Legal Identity Relationships - IT'S A PROBLEM
Guy Huntington
Trailblazing Human and Entity Identity & Learning Visionary - Created a new legal identity architecture for humans/ AI systems/bots and leveraged this to create a new learning architecture
Updated May 19, 2024
Consider these examples of legal identity relationships:
THE WORLD IS FULL OF THEM AND WE NEED TO BE ABLE TO PROVE LOCALLY/GLOBALLY, DIGITALLY/PHYSICALLY THE RELATIONSHIP.
My dumb question to you the reader is how will this be done? Today, on the planet, there's not a legal identity framework which can easily deliver this digitally. That's what this article dives into. Note it's a long read because legal identity relationships is complicated.
I'll start with use of an example of Jane Doe giving birth to her son John. Then I'll move on to the fast emerging world of "hives".
The Problem Statement - John's Born
In today's crappy legal identity world, we still use pieces of paper to give John his birth certificate showing a legal relationship to his mom, Jane. IT'S TOTALLY ANTIQUATED. WHY?
Given this, as an old, very experienced identity architect eight years ago, my foundational premise was until we dealt with this, any type of digital identity we created would be like building a house on shaky legal ground. I knew I had to find the tools to:
Key Foundational Piece - Enter New Age CRVS
I realized the starting place was to create a new CRVS system, which had the following capabilities to new global standards:
Next Key Foundational Pieces - Enter TODA & Graphs
Skim this article,“TODA, EMS, Graphs – New Enterprise Architectural Tools For a New Age”
TODA
TODA allows for confidential, secure, point to point transmission of the legal identity data between the CRVS and the desired endpoint (which I'll come to shortly). It prevents the double spend, is extremely fast and scalable.
When I first came into contact with TODA I knew it was a key foundational piece in rethinking legal identity and relationships. Why?
Graphs
Graph databases are the perfect tool to use to manage complex, fast changing, with a one to many, and many to many, legal identity relationships. Visit my friend Derek Small's company, Nulli. They've been working the last several years on implementing graph databases with IAM (Identity Access Management) systems to handle complex identity relationships - skim 3 Edges.
I suggest you skim this recent article I wrote about AI agents and authorization, “AI Agent Authorization - Identity, Graphs & Architecture”.
So, now I knew I had the foundational pieces to then build upon a new privacy by design legal identity framework. How?
Enter the SOLICT
I wanted to architect something where:
So, from cradle to grave, John has his own SOLICT, which he controls (or his mother Jane does until he reaches age of majority). John now has the beginning toolkit to prove his legal identity and legal relationship to his mom Jane. Yet, how is this going to work in "real life"?
Enter John's LSSI Devices
I've had the privilege of being able to travel around our planet. I realized billions of people don't have access to tech or, are like my 94 year old mom who can now no longer use tech. Thus, I wanted to architect a solution that addressed all of us, from cradle to grave, giving each of us tools to use, allowing us to either physically or digitally prove our legal self-sovereign identity (LSSI). Thus, John has four possible choices containing his legal identity information from his SOLICT:
All of these require John's consent to release portions of his legal identity, biometric, behavioral and neurodata.
Also note that all consents given by John, from cradle to grave are done via TODA/ and possibly Kantara UMA and stored in his SOLICT. Thus in one place, John can go back and see on X date, at Y time, he gave his consent to Acme Inc. to use his identity data, including his legal identity relationship with his mother Jane Doe. Depending on laws/regs where John lives, he might be able to leverage acts like EU GDRP Article 17 "Right to be Forgotten" requesting deletion of his data from Acme.
Yet, how does Jane administer John's legal identity both physically and digitally?
Enter PIAM
I wanted to architect a framework allowing say Jane to legally control John's legal identity, biometric, behavioral and neurodata. So, I created the concept of a PIAM (Personal Identity Access Management) system. It's AI leveraged, allowing Jane to control John's legal identity, as well as also creating legal consent contracts on the fly, for both herself and John's identity et al data to be used.
To see how this can be leveraged, skim page 12 of this doc, “Learning Vision Flyover”. It shows a pic showing Jane's PIAM controlling John's PIAM as well as his learning assistant bot, AssistBot, who are interfacing with a school's LMS (Learning Management System).
Now you can see all the pieces of the puzzle coming together...
JOHN CAN NOW EASILY PROVE NOT ONLY HIS LEGAL IDENTITY BUT ALSO LEGAL RELATIONSHIPS BOTH DIGITALLY AND PHYSICALLY
All of a sudden, the planet can now begin to rethink "oddles" of business processes for legal identity of people, both digitally and physically. We'd now have a new legal toolkit, which each of us controls, allowing enterprises to standardize, streamline and lower costs of proving legal identities and legal identity relationships.
Readers might want to skim rethinking business processes section of “Cost Centres – Rethinking Legal Identity & Learning Vision” . It discusses starting with rethinking death processes- which is full of legal identity relationships!
Enter Hives
Skim “Hives, AI, Agents/Bots & Humans - Another Whopper Sized Problem”. Now come with me on a short mental journey...
Where legal risk warrants it, the legal identity relationship amongst each of the entities with the hive must be registered. Then consider this article, “Nanobots, Microbots, Manufacturing, Risk, Legal Identity & Contracts”. It means, in the not so distant future, hive entity relationships might only last seconds, minutes, hours, days, weeks, months or years. YIKES!!!!!
Thus, it requires an extraordinary fast CRVS system with the ability to map one ot one, one to many, and many to many legal identity relationships. Enter graphs as described above.
Yes, it's darned complicated. New architectural tools are required by the new age CRVS.
To see an example of a "hive" in a back office setting skim to Problem #2 in "CISO's - What's Your Security Strategy For AI, Bots, IoT Devices & AI Leveraged Smart Human Digital Identities?"
It's All Based on Risk
John controls his legal identity. Based on risk, he might only have to show/submit his legal identity or portions thereof to an enterprise. The enterprise might want to verify the digital signatures.
Or, if the risk is higher, the enterprise might request John give his fingerprints and iris scans, which are checked against the one's on his LSSI devices, also checking the digital signatures from the gov't authority.
Or, if the risk is high, John might have to go a new age notary to have his legal identity verified (skim the notary section in “Rethinking Human Legal Identity” to see an example illustrating this).
To do a deeper dive skim “How Do I Trust Entities??? Different Levels of Identity & Credential Assurance - A Thought Paper”.
A Sample School Hive Use Case
Skim “The Coming Classroom Revolution – Privacy & Internet of Things In A Classroom” to see early days of a hive within a classroom.
Identity Principles
I wanted to create an architecture which is flexible and confidential, yet risk based. So, John can create as many digital identities as he wants. Depending on risk, these may or may not be required to be registered. I strongly suggest readers skim this:
It Requires Open Source Software & Standards
This curve means our old ways of doing things won't work well. Why? New attack vectors are rapidly generated against not only the tech used in Jane and John's legal identity, but also the governance, business processes and end users (be they Jane, John or bots). Thus, I realized years ago, it all must be to open source standards with a well financed, independent, global non-profit able to do 24x7x365 threat analysis against the legal identity framework.
I strongly suggest readers skim this:
Now Consider Whopper Sized Legal Identity Hives
Hypothetically, consider an AI system in one jurisdiction on the planet. It can create digital bots at speeds of thousands or more per second. In the next second, they can be operating in all other jurisdictions on the planet.
Then consider if a few, many or all of the digital bots require a legal identity relationship with the AI system that created them. Next consider if the AI system and digital bots have additional legal identity relationships with IoT devices, physical bots and AI leveraged, smart digital identities of people.
THIS IS WHAT'S RAPIDLY COMING AT US. To address this it requires out of the box thinking. Like what?
To See the Architectures & Costs
Skim these docs:
It Has Rapidly Growing National Security Implications
IT'S TRANSFORMATIONAL OVER TIME, NOT OVER NIGHT
All of the above is a bottom up driven architecture. It starts when humans are born or, digital entities are created. Based on risk, it gives each new entity us a new legal toolkit we can use, both physically and digitally, from cradle to grave. It offers many advantages, features and benefits that existing digital strategies, products and protocols can't address - like legal identity relationships.
Skim my message to government and industry leaders:
We're Entering A Major Paradigm Shift
Where our old ways won't work well anymore. Thus, it requires out of the box thinking for our out of the box times. That's what the architectures deliver.
Contact me if you'd like to chat.
About Guy Huntington
I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.
I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.
I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.
I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.
Quotes I REALLY LIKE!!!!!!:
领英推荐
Reference Links:
An Identity Day in The Life:
My Message To Government & Industry Leaders:
National Security:
Rethinking Legal Identity, Credentials & Learning:
Learning Vision:
Creativity:
AI Agents:
Architecture:
AI/Human Legal Identity/Learning Cost References
AI Leveraged, Smart Digital Identities of Humans:
CISO's:
Companies, C-Suites and Boards:
Legal Identity & TODA:
Enterprise Articles:
Rethinking Enterprise Architecture In The Age of AI:
LLC's & AI:
Challenges With AI:
New Security Model:
DAO:
Kids:
Sex:
Schools:
Biometrics:
Legal Identity:
Identity, Death, Laws & Processes:
Open Source:
Notaries:
Climate Change, Migration & Legal Identity:
Fraud/Crime:
Behavioral Marketing:
AI Systems and Bots:
Contract Law:
Insurance:
Health:
AI/AR/VR Metaverse Type Environments:
SOLICT:
EMP/HEMP Data Centre Protection:
Climate:
A 100,000-Foot Level Summary Of Legal Human Identity
A 100,000-Foot Level Summary Of The Learning Vision: