Part VII Rethinking Enterprise Identity                - Summary
Copyright 123RF

Part VII Rethinking Enterprise Identity - Summary

December 27, 2023 update - I strongly suggest readers skim How Do I Trust Entities?   Different Levels of Identity & Credential Assurance - A Thought Paper

March 31, 2023 update - Note to reader: I wrote this series now a little over two years ago. Within the articles, I provide updates since the post was written. I strongly suggest readers skim this recent article about toolkits:

This post summarizes the prior posts about rethinking enterprise identity architecture.

Wave of Change

February 2022 Update:

Skim this article:

It shows the large wave approaching our shores. Which is why in this article I'm using a picture of a person holding an umbrella as a defense against the rain, watching the incoming tsunami wave approach them. It's not going to work. Thus, it's an excellent reason of what the other posts in this series discusses.

In the technological tsunami wave of change we're entering, we're using tried and trued identity access management (IAM) systems and business processes to govern our enterprise identity architectures. My underlying premise? It's not going to work well given the massive amount of change.

All around us, change regarding identity is occurring...

Human Legal Identity

Part I describes the need to create a rethought human legal identity system leveraging a LSSI (Legal Self-Sovereign Identity), biometrically tied to each person, from cradle to grave, which they can control. It's interoperable globally, both physically and digitally.

Built from the bottom up on privacy by design, it allows each person control over their forensic biometrics, as well as the ability to maintain a list of all consents granted by them for access to their identity and data in their SOLICT (Source of Legal Identity & Credential Truth). Further, it also allows easy proof of legal identity relationships between people.

It leverages TODA. I strongly suggest readers skim this article:

Enterprise Legal Identities & AI

Part II dives into the corporate legal identity waters. It describes how AI systems can now legally own LLC (limited liability corporations).

The article shows, how by leveraging Toda with it's abilities to mimic paper, jurisdictions can still continue to control their corporate registrations, GLEIF can still do their legal identifiers, BUT leverage Toda to do it. The ability to do a identity transaction between parties, containing corporate legal information, proving it occurred on a certain date, time, immutably with no change to the content, is what Toda brings to the party.

Finally, given the fact that AI systems can now own companies, the ability for a jurisdiction to insert an attribute describing this into the corporate Toda file is required.

Determining Who a Potential Worker Really Is

Part III describes a new internal identity architecture for enterprises addressing employees, contractors, etc. It begins with knowing who the legal identity of a person applying for a job at the enterprise or, a contractor working at the enterprise.

Leveraging the Toda LSSI model described in Part I, based on degree of risk associated with each worker, the enterprise will request the person to supply minimal legal identity information through to their biometrics, with the worker's consent.

The same LSSI can be used by both the worker and employer to instantly determine education credentials. It also can be used to instantly determine legal dependents which HR can use for benefits programs, etc.

The Toda LSSI framework can also be leveraged to determine legal smart human digital identities of workers. As these become used within an enterprise, the enterprise, depending on risk, can request legal identification of not only the human, but their digital smart identities as well.

The enterprise can also leverage the Toda LSSI system to be instantly notified when a worker dies.

The article ends with a discussion of what to use when a worker doesn't have a jurisdiction issued LSSI. It proposes creation of commercial ones, which an enterprise can use.

Decentralized Identity and Access Control

Part IV, describes rethinking internal identities and access control systems within an enterprise.

It begins by proposing creation of enterprise Toda files for each identity, potentially leveraging anonymous biometrics.

The article then proposes leveraging the Toda file to begin rethinking access control. It proposes the creation of multiple capability Toda files, allowing for both a decentralized access control strategy, as well as enabling a person to hypothetically delegate portion of their authorization.

The article also describes how smart digital entities of these people can be identified within the enterprise and then used.

It offers enterprises a new identity toolkit to create a mixture of decentralized/centralized IAM systems.

Rethinking Customer Identity Architecture

Part V is a rethink of customer identities, leveraging their Toda LSSI. It begins with a review of how to prove a customer's of legal age, both physically and digitally. Next, it discusses creating a enterprise customer Toda identity, leveraging their Toda LSSI.

The article then proposes creating customer capability Toda files for the customer. An example is given where Jane Doe has a child and wants to delegate some responsibility to the child to interact with the enterprise to varying degrees.

Next, identity federation is discussed. The emergence of a customer LSSI means enterprises will be forced to leverage AI contract law to instantly create federation agreements with the customer directly, or their PIAM (personal identity access management) system, or a third party acting on their behalf.

Smart customer digital entities are then discussed. Depending on risk, the enterprise might be required to legally identify them via the customer's human Toda LSSI plus the smart digital entity's Toda file. It discusses creating similar links within the enterprise customer Toda file.

Next up is a discussion of Fraud 4.0, with criminals using customer smart digital entities to masquerade as them.

The article ends with a brief discussion of how enterprises can substantially reduce their advertising fraud by leveraging a person's Toda LSSI.

Legal Identities for AI Systems/Bots the Enterprise is Owning and/or Interacting With

Part VI, discusses why enterprises quickly need to come up with a legal framework to legally identify AI systems and bots (both physical and digital), they're interacting with. Today, there is no global legal identity framework addressing this.

It discusses the political challenge in getting politicians and national jurisdictions to agree on the need for creating a global legal identity framework, locally managed.

The article describes the technical challenges in securely identify AI systems and bots. It goes on to describe how the increasing ability for AI system/bots to work together in singularity, means new tools are required to not only identity the individual AI system/bots but those that they're working with in singularity.

The article then breaks down into small baby steps to begin addressing this. These include, creating a common nomenclature for these types of entities, research on how to legally identify them, contract law research on new laws/regulations requirements, and finally proposing a series of coordinated POC's (proof of concept) to prove it all out.

Summary

THIS CURVE, MEANS TOMORROW IS DEFINITELY NOT GOING TO BE LIKE TODAY. Thus, while jurisdictions discuss "digital identities", others discuss "SSI", and IAM/biometric vendors promote their products/services, it's not going to work well.

In this post, I discuss how identity discussions are analogous to the old adage of the emperor wearing no clothes. We're pretending the existing identity systems work, while the fraud costs reach simply staggering numbers.

If you've got this far in the article, then here's my request to you, a senior enterprise leader and/or an enterprise identity architect. I'm only looking for early adopters, who agree with the challenges described in the articles, and want to work with me implementing first iterations of what the articles propose. Please contact me.

Here's the links to articles in this series:

Enterprise readers might also find these articles very relevant to rethinking enterprises:

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime. This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the over 100 LinkedIn articles I've written, or my webpage with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth). The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs. So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child. The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves. This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc. It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system. This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities. This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning. The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc. 
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc. This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT

 


Geeta Gouri

Former Member at Competition Commission of India

3y

Interesting. But not in my line of work. Best

Like
Reply
Diane Strahan

Board Member and Executive Advisor to Fortune 500 Tech Companies and Start Ups and non profits: IPIE, PCI and others

3y

Guy, you introduce new thinking to a growing problem for sure. One of the biggest challenges IMO is not whether you can find a technological solution but rather if individuals will step up to ownership and control of their digital identities. Most consumers don't even want to control their own passwords, nor do many want to give up their online social networking for privacy even when made aware of all the "bad" things that can happen online when your image, your posts, access to your camera and sms texts and entire address book on your smartphone at risk. Solving for within one country vs. globally might be helpful so there is a digestible use case and benefit/value statement more can understand, but most importantly so we can see how consumers engage, create rules, share and protect their digital identities and determine what is and is not important to them.

Like
Reply
Anand Deshpande

Founder and Chairman of Persistent Systems

3y

Thorough and well-thought-through as always. Happy 2021!

Like
Reply
Debbie Reynolds

The Data Diva | Data Privacy & Emerging Technologies Advisor | Technologist | Keynote Speaker | Helping Companies Make Data Privacy and Business Advantage | Advisor | Futurist | #1 Data Privacy Podcast Host | Polymath

3y

Guy Huntington this is excellent information. Thanks for sharing.

Like
Reply

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics