Rethinking Enterprise Architecture In The Age of AI - Part I AI Systems, Bots, AI Agents, IoT Devices, & Identity Architecture
Copyright 123Rf

Rethinking Enterprise Architecture In The Age of AI - Part I AI Systems, Bots, AI Agents, IoT Devices, & Identity Architecture

May 18, 2024

The rapid emergence within enterprises of AI, bots, AI agents, IoT, behavioural tech, etc. means all sorts of new innovative ways enterprises can work faster, cheaper and better. The rise of the Evil Inc.s leveraging new tech tools like AI means enterprises are now under increasingly new types of attacks, like this one. Add it all up and enterprise architectures must substantially change. That's what this series of four articles dives into.

This first article addresses the need to create a new enterprise identity architecture with the arrival of AI systems, bots, AI Agents and IoT Devices.

Other Articles In The Series:

Story-line Used In This Series of Articles

Jane Doe is a medical doctor working for Acme Health Inc. Her partner, Sally Smith, works for Acme Manufacturing Inc. Both of them shop at Acme Retail Inc. and do financial transactions with Acme Bank inc.

Jane has a medical AI agent she uses at work, in a "medical hive" with other AI systems, IoT devices, physical/digital bots and other people to simultaneously manage several patients. Sally works in Acme Manufacturing's payables department, where she leverages her AI payables agent to do the work formerly done by several people. Sally's part of a "payables hive" allowing Acme to do things faster, cheaper and better.

Both Jane and Sally have retail AI agents they use to shop for them at Acme Retail Inc. which buys clothes for them. They also have AI financial agents which they use to do financial transactions and manage their investments at Acme Bank Inc.

Their son, John Doe, who's a teenager, leverages his own AI agent, under supervision by Jane and Sally, to do limited purchasing with Acme Retail Inc. and also do transactions with Acme Bank Inc.

John also has a medical/learning condition so he uses IoT devices and an AI health agent to continually monitor his health, with notifications/reports to his parents and Acme Health Inc.. He works with Acme Learning Inc. who leverages AI systems, physical and digital learning bots to work with him.

Acme Health, Retail, Bank and Learning Inc.s have all adopted use of various types of AI agents, physical/digital bots and IoT devices to do things faster, cheaper and better.

The Arrival of New Enterprise Entities

The enterprise is now faced with an onslaught of new types of identities:

  • AI agents for customers, employees, contractors, suppliers and business partners
  • AI agents used within the enterprise to rapidly do tasks
  • AI systems
  • Physical bots
  • Digital bots
  • IoT devices

It all comes down to risk. As risk rises, the enterprise needs to know with increasing certainty who the entity they're interacting with is.

Down In The Identity Weeds Enterprise Identity Verification Means:

  • Identity assurance- is the entity who they claim to be - historically this is typically done leveraging government issued identity papers
  • Credential assurance - is the entity digitally interacting with the enterprise who they claim to be - historically this is typically done leveraging credentials i.e. something they know, something they have or something they are
  • Session assurance - as risk rises during a user session, then so to must stronger levels of identity and/or credential assurance

Challenge #1 - Legal Identity Framework Is Badly Broken

Today, on the planet, there's:

  • No ability in most jurisdictions to tie an identity to their legal identity using biometrics
  • No ability to register AI agents against a person's legal physical identity
  • No ability to register, where risk warrants it, AI systems or bots to give them a legal identity

So, if you skim to "Problem #1 - Determining Friend From Foe" in "CISO's - What's Your Security Strategy For AI, Bots, IoT Devices & AI Leveraged Smart Human Digital Identities?" it states:

"Good news - I've spent 8 years creating a legal identity framework for these entities.

Bad news - It will be years before countries adopt it. In the meantime, you folks are on your own. Thus, in my C-suite consulting decks, I'm giving folks like you a proverbial kick in the ass, telling you, based on risk, you're going to have to create your own internal identity system able to write into an entity's source code, their identity and any applicable credentials."

This is something your IAM vendors and consultants mostly aren't currently addressing.

Challenge #2 - Lack Of An Entity Management System

In the 90's industry created HRMS (Human Resource Management System) and CRM (Customer Relationship Marketing) systems to become the authoritative source within enterprises for employee, contractor and customer identities. My premise? It's not going to work well anymore. Why?

Arrival of all sorts of new types of entities:

  • AI systems
  • Physical and digital bots
  • AI agents
  • IoT devices

So, I strongly suggest you read “Entity Management System”. This is what I see rapidly being required within an enterprise. HOWEVER, THE ASSUMPTION IS THE ENTERPRISE HAS A WAY TO SECURELY WRITE UNIQUE IDENTIFIERS TO THE ENTITY'S UNDERLYING SOURCE CODE.

Yet, it's even more complicated than this...

Challenge #3 - AI Can Legally Own A Company

In fact, in one jurisdiction, it's already happened. Skim Legal Identity Vs. Legal Personhood”. As this moves beyond being a novelty, to becoming common, it means, based on risk, your EMS and legal systems will need, where risk warrants it, to be able to enter in say AI System 12345's legal identity or an identity you get agreement from your LLC partner to write to the source code.

This is why I created the story line of John Doe being learning assisted by Acme Learning Inc. in the story line. It's hypothetically now possible that Acme Learning Inc. could be owned by an AI system, and operate a series of physical and digital learning assistant bots, which they contract out to Jane Doe and Sally Smith to assist John with his learning. This is the stuff which would have been science fiction when I was growing up.

Yet, it's even more complicated than this...

Challenge #4 - The Arrival Of "Hives"

Read “Hives, AI, Bots & Humans - Another Whopper Sized Problem”. It states:

"A hive in real life is what bees collaboratively create to live in. It's composed of many different cells, which the bees use to create honey.

The analogy is each entity is like a bee, busily building it's own "identity cell", which works collaboratively with other entities and their "Identity cells"."

Hopefully now your eyes are opened wide as you consider how hives will relatively soon explode within your enterprise. As per the hives article it's VERY complicated from an architectural perspective i.e.:

  • No legal identity framework for entities
  • No authorization framework for entities to give their consent to join hives
  • No commercial framework for hive contracts to be instantly created

Challenge #5 - Your Existing LDAP Architecture Sucks Re Hives

As Jane Doe and Sally Smith leverage hives in their workplaces to do things faster, cheaper and better. Add to this, in an enterprise hive, in the not-so-distant future, there will likely be hundreds, thousands or more AI agents, with many different types of entity relationships. These relationships will be one to one, one to many, etc. with some of them fast changing.

Down in the heart of enterprise architecture is use of LDAP (Lightweight Directory Access Protocol) directories. In the late 80's early 90's when LDAP was selected the types of relationships was few. Thus, it's tree shaped structure worked well.

Today, it doesn't work well with fast changing one to many, and many to many relationships. I strongly suggest reading “AI Agent Authorization - Identity, Graphs & Architecture”.

Enter TODA and graphs. I strongly advise you to read ?“TODA, EMS, Graphs – New Enterprise Architectural Tools For a New Age”.

Summary - Incoming Identity Tsunami Wave

Most enterprises won't see this coming until the tech tsunami wave depicted by this curve strikes them. This article is written for enterprise architects and senior corporate leaders who want to see what's coming at them in order to get ready. You're entering a major paradigm shift where your old ways won't work well anymore. Thus, it requires out of the box thinking for our out of the box times.

Step number one is getting in place an enterprise entity management identification system which is secure.

The next article in the series dives into hives and fast changing authorization relationships

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT


要查看或添加评论,请登录

Guy Huntington的更多文章

社区洞察

其他会员也浏览了