image15

Ecosystem Foundry

As a foundry service provider, we facilitate communities of practice among governance authorities, implementers, operators, and other service providers to produce viable government and enterprise commercial data/privacy, supply-chain, health, vertical market, consortia, organization, and program level ecosystems.

background

image16

Learning From the Past

The Introduction of Trust Ecosystem Foundry

Learning From the Past

Legacy identity and a lack of trust credential interoperability could be a major inhibitor to adoption just like the lack of a dominant internetworking standards held back the Internet.  The next evolution with labels like the "Internet of Trust" and the "Internet of Value" will take the lessons history to counterbalance omissions of the past by injecting a foundational layer of trust as an enabler for human-technology ecosystems.

image17

Standards Catching On

The Introduction of Trust Ecosystem Foundry

Learning From the Past

Emerging technology and standards, including person-centric; identity and trust-based credential standards; and governance are catching on quickly, but a solidifying event is needed to initiate the establishment of a single interoperable stack for digital trust.  NIST, IEEE, ISO, DIF, W3C and a robust community of non-profits emphasizing interoperability and portability have clarified government specification and moved emerging technology standard to foreseeable outcomes.

image18

The Introduction of Trust Ecosystem Foundry

The Introduction of Trust Ecosystem Foundry

The Introduction of Trust Ecosystem Foundry

Foundry service providers help consortia solve their most difficult challenges in a complete different way.  The recent identity and privacy visionaries, through open systems, open standards and open collaboration have advanced emerging technologies to integrate with people and process in ways never economically feasible before.   The next stage are trust ecosystem foundries to actualize and reap the global and economic benefits for all.

Key ECOSYSTEM foundry Elements

image19

Human-Technology Trust Ecosystem Solution Architecture

Business and Enterprise Governance Ecosystem Experience

Human-Technology Trust Ecosystem Solution Architecture

Our ecosystem foundry utilizes a core palette of configurable human and trust based architectures and frameworks including SAFe Agile, Trust Over IP (ToIP) and Technology Business Management (TBM) all available to be tailored to specific ecosystem mission and governance parameters.

image20

Human Centered Trust and Privacy Ecosystem Experience

Business and Enterprise Governance Ecosystem Experience

Human-Technology Trust Ecosystem Solution Architecture

Our approach to problem solving puts the human perspective first by purposefully emphasizing the human experience at all lifecycle stages and contexts throughout continuous lifecycle of services, integration, and delivery.   This key element inherently drives innovation by delegating complex and mundane tasks to machines so that humans achieve the most value from the ecosystem.

image21

Business and Enterprise Governance Ecosystem Experience

Business and Enterprise Governance Ecosystem Experience

Business and Enterprise Governance Ecosystem Experience

We seek to deliver to business enterprise and government agencies value management ecosystems that are continuously monitored and measured for the value and impact created and improved upon.  This is possible through easy to use human-centric application interfaces atop attestations of trust, governance, technology, and process and where the human-machine collaboration is optimally configured and  balanced for each ecosystem's mission.

Cloud Ecosystem Environments

image22

Government and Commercial Cloud Ecosystems

Government and Commercial Cloud Ecosystems

Government and Commercial Cloud Ecosystems

image23

Container Orchestration Ecosystems

Government and Commercial Cloud Ecosystems

Government and Commercial Cloud Ecosystems

image24

Cloud Identity Provider Ecosystems

Government and Commercial Cloud Ecosystems

Cloud Identity Provider Ecosystems

image25

Digital Trust Ecosystem Canvas

Human-centered, trust-based, operationally intelligent software application ecosystems that are secure, flexible and interoperable.

digital trust Ecosystem canvas Overview

image26

1. Ecosystem Value Management Dashboard

The Ecosystem Value Management (EVM) dashboard provides situational awareness of value creation, continuous monitoring, telemetry, and risk management of all ecosystems elements.  These part human, part "software as code" ecosystems may be market, consortia, associations, enterprise, platform, application, program, projects, community, team, or family based.  The EVM includes the concept of a ecosystem  continuum maturity model to act as a compass and guideposts from informal and lightly structured and short-term sustainability through highly structured and automated continuous sustainable structures.

2. Financial Management Dashboard

The Financial Management dashboard provide financial, investor, contract funding sources, grant fundings sources, donation funding sources, and phantom equity volunteer sources the ability to track financial and forecast performance of the ecosystem in terms of operating cashflows, income, incentive rewards, and bounties as compared to the value created.  

3. Human-Centric Identity, Credential, and Economic Development Dashboard

The Human-Centric Identity, Credential, and Economic Development dashboard provides individuals with the ability to own their own identity and engage in both private and global public-private verifiable credential ecosystems to securely engage with employers, government, communities, and teams with the opportunity to economically develop and commercialize each of our own identity, health data, biometrics, and other self-sovereign information.  

4. Governance and Oversight Dashboard

The Governance and Oversight dashboard provides a continuous immutable record of governance constitutional artifacts, legislative actions, records retainment, voting, budgetary and treasury as well as an action engagement interface for stakeholders to interact with the governance and oversight function.   

5. Technology Business Management Enterprise Dashboard

The Technology Business Management (TBM) Enterprise and Leadership dashboard provides organizations with the ability to participate in global directories of governance, standards, and supply-chain registries to continuous improve value creation outreach and new business development.  Most importantly, this dashboard provides the operations and intelligence performance and situational awareness for all value/revenue and income streams of the ecosystem, coalition and partner value creation opportunity pipelines, human-centric perspectives, and the management of the Continuous Innovation and technology incentive rewards and bounty program. 

6. Supply-Chain Relationship Management Dashboard

The Coalition and Partner Relationship dashboard provides organizations with the ability to continuously forecast and align responsibilities and new business activities with ecosystem consortia, partners, universities, non-profits, affiliates, government, as well as their employees and non-employees.  

7. Continuous Innovation and Technology Dashboard

The Continuous Innovation and Technology dashboard provides bounty leaderboard recognition in Communities of Interest (COI) categories including:  Ecosystem programs, projects, chapters, and working groups;  Distributed Ledger Technology, Trust Over IP,  human-centric identity, Cloud Native, multi-cloud container orchestration, commercial cloud, Micro-Services Architecture, Service Mesh, Zero-Trust Architecture, cloud automation, AI and machine learning, disconnected networks;  as well as process oriented categories of Continuous Integration Continuous Delivery, Agile, and DevSecOps; and information categories including identity, PII, HIPPA, Government/CAC, health and biometric, and virtual assets and tokens.

image27

Digital Trust Ecosystem Stack

Digital Trust Ecosystems Sit On Top of a Human-Technology Trust Over IP Architecture

image28

Trust Over IP Overview

Overview

What's unique about this stack is that it's not just technology—it's also a stack for the rules for how that technology will be used to produce trust. That's called "governance". It recognizes the reality that trust can never be achieved by technology alone, but only by humans and technology working together. So that's why the stack has two halves—the technology stack and the governance stack.


In the ToIP Governance Stack, there are different types of governance frameworks for Layer One (Ledger governance), Layer Two (Provider governance), Layer Three (Credential governance), and Layer Four (Ecosystem governance). Together, these cover the full spectrum of what is needed for both humans and machines to make trust decisions about interacting over the Internet.


The whole stack revolves around what is required to enable digital credentials. It's a very simple concept: they work just like the physical credentials we have in our wallets today. We're just doing them digitally, on devices like our smartphones.  What makes any type of credentials work for proving some aspect of your identity is the credential trust triangle.  These three roles—issuer, holder, and verifier—are the same for every kind of credential everywhere. You just have to be able to verify that a credential is authentic.


Blockchain is the bottom layer—layer 1 of the ToIP stack. When it comes to digital trust, what we need blockchain for is very simple: it's to verify the authoritative public key for any credential issuer. We do that by standardizing the address for that public key—we call it a DID (Decentralized Identifier), which is now a full W3C Working Group. Each blockchain will have a DID method that defines how to look up that public key and other cryptographic metadata on that blockchain.  The Hyperledger Indy project was started to produce an open source blockchain that is optimized for storing DIDs and DID documents.


Layer Two is where Hyperledger Aries comes in. This is the layer for interoperable digital wallets and agents that will actually hold and exchange digital credentials. This layer also uses DIDs, but they are exchanged directly, off-chain, to form pairwise private connections between peers, which is why we call them peer DIDs. This layer also uses a single interoperable protocol called DIDComm that started at Hyperledger Aries and is not a joint project with the Decentralized Identity Foundation. The goal of this layer is for any wallet to accept any digital credential from any issuer and be able to present it to any verifier—just like our real-world wallets.


Layer Three credential governance  is where the trust triangle lives. At this layer, each issuer has a public DID at Layer 1. They use that to sign each verifiable credential that the issuer then delivers ver a Layer 2 connection into a holder's digital wallet. Now the holder can present a proof of that credential to any verifier. Since the proof contains the issuer's DID, the verifier can look it up on the blockchain to get the issuer's current public key to verify the proof.


Layer Four is how issuers establish real-world business, legal, and social trust in their credentials—by publishing the rules that must be followed to issue and hold them. These governance frameworks are not technology, they are policy—but they are as essential to establishing and maintaining real-world trust as the rulebooks of the Mastercard or Visa networks.



Background

The Trust over IP stack grew out of Hyperledger Indy and Aries but the ongoing definition of the stack is now moving to a new independent Linux Foundation project called the ToIP Foundation. We plan to announce it this spring. If you have any questions, just contact the Hyperledger Aries Working Group.

image29

A Tool for Decision-Making About Digital Trust

Overview

The Trust Ecosystem stack can be regarded as a three-stage decision-making tool. The most important aspect of the Trust over IP dual-stack design is that it is “governance first”, i.e., it is a tool enabling any particular trust community (government, industry, consortia, university, company, city, etc.) to: 


  1. Analyze the community’s needs for trusted interactions. 
  2. Use the standardized models at each of the four levels of the Trust over IP Governance Stack to map those requirements into the necessary governance policies. 
  3. Finally, using the understanding derived from the governance policies of how trust is established in the community at hand, technology decisions can be made. These technology decisions will benefit from the transparency provided by the governance policies of the trust community and should result in greater success as the community moves its digital trust efforts forward. 




Contextual Decision Making

Contextual decisions are dependent on the circumstances and requirements of a particular trust community: 


  • The particular form of governance authority the community uses (e.g., government, consortia, NGO, corporation, informal community) 
  • The particular regulatory environment(s) the community is are operating under 
  • The particular types of trust challenges the community is facing (e.g., fraud, cybercrime, economic friction, digital transformation, user experience, inclusion and accessibility) 
  • The particular capabilities of issuers, holders, and verifiers in that community (e.g., Internet access, available devices, technology literacy, legacy systems) 

image30

relationship to open standards bodies

Overview

The Trust Ecosystem framework relies on a continuous evolution with open standards bodies and those  aligned to critical infrastructure and national homeland security particularly aligned to mature align with NIST and IEEE standards for governance, cyber security, cryptography as well as CMMI, DMM, and SCMM maturity models, and Technology Business Management (TBM).



image31

Featured: Public-Private Identity and Health Ecosystem

An ecosystem onboarding program for to develop and deploy a globally available public-private zero-trust human-centric identity and biometric collection, processing, matching and background check ecosystem.

Purpose

Contribute Towards a Shared Global Trust Through the Application of Person-Centric Governance, Business, Technology, and Financial User and Identity, Credential and Information Privacy Value Creation Experience.

Key Elements

image32

2020: Person and Thing Centric Identity Access Management and Health and Biometric Education and Certification

2022: Global Public-Private Person and Thing Ecosystem for Health, Biometric Collection, Processing, Watchlist, and Matching

2020: Person and Thing Centric Identity Access Management and Health and Biometric Education and Certification

Students achieve a globally recognized and verifiable biometric credential; receive a person-centric digital identity; and participate in working groups and workshops to develop, create, and earn economic value for a future global public-private ecosystem.

image33

2021: Coalition, Person, and Thing Ecosystem Onboarding

2022: Global Public-Private Person and Thing Ecosystem for Health, Biometric Collection, Processing, Watchlist, and Matching

2020: Person and Thing Centric Identity Access Management and Health and Biometric Education and Certification

In this ecosystem, certified Cloudocracy fractional officers and fractional employees; partner and connected organizations; partner and connected employees; government agencies; and volunteers have the opportunity to inter-connect to a global public-private distributed network for person-centric biometric information collection, processing and matching.  For ODNI agencies: Funded development available for  alignment to Commercial Solutions for Classified (CSfC) mobility, data at rest, and data in motion capability service delivery packages.  

image34

2022: Global Public-Private Person and Thing Ecosystem for Health, Biometric Collection, Processing, Watchlist, and Matching

2022: Global Public-Private Person and Thing Ecosystem for Health, Biometric Collection, Processing, Watchlist, and Matching

2022: Global Public-Private Person and Thing Ecosystem for Health, Biometric Collection, Processing, Watchlist, and Matching

Vision:  In 2023, law-abiding citizens will have the opportunity to securely own their digital identity in a new public-private business model of cooperation.  In this vision, law-abiding citizens willingly provide government agencies with a programmable (smart-contract) level of their identity (self-sovereign) as well as biometric (e.g. fingerprint, facial, behavioral, geospatial, virus/vaccination) receiving government micro-incentives for registration and bounty opportunities for identifying "bad actors" on government agency watchlists.

Person-Centric Public-Privacy Biometric Credentials

image35

Fingerprint Identification

Fingerprint Identification

Fingerprint Identification

Uses a phone’s native 5MP camera and flash to capture 4 fingerprints at once

image36

Facial Recognition

Fingerprint Identification

Fingerprint Identification

Multi-point facial scanning with optional ‘liveness’ verification

image37

Behavioral Analytics

Behavioral Analytics

Behavioral Analytics

Identify possible anomalies through a user’s interactions with their phone

image38

Health

Behavioral Analytics

Behavioral Analytics

Monitor public-private data privacy based information sharing for person-centric health as well as geospatial virus tracking and vaccination provenance.

Person Experience

Person-Centric Self-Capture

Person-Centric User Value Experience

Organization-Centric Agent Capture

image39

As a person, imagine a future DHS Known Traveler and U.S. REAL ID recognized self authorization ecosystem where you can receive  value credits for your quality and performance of balanced public-private identity and information privacy with your engagement with government, businesses, non-profits, and colleagues.

Organization-Centric Agent Capture

Person-Centric User Value Experience

Organization-Centric Agent Capture

image40

As an organization, imagine a future where you have distributed and re-delegated the authority and responsibility of identity and data privacy towards a shared public-privacy ecosystem in a way that there are shared cyber security and economic benefits for all parties, organizational, personal, and government.

Person-Centric User Value Experience

Person-Centric User Value Experience

Person-Centric User Value Experience

image41


The mobile/web application user experience including a public-privacy governance, operations and performance leaderboard of commercial challenges, micro-grants, and bounty opportunities.

Digital Trust Ecosystem Foundry Program

image42

Onboard Phase 1: Learn

Phase 3: Commercialization Working Group

Phase 2: Build Working Group

Enterprise learning teams earn simulated value credits for their learning and working group contributions towards a commercialization of their integrated efforts, initiatives, and contributions in this learning program.

image43

Phase 2: Build Working Group

Phase 3: Commercialization Working Group

Phase 2: Build Working Group

Enterprise learning teams earn simulated value credits for application of a structured business-technology-financial funding model for value creation in this working group meeting and business collaboration rhythm.

image44

Phase 3: Commercialization Working Group

Phase 3: Commercialization Working Group

Phase 3: Commercialization Working Group

Enterprise learning teams earn simulated value credits for deploying their commercialization plan to commercial cloud, initial Authority to Operate (ATO) and continuous ATO DevSecOps, GovCloud, or other distributed platform or distributed ledger-based ecosystems.

image45

Digital Trust Ecosystem Identity Toolkit and Support

The Touchless Fingerprint Identification Toolkit (TFIT), can be used by any developer without biometric expertise to build and evaluate mobile applications that onboard human-centric mobile identity and touchless fingerprint capabilities that are suited to specific domain mission needs and objectives. 

image46

Mobile Multi-Factor Authentication

Cloudocracy uses VeridiumID to provide both multi-factor  and step-up authentication through a single, easy-to-use platform.  Combining who you are (your biometrics), with what you have ( within  your phone), you can deploy multiple layers of authentication through a  single device.


You can choose where you store biometric data based on your needs,  for example biometrics can be stored using a distributed data model that  places shards of  encrypted biometric data in multiple places. Or you  can store it one place.

Contact Us

If you are curious, interested in exploring new adventures, participating, or have something on your mind, would love to connect with you.