IAME
Introduction
Current identification systems rely on people having to share their personal information and supporting evidence with counterparties in order to identify themselves and their source of wealth. Those counterparties hold the shared data wholly, and the more data a person shares with those counterparties, the easier it is to identify the person and their source of wealth. If a person is to transact with n counterparties, it results into a topological star network with n nodes, each acting as point of vulnerability to the data sharer. Regardless of security measures, the more data a person surrenders, the more severe the fallout from any potential security breach.
All too often the counterparties/nodes do share the data partially or wholly with third parties, which in turn extends the initial star network, hence increasing the number of points of vulnerability in the former network. Technological innovation in encryption mostly work with regards to securing the transmission of data between two or more nodes in a network, however they do not address the issue of an increase in the number of nodes in a sensible data network. As the number of electronic transactions a person conducts increases in frequency, the number of nodes in their personal data network subsequently increases exponentially, consequently increasing the number of points of vulnerability
Deconstructing the Identification Process
The process assumes that: if the party is genuine then all provided statements can be mapped onto supporting documentation. In principle, the more data that can be mapped on more supporting documents, the more difficult it is for a party to falsify its identity.
The mapping process itself is quite simplistic and can be categorized as follows:
- 1. Statement to string confirmation
2. Statement to non-string confirmation
3. Statement to publicly available information confirmation
4. Statement to privately available information confirmation
5. Statement to government records confirmation.
Comments
Post a Comment