Legal Identity Relationships - IT'S A PROBLEM
Copyright CanStock

Legal Identity Relationships - IT'S A PROBLEM

Updated May 19, 2024

Consider these examples of legal identity relationships:

  • Parent (legal guardian)/child
  • Power of attorney/person
  • Executor of estate/deceased identity
  • Person/AI agent
  • Person/physical bot
  • AI system/digital bots

THE WORLD IS FULL OF THEM AND WE NEED TO BE ABLE TO PROVE LOCALLY/GLOBALLY, DIGITALLY/PHYSICALLY THE RELATIONSHIP.

My dumb question to you the reader is how will this be done? Today, on the planet, there's not a legal identity framework which can easily deliver this digitally. That's what this article dives into. Note it's a long read because legal identity relationships is complicated.

I'll start with use of an example of Jane Doe giving birth to her son John. Then I'll move on to the fast emerging world of "hives".

The Problem Statement - John's Born

In today's crappy legal identity world, we still use pieces of paper to give John his birth certificate showing a legal relationship to his mom, Jane. IT'S TOTALLY ANTIQUATED. WHY?

  • There's no data standards for CRVS (Civil Registration Vital Statistics) systems around the planet
  • They issue pieces of paper which are easily frauded
  • They can't query all other CRVS systems to verify an identity
  • There's no ability to biometrically tie John holding his piece of CRVS paper to his CRVS entry in the underlying CRVS database
  • There's no ability to cross-link John and Jane's CRVS records
  • There's no ability to easily generate from the CRVS a legal digital identity for John, at birth, which cross-links to Jane's digital legal identity
  • There's also no ability to register, where risk warrants it, to register John's smart AI leveraged digital identity to his physical CRVS database entry
  • Finally, there's no ability to legally, anonymously prove John is a human (not a bot), if he's been Covid vaccinated, if he's above or below age of consent.
  • IT'S A WHOPPER MESS - THIS IS WHAT WE USE AS A FOUNDATIONAL PROOF OF EVIDENCE OF JOHN AND JANE'S LEGAL IDENTITY AND THEIR LEGAL RELATIONSHIP WITH EACH OTHER!!
  • Add to this the fact that each CRVS system around the planet frequently operates at the provincial/state level i.e., there are literally hundreds of them to deal with when creating a new framework - YIKES!!!!!

Given this, as an old, very experienced identity architect eight years ago, my foundational premise was until we dealt with this, any type of digital identity we created would be like building a house on shaky legal ground. I knew I had to find the tools to:

  • Still allow each local jurisdiction to run their own CRVS and legal identity systems, yet export it out to global standards
  • Do it in such a way it works both physically and digitally
  • Shows legal identity relationships like Jane and John being parent/child
  • Allows one party where legal risk requires it to administer the other's legal identity (like Jane administering John's legal identity)
  • Gives each of us control of our legal identity information allowing us to choose when and where to release portions of it (like Jane registering John at his first school as his parent)
  • Ability to rapidly prove legal identity relationships in "hives". For example, Jane Doe could have one or more AI leveraged, smart digital identities of her, in legal identity relationships with one of more AI systems, physical and digital bots, and IoT devices. As nanobots enter our lives (skim this,?“Nanobots, Microbots, Manufacturing, Risk, Legal Identity & Contracts”, then hive relationships between entities can last seconds, minutes, hours, days, weeks. months or years.

Key Foundational Piece - Enter New Age CRVS

I realized the starting place was to create a new CRVS system, which had the following capabilities to new global standards:

  • Ability to not only register John with his legal identity information BUT ALSO ENTER HIS FORENSIC BIOMETRICS (fingerprints and iris scan at a later age when he can keep his eyes open)
  • Ability to cryptographically cross link within the CRVS database John and Jane's entry showing a child/parent relationship as well as for all the other types of legal identity relationships
  • Ability to export the data out, including John's forensic biometrics, digitally signed by the CRVS, to global standards in a TODA file
  • Create both a physical legal identity entry as well as creating a new digital legal identity for John at birth

Next Key Foundational Pieces - Enter TODA & Graphs

Skim this article,“TODA, EMS, Graphs – New Enterprise Architectural Tools For a New Age

TODA

TODA allows for confidential, secure, point to point transmission of the legal identity data between the CRVS and the desired endpoint (which I'll come to shortly). It prevents the double spend, is extremely fast and scalable.

When I first came into contact with TODA I knew it was a key foundational piece in rethinking legal identity and relationships. Why?

  • It contains a TODA file which can be anything, which I saw was the key to the proverbial highly jurisdictional CRVS et al state/provincial worlds - i.e., they can still keep control of their underlying laws, regs and systems but export the data out as a globally standardized TODA file
  • It can create cryptographic linkages between different people's TODA files - which is where Jane and John's legal identity relationship can be communicated from the CRVS system

Graphs

Graph databases are the perfect tool to use to manage complex, fast changing, with a one to many, and many to many, legal identity relationships. Visit my friend Derek Small's company, Nulli. They've been working the last several years on implementing graph databases with IAM (Identity Access Management) systems to handle complex identity relationships - skim 3 Edges.

I suggest you skim this recent article I wrote about AI agents and authorization, “AI Agent Authorization - Identity, Graphs & Architecture”.

So, now I knew I had the foundational pieces to then build upon a new privacy by design legal identity framework. How?

Enter the SOLICT

I wanted to architect something where:

  • We were in control of not only our legal identity, but also our biometric, behavioral, neurodata and credentials
  • It resides outside a jurisdiction's control i.e., I wanted to architect against a malicious state deleting say John's CRVS and national ID database entries, thus effectively preventing him from being able to prove who he is (it's called "digital death").
  • Scott David, U of Washington gave me the idea of creating for each person on the planet, their own database
  • At which moment, I could see the database being called the "Source of Legal Identity & Credential Truth) i.e. the SOLICT
  • It's administered by a new, global, independent non-profit
  • As John goes through life, different authoritative legal sources would write to his SOLICT, digitally signing the attestations (like when John's vaccinated, passes courses, school et al)

So, from cradle to grave, John has his own SOLICT, which he controls (or his mother Jane does until he reaches age of majority). John now has the beginning toolkit to prove his legal identity and legal relationship to his mom Jane. Yet, how is this going to work in "real life"?

Enter John's LSSI Devices

I've had the privilege of being able to travel around our planet. I realized billions of people don't have access to tech or, are like my 94 year old mom who can now no longer use tech. Thus, I wanted to architect a solution that addressed all of us, from cradle to grave, giving each of us tools to use, allowing us to either physically or digitally prove our legal self-sovereign identity (LSSI). Thus, John has four possible choices containing his legal identity information from his SOLICT:

  • A legal physical identity card
  • A digital legal identity app
  • A physical wristband biometrically tied to him
  • A chip implanted into him

All of these require John's consent to release portions of his legal identity, biometric, behavioral and neurodata.

Also note that all consents given by John, from cradle to grave are done via TODA/ and possibly Kantara UMA and stored in his SOLICT. Thus in one place, John can go back and see on X date, at Y time, he gave his consent to Acme Inc. to use his identity data, including his legal identity relationship with his mother Jane Doe. Depending on laws/regs where John lives, he might be able to leverage acts like EU GDRP Article 17 "Right to be Forgotten" requesting deletion of his data from Acme.

Yet, how does Jane administer John's legal identity both physically and digitally?

Enter PIAM

I wanted to architect a framework allowing say Jane to legally control John's legal identity, biometric, behavioral and neurodata. So, I created the concept of a PIAM (Personal Identity Access Management) system. It's AI leveraged, allowing Jane to control John's legal identity, as well as also creating legal consent contracts on the fly, for both herself and John's identity et al data to be used.

To see how this can be leveraged, skim page 12 of this doc, “Learning Vision Flyover”. It shows a pic showing Jane's PIAM controlling John's PIAM as well as his learning assistant bot, AssistBot, who are interfacing with a school's LMS (Learning Management System).

Now you can see all the pieces of the puzzle coming together...

JOHN CAN NOW EASILY PROVE NOT ONLY HIS LEGAL IDENTITY BUT ALSO LEGAL RELATIONSHIPS BOTH DIGITALLY AND PHYSICALLY

All of a sudden, the planet can now begin to rethink "oddles" of business processes for legal identity of people, both digitally and physically. We'd now have a new legal toolkit, which each of us controls, allowing enterprises to standardize, streamline and lower costs of proving legal identities and legal identity relationships.

Readers might want to skim rethinking business processes section ofCost Centres – Rethinking Legal Identity & Learning Vision . It discusses starting with rethinking death processes- which is full of legal identity relationships!

Enter Hives

Skim “Hives, AI, Agents/Bots & Humans - Another Whopper Sized Problem”. Now come with me on a short mental journey...

  • Jane or John Doe could have 1 or many different, AI agents which
  • Belong to a hive with one or more AI systems which
  • Also includes one of more physical bots which
  • Also includes one or more digital bots which
  • Also includes one or more IoT devices

Where legal risk warrants it, the legal identity relationship amongst each of the entities with the hive must be registered. Then consider this article, “Nanobots, Microbots, Manufacturing, Risk, Legal Identity & Contracts”. It means, in the not so distant future, hive entity relationships might only last seconds, minutes, hours, days, weeks, months or years. YIKES!!!!!

Thus, it requires an extraordinary fast CRVS system with the ability to map one ot one, one to many, and many to many legal identity relationships. Enter graphs as described above.

Yes, it's darned complicated. New architectural tools are required by the new age CRVS.

To see an example of a "hive" in a back office setting skim to Problem #2 in "CISO's - What's Your Security Strategy For AI, Bots, IoT Devices & AI Leveraged Smart Human Digital Identities?"

It's All Based on Risk

John controls his legal identity. Based on risk, he might only have to show/submit his legal identity or portions thereof to an enterprise. The enterprise might want to verify the digital signatures.

Or, if the risk is higher, the enterprise might request John give his fingerprints and iris scans, which are checked against the one's on his LSSI devices, also checking the digital signatures from the gov't authority.

Or, if the risk is high, John might have to go a new age notary to have his legal identity verified (skim the notary section in “Rethinking Human Legal Identity” to see an example illustrating this).

To do a deeper dive skim “How Do I Trust Entities??? Different Levels of Identity & Credential Assurance - A Thought Paper”.

A Sample School Hive Use Case

Skim “The Coming Classroom Revolution – Privacy & Internet of Things In A Classroom” to see early days of a hive within a classroom.

Identity Principles

I wanted to create an architecture which is flexible and confidential, yet risk based. So, John can create as many digital identities as he wants. Depending on risk, these may or may not be required to be registered. I strongly suggest readers skim this:

It Requires Open Source Software & Standards

This curve means our old ways of doing things won't work well. Why? New attack vectors are rapidly generated against not only the tech used in Jane and John's legal identity, but also the governance, business processes and end users (be they Jane, John or bots). Thus, I realized years ago, it all must be to open source standards with a well financed, independent, global non-profit able to do 24x7x365 threat analysis against the legal identity framework.

I strongly suggest readers skim this:

Now Consider Whopper Sized Legal Identity Hives

Hypothetically, consider an AI system in one jurisdiction on the planet. It can create digital bots at speeds of thousands or more per second. In the next second, they can be operating in all other jurisdictions on the planet.

Then consider if a few, many or all of the digital bots require a legal identity relationship with the AI system that created them. Next consider if the AI system and digital bots have additional legal identity relationships with IoT devices, physical bots and AI leveraged, smart digital identities of people.

THIS IS WHAT'S RAPIDLY COMING AT US. To address this it requires out of the box thinking. Like what?

  • Transactional speed CRVS systems able to securely legally register digital entities and also map, where risk requires it, legal identity relationships between the entities
  • Transactional speed abilities for the CRVS system to write to new SOLICT for each new digital entity
  • Technical, business process and legal abilities to determine when a digital entity is terminated, merged with another, etc. which results in their SOLICT becoming archived

To See the Architectures & Costs

Skim these docs:

It Has Rapidly Growing National Security Implications

Skim “National Security – Reduce Risk By Instantly Determining Entity Friend From Foe”.

IT'S TRANSFORMATIONAL OVER TIME, NOT OVER NIGHT

All of the above is a bottom up driven architecture. It starts when humans are born or, digital entities are created. Based on risk, it gives each new entity us a new legal toolkit we can use, both physically and digitally, from cradle to grave. It offers many advantages, features and benefits that existing digital strategies, products and protocols can't address - like legal identity relationships.

Skim my message to government and industry leaders:

We're Entering A Major Paradigm Shift

Where our old ways won't work well anymore. Thus, it requires out of the box thinking for our out of the box times. That's what the architectures deliver.

Contact me if you'd like to chat.

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT



要查看或添加评论,请登录

社区洞察

其他会员也浏览了