An Identity Day in the Life of Jane Doe
Copyright 123RF

An Identity Day in the Life of Jane Doe

Updated May 19, 2024

Come with me on a journey, in the not so distant future, when Jane Doe leverages a new legal identity framework, to act both locally and globally, physically and digitally, with her in control of her legal identity, consent, and data.

Note to readers: To see a 100,000 foot level summary of the new framework vision, go to the bottom of this article describing each component.

Jane Wakes Up

Jane puts on her AI/AR glasses, just like the woman uses in this video. The glasses are biometrically tied to Jane i.e., no one else can use them. She automatically authenticates to her news feeds, social media sites, et al.

Jane Wants to Execute a Financial Transaction

Jane's AI leveraged, smart financial AI Agent (BankBot) wants to execute a fiscal transaction. Depending on the amount of the transaction, different levels of both identity and credential assurance might be required i.e., for low risk the bank will likely take her existing biometric authentication from her AI/AR glasses, verify Jane BankBot's identity and allow the transaction to occur.. However, let's take a high risk case, where the bank wants to ensure it's really Jane who's making the transaction.

The bank first asks for Jane's consent to do a biometric legal identification. This is automatically agreed upon by Jane's PIAM (Personal Identity Access Management) system. It's automatic because Jane has pre-configured her AI leveraged, smart financial digital identity and her PIAM to agree to requests involving her bank Acme Bank Inc. The consent is automatically stored in Jane's SOLICT (Source of Legal Identity & Credential Truth) database, which she controls. It contains all consents given by Jane (or by her parents when she was young) from her birth to her death.

Jane presses her fingers against her phone, plus also has her iris scanned. In her automatic consent, she also agrees to release her fingerprints and iris scans. These were digitally signed by the government using an algorithm leveraging a number generator with a 4-6 digit numbers Jane gave the government, which are placed on Jane's LSSI devices (Legal Self-Sovereign Identity). This could be a physical legal identity card, a digital legal app stored on her phone, a biometrically tied wristband containing her legal identity or, a chip implanted into her.

The bank:

  • Takes the data from the LSSI device
  • Asks Jane to input the 4-6 digits secret number
  • Does the algorithm on the biometrics Jane's supplied to the bank using Jane's secret number
  • Compares it to the one on Jane's LSSI devices, checks the government's digital signature, and if it matches, grants the transaction to proceed.

It all happens in a few seconds. The bank now has a high degree of trust it's Jane.

Jane Walks Down the Street

As Jane walks down the street, people coming towards her, retail outlets nearby et al, will all be using miniature cameras built into their clothes, buildings, etc. They'll want to identify Jane. It's what I call a very "non-private world".

So, to give Jane privacy, by law, to identify Jane first requires her permission. Jane has set her AI ShopBot agent and PIAM, which leverages AI, to NOT grant release of her identity to most people and businesses. However, she's preset some exceptions...

Jane Walks By Women's Clothing Stores

She first comes upon Aritzia, a store Jane sometime shops. It's not her favorite, so she only grants release of her gender, clothes size, styles, colors and price points. This consent agreement is automatically stored in Jane's SOLICT.

So, Aritzia can't call up the other times Jane's shopped with them and use the data. Thus, they'll do a best fit against the data Jane's given them. In Jane's glasses will come an ad for Aritzia, displaying Jane in a clothing style, with the colour and price point Jane's interested in. Sadly, Jane isn't interested, so she keeps walking.

Then she comes upon Lululemon, her favorite store. She's granted release of her identity information plus her past shopping experiences to Lululemon. The consent agreement is automatically stored in Jane's SOLICT.

Lululemon calls up all the other times Jane's walked by the store, been in the store, her behavior, what made her buy, etc. The use this to present a highly customized ad for Jane in her glasses. She's interested, so she goes into the store.

Alternatively, Jane's smart, AI agent ShopBot, might actually purchase clothes from Lululemon, on Jane's behalf, without her even walking into the store. As tech advances, the AI leveraged, smart digital identity might "virtually model" the clothes, determine fabric, costs, make the decision and order the clothes to be shipped to Jane's home address.

Jane Needs To Prove She's Been Covid Vaccinated

When Jane needs to prove this, with her consent, she agrees to release her legal, anonymous vaccine attestation, digitally signed by the government, plus a digital face image also digitally signed by the government, from her LSSI devices, to the person, enterprise or whomever. Her consent is automatically stored in her SOLICT.

It happens in the blink of any eye. The other party can instantly check the Covid vaccination plus digital signature, compare it to Jane's face, and she's granted entry. She hasn't been required to release her legal identity information.

Jane Leverages Her AI Medical Agent "MedBot" Identity Which Is Part of a Hive At Work

Jane has a specialized AI agent medial digital identity in her work as a doctor (MedBot). Because of the high risk, it's registered against her underlying legal physical identity. It allows her to simultaneously manage several patients while she works with another patient.

MedBot is legally part of a "medical hive" composed of:

  • 1 or more AI medical diagnosis systems
  • 1 or more physical bots she uses to assist her in medical diagnosis
  • 1 or more digital bots doing monitoring/assessment data processing
  • 1 or more IoT devices Jane's leverages with her patients to monitor their physical and mental health
  • Other medical people's smart, AI agent medical digital identities

Jane wants to add a new digital bot to her medical hive network. She gives her consent, via her PIAM and her MedBot to instantly:

  • Create a AI smart contract, which she digitally signs, with the digital bot's owner
  • Verify the digital bot's legal identity against the CRVS
  • Verify its credentials against the medical authority granting the credentials
  • Registers the new digital identity against the CRVS in Jane's hive network
  • Assigns delegated authorization rights from Jane on what the digital bot can and can't do with her patients' data

While all this sounds complex, it only takes Jane a few seconds to execute it all and continue on with her day.

Note: Skim “AI Leveraged Smart Digital Identities of Us” to see how this will transform workplaces overtime. Also skim “Entity Management System" to see how all this works at the enterprise level. Finally skim “Hives, AI, Bots & Humans - Another Whopper Sized Problem” to do a deeper dive into this.

Jane Attends a Work Meeting Using AI/AR/VR

Jane's avatar she uses in the meeting is a legal digital entity of her i.e., participants can easily check to see if Jane's avatar is her. They do so by instantly querying a specific port accessing the avatar code, where Jane's legal digital identity for her work avatar is stored, also checking out the government's digital signature. Note, in the not so distant future, Jane's work avatar might be digitally signed by the company or enterprise she works for.

With Jane's consent, when she was hired, the enterprise and her agreed on which of her legal identity data would be used, which enterprise identity information would be used (e.g., her job title, digital signing authority, etc.), and which of her behavioral and biometric data would also be used, stored, archived and deleted.

Thus, depending on the meeting participants, they'll be able to interact with Jane differently. For example, her work colleagues will be able to see more about Jane, predict her behavior et al, than will say a new potential supplier she's meeting to negotiate a business deal with. All of these consents are stored in Jane's SOLICT, as well, where appropriate, in enterprise consent/identity data storage systems.

Jane Defends Herself Against a Malicious Deep Fake Video

Jane digitally signs images/vidoes of her, using her PIAM/LSSI, proving they're her. New laws and regulations require a person's digital consent before using these. So, if Sally Smith, Jane's friend or Acme Inc. wants to use a image or video of Jane, it requires her consent to do so.

Jane's AI leveraged PIAM is constantly searching the internet for images/videos of her. It finds a malicious video an ex-boyfriend of her's created using AI. Jane's PIAM immediately notifies her.

She has pre-configured her PIAM to immediately notify other entities she hasn't given her consent for this. Her ex-boyfriend is immediately notified, telling him she'll take legal action if he doesn't immediately take it down.

If he doesn't, then Jane immediately files a complaint to the police against the ex-boyfriend. The police and court systems have been changed. Now an AI system is able to instantly prove or disprove Jane's claim. The AI system speeds up the progress of action by the police and courts.

Note: To see what's coming re attack vectors on Jane skim “Deep Fakes, Privacy, Protection & Misinformation”.

Jane Takes A Course

With her consent, Jane leverages her DLT (Digital Learning Twin) plus her LDV (Learner Data Vault) to the post-secondary institution or, a private company, offering the course/training. The consent is stored in Jane's SOLICT.

The post-secondary/private company learning provider, takes the DLT and creates a highly customized IEP (Individualized Education Plan) for Jane. It cuts down time and costs to train or help Jane learn.

Jane might take the course physically or, she might decide to do it via an AI/AR/VR learning environment. The course teacher, Sally Goodteacher is located somewhere on the planet. She's assisted in the learning/training environment by PattyBot and BotBot, two virtual teaching assistant bots. All the teachers identities and credentials, both human and digital, are checked by the training provider company/post-secondary learning institution, via their LSSI devices.

Jane's consent she gave the course provider/post secondary institution stated clearly what of her legal identity, her biometric/behavioral data and learning data could be used. The consent agreement is stored in Jane's SOLICT. Any learning data is automatically stored in Jane's LDV.

When Jane completes the course, the course provider/post-secondary institution issues a new learning credential to Jane's SOLICT digitally signing it. Jane's SOLICT in turn pushes it out to her LSSI devices. Jane is now in control of her learning credentials.

Due to the emergence of AI leveraged smart digital learning identities, the assessments change in the course Jane took. Skim “AI, Cheating & Future of Schools/Work”.

To see the learning vision skim these two articles:

Jane Controls Her Son John Doe's Legal Identity & Learning Information

At John's school, they want to leverage emerging AI/VR environments by having John and his class participate in a global classroom for one course. An electronic consent request by the school is sent, via John's PIAM to Jane's PIAM (a legal trust relationship is built from John's birth between Jane and John, via the birth registry system, Jane and John's SOLICTs, their LSSI devices and PIAMs).

Jane's PIAM instantly approves the request, stating which of John's legal identity and learning data can be used, how it will be used, what will be stored, etc. The consent is stored in John's SOLICT (and possibly in Jane's as well).

Jane Wants To Delegate Some Authorization Rights To John As He Becomes a Teenager

John has his own BankBot. Jane's contractual agreement with Acme Bank Inc. grants her some delegable authorization rights. Now John's become a teenager, Jane wants him to be able to make limited financial decisions on his own. So, her PIAM and BankBot, grant John a limited amount of financial decision making.

When John's BankBot does financial tasks, the bank checks the BankBot identity, John's identity and his legal identity relationship with his mom Jane Doe. Then it instantly determines if the financial tasks John's Bank Bot wants to do are within authorization limits granted to Jane. Next, the bank uses metadata to see if the transaction fits in with John and Jane's usage habits. Assuming it passes, John is able to do the financial transaction, investment, etc.

Jane Goes to a Bar

To enter the bar, Jane gives her consent for her age of consent, plus her digitally signed face image by the government, to be released from her LSSI devices. The bar then takes the age of consent, checks the digital signature from the government, and then compares the face image to Jane's. Assuming they match, Jane's given access. It all happens in the blink of an eye. Jane's consent agreement with the bar is automatically stored in her SOLICT. Note that Jane hasn't been required to reveal anything else about herself to enter the bar.

Jane Enters a AI/AR/VR Sex Environment

Jane gives her consent to the sex environment operator to prove she's over age of consent, releasing the information from her LSSI device. The consent agreement is automatically stored in Jane's SOLICT. She then authenticates to the sex tech, and has sex. Her partners might be physical humans, virtual humans or virtual AI system/bots. In the not so distant future, they might also be physical bots.

During the session, if the risk rises for Jane e.g., BDSM et al, further consent must be obtained from Jane. Also note that any behavioral/biometric/neurological data will be stored according to the consent agreement Jane agreed to.

I can see, in the not so distant future, Jane leveraging yet another AI leveraged, smart digital sex identity, SexBot. This is finely tuned to Jane's "sexual appetites", deliverying to her very strong, emotional, sexual experiences.

Jane's Legal Identity is Compromised

If Jane's legal identity is compromised, if criminals obtain her biometrics and start using them, or if a national or local identity database is compromised (e.g. Argentina or Newfoundland), unlike the past, it's no big deal to Jane. She simply goes to the local government authority, verifies her identity which is compared not only to the biometrics on her LSSI devices, but also to the ones stored in the government CRVS (Civil Registration Vital Statistics) system. The government then terminates her current biometrics, asks Jane to give a new secret number, recalculates the algorithm for the biometrics, and writes this to Jane's SOLICT, The SOLICT in turn pushes it out to her LSSI devices.

Jane can now go on living her life, without worrying criminals will be able to successfully masquerade as her. Her biometrics have been revoked and re-issued.

SUMMARY - Consent, Identity & Data are Controlled By Jane

This model is VERY DIFFERENT than the one used today. It put's Jane front and centre deciding who to release portions of her legal identity to. The requirement for enterprises to store it and her biometrics diminishes.

It also contains in one place, a record of every consent Jane granted from cradle to grave. Thus, if Jane's lucky enough to live in a jurisdiction like the EU, with GDPR article 17 "right to be forgotten", she can use the records, go back and ask an enterprise to remove her from their databases.

It legally, anonymously allows Jane to prove she's of age of consent, and been Covid vaccinated.

It works physically and digitally, anywhere on the planet, including the rapidly emerging metaverse environments we're creating.

The advent of smart, AI leveraged, digital identities will transform our lives.

IT'S TIME HAS COME.

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT


?



Debbie Reynolds

The Data Diva | Data Privacy & Emerging Technologies Advisor | Technologist | Keynote Speaker | Helping Companies Make Data Privacy and Business Advantage | Advisor | Futurist | #1 Data Privacy Podcast Host | Polymath

2 年

Guy Huntington excellent

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了