skim the new human legal identity architecture:

Highest Level of Identity Assurance From Birth On

The architecture leverages forensic biometrics, obtained at birth, to tie the physical legal identity to the civil registration vital statistics (CRVS) system. It then grants the person a physical legal identity fob/card as well as a digital legal app version which contains their Toda legal identity file. Thus, from birth on, each person has the highest level of identity assurance.

Skim this article:

It Leverages Anonymous, Revocable, Re-issuable Biometrics

February 2022 Update:

Skim this article:

It discusses the work or Rud Bolle's draft anonymous biometrics paper. It leverages this into the architecture, issuing each person with their forensic biometrics, from birth on, they can control, which if fraudulently or maliciously obtained, can be revoked and re-issued.

It Addresses New Attack Vectors From the Rapid Technological Change We Live In

This curve produced by my friend Pat Scannell, means today's best legal identity system can quickly become tomorrow's turd. The architecture addresses this by creating a global, independent, threat analysis centre for legal identity governance, business processes and technological infrastructure. We're bringing industry best practices to the world of legal identity

Leveraging This into a New Age Enterprise Identity Architecture

In the last appendix of the paper, I began to think my way though how to leverage Toda and Toda-LSSI into a new age enterprise architecture. Here's what I was looking for:

  • A decentralized model for identifying the actual corporate legal identity, as well as being able to determine if the corporation is owned by AI systems (read this thought paper to understand why I was thinking about this)
  • A decentralized model for determining the legal identities, where required, for customers, employees, contractors, etc.
  • A decentralized model allowing for identification of smart digital entities of customers, employees, contractors, etc.
  • An identification of AI systems and bots working within the enterprise and/or interacting with the enterprise
  • A decentralized model for authorization within an enterprise

The result was the thought diagram in the last appendix.

In subsequent posts. I'll dive deeper into each of the above components, describing my thoughts.

Here's the links to articles in this series:

Enterprise readers might also find these articles very relevant to rethinking enterprises:

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime. This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the over 100 LinkedIn articles I've written, or my webpage with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth). The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs. So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child. The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves. This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc. It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system. This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities. This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning. The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc. 
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc. This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT

 


To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics