Taking identity management seriously

1 March 2020 Asset Management, EAS, RFID

As humans, we have embraced the digital and electronic developments and changes of the last two decades with almost zero resistance. Trust has shifted away from where it was once necessary to meet people face-to-face to discuss critical issues, to where we use digital platforms on our computers and phones to do so.

Banking transactions, once only conducted within a brick-and-mortar environment, are now done easily from an electronic device linked to the Internet. This explains why the financial inclusion of every person on earth has become a goal for every mobile bank and app developer. Creating fast and quick methods of access to mobile banks has driven start-ups and their developers to work feverishly to bring products to market, thereby gaining clients for their business and making money to satisfy their funders.

Know Your Customer (KYC) has formed part of these fintech developments, providing quick and easy solutions for institutions to use technology to authenticate the identity of their clients during transactions and comply with global regulations guarding against money laundering, terrorism funding and other identity related crimes.

Self-sovereign identities

As a counterpoint, these developments have given rise to a digital movement which recognises that individuals should be able to both own and control their digital identities in the same way – and with the same freedom and capacity for trust – as they do in the real world. This is referred to as a Self-Sovereign Identity (SSI).

Suddenly a multitude of SSI management platforms have emerged which control the creation of digital identities for individuals. These ‘identity authentication solutions’ allow individuals to self-register and to manage their identities as a self-sovereign identity on their platforms, by using the ‘selfie’ option especially. The platforms gather personally identifiable information (PII) from a multitude of ‘trusted sources’ to prove that the identity of the digital identity or SSI, is that of someone. Someone … but who?

The most important and critical part of identity management is the enrolment/registration part of the process. This is where the real-world human being must be linked to the cyber world digital identity with forensic proof.

The problem of digital proof

Throwing technology together with biometrics, liveness detection and every type of algorithm into an ‘identity authentication solution’ is not the answer to proving a human being exists, if you leave the essence of an identity behind. This is because an identity is the proof of the existence of a single human being.

Every person is first a human being before they can become a digital identity.

Every individual human being has only one human identity they can lay claim to. This identity is proof that a person actually does exist in the real world. As progress accelerates towards providing every individual with a digital identity which they manage using their self-sovereign identity, so the necessity of linking each human to a single digital identity and single self-sovereign identity becomes critically important.


Dawid Jacobs.

The threat of fraudulent and especially synthetic identities is real for every institution. If the importance of linking a human being to a single digital entity or single self-sovereign identity is not recognised now, an avalanche of crimes relating to identity theft, fraud and especially synthetic identities, will continue in the future.

The only way to link a human being to an identity, either in the real world or as a digital identity in the cyber world, is by enrolling/registering/capturing the human’s fingerprints with forensic protocol into a referenceable system. An Identity can be proven using various methods, but the decisive proof is to link a human being’s specific body attributes (fingerprints) to an identity as evidence. It is the fact of being who or what a person or thing is.

The term ‘identity’ further refers to properties based on the uniqueness and individuality which make a person distinct from others. Human beings cannot exist without an identity; no two humans – not even identical twins – are genetically identical. A human being is also born with physical identifiable markings, which are only relevant to that one unique human body. (Fingerprints and DNA are currently the only human attributes accepted as forensic evidence in a court of law.)

An individual must be able to attest that the identity they claim in the real world or cyber world belongs to them and if refuted, must be able to reference such claim to a proof of existence. The only way to prove such a claim is to present evidence of an established and non-compromised link between the claimed identity (real world or cyber world) and a corresponding single existing human body (real world).

It is critical to recognise that a claimed identity in the real world can only belong to a single existing human being and that there must always be evidence to attest to such a claim. If there is no clear evidence, the claim cannot be proven.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Scanning for gold
Issue 8 2020, Saflec , Asset Management, EAS, RFID, Products
The metal detection market is such that customers looking for a specific point solution are becoming a rarity and the primary desire is for a solution.

Read more...
Manufacturer adopts touchless biometrics and temperature screening
Issue 1 2021 , Asset Management, EAS, RFID, Industrial (Industry)
Leading implantable plastics manufacturer adopts touchless biometrics and temperature screening via IXM TITAN with Enhancement Kit for workforce management and to safeguard employee health.

Read more...
What happens to your data when you leave the estate?
Residential Security Handbook 2021: Smart Estate Living , Vox , Asset Management, EAS, RFID
COVID-19 infections and the imminent enforcement of the Protection of Personal Information Act (POPIA) on 1 July 2021 have put business and residential estate visitor management under the spotlight from both a health and a data privacy perspective.

Read more...
Ensuring the secure flow of information
Issue 9 2020 , Asset Management, EAS, RFID
The recent leak of two matric exam papers and arrest of a suspect has raised renewed concerns over security and data leaks within a corporate and public organisation environment.

Read more...
Information keeps the trucks rolling
Issue 9 2020 , Asset Management, EAS, RFID
Elite Truck Hire harnesses the power of information to optimise its business and prevent fraud with FleetDomain.

Read more...
Circular economy offers cost savings
Issue 7 2020 , Asset Management, EAS, RFID
Circular economy initiatives help businesses keep technology assets in use for longer, extracting the maximum value from those electronics while in use.

Read more...
IoT is transforming the mobility space
Issue 7 2020 , Asset Management, EAS, RFID
Technology is no longer a grudge purchase, but an indispensable part of modern business, especially in the mobility and transport sector.

Read more...
Adapting the supply chain to the new normal
Issue 8 2020 , Asset Management, EAS, RFID
The supply chain, particularly in the Fast-Moving Consumer Goods (FMCG) industry and especially in South Africa’s main or informal market, needs to make use of mobile technologies.

Read more...
Reduce fleet challenges with video telematics
Issue 7 2020 , Asset Management, EAS, RFID
Using a video telematics system can take your fleet into a new domain of safety, efficiency, productivity and cost cutting.

Read more...
Argility showcases SkyData IoT Platform
Issue 6 2020 , Asset Management, EAS, RFID
SkyData, a device agnostic IoT cloud platform, is transforming asset and resource monitoring and management.

Read more...