Voting and Digital Identities
copyright 123RF

Voting and Digital Identities

December 27, 2023 update - I strongly suggest readers skim How Do I Trust Entities??? Different Levels of Identity & Credential Assurance - A Thought Paper ”.



Conducting physical voting in times of a pandemic are challenging. As more of our business activity moves online, it seems that e-voting should also become common. This post will discuss leveraging a new age legal human architecture, leveraging a Legal Self-Sovereign Identity (LSSI), to rethink both traditional and online voting.

What's a LSSI?

It's a rethought driver's license, identity card or national identity card, both physically and digitally, all to new global standards. It's built upon a rethought civil registration vital statistics (CRVS) system, also built to new global standards. It enables more certainty the person either presenting their physical of digital LSSI is who they claim to be.

If you skim this paper, it shows when you're born, your legal identity is recorded, as well as collection of your fingerprints and, at a later date when you can keep your eyes open, your iris scan also obtained. These are written to your legal birth registration. AS IMPORTANTLY, the CRVS also writes all of this to a database you control called a SOLICT (Source of Legal Identity & Credential Truth).

Your SOLICT in turn writes this information to up to four of your different LSSI devices:

  • A physical legal identity card
  • A digital app
  • A physical wristband biometrically tied to you
  • A chip implanted into you

With your LSSI devices, you are now in control of releasing portions of your legal identity. This ranges from:

  • Anonymously being able to prove you're a human and not a bot, you're above or below age of consent, or if you've been Covid vaccinated, etc.
  • Releasing portions of your legal name and address
  • Releasing your biometrics from the LSSI device to be compared to the one's you're presenting. The biometrics on your LSSI device have been digitally signed by the CRVS agency

Note: All consents you give from cradle to grave for releasing portions of your legal identity are stored in your SOLICT, leveraging a protocol called Kantara UMA (User Managed Access).

As importantly, if you live in a jurisdiction like the EU, you can leverage EU GDPR Article 17, "Right to be Forgotten" . You can go back in time, via your SOLICT, and select one of your consents you gave to say Acme Inc., requesting they remove you from their databases.

When you'e of legal age, your face scan would also be obtained by the government, digitally signed, and written to your SOLICT. See page 19 of this doc to see a pic showing Jane leveraging this . Further, the government issues to your SOLICT a digital signature only you can use. you can now digitally sign documents as and when you please.

We're entering an age of smart clothing, glasses, contact lenses, very small cameras, etc.. Thus, as you walk down a street, you'll be besieged with requests to release portions of your legal identity from other people walking towards you wearing the same tech, or from retailers, etc., leveraging the same tech.

To address this, you also have a Personal Identity Access Management (PIAM). This is an AI leveraged software you control. You can preset it before walking out the door. To see an example of this skim this article:

Using Your LSSI Device In Real Life

Driver's License

For example, when Jane Doe applies for her driver's license, with her consent, she'd agree to release her full legal identity from her LSSI device, along with her fingerprints and iris scan. She'd then give her physical biometrics to be compared to the ones on her card. The driver's license system would then check the digital signature from the issuing CRVS agency to see if it's valid. You can see a pic showing this on page 21 of this doc .

The driver's license agency now has a medium to high assurance it's really Jane.

Jane Doe Votes

Physically

Jane presents her physical LSSI card at the voting station with her consent for her legal identity to be verified. The same process described above occurs. Or, if the state card's digital signature issued by the government is checked. Her legal name and legal address are then provided. As well, her face image stored on her card appears on the screen. The voting registrar compares the image to Jane Doe. Since it all checks, Jane's allowed to vote.

When approved, a?voting?certificate is generated and stored on the physical LSSI card of Jane Doe. The certificate is short lived and the certificate is anonymous.

Jane goes to the?voting?boot, votes and taps her LSSI device to a secure NFC reader. The NFC reader finds the?voting?certificate and reads it. Assuming the certificate is still valid, Jane can now enter her vote in the ballot box. After ensuring the vote was correct, securely stored and administered, the?voting?administration then revokes the short term voting certificate.

The voting system writes a certificate to Jane Doe's SOLICT. Thus, if Jane Doe tries to vote again, the certificate exists indicating she's already voted.

Digitally

Jane Doe accesses the voting system's website, giving her consent for her legal digital identity to be confirmed. As above, the government's digital signature is checked, and her legal name and address confirmed. Jane will be required to digitally sign an attestation using her digital signature. She'll present a selfie, against which a liveliness test is done, which is then compared to the image sent by her digital LSSI device. Assuming these match, Jane can now vote.

As above, when approved a?voting?certificate is generated and stored on Jane Doe's SOLICT. The certificate is short lived and the certificate is anonymous.

Jane Doe then electronically votes. After she votes, the administrative voting system then revokes the short term voting certificate. It writes a certificate to Jane Doe's SOLICT. Thus, if Jane Doe tries to digitally vote again, the certificate exists indicating she's already voted.

Summary

As illustrated above, the same legal identity tool Jane Doe uses for other purposes, both physically and digitally. The risk of someone masquerading as another, a dead person, etc. are minimized. It's easy to use, which the person is already familiar with.

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles ?I've written,?or my webpage ?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT


Paul Platen CIPP/E, CIAM, CIST

CISO - PKI - Quantum Computing - IAM - Digital Identity - Machine Identity Management - Authentication - Digital Transformation - Strategy and Roadmap Development

4 年

Great perspective on the use of self sovereign identity. One of the things we have to consider is the form factor. How do we ensure that this reaches all sectors of the population? Also there are countries that refuse to have any sort of National ID which impacts the reach of the technology. Further use cases include healthcare, pharmaceuticals, banking, retail, social development. The possibilities are endless. And if you include the use of biometrics with these smartcards, what a powerful tool it would be.

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了