As a foundry service provider, we facilitate communities of practice among governance authorities, implementers, operators, and other service providers to produce viable government and enterprise commercial data/privacy, supply-chain, health, vertical market, consortia, organization, and program level ecosystems.
Legacy identity and a lack of trust credential interoperability could be a major inhibitor to adoption just like the lack of a dominant internetworking standards held back the Internet. The next evolution with labels like the "Internet of Trust" and the "Internet of Value" will take the lessons history to counterbalance omissions of the past by injecting a foundational layer of trust as an enabler for human-technology ecosystems.
Emerging technology and standards, including person-centric; identity and trust-based credential standards; and governance are catching on quickly, but a solidifying event is needed to initiate the establishment of a single interoperable stack for digital trust. NIST, IEEE, ISO, DIF, W3C and a robust community of non-profits emphasizing interoperability and portability have clarified government specification and moved emerging technology standard to foreseeable outcomes.
Foundry service providers help consortia solve their most difficult challenges in a complete different way. The recent identity and privacy visionaries, through open systems, open standards and open collaboration have advanced emerging technologies to integrate with people and process in ways never economically feasible before. The next stage are trust ecosystem foundries to actualize and reap the global and economic benefits for all.
Our ecosystem foundry utilizes a core palette of configurable human and trust based architectures and frameworks including SAFe Agile, Trust Over IP (ToIP) and Technology Business Management (TBM) all available to be tailored to specific ecosystem mission and governance parameters.
Our approach to problem solving puts the human perspective first by purposefully emphasizing the human experience at all lifecycle stages and contexts throughout continuous lifecycle of services, integration, and delivery. This key element inherently drives innovation by delegating complex and mundane tasks to machines so that humans achieve the most value from the ecosystem.
We seek to deliver to business enterprise and government agencies value management ecosystems that are continuously monitored and measured for the value and impact created and improved upon. This is possible through easy to use human-centric application interfaces atop attestations of trust, governance, technology, and process and where the human-machine collaboration is optimally configured and balanced for each ecosystem's mission.
Human-centered, trust-based, operationally intelligent software application ecosystems that are secure, flexible and interoperable.
The Ecosystem Value Management (EVM) dashboard provides situational awareness of value creation, continuous monitoring, telemetry, and risk management of all ecosystems elements. These part human, part "software as code" ecosystems may be market, consortia, associations, enterprise, platform, application, program, projects, community, team, or family based. The EVM includes the concept of a ecosystem continuum maturity model to act as a compass and guideposts from informal and lightly structured and short-term sustainability through highly structured and automated continuous sustainable structures.
The Financial Management dashboard provide financial, investor, contract funding sources, grant fundings sources, donation funding sources, and phantom equity volunteer sources the ability to track financial and forecast performance of the ecosystem in terms of operating cashflows, income, incentive rewards, and bounties as compared to the value created.
The Human-Centric Identity, Credential, and Economic Development dashboard provides individuals with the ability to own their own identity and engage in both private and global public-private verifiable credential ecosystems to securely engage with employers, government, communities, and teams with the opportunity to economically develop and commercialize each of our own identity, health data, biometrics, and other self-sovereign information.
The Governance and Oversight dashboard provides a continuous immutable record of governance constitutional artifacts, legislative actions, records retainment, voting, budgetary and treasury as well as an action engagement interface for stakeholders to interact with the governance and oversight function.
The Technology Business Management (TBM) Enterprise and Leadership dashboard provides organizations with the ability to participate in global directories of governance, standards, and supply-chain registries to continuous improve value creation outreach and new business development. Most importantly, this dashboard provides the operations and intelligence performance and situational awareness for all value/revenue and income streams of the ecosystem, coalition and partner value creation opportunity pipelines, human-centric perspectives, and the management of the Continuous Innovation and technology incentive rewards and bounty program.
The Coalition and Partner Relationship dashboard provides organizations with the ability to continuously forecast and align responsibilities and new business activities with ecosystem consortia, partners, universities, non-profits, affiliates, government, as well as their employees and non-employees.
The Continuous Innovation and Technology dashboard provides bounty leaderboard recognition in Communities of Interest (COI) categories including: Ecosystem programs, projects, chapters, and working groups; Distributed Ledger Technology, Trust Over IP, human-centric identity, Cloud Native, multi-cloud container orchestration, commercial cloud, Micro-Services Architecture, Service Mesh, Zero-Trust Architecture, cloud automation, AI and machine learning, disconnected networks; as well as process oriented categories of Continuous Integration Continuous Delivery, Agile, and DevSecOps; and information categories including identity, PII, HIPPA, Government/CAC, health and biometric, and virtual assets and tokens.
Digital Trust Ecosystems Sit On Top of a Human-Technology Trust Over IP Architecture
What's unique about this stack is that it's not just technology—it's also a stack for the rules for how that technology will be used to produce trust. That's called "governance". It recognizes the reality that trust can never be achieved by technology alone, but only by humans and technology working together. So that's why the stack has two halves—the technology stack and the governance stack.
In the ToIP Governance Stack, there are different types of governance frameworks for Layer One (Ledger governance), Layer Two (Provider governance), Layer Three (Credential governance), and Layer Four (Ecosystem governance). Together, these cover the full spectrum of what is needed for both humans and machines to make trust decisions about interacting over the Internet.
The whole stack revolves around what is required to enable digital credentials. It's a very simple concept: they work just like the physical credentials we have in our wallets today. We're just doing them digitally, on devices like our smartphones. What makes any type of credentials work for proving some aspect of your identity is the credential trust triangle. These three roles—issuer, holder, and verifier—are the same for every kind of credential everywhere. You just have to be able to verify that a credential is authentic.
Blockchain is the bottom layer—layer 1 of the ToIP stack. When it comes to digital trust, what we need blockchain for is very simple: it's to verify the authoritative public key for any credential issuer. We do that by standardizing the address for that public key—we call it a DID (Decentralized Identifier), which is now a full W3C Working Group. Each blockchain will have a DID method that defines how to look up that public key and other cryptographic metadata on that blockchain. The Hyperledger Indy project was started to produce an open source blockchain that is optimized for storing DIDs and DID documents.
Layer Two is where Hyperledger Aries comes in. This is the layer for interoperable digital wallets and agents that will actually hold and exchange digital credentials. This layer also uses DIDs, but they are exchanged directly, off-chain, to form pairwise private connections between peers, which is why we call them peer DIDs. This layer also uses a single interoperable protocol called DIDComm that started at Hyperledger Aries and is not a joint project with the Decentralized Identity Foundation. The goal of this layer is for any wallet to accept any digital credential from any issuer and be able to present it to any verifier—just like our real-world wallets.
Layer Three credential governance is where the trust triangle lives. At this layer, each issuer has a public DID at Layer 1. They use that to sign each verifiable credential that the issuer then delivers ver a Layer 2 connection into a holder's digital wallet. Now the holder can present a proof of that credential to any verifier. Since the proof contains the issuer's DID, the verifier can look it up on the blockchain to get the issuer's current public key to verify the proof.
Layer Four is how issuers establish real-world business, legal, and social trust in their credentials—by publishing the rules that must be followed to issue and hold them. These governance frameworks are not technology, they are policy—but they are as essential to establishing and maintaining real-world trust as the rulebooks of the Mastercard or Visa networks.
The Trust over IP stack grew out of Hyperledger Indy and Aries but the ongoing definition of the stack is now moving to a new independent Linux Foundation project called the ToIP Foundation. We plan to announce it this spring. If you have any questions, just contact the Hyperledger Aries Working Group.
The Trust Ecosystem stack can be regarded as a three-stage decision-making tool. The most important aspect of the Trust over IP dual-stack design is that it is “governance first”, i.e., it is a tool enabling any particular trust community (government, industry, consortia, university, company, city, etc.) to:
Contextual decisions are dependent on the circumstances and requirements of a particular trust community:
The Trust Ecosystem framework relies on a continuous evolution with open standards bodies and those aligned to critical infrastructure and national homeland security particularly aligned to mature align with NIST and IEEE standards for governance, cyber security, cryptography as well as CMMI, DMM, and SCMM maturity models, and Technology Business Management (TBM).
An ecosystem onboarding program for to develop and deploy a globally available public-private zero-trust human-centric identity and biometric collection, processing, matching and background check ecosystem.
Contribute Towards a Shared Global Trust Through the Application of Person-Centric Governance, Business, Technology, and Financial User and Identity, Credential and Information Privacy Value Creation Experience.
Students achieve a globally recognized and verifiable biometric credential; receive a person-centric digital identity; and participate in working groups and workshops to develop, create, and earn economic value for a future global public-private ecosystem.
In this ecosystem, certified Cloudocracy fractional officers and fractional employees; partner and connected organizations; partner and connected employees; government agencies; and volunteers have the opportunity to inter-connect to a global public-private distributed network for person-centric biometric information collection, processing and matching. For ODNI agencies: Funded development available for alignment to Commercial Solutions for Classified (CSfC) mobility, data at rest, and data in motion capability service delivery packages.
Vision: In 2023, law-abiding citizens will have the opportunity to securely own their digital identity in a new public-private business model of cooperation. In this vision, law-abiding citizens willingly provide government agencies with a programmable (smart-contract) level of their identity (self-sovereign) as well as biometric (e.g. fingerprint, facial, behavioral, geospatial, virus/vaccination) receiving government micro-incentives for registration and bounty opportunities for identifying "bad actors" on government agency watchlists.
Uses a phone’s native 5MP camera and flash to capture 4 fingerprints at once
Multi-point facial scanning with optional ‘liveness’ verification
Identify possible anomalies through a user’s interactions with their phone
Monitor public-private data privacy based information sharing for person-centric health as well as geospatial virus tracking and vaccination provenance.
As a person, imagine a future DHS Known Traveler and U.S. REAL ID recognized self authorization ecosystem where you can receive value credits for your quality and performance of balanced public-private identity and information privacy with your engagement with government, businesses, non-profits, and colleagues.
As an organization, imagine a future where you have distributed and re-delegated the authority and responsibility of identity and data privacy towards a shared public-privacy ecosystem in a way that there are shared cyber security and economic benefits for all parties, organizational, personal, and government.
The mobile/web application user experience including a public-privacy governance, operations and performance leaderboard of commercial challenges, micro-grants, and bounty opportunities.
Enterprise learning teams earn simulated value credits for their learning and working group contributions towards a commercialization of their integrated efforts, initiatives, and contributions in this learning program.
Enterprise learning teams earn simulated value credits for application of a structured business-technology-financial funding model for value creation in this working group meeting and business collaboration rhythm.
Enterprise learning teams earn simulated value credits for deploying their commercialization plan to commercial cloud, initial Authority to Operate (ATO) and continuous ATO DevSecOps, GovCloud, or other distributed platform or distributed ledger-based ecosystems.
The Touchless Fingerprint Identification Toolkit (TFIT), can be used by any developer without biometric expertise to build and evaluate mobile applications that onboard human-centric mobile identity and touchless fingerprint capabilities that are suited to specific domain mission needs and objectives.
Cloudocracy uses VeridiumID to provide both multi-factor and step-up authentication through a single, easy-to-use platform. Combining who you are (your biometrics), with what you have ( within your phone), you can deploy multiple layers of authentication through a single device.
You can choose where you store biometric data based on your needs, for example biometrics can be stored using a distributed data model that places shards of encrypted biometric data in multiple places. Or you can store it one place.
Copyright © 2020 Cloudocracy, LLC - All Rights Reserved.