Enterprise Change!
Guy Huntington
Trailblazing Human and Entity Identity & Learning Visionary - Created a new legal identity architecture for humans/ AI systems/bots and leveraged this to create a new learning architecture
Updated August 29, 2024
Change & Risk Require New Enterprise Tools
As AI systems, bots (both digital and physical), AI agents, and IoT devices invade your enterprise, it increases the pace of change and risk. This brief article focuses on why you should be deploying TODA, EMS and graphs in your enterprise architecture to mitigate risk.
First, Lets Set The Stage
Consider the arrival of human AI agents:
Next, consider the arrival of hundreds, then thousands and tens of thousands of AI agents within your enterprise, doing tasks faster, cheaper and better. Skim these two articles to understand the challenges associated with this:
TODA
I was introduced a few years ago to Toufi Saliba. He's Global Chair of IEEE's International Protocols for AI Security, who, together with Dan Toliver had produced a new protocol called TODA. I’ve inserted many links about this at the end of this section for you to review.
The short version is it works at transactional speeds, leveraging Merkle math and cycles, able to prove that a transaction, from end point 1 to end point 2, occurred on X date, at Y time, containing a TODA file (which can be anything) with a hash of the file as well.
I knew when I saw this I was looking at a new foundational piece for not only rethinking legal identity but also enterprise identity. I could see the TODA file could contain unique identifiers and credentials. This could be securely written to the entity's source code. I also saw enterprises creating TODA “capability files” able to specify what authorization rights an entity has.
i also liked the fact TODA works at transactional speeds. Why? Consider an AI system on the planet. it has the abilities today to create digital bots at speeds of thousands to millions PER SECOND, WHICH IN THE NEXT INSTANCE CAN BE OPERATING ANYWHERE ON THE PLANET. Thus, TODA has the ability to deal with this.
Further, Dan and I talked about hives and the ability to cross ink TODA files. So, MedBot1 might belong to AI system hive 1234. Both of them could have TODA capability files written to them containing their relationship. Bear in mind that a “hive” could easily be a combination of AI systems, digital bots, physical bots and increasingly smart IoT devices.
TODA Links:
The TODA Protocol
So, TODA is one piece of your new entity management security strategy. But on its own, it’s not enough. Why?
EMS - Entity Management Systems
Let’s use Nurse or Doctor Jane Doe as an example. She interacts with not only many different hospital staff and patients, but also with many different emerging new types of entities like AI systems, bots and smart AI leveraged digital identities of people. As well, she’s also interacting with an increasing number of IoT devices.
It requires an authoritative source for all entities, which I’ve called a new “Entity Management System” or EMS. Skim this article, “Entity Management System".
THE EMS MUST ALSO DEAL WITH RAPIDLY EMERGING SMART, AI AGENT IDENTITIES OF US
Thus, deep within your enterprise authoritative source "bowels", will need the ability to enter smart AI leveraged digital identities against the physical identity of the employee, contractor or customer. Skim this enterprise architecture article addressing this, ?“Part I AI Systems, Bots, AI Agents, IoT Devices, & Identity Architecture”
?Yet, having a new EMS on it's own isn't enough. Why?
Identity Relationships & Graphs
The relationships Jane Doe has with AI systems, bots (both digital and physcial), other humans, their smart AI leveraged digital identities and IoT devices, might last years, months, days, weeks or seconds. Some of them can be very fast changing. Our old database toolkits aren't good at managing all of these complex one to many and many to many identity relationships. Skim “Hives, AI, Bots & Humans - Another Whopper Sized Problem”.
LDAP TOO NEEDS TO BE SUPPLEMENTED OR REPLACED BY GRAPHS
In the 90's when HR departments were getting going creating enterprise identity systems, LDAP was selected because of:
All of this was leveraged to the hilt by IAM vendors and architects to build on top of LDAP their IAM systems. Yet today, it's not going to work well anymore.
Why? The fast changing, multiple, one to many and many to many, identity relationships described above. LDAP is crappy at a performance level in handling this.
Graphs are very good at doing this. Thus, your enterprise needs to rapidly adopt graphs to manage fast changing identity relationships with one to many and many to many authorization relationships.
I strongly suggest readers acquaint themselves with 3Edges, a graph based authorization product, recently acquired by IndyKite. It can easily map and manage many to many relationships with low coding.
Rapid Rate of Change Requires Out of the Box Thinking For Our Out of the Box Times
I have a friend, Pat Scanell, who a few yeara ago created this diagram which I absolutely love. It shows in one pic, the logarithmic rate of tech change and our inability to keep up with it cognitively, socially, business or politically. This is the diagram you folks should be showing your C-Suite with this article.
All around the C-suite is rapid change coming at them from all directions. Yes, it’s darned complicated. It's not a simple tweak and twiddle architectural change your enterprise can make. The old toolkits are no longer up to the tasks of today's new age we're rapidly entering. I suggest your C-suite and board skim ?“Getting Your Company Ready for AI/tech- What Boards Need to Know”.
New Security Model
For the last several years, I realized our old corporate security models weren't going to work well against the incoming tech tsunami wave. You might want to skim “New Physical/Cybersecurity Security Model” to see my vision and thoughts.
All The Above Is Crying Out For A Rethink Of Enterprise Architecture
Skim:
Legal Identity Architectures & Costs Addressing The Above
Enterprise CISO's Take Note
The chances of most local jurisdictions rapidly adopting the legal identity architecture is slim to none. Thus, last fall, I put myself in your shoes, asking myself, "What should i be doing to rapidly leverage the incoming tech tsunami wave, while mitigating risk?"
Skim these two articles to see my answer:
Your Enterprise Is Entering A Major Paradigm Shift
Where your old ways won't work well anymore. Thus, it requires out of the box thinking for our out of the box times. That's what the new architectures provide.
To see my messages to government and industry leaders skim these:
Contact Me
I do short-term consulting to get C-suites into a new transformation roadmap. One of the key parts is creating the beginning guts of a new enterprise architecture which this article highlights.
About Guy Huntington
I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.
I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.
I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.
I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.
Quotes I REALLY LIKE!!!!!!:
Reference Links:
An Identity Day in The Life:
My Message To Government & Industry Leaders:
National Security:
Rethinking Legal Identity, Credentials & Learning:
Learning Vision:
领英推荐
Creativity:
AI Agents:
Architecture:
AI/Human Legal Identity/Learning Cost References
AI Leveraged, Smart Digital Identities of Humans:
CISO's:
Companies, C-Suites and Boards:
Legal Identity & TODA:
Enterprise Articles:
Rethinking Enterprise Architecture In The Age of AI:
LLC's & AI:
Challenges With AI:
New Security Model:
DAO:
Kids:
Sex:
Schools:
Biometrics:
Legal Identity:
Identity, Death, Laws & Processes:
Open Source:
Notaries:
Climate Change, Migration & Legal Identity:
Fraud/Crime:
Behavioral Marketing:
AI Systems and Bots:
Contract Law:
Insurance:
Health:
AI/AR/VR Metaverse Type Environments:
SOLICT:
EMP/HEMP Data Centre Protection:
Climate:
A 100,000-Foot Level Summary Of Legal Human Identity
A 100,000-Foot Level Summary Of The Learning Vision: