...
...
...
...
...
...
Table of Contents |
---|
Key Points
- who are our markets? prospects? clients?
- what have we done? for who?
- where have we added value? for who? how? VSP
- what are our current capabilities, solutions, services, products?
- everything that calls us and that we call is defined by standards and interfaces supporting modular, event-driven solutions
- what are their priority use cases they are focused on now?
- where is the net value add in our offerings?
- what is the feedback from clients on our strengths, weakneeses? ease of adding, using, integrating, automating our services?
- who should we partner with and why?
- our integration score - how easy to add our services via interfaces, call other services with interfaces, extend our services wo coding? related standards support?
- what other solution providers can we add value for? ( ERP, SC, FIN, HC, GOV, etc )
- who can add value as components, services, solutions for our offerings?
- what's the easiest path to sell solutions now? >> VCRST
- what are strategic opportunities for our projects?
- our systems leverage the stronger VITAC trust model and support STEAR architecture for threat management
- we lead on systems architectures that evolve beyond decentralization to highly resilient supporting BFT level operability
References
Reference_description_with_linked_URLs_______________________ | Notes______________________________________________________________ |
---|---|
Trust Value Concepts
Key platform needs - trustless, secure, private, confidential, resilient, recoverable, any-protocol, everytime messaging, decentralized, governed, riskless, finalized transactions, D.ODS for identity, data, docs is decentralized
most user analytics normally run from a data warehouse or lake warehouse depending on complexity and speed required
decentralization benefits depend on context
- for governance and decision making, benefits are independence, consensus
- for for operations and use benefits of distributed systems are resiliency, reliability, availability, service
- for security, less vulnerable to threats
Vitalik Buterin -- the-meaning-of-decentralization
Value Chain Model
Community > Value Activities > Opportunities > Solution Strategies > Capabilities > Products and Services >
VCE > Value Chain Economies: micro economies for value-chain communities ( VCC )
Articles on platform needs, challenges, opportunities, solutions
...
Trinsic - mobile driver’s license grow fast in 2025
Federal Standards, Groups, Policies, Legislation on Trust
ATARC FIDO2 lab enrollment
https://atarc.org/atarc-derived-fido2-credentials-lab/
Financial Services
sifma - Regulated Settlement Network Proof-of-Concept - Dec 2024 - Tony McLaughlin
...
FEMA Issues Survival Guide Amid Fears Of Nuclear Attack - 241204
three crucial steps: Get Inside, Stay Inside, and Stay Tuned
https://www.fema.gov/emergency-managers/national-preparedness/plan
TrustGrid Concepts
TrustGrid and Heale partner on Logistics Supply Chain
...
#S1 >> Value Identified >>. Customer Understands the Value our Solutions have for their needs, use cases
- needs understood, defined, mapped to a solution strategy the customer wants
#S2 >> Solutions Realized >> Turning Ideas into Real Product >> our Tech team
- solution measured on capabilities to meet needs for delivery supporting the solution strategy the customer wants
#S3 >> Value Realized >> Our Team provides the implementation, education, operations and support to help clients realize value
- Who is in our reseller partner network?
- Who is in our implementation partner network?
- Who is in our operations partner network?
A TrustGrid Solution Architecture Stack
...
Separately you need authorized, smart semantic adapters that enable end-to-end transactions via automated metadata mapping. We do have both architecture standards, patterns and technologies that make those smart connectors possible today. In the past, I did build some smart adapters based on metadata for transaction systems that worked well. Today's AI makes that easier. The ones I built used Machine Learning to generate them. A GIGO2 machine - garbage data in, good data out. << me
Management Areas
Admin mgt
Learning mgt
Account mgt
Sales mgt
Marketing mgt
Financial mgt
Project mgt
Product mgt
Delivery mgt
Solution mgt
Hardware mgt
Technology mgt
Devops mgt
Governance mgt
Partner mgt
Service mgt
Support mgt
Implementation mgt
Operations mgt
Potential Value Opportunities
DePIN- Decentralized Physical Infrastrcture Networks for DeFi VCE - 2025
depin-crypto-infrastructure-solutions-status.pdf.
Potential Challenges
Candidate Solutions
SAML 2.0 for IDMS delegation for authn, authz
- How SAML 2.0 worksSAML 2.0 is an XML standard that allows secure exchange of user authentication and authorization data between web applications and identity service providers (IdPs).
- How SAML 2.0 is usedSAML 2.0 is used to enable single sign-on (SSO). When a user logs in to a service provider (SP) using SAML, the SP checks the user's credentials with the IdP. The IdP then sends authorization and authentication messages back to the SP.
- Examples of SAML 2.0 in useSAML 2.0 can be used with Tableau, AWS IAM Identity Center, and Duo Single Sign-On:
- Tableau: Tableau Server and Tableau Cloud can use an external IdP to authenticate users over SAML 2.0.
- AWS IAM Identity Center: Users can sign in to the AWS access portal with their corporate credentials from an external IdP like Okta or Microsoft Entra ID.
- Duo Single Sign-On: Duo Single Sign-On can connect to any app that supports SAML 2.0 or OIDC.
SSO, OIDC, OAuth2 - connect other apps
SSO - Single Signon to multiple sites using same credentials ( Kerberos ticket granting server model )
Open ID Connect -
How OpenID Connect SSO Works? OpenID Connect will redirect a user to an identity provider (IdP) to check the user's identity, either by looking for an active session i.e Single Sign-On (SSO) or by asking the user to authenticate.
OpenID Connect (OIDC) is an identity authentication protocol that is an extension of open authorization (OAuth) 2.0 to standardize the process for authenticating and authorizing users when they sign in to access digital services. OIDC provides authentication, which means verifying that users are who they say they are. OAuth 2.0 authorizes which systems those users are allowed to access. OAuth 2.0 is typically used to enable two unrelated applications to share information without compromising user data. For example, many people use their email or social media accounts to sign in to a third-party site rather than creating a new username and password. OIDC is also used to provide single sign-on. Organizations can use a secure identity and access management (IAM) system like Microsoft Entra ID (formerly Azure Active Directory) as the primary authenticator of identities and then use OIDC to pass that authentication to other apps. This way users only need to sign in once with one username and password to access multiple apps.
Key Tools
Scaffolding >. Feathers, Loopback, Openapi
Runtime generation > Grails, JHipster
Web3 > Firefly generation, services
CICD — see Dev tools
Step-by-step guide for Example
...
But in retrospect, it’s pretty obvious right? You have a plastic ID card. Why wouldn’t you also have a digital ID card? Especially when it’s easier to use online, better for privacy, and only takes 2 minutes to obtain.
mDL adoption is accelerating because it’s obvious. California doubled enrollment (from 600k to 1.2m) over the last few months. New York’s mDL is growing ~10% week-over-week. 10 more states will launch mDLs in 2025 (that we’re aware of!) and none show signs of slowing down.
And it’s not just constrained to the US. Buenos Aires launched digital driver’s licenses ~45 days ago, and have 200k+ downloads. (Podcast on this coming soon!)
In a recent version of the image associated with this post, we actually removed New Mexico because although we knew they were piloting/preparing, we couldn't find a public indication confirming their launch plans. But now, we get to add them back to the image! Unless we have another December surprise, the US states to launch an mDL in 2024 are: Virginia, Ohio, New York, Hawaii, New Mexico.
At this rate, I can't wait to see where we're wrong about our 2025 predictions!! We're doing a webinar next week called "2025 digital ID launches to watch" if the topic interests you register here:https://trinsic.id/webinar