SlideShare a Scribd company logo
1 of 47
National ICT & Identity
Strategy
Managing
Illegal Citizens
& Identity
Fraud
Huntington Ventures Ltd.
The Business of Identity Management
Guy Huntington
Guy Huntington is a very
experienced identity
architect, program and
project manager who has led,
as well as rescued, many
large Fortune 500 identity
projects including Boeing and
Capital One. He recently
completed being the identity
architect for the Government
of Alberta’s Digital Citizen
Identity and Authentication
program.
Existing Identity Challenges
• Most African governments struggle with people
– Illegally immigrating in and then masquerading as a
citizen
– Voting irregularities
– Pretending to be students when they’re not
– Using dead citizen’s identities to then use them to
access social programs
• Governments find the identity is effectively
siloed in many different ministry databases and
have problems with fake identity cards being
used
So They Address It
• By working on creating new identity cards that are
tougher to forge
• Use biometrics to create voting databases
• They then try to sync the national identity card with
various underlying ministries databases
• They also have e-governance programs in place that
begin to seek to leverage the national identity
• While all of this is understandable, they are making
a mistake. Why?
• Their identity processes are beginning when the
identity is an adult
It’s The Digital Age
• Governments and citizens are increasingly using
electronic means to offer and consume government
services (e.g. health, education, social services, etc.)
• Many of these services require digital records to be
created for each citizen regardless of their age
• For example:
– An infant who is receiving a vaccination requires a
national health care record
– A child who’s entering school requires a student identity
– As a child ages, they may begin to consume government
digital services
– When a child is involved with social services the parent’s
or guardians legal relationship needs to be determined
Technology Citizens Have
• Most citizens in Africa DON’T have internet
access
• What they do have is:
– Cell phone
– e-wallets
• Some have debit and credit cards
Solution: Leverage Identity & Cell
• Create a national identity strategy leveraging citizens use
of cell phones using their voice to authenticate
• The architecture behind this has been used by large global
enterprises and a few countries like Estonia since the late
1990’s….so it’s nothing new
• It also leverages interactive voice response, which has
been used in industry for the last 20 years as well
• It provides a seamless user experience when the citizen
acquires a smart phone, tablet or laptop
• It leverages the same infrastructure that ALL government
ministries will use
• Additionally, the same infrastructure can be used by crown
corporations, municipalities and third parties like banks,
telcos and insurance companies
Let Me Take You On A Journey…
• It begins when a citizen is born
• When you are born, in addition to the traditional
information being captured, the health worker will also
take a biometric from you, e.g. a finger scan and/or a
retina scan
• As well, the health worker will also obtain your parents
national identities from their national ID card
• There is one important addition to the national ID….it now
captures your cell number in the national ID directory
• So, in the national directory, your electronic identity
begins at birth. There is also a relationship between you
and your parents or legal guardians
• Let’s look “behind the scenes” at how this will work by
first understanding a bit about the architecture...
Nearly 20 Years Ago…
• Many Fortune 500 companies and only a few governments realized that
single identity was a critical cornerstone piece of their digital strategies
• Without this, no SOA and portal strategy would work, since having
multiple identities for the same person would not allow for seamless
digital and in-person services
• Further, they also realized that having a common access service is
dependent upon having a unified identity
• In my own case, at Boeing, in the early 2000’s, we implemented a
unified identity and access management infrastructure and then
integrated into this several large portals with more than one million
users as well as 1,500 applications. In parallel, they then developed a
SOA architecture based on the identity infrastructure
• An old Burton Group target architecture, from this time, illustrates this
showing identity, provisioning and access management all running as
SOA web services (they were the original consulting group who
pioneered SOA identity services)
• An old Burton group target architecture from
nearly 20 years ago illustrates this showing
identity, provisioning and access management
all running as web services
Estonia…
• In Estonia, in the late 1990’s they too realized
that identity is the key component
• They realized that a common identity for each
citizen was required
• They also realized that citizen event life triggers
were also important to streamline government
services
• Finally, they too also adopted a SOA web services
architecture
Single Citizen Identity
• One identity per citizen
• Any changes to the identity are then shared with
other apps/services consuming them
– One place for a citizen to change things like addresses
and phone numbers
– Citizens don’t have to fill in the same information
over and over in forms for different apps/services
• Same identity used for access management
Single
Citizen
Identity
Citizen
Accesses via their phone or the internet
Government Portal
Ministry
Apps/Services
Ministry
Apps/Services
Ministry
Apps/Services
Municipalities
Apps/Services
3rd Party
Apps/Services
Crown Corp.
Apps/Services
Citizen Identity Access Management System
Identity - Foundation of e-Governance
National Citizen Identity Lifecycle
Citizen
Tombstone
Identity
Directory
Identity
Management
System
Leverage Open Source Software
• The strategy leverages open source software identity
and access management from a company called
“ForgeRock”
• Governments using this around the world include
Canada, Norway, New Zealand, Australia and the
Province of Alberta
• Large companies like Toyota also use it
• So this is proven and you won’t be the first to use it
• Let me show you what really happens “underneath
the hood”…
Automatically Create A
Healthcare Account For The Infant
• The identity management server (depicted by
the black box earlier in this presentation) can be
used to send your new birth entry, along with
your parents/legal guardian information to a
open source health care software (which also
exists today)
• Included in this is your parents/legal guardians
cell phone information
• Here’s how this happens “underneath the
hood”…
Changes To The Citizen’s Identity
• The value of using this architecture is that all
government ministries, crown corporations,
municipalities and 3rd parties consume the same
identity
• So now let’s see how an identity change then
flows from the identity management server
(OpenIDM) to these entities…one of which is to
the Open Source Health Care application to
create a new identity for you....
When You’re Vaccinated
Your Biometrics Are Updated…
• Since your finger biometric changes, the
vaccination point in your lifecycle is an excellent
opportunity for the local health care worker to
update it
What Happens When
There’s No Connectivity?
• In certain parts of your country there may be no or poor
connectivity
• You, the infant, will also have a national identity card
– Malaysia creates youth identity cards MyKid
• http://www.malaysiacentral.com/information-directory/mykid-
identity-card-of-malaysia-for-children-below-12-years-
old/#sthash.ZXp3bJOb.dpbs
• On the card will securely be stored some of your medical
information
• If your parents are in a remote area, the health care
worker will scan the card using a portable unit, treat or
vaccinate you and then update the card
• When the healthcare worker reaches connectivity, they
will upload the information to the healthcare system
When You Need A Vaccination…
• The open source eHealth software has your
parents/legal guardian’s cell numbers from the
national identity and authentication
infrastructure
• So…it will be able to send them a SMS message
telling them you need a vaccination
• This leverages what the citizens have in their
pockets
It’s Your First Day At School…
• Each school will be connected to the internet
• Remote schools will also be given smartphones
• When you show up, your parents/legal guardians
will provide one or two biometrics
• This will be checked against the national
directory and you, the infant will be found to be
their offspring or under their guardianship
• More biometrics will now be taken from you
including your finger scans, face, retina and voice
Each Subsequent School Year…
• The student will have their face, voice and finger
scans all updated because they change with
aging
A Student Record Will Be
Automatically Created For You…
• The identity management server will send your
citizen identity information along with your
parents to an open source education
management software (which also exists today)
• This will be used your entire life as you move
between schools, regions, and take courses
throughout your life
• There’s also something else that can be done…
Students Can Logon To
School Networks Using Their Voice…
• Schools will leverage the national identity and
authentication service using their voice to
authenticate
• The voice is authenticated by the national
authentication service and then a persistent
anonymous identifier (“PAI”) will be sent to the
open source education management system
• This will then take the PAI and map it to the
student’s identity granting the student access to
apps and services they are entitled to
Single
Citizen
Identity
Citizen
Accesses via their phone or the internet
Government Portal
Ministry
Apps/Services
Ministry
Apps/Services
Ministry
Apps/Services
Municipalities
Apps/Services
3rd Party
Apps/Services
Crown Corp.
Apps/Services
Citizen Identity Access Management System
All Apps/Services Leverage the Same
Access Management System
Leverage The Phone…
• At a recent conference, I was with a lady from
the Estonian government who has worked on
their identity system since 2000
• As we were sitting together in Kigali, she was
looking at her children’s homework assignments
and if they were in classes using her smartphone
• In Estonia, this is called “iSchool”
• I want to modify this to leverage SMS for people
who only have a cell phone
You’re Grown Up…
• Now you need to get things like a driver’s license
and passport
• So you go to their office
• You provide some biometrics
• These are verified against the national identity and
access management system
• Your tombstone level information is then
automatically sent from the identity management
server to the driver’s license or passport system
• You don’t have to fill in any forms with your
tombstone level identity information
What About The National ID Card?
• You will already had a National ID card for kids (like the
previously referred to MyKid in Malaysia)
• When you reach the age of 16, the identity management
server will send you a SMS message telling you to replace
your youth national ID card with an adult one
• You go to a government office and provide some
biometrics
• These are then verified against the national identity and
access management system
• The counter person sees you are you and then prints an
adult card for you
• You medical information is transferred from the youth card
to the adult one
And Then There Are Payments…
• You now have to pay for things like
car/motorcycle registration, license renewals,
taxes, paying fines, paying for water and power
bills, etc.
• If citizens could use their cell using things like e-
wallets to pay for these and not have to go into a
government office…THEY WOULD LIKELY BE VERY
INTERESTED
• It would save them having to go into a
government office and stand in line
Let’s Say You Got A Speeding Ticket…
• You would see that you can pay via your cell or
online
• If you do this, the cost is lower than if you pay
last minute as is traditionally the case
• Additionally, if you pay even earlier, there will be
a further discount!
• So you call up a toll free number to access the
government payment portal (or enter a URL on
your smartphone, tablet or computer)
Here’s What Happens…
• You authenticate using your voice
• The identity and access management infrastructure
authenticates you
• In the blink of an eye, the payment portal then
queries all the ministry services dealing with citizen
payments and finds you have a speeding ticket
(using a Enterprise Service Bus or “ESB”)
• ESB’s have been around for the last 15 or so years
• The IVR then tells you the amount owing and asks
how you want to pay
• You select e-wallet and make the payment
Paying Bills Using Their Cell or Internet
Banks
Telcos
It Will Make The Government Money
• At a recent government project I was the identity
architect for, they centralized all payments into
one back-end government bank account each
night
• The nightly interest payments on money received
increased due to one large amount
• By discounting early payments made via cell or
online, the government’s daily cash flow will
increase
Government Citizen Identities
Can Also Generate Revenue…
• Third parties, like banks, telcos and insurance
companies have to validate the identity when
they are creating new accounts to reduce their
risk of working with fraudulent customers
• As a result, they would pay the government to
not only validate the citizen’s identity but, in this
strategy, also receive their tombstone level
identity, with the citizens consent
• In Australia, a national citizen identity validation
service for documents already exists
– http://www.dvs.gov.au/Pages/default.aspx
This Requires Federation Agreements
• To make all this “magic” work requires the
government identity service to sign identity
federation agreements with the third parties and
memorandums of understanding with crown
corporations and municipalities
• At Boeing, about 15 years ago, the identity team
lead one of the world’s first large identity
federation projects
• Today, identity federation is commonly used in
many different industry sectors
It Also Requires Citizen Consent Using
User Managed Access Protocol (UMA)
• Standards based privacy
and consent
protocolhttps://kantaraini
tiative.org/confluence/dis
play/uma/Home
• Gives people the right to
control access to their
data across providers
• Interoperable OAuth2-
based protocol
• Shipping as an integrated
feature of ForgeRock
Change Ways of Business
• In Estonia today, they use digital signatures from their phones
for any legal contract. How do they do this? Let’s continue on
with our story. Now you’ re buying something requiring a
contract signature…
• First, you go to you local telco provider and produce your
national id card
• They then take some biometrics from you which are validated
against the national identity and authentication infrastructure
• The telco person removes your sim card and replaces it with
one containing a government issued digital certificate
• You say thank you, walk out and then log on to government
website where you create a 4 digit pin
• Now, when you want to sign a contract, you enter the 4 digit
pin and your digital signature is made!
• https://e-estonia.com/component/digital-signature/
Leverage The Same Infrastructure
For e-Voting
• The same underlying infrastructure can be used
for e-voting
• Citizens can authenticate using their biometrics
and then cast their vote
Businesses Are Legal Identities Too…
• In Estonia, they have a program called “e-residents”
• Their goal is to expand their population from 1.3 to 10
million virtual citizens. Why?
• They see themselves as the electronic gateway to the EU
• They are currently changing their laws allowing for
foreigners to create bank accounts quickly online and to
grant them limited identity rights to consume and
leverage services
• So the program is relatively new and currently has 10,000
e-residents
http://www.estoniancompanyregistration.com/estonian-
e-residency?gclid=CPHA4uWIgc0CFeop0wodh5kHig
What Happens When A Citizen Dies?
• The citizen is confirmed to be who others claim them to
be via biometrics
– E.g. fingerprints
• The business process then leads to an entry into the
death registry
• The registry automatically notifies the national identity
directory
• The national identity directory then automatically
notifies all the government ministries/services
• This mitigates the risk of people using dead people’s
identities to masquerade as others
Benefits…
• Citizens can be easily confirmed via biometrics
• Fraudulent masquerading as a citizen can be
significantly reduced
• Automatic notification of marriage, children, legal
guardians and death to various ministries will
effectively stop misuse of government services
• Same infrastructure can be leveraged for e-voting
ICT Requires National e-Identity Strategy
• Governments wanting to raise their GDP per
capita and offer e-government services need to
first implement a national electronic identity
strategy from the moment a citizen is born until
they die
• Without this, governments flounder around
creating silo’s for their citizen identities
• By implementing a national citizen identity
strategy, governments are laying the foundations
for a successful new economy
If You Thought This Is Thought Provoking
• Then please pass along a link to the presentation
to people in your country who might be
interested
• You can contact me at:
– guy@hvl.net
– 1-604-861-6804
– Via linkedin (https://ca.linkedin.com/in/ghuntington)
• Thanks for your time!

More Related Content

What's hot

National Citizen Target SOA Architecture Sept 2016
National Citizen Target SOA Architecture Sept 2016National Citizen Target SOA Architecture Sept 2016
National Citizen Target SOA Architecture Sept 2016Guy Huntington
 
Evolving E-governance Trends in Digital Identity, Services and Payments
Evolving E-governance Trends in Digital Identity, Services and PaymentsEvolving E-governance Trends in Digital Identity, Services and Payments
Evolving E-governance Trends in Digital Identity, Services and PaymentsAbhishek Syal
 
Electronic reform in albania - Vision Consulting Albania Law Firm
Electronic reform in albania - Vision Consulting Albania Law FirmElectronic reform in albania - Vision Consulting Albania Law Firm
Electronic reform in albania - Vision Consulting Albania Law FirmMelisaPanariti
 
How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?Roohul Amin
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 Timothy Holborn
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
Cary LaCheen - Navigating Disability Law
Cary LaCheen - Navigating Disability LawCary LaCheen - Navigating Disability Law
Cary LaCheen - Navigating Disability LawPlain Talk 2015
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...Timothy Holborn
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts Timothy Holborn
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protectionijtsrd
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral Systemiosrjce
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)Timothy Holborn
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge bankingTimothy Holborn
 
DATA EXCHANGE AGENCY INTRODUCTION - Irakli Lomidze
DATA EXCHANGE AGENCY INTRODUCTION - Irakli LomidzeDATA EXCHANGE AGENCY INTRODUCTION - Irakli Lomidze
DATA EXCHANGE AGENCY INTRODUCTION - Irakli LomidzeDataExchangeAgency
 

What's hot (20)

National Citizen Target SOA Architecture Sept 2016
National Citizen Target SOA Architecture Sept 2016National Citizen Target SOA Architecture Sept 2016
National Citizen Target SOA Architecture Sept 2016
 
Evolving E-governance Trends in Digital Identity, Services and Payments
Evolving E-governance Trends in Digital Identity, Services and PaymentsEvolving E-governance Trends in Digital Identity, Services and Payments
Evolving E-governance Trends in Digital Identity, Services and Payments
 
Electronic reform in albania - Vision Consulting Albania Law Firm
Electronic reform in albania - Vision Consulting Albania Law FirmElectronic reform in albania - Vision Consulting Albania Law Firm
Electronic reform in albania - Vision Consulting Albania Law Firm
 
How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
Cary LaCheen - Navigating Disability Law
Cary LaCheen - Navigating Disability LawCary LaCheen - Navigating Disability Law
Cary LaCheen - Navigating Disability Law
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
 
Delhi.gov.in
Delhi.gov.inDelhi.gov.in
Delhi.gov.in
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Better use of data
Better use of dataBetter use of data
Better use of data
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protection
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge banking
 
Human identity inforg
Human identity   inforgHuman identity   inforg
Human identity inforg
 
DATA EXCHANGE AGENCY INTRODUCTION - Irakli Lomidze
DATA EXCHANGE AGENCY INTRODUCTION - Irakli LomidzeDATA EXCHANGE AGENCY INTRODUCTION - Irakli Lomidze
DATA EXCHANGE AGENCY INTRODUCTION - Irakli Lomidze
 

Viewers also liked

Key Thoughtsaround the Management and Implementation of Citizen ID Programmes
Key Thoughtsaround the Management and Implementation of Citizen ID ProgrammesKey Thoughtsaround the Management and Implementation of Citizen ID Programmes
Key Thoughtsaround the Management and Implementation of Citizen ID ProgrammesArab Federation for Digital Economy
 
National citizen identity strategy
National citizen identity strategyNational citizen identity strategy
National citizen identity strategyGuy Huntington
 
Nivel competencial tercer ciclo
Nivel competencial tercer cicloNivel competencial tercer ciclo
Nivel competencial tercer ciclomaripach
 
Dining Facilities for 1500 People in Bangalore
Dining Facilities for 1500 People in BangaloreDining Facilities for 1500 People in Bangalore
Dining Facilities for 1500 People in BangaloreVivek Kumar
 
Atividades de Aperfeiçoamento Academico -A caminho da copa
Atividades de Aperfeiçoamento Academico -A caminho da copa Atividades de Aperfeiçoamento Academico -A caminho da copa
Atividades de Aperfeiçoamento Academico -A caminho da copa Paula Marcelino da Silva
 
Nivel competencial primer ciclo. Andalucía
Nivel competencial primer ciclo. AndalucíaNivel competencial primer ciclo. Andalucía
Nivel competencial primer ciclo. Andalucíamaripach
 
La Alhambra. Palacios Nazaríes. Granada 1
La Alhambra. Palacios Nazaríes. Granada 1La Alhambra. Palacios Nazaríes. Granada 1
La Alhambra. Palacios Nazaríes. Granada 1Emilio Fernández
 
La Liberté 1 nov 2013
La Liberté   1 nov 2013La Liberté   1 nov 2013
La Liberté 1 nov 2013Paulsalen
 
Communiqué qg fiscalite ep
Communiqué qg fiscalite epCommuniqué qg fiscalite ep
Communiqué qg fiscalite epPaulsalen
 
Le grisou.fr 8 avril 2013
Le grisou.fr 8 avril 2013Le grisou.fr 8 avril 2013
Le grisou.fr 8 avril 2013Paulsalen
 

Viewers also liked (14)

Key Thoughtsaround the Management and Implementation of Citizen ID Programmes
Key Thoughtsaround the Management and Implementation of Citizen ID ProgrammesKey Thoughtsaround the Management and Implementation of Citizen ID Programmes
Key Thoughtsaround the Management and Implementation of Citizen ID Programmes
 
S K Sinha
S K SinhaS K Sinha
S K Sinha
 
National citizen identity strategy
National citizen identity strategyNational citizen identity strategy
National citizen identity strategy
 
Nivel competencial tercer ciclo
Nivel competencial tercer cicloNivel competencial tercer ciclo
Nivel competencial tercer ciclo
 
Dining Facilities for 1500 People in Bangalore
Dining Facilities for 1500 People in BangaloreDining Facilities for 1500 People in Bangalore
Dining Facilities for 1500 People in Bangalore
 
Atividades de Aperfeiçoamento Academico -A caminho da copa
Atividades de Aperfeiçoamento Academico -A caminho da copa Atividades de Aperfeiçoamento Academico -A caminho da copa
Atividades de Aperfeiçoamento Academico -A caminho da copa
 
Nivel competencial primer ciclo. Andalucía
Nivel competencial primer ciclo. AndalucíaNivel competencial primer ciclo. Andalucía
Nivel competencial primer ciclo. Andalucía
 
300.39 subpoenas acceptance and response
300.39 subpoenas acceptance and response300.39 subpoenas acceptance and response
300.39 subpoenas acceptance and response
 
FINAL SKYBICYCLES
FINAL SKYBICYCLESFINAL SKYBICYCLES
FINAL SKYBICYCLES
 
La Alhambra. Palacios Nazaríes. Granada 1
La Alhambra. Palacios Nazaríes. Granada 1La Alhambra. Palacios Nazaríes. Granada 1
La Alhambra. Palacios Nazaríes. Granada 1
 
La Liberté 1 nov 2013
La Liberté   1 nov 2013La Liberté   1 nov 2013
La Liberté 1 nov 2013
 
Communiqué qg fiscalite ep
Communiqué qg fiscalite epCommuniqué qg fiscalite ep
Communiqué qg fiscalite ep
 
Le grisou.fr 8 avril 2013
Le grisou.fr 8 avril 2013Le grisou.fr 8 avril 2013
Le grisou.fr 8 avril 2013
 
Team 6
Team 6Team 6
Team 6
 

Similar to National ICT & Identity Strategy Managing Illegal Citizens & Identity Fraud 2016

Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015Guy Huntington
 
Digital as appropriate an independent view no notes
Digital as appropriate an independent view no notesDigital as appropriate an independent view no notes
Digital as appropriate an independent view no notesiscas
 
ICT and Social Responsibility.pptx
ICT and Social Responsibility.pptxICT and Social Responsibility.pptx
ICT and Social Responsibility.pptxCatalino Yanos Jr.
 
Information technology
Information technologyInformation technology
Information technologyNasir Ali
 
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...Vladislav Solodkiy
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Barnsley & Digital Inclusion
Barnsley & Digital InclusionBarnsley & Digital Inclusion
Barnsley & Digital InclusionHelen Milner
 
Local Government Units on the Internet
Local Government Units on the InternetLocal Government Units on the Internet
Local Government Units on the InternetIdeo Agency
 
Why Governments Need a Mobile Site
Why Governments Need a Mobile SiteWhy Governments Need a Mobile Site
Why Governments Need a Mobile Sitemeumobi
 
10 Emerging Trends in Online Communications and Fundraising to Watch in 2018
10 Emerging Trends in Online Communications and Fundraising to Watch in 201810 Emerging Trends in Online Communications and Fundraising to Watch in 2018
10 Emerging Trends in Online Communications and Fundraising to Watch in 2018Nonprofit Tech for Good
 
Identity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic GrowthIdentity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic GrowthGuy Huntington
 
Child online protection a collective responsibillity
Child online protection   a collective responsibillityChild online protection   a collective responsibillity
Child online protection a collective responsibillitychioma Ibe
 
Digital india-cssfounder.com
Digital india-cssfounder.comDigital india-cssfounder.com
Digital india-cssfounder.comCss Founder
 
Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015Mwiza Helen
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldGood Things Foundation
 
[E government policy training] quito city presentation
[E government policy training] quito city presentation[E government policy training] quito city presentation
[E government policy training] quito city presentationshrdcinfo
 
Digital Inclusion in the Age of Mobile (Socitm May 2014)
Digital Inclusion in the Age of Mobile (Socitm May 2014)Digital Inclusion in the Age of Mobile (Socitm May 2014)
Digital Inclusion in the Age of Mobile (Socitm May 2014)Helen Milner
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 

Similar to National ICT & Identity Strategy Managing Illegal Citizens & Identity Fraud 2016 (20)

Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015
 
Digital as appropriate an independent view no notes
Digital as appropriate an independent view no notesDigital as appropriate an independent view no notes
Digital as appropriate an independent view no notes
 
ICT and Social Responsibility.pptx
ICT and Social Responsibility.pptxICT and Social Responsibility.pptx
ICT and Social Responsibility.pptx
 
Information technology
Information technologyInformation technology
Information technology
 
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Barnsley & Digital Inclusion
Barnsley & Digital InclusionBarnsley & Digital Inclusion
Barnsley & Digital Inclusion
 
Local Government Units on the Internet
Local Government Units on the InternetLocal Government Units on the Internet
Local Government Units on the Internet
 
Why Governments Need a Mobile Site
Why Governments Need a Mobile SiteWhy Governments Need a Mobile Site
Why Governments Need a Mobile Site
 
Mihkel Lauk, life events in public service delivery, SIGMA, 4 March 2021
Mihkel Lauk, life events in public service delivery, SIGMA, 4 March 2021Mihkel Lauk, life events in public service delivery, SIGMA, 4 March 2021
Mihkel Lauk, life events in public service delivery, SIGMA, 4 March 2021
 
10 Emerging Trends in Online Communications and Fundraising to Watch in 2018
10 Emerging Trends in Online Communications and Fundraising to Watch in 201810 Emerging Trends in Online Communications and Fundraising to Watch in 2018
10 Emerging Trends in Online Communications and Fundraising to Watch in 2018
 
Digital governance-1
Digital governance-1Digital governance-1
Digital governance-1
 
Identity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic GrowthIdentity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic Growth
 
Child online protection a collective responsibillity
Child online protection   a collective responsibillityChild online protection   a collective responsibillity
Child online protection a collective responsibillity
 
Digital india-cssfounder.com
Digital india-cssfounder.comDigital india-cssfounder.com
Digital india-cssfounder.com
 
Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015Mo fa effective use of ict tools-05-01-2015
Mo fa effective use of ict tools-05-01-2015
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital World
 
[E government policy training] quito city presentation
[E government policy training] quito city presentation[E government policy training] quito city presentation
[E government policy training] quito city presentation
 
Digital Inclusion in the Age of Mobile (Socitm May 2014)
Digital Inclusion in the Age of Mobile (Socitm May 2014)Digital Inclusion in the Age of Mobile (Socitm May 2014)
Digital Inclusion in the Age of Mobile (Socitm May 2014)
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 

Recently uploaded

Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCNAP Global Network
 
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfHonasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfSocial Samosa
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfSERUDS INDIA
 
Lorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationLorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationCuyahoga County Planning Commission
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.Christina Parmionova
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfScottMeyers35
 
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...kumargunjan9515
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehousesubs7
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsMonica Sydney
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlEdouardHusson
 
74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptxpiyushsinghrajput913
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgergMadhuKothuru
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
 
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...Call Girls Mumbai
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...Namrata Singh
 
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...kumargunjan9515
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learningNAP Global Network
 
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...Delhi Call girls
 

Recently uploaded (20)

Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
 
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfHonasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdf
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdf
 
Lorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationLorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final Presentation
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
 
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
 
tOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTRtOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTR
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
 
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
 

National ICT & Identity Strategy Managing Illegal Citizens & Identity Fraud 2016

  • 1. National ICT & Identity Strategy Managing Illegal Citizens & Identity Fraud Huntington Ventures Ltd. The Business of Identity Management
  • 2. Guy Huntington Guy Huntington is a very experienced identity architect, program and project manager who has led, as well as rescued, many large Fortune 500 identity projects including Boeing and Capital One. He recently completed being the identity architect for the Government of Alberta’s Digital Citizen Identity and Authentication program.
  • 3. Existing Identity Challenges • Most African governments struggle with people – Illegally immigrating in and then masquerading as a citizen – Voting irregularities – Pretending to be students when they’re not – Using dead citizen’s identities to then use them to access social programs • Governments find the identity is effectively siloed in many different ministry databases and have problems with fake identity cards being used
  • 4. So They Address It • By working on creating new identity cards that are tougher to forge • Use biometrics to create voting databases • They then try to sync the national identity card with various underlying ministries databases • They also have e-governance programs in place that begin to seek to leverage the national identity • While all of this is understandable, they are making a mistake. Why? • Their identity processes are beginning when the identity is an adult
  • 5. It’s The Digital Age • Governments and citizens are increasingly using electronic means to offer and consume government services (e.g. health, education, social services, etc.) • Many of these services require digital records to be created for each citizen regardless of their age • For example: – An infant who is receiving a vaccination requires a national health care record – A child who’s entering school requires a student identity – As a child ages, they may begin to consume government digital services – When a child is involved with social services the parent’s or guardians legal relationship needs to be determined
  • 6. Technology Citizens Have • Most citizens in Africa DON’T have internet access • What they do have is: – Cell phone – e-wallets • Some have debit and credit cards
  • 7. Solution: Leverage Identity & Cell • Create a national identity strategy leveraging citizens use of cell phones using their voice to authenticate • The architecture behind this has been used by large global enterprises and a few countries like Estonia since the late 1990’s….so it’s nothing new • It also leverages interactive voice response, which has been used in industry for the last 20 years as well • It provides a seamless user experience when the citizen acquires a smart phone, tablet or laptop • It leverages the same infrastructure that ALL government ministries will use • Additionally, the same infrastructure can be used by crown corporations, municipalities and third parties like banks, telcos and insurance companies
  • 8. Let Me Take You On A Journey… • It begins when a citizen is born • When you are born, in addition to the traditional information being captured, the health worker will also take a biometric from you, e.g. a finger scan and/or a retina scan • As well, the health worker will also obtain your parents national identities from their national ID card • There is one important addition to the national ID….it now captures your cell number in the national ID directory • So, in the national directory, your electronic identity begins at birth. There is also a relationship between you and your parents or legal guardians • Let’s look “behind the scenes” at how this will work by first understanding a bit about the architecture...
  • 9. Nearly 20 Years Ago… • Many Fortune 500 companies and only a few governments realized that single identity was a critical cornerstone piece of their digital strategies • Without this, no SOA and portal strategy would work, since having multiple identities for the same person would not allow for seamless digital and in-person services • Further, they also realized that having a common access service is dependent upon having a unified identity • In my own case, at Boeing, in the early 2000’s, we implemented a unified identity and access management infrastructure and then integrated into this several large portals with more than one million users as well as 1,500 applications. In parallel, they then developed a SOA architecture based on the identity infrastructure • An old Burton Group target architecture, from this time, illustrates this showing identity, provisioning and access management all running as SOA web services (they were the original consulting group who pioneered SOA identity services)
  • 10. • An old Burton group target architecture from nearly 20 years ago illustrates this showing identity, provisioning and access management all running as web services
  • 11. Estonia… • In Estonia, in the late 1990’s they too realized that identity is the key component • They realized that a common identity for each citizen was required • They also realized that citizen event life triggers were also important to streamline government services • Finally, they too also adopted a SOA web services architecture
  • 12. Single Citizen Identity • One identity per citizen • Any changes to the identity are then shared with other apps/services consuming them – One place for a citizen to change things like addresses and phone numbers – Citizens don’t have to fill in the same information over and over in forms for different apps/services • Same identity used for access management
  • 13. Single Citizen Identity Citizen Accesses via their phone or the internet Government Portal Ministry Apps/Services Ministry Apps/Services Ministry Apps/Services Municipalities Apps/Services 3rd Party Apps/Services Crown Corp. Apps/Services Citizen Identity Access Management System Identity - Foundation of e-Governance
  • 14. National Citizen Identity Lifecycle Citizen Tombstone Identity Directory Identity Management System
  • 15. Leverage Open Source Software • The strategy leverages open source software identity and access management from a company called “ForgeRock” • Governments using this around the world include Canada, Norway, New Zealand, Australia and the Province of Alberta • Large companies like Toyota also use it • So this is proven and you won’t be the first to use it • Let me show you what really happens “underneath the hood”…
  • 16.
  • 17. Automatically Create A Healthcare Account For The Infant • The identity management server (depicted by the black box earlier in this presentation) can be used to send your new birth entry, along with your parents/legal guardian information to a open source health care software (which also exists today) • Included in this is your parents/legal guardians cell phone information • Here’s how this happens “underneath the hood”…
  • 18. Changes To The Citizen’s Identity • The value of using this architecture is that all government ministries, crown corporations, municipalities and 3rd parties consume the same identity • So now let’s see how an identity change then flows from the identity management server (OpenIDM) to these entities…one of which is to the Open Source Health Care application to create a new identity for you....
  • 19.
  • 20. When You’re Vaccinated Your Biometrics Are Updated… • Since your finger biometric changes, the vaccination point in your lifecycle is an excellent opportunity for the local health care worker to update it
  • 21. What Happens When There’s No Connectivity? • In certain parts of your country there may be no or poor connectivity • You, the infant, will also have a national identity card – Malaysia creates youth identity cards MyKid • http://www.malaysiacentral.com/information-directory/mykid- identity-card-of-malaysia-for-children-below-12-years- old/#sthash.ZXp3bJOb.dpbs • On the card will securely be stored some of your medical information • If your parents are in a remote area, the health care worker will scan the card using a portable unit, treat or vaccinate you and then update the card • When the healthcare worker reaches connectivity, they will upload the information to the healthcare system
  • 22. When You Need A Vaccination… • The open source eHealth software has your parents/legal guardian’s cell numbers from the national identity and authentication infrastructure • So…it will be able to send them a SMS message telling them you need a vaccination • This leverages what the citizens have in their pockets
  • 23. It’s Your First Day At School… • Each school will be connected to the internet • Remote schools will also be given smartphones • When you show up, your parents/legal guardians will provide one or two biometrics • This will be checked against the national directory and you, the infant will be found to be their offspring or under their guardianship • More biometrics will now be taken from you including your finger scans, face, retina and voice
  • 24. Each Subsequent School Year… • The student will have their face, voice and finger scans all updated because they change with aging
  • 25. A Student Record Will Be Automatically Created For You… • The identity management server will send your citizen identity information along with your parents to an open source education management software (which also exists today) • This will be used your entire life as you move between schools, regions, and take courses throughout your life • There’s also something else that can be done…
  • 26. Students Can Logon To School Networks Using Their Voice… • Schools will leverage the national identity and authentication service using their voice to authenticate • The voice is authenticated by the national authentication service and then a persistent anonymous identifier (“PAI”) will be sent to the open source education management system • This will then take the PAI and map it to the student’s identity granting the student access to apps and services they are entitled to
  • 27. Single Citizen Identity Citizen Accesses via their phone or the internet Government Portal Ministry Apps/Services Ministry Apps/Services Ministry Apps/Services Municipalities Apps/Services 3rd Party Apps/Services Crown Corp. Apps/Services Citizen Identity Access Management System All Apps/Services Leverage the Same Access Management System
  • 28.
  • 29. Leverage The Phone… • At a recent conference, I was with a lady from the Estonian government who has worked on their identity system since 2000 • As we were sitting together in Kigali, she was looking at her children’s homework assignments and if they were in classes using her smartphone • In Estonia, this is called “iSchool” • I want to modify this to leverage SMS for people who only have a cell phone
  • 30. You’re Grown Up… • Now you need to get things like a driver’s license and passport • So you go to their office • You provide some biometrics • These are verified against the national identity and access management system • Your tombstone level information is then automatically sent from the identity management server to the driver’s license or passport system • You don’t have to fill in any forms with your tombstone level identity information
  • 31. What About The National ID Card? • You will already had a National ID card for kids (like the previously referred to MyKid in Malaysia) • When you reach the age of 16, the identity management server will send you a SMS message telling you to replace your youth national ID card with an adult one • You go to a government office and provide some biometrics • These are then verified against the national identity and access management system • The counter person sees you are you and then prints an adult card for you • You medical information is transferred from the youth card to the adult one
  • 32. And Then There Are Payments… • You now have to pay for things like car/motorcycle registration, license renewals, taxes, paying fines, paying for water and power bills, etc. • If citizens could use their cell using things like e- wallets to pay for these and not have to go into a government office…THEY WOULD LIKELY BE VERY INTERESTED • It would save them having to go into a government office and stand in line
  • 33. Let’s Say You Got A Speeding Ticket… • You would see that you can pay via your cell or online • If you do this, the cost is lower than if you pay last minute as is traditionally the case • Additionally, if you pay even earlier, there will be a further discount! • So you call up a toll free number to access the government payment portal (or enter a URL on your smartphone, tablet or computer)
  • 34. Here’s What Happens… • You authenticate using your voice • The identity and access management infrastructure authenticates you • In the blink of an eye, the payment portal then queries all the ministry services dealing with citizen payments and finds you have a speeding ticket (using a Enterprise Service Bus or “ESB”) • ESB’s have been around for the last 15 or so years • The IVR then tells you the amount owing and asks how you want to pay • You select e-wallet and make the payment
  • 35. Paying Bills Using Their Cell or Internet Banks Telcos
  • 36.
  • 37. It Will Make The Government Money • At a recent government project I was the identity architect for, they centralized all payments into one back-end government bank account each night • The nightly interest payments on money received increased due to one large amount • By discounting early payments made via cell or online, the government’s daily cash flow will increase
  • 38. Government Citizen Identities Can Also Generate Revenue… • Third parties, like banks, telcos and insurance companies have to validate the identity when they are creating new accounts to reduce their risk of working with fraudulent customers • As a result, they would pay the government to not only validate the citizen’s identity but, in this strategy, also receive their tombstone level identity, with the citizens consent • In Australia, a national citizen identity validation service for documents already exists – http://www.dvs.gov.au/Pages/default.aspx
  • 39. This Requires Federation Agreements • To make all this “magic” work requires the government identity service to sign identity federation agreements with the third parties and memorandums of understanding with crown corporations and municipalities • At Boeing, about 15 years ago, the identity team lead one of the world’s first large identity federation projects • Today, identity federation is commonly used in many different industry sectors
  • 40. It Also Requires Citizen Consent Using User Managed Access Protocol (UMA) • Standards based privacy and consent protocolhttps://kantaraini tiative.org/confluence/dis play/uma/Home • Gives people the right to control access to their data across providers • Interoperable OAuth2- based protocol • Shipping as an integrated feature of ForgeRock
  • 41. Change Ways of Business • In Estonia today, they use digital signatures from their phones for any legal contract. How do they do this? Let’s continue on with our story. Now you’ re buying something requiring a contract signature… • First, you go to you local telco provider and produce your national id card • They then take some biometrics from you which are validated against the national identity and authentication infrastructure • The telco person removes your sim card and replaces it with one containing a government issued digital certificate • You say thank you, walk out and then log on to government website where you create a 4 digit pin • Now, when you want to sign a contract, you enter the 4 digit pin and your digital signature is made! • https://e-estonia.com/component/digital-signature/
  • 42. Leverage The Same Infrastructure For e-Voting • The same underlying infrastructure can be used for e-voting • Citizens can authenticate using their biometrics and then cast their vote
  • 43. Businesses Are Legal Identities Too… • In Estonia, they have a program called “e-residents” • Their goal is to expand their population from 1.3 to 10 million virtual citizens. Why? • They see themselves as the electronic gateway to the EU • They are currently changing their laws allowing for foreigners to create bank accounts quickly online and to grant them limited identity rights to consume and leverage services • So the program is relatively new and currently has 10,000 e-residents http://www.estoniancompanyregistration.com/estonian- e-residency?gclid=CPHA4uWIgc0CFeop0wodh5kHig
  • 44. What Happens When A Citizen Dies? • The citizen is confirmed to be who others claim them to be via biometrics – E.g. fingerprints • The business process then leads to an entry into the death registry • The registry automatically notifies the national identity directory • The national identity directory then automatically notifies all the government ministries/services • This mitigates the risk of people using dead people’s identities to masquerade as others
  • 45. Benefits… • Citizens can be easily confirmed via biometrics • Fraudulent masquerading as a citizen can be significantly reduced • Automatic notification of marriage, children, legal guardians and death to various ministries will effectively stop misuse of government services • Same infrastructure can be leveraged for e-voting
  • 46. ICT Requires National e-Identity Strategy • Governments wanting to raise their GDP per capita and offer e-government services need to first implement a national electronic identity strategy from the moment a citizen is born until they die • Without this, governments flounder around creating silo’s for their citizen identities • By implementing a national citizen identity strategy, governments are laying the foundations for a successful new economy
  • 47. If You Thought This Is Thought Provoking • Then please pass along a link to the presentation to people in your country who might be interested • You can contact me at: – guy@hvl.net – 1-604-861-6804 – Via linkedin (https://ca.linkedin.com/in/ghuntington) • Thanks for your time!