Taking identity management seriously

1 March 2020 Asset Management

As humans, we have embraced the digital and electronic developments and changes of the last two decades with almost zero resistance. Trust has shifted away from where it was once necessary to meet people face-to-face to discuss critical issues, to where we use digital platforms on our computers and phones to do so.

Banking transactions, once only conducted within a brick-and-mortar environment, are now done easily from an electronic device linked to the Internet. This explains why the financial inclusion of every person on earth has become a goal for every mobile bank and app developer. Creating fast and quick methods of access to mobile banks has driven start-ups and their developers to work feverishly to bring products to market, thereby gaining clients for their business and making money to satisfy their funders.

Know Your Customer (KYC) has formed part of these fintech developments, providing quick and easy solutions for institutions to use technology to authenticate the identity of their clients during transactions and comply with global regulations guarding against money laundering, terrorism funding and other identity related crimes.

Self-sovereign identities

As a counterpoint, these developments have given rise to a digital movement which recognises that individuals should be able to both own and control their digital identities in the same way – and with the same freedom and capacity for trust – as they do in the real world. This is referred to as a Self-Sovereign Identity (SSI).

Suddenly a multitude of SSI management platforms have emerged which control the creation of digital identities for individuals. These ‘identity authentication solutions’ allow individuals to self-register and to manage their identities as a self-sovereign identity on their platforms, by using the ‘selfie’ option especially. The platforms gather personally identifiable information (PII) from a multitude of ‘trusted sources’ to prove that the identity of the digital identity or SSI, is that of someone. Someone … but who?

The most important and critical part of identity management is the enrolment/registration part of the process. This is where the real-world human being must be linked to the cyber world digital identity with forensic proof.

The problem of digital proof

Throwing technology together with biometrics, liveness detection and every type of algorithm into an ‘identity authentication solution’ is not the answer to proving a human being exists, if you leave the essence of an identity behind. This is because an identity is the proof of the existence of a single human being.

Every person is first a human being before they can become a digital identity.

Every individual human being has only one human identity they can lay claim to. This identity is proof that a person actually does exist in the real world. As progress accelerates towards providing every individual with a digital identity which they manage using their self-sovereign identity, so the necessity of linking each human to a single digital identity and single self-sovereign identity becomes critically important.


Dawid Jacobs.

The threat of fraudulent and especially synthetic identities is real for every institution. If the importance of linking a human being to a single digital entity or single self-sovereign identity is not recognised now, an avalanche of crimes relating to identity theft, fraud and especially synthetic identities, will continue in the future.

The only way to link a human being to an identity, either in the real world or as a digital identity in the cyber world, is by enrolling/registering/capturing the human’s fingerprints with forensic protocol into a referenceable system. An Identity can be proven using various methods, but the decisive proof is to link a human being’s specific body attributes (fingerprints) to an identity as evidence. It is the fact of being who or what a person or thing is.

The term ‘identity’ further refers to properties based on the uniqueness and individuality which make a person distinct from others. Human beings cannot exist without an identity; no two humans – not even identical twins – are genetically identical. A human being is also born with physical identifiable markings, which are only relevant to that one unique human body. (Fingerprints and DNA are currently the only human attributes accepted as forensic evidence in a court of law.)

An individual must be able to attest that the identity they claim in the real world or cyber world belongs to them and if refuted, must be able to reference such claim to a proof of existence. The only way to prove such a claim is to present evidence of an established and non-compromised link between the claimed identity (real world or cyber world) and a corresponding single existing human body (real world).

It is critical to recognise that a claimed identity in the real world can only belong to a single existing human being and that there must always be evidence to attest to such a claim. If there is no clear evidence, the claim cannot be proven.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Verification is reshaping South Africa’s labour market
Security Services & Risk Management Asset Management Commercial (Industry)
Hiring faster, trusting less: in a labour market defined by both constraint and potential, the ability to hire with confidence may well become one of the most important competitive advantages.

Read more...
Driving down fleet management costs
Asset Management Transport (Industry) Logistics (Industry)
As we move into the latter part of the first quarter of 2026, businesses operating fleets can expect expenses to increase from the procurement stage through to termination, due to various local and international factors.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Visual Intelligence for driver and vehicle safety
News & Events Asset Management Transport (Industry)
Webfleet, Bridgestone’s fleet management solution, and Peregrine.ai, a Berlin-based startup transforming mobility through AI-powered vision systems, announced the launch of a next-generation driver assistance solution.

Read more...
Global hub for predictive road safety intelligence
News & Events Asset Management Transport (Industry)
One year since its formation, Netstar’s advanced Global Fleet Bureau is more than an operational facility for international fleet management, it has become a big-data nerve centre delivering unprecedented value to clients.

Read more...
Cyber attack surface expanding
Asset Management Information Security Logistics (Industry)
Despite the increasing number of attacks, analysis of Allianz Commercial cyber claims shows that severity is down by 50% and large-claim frequency by 30% in H1 2025, driven by larger companies’ enhanced detection and response capabilities.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...
Workflow and asset management solutions
Asset Management News & Events
Zamatrack’s innovative workflow and asset management solutions feature the Worxit platform. This all-in-one solution allows businesses to streamline operations with real-time tracking, GPS data, and custom reports.

Read more...
Know where your asset is - not was
IoT & Automation Asset Management
To properly prevent loss of movable assets, companies need an early warning system, traceability throughout the chain of custody, and intelligence on parameters such as temperature, humidity, and impact.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.