G.Code. I.D and Data for Development
A location encrypted identity and data mechanism that makes effective use of identification and data for planning and empowerment
"Isolated people do not manifest among us- they do not ask anything of us- they live and die mostly without our knowledge" Sydney Possuelo.
The invisible billion are invisible owing to a number of socioeconomic factors. A large proportion of them fall in the category of the least privileged, the least connected and the billion with the lowest life expectancy. Coincidentally, the invisible billion also falls within the jurisdiction of nations. Groups like the North Sentinel tribe of India, Nations like Chad, Malawi and Madagascar which has a population of about 26 million, larger than Australia, The Netherlands, Romania and Greece, and yet partly invisible. These people make up a fraction of the invisible billion.
Advancements in technology through increased mobile and internet penetration create the possibility for new solutions to identify these groups. It would be a global public good, if solutions we proffer for the invisible billion extend as far as the least fortunate of them. Whilst working for their identity, the solution should also help their governments use the identification and database assets in planning progressive socioeconomic interventions such as credit identity which is critical for financial inclusion whilst improving the quality of their lives and making them visible to the larger world.
All entities and events on earth have three common characteristics:
1. Existential or biological peculiarities,
2.Locational peculiarities and
3. Time.
The history of identity dates back to when people were first identified with the locations of their residences; villages, clans etc. Over time many other parameters were joined to the identity framework alongside locations. The G.Code reinvents the location peculiarity as a statistically analyzable identity and data aggregation hosting mechanism by breaking states into a grid of 300m by 300m cells. The coding nomenclature identifies a location from its country name through smaller districts to the exact neighborhood, whether urban or rural. Each cell carries the identity of its location, then all data connected to it including but not limited to occupants, fingerprint inclusive, and entities connected to occupants of the cells. The fingerprint data is however encrypted on smart I.D cards. Users, at points of necessity, will physically finger-print on a reader to confirm the match with their encrypted fingerprint. Data misuse comes when governments only have citizens data, as name lists, without the underlying data geographically mapped out data of prevailing socio-economic factors. This results in recurring ill-fitting projects that leave societies unempowered as is peculiar to Africa. The G.Code will fill the vacuum created by data gaps and enable credit identity analysis for financial inclusion and social interventions, an advantage made possible by the multi-data analytical capacity of the solution. Governments will be able to deliver the best matching solutions per demographic/geographic population for development and improve the Quality-of-life of people. For emergencies, locations of first responders' apparatus are also encrypted in the code. Alerts can be raised by SMS and an App which will help authorities manage their emergency apparatus efficiently.













- Pilot
Its innovative because it unveils a new dimension to identity, data management and Governance. An application of various mechanisms forming an innovative new way to solve age old problems. It is all-inclusive and easy to implement whilst addressing some of the biggest challenges in the world including but not limited to: identity, financial inclusion, efficient administration of empowering economic interventions, quality of life improvements and governance planning. Coincidentally, these are peculiarities of the invisible billion and their governments.
It demonstrates "privacy by design" by not being intrusive and accessible only by authorized entities. Owing to the database aggregating capacity of the G.Code, entities requiring use of data will only be granted access to data results sheets and not actual databases. Databases will be protected with the Intrusion Detection System (IDS) and would not to be exposed to entities that make it vulnerable. It's design and use is specific to what data is needed for, more importantly for societal advancement. Third parties only need to contact the central database for information and not for operational use.
Also, in instances where the the invisible billion need to prove their identity, they will not need to type or write any form of passwords or access parameters, rather their fingerprints will be used to match what has already been documented in the G.Code database. This is because a lot of privacy infringements are initiated through hacking passwords or pass phrases, and the low literacy level of, most of, the invisible billion would make them vulnerable to such.
All data is inextricably connected to a location related entity, whether persons, entities, incidences or acts of God. The G.Code as a location hosting entity will be included as an additional Data parameter accessible only by integrating a connecting link to other digital identification systems while confirmation checks can be conducted from the G.Code when needed.
User friendliness is inextricably connected to
1. Ease of understanding by creating non-complex connections and user interfaces, and
2. Ease of integration.
These two factors are a fundamental part of the G.Code design. So far, Key players across all database related entities in Identification; Health, Security, Logistics, Insurance, Finance and Agriculture in Nigeria have identified a connection between their work and the solution. More important was the emphasis they made on optimal location related resource planning and management to support interventions which they acknowledge the G.Code will solve.
The interoperability of other database entities whose databases are located connected is easy with the G.Code. As an API too, it is hinged to be built on a mapping API and the strength of the G.Code is built over time with continuous interoperability, and so, as a means of sustenance, it's API mechanism will be perpetually easy to connect with.
At low literacy locations, 2 factors exist: address based identity is rare likewise GPS enabled smart communication. The G.Code fixes the addressing gap and Users will interact with SMS messages likewise GPS enabled smart devices. The thumbprint confirmation also lowers the need for them to express themselves in text or writing, a challenge for low literacy people. The solution is also designed to work offline. In addition, it is designed with minimal text information and utilizes only common words. For remote environments, markers on buildings, signage and Print fliers can be used for correlation and enlightenment.
Our vision is to develop the solution and make it available to other economically developing countries in Africa. We hope partnerships with international development entities can strengthen this. The solution will be built for these environments and handed over to them to run and manage themselves. As the nations' grow, the solution will be adapted to suit their emerging identity and data needs while generating income for themselves though the revenue streams the solution creates.
- Nigeria
- Hybrid of For Profit and Nonprofit
- Other (Please explain below)
- 1-5
- 3-4 years
At the moment, I am building a prototype of the solution. The presidency in Nigeria requested for the solution and the ease of integrating its mechanism in early 2017. Asides that, I am working on fully deploying a complete version of the solution with a bigger ambition to expand the solution to neighboring African nations that would benefit immensely from it's applications.
A good understanding of the socio-political DNA of emerging societies. High processing mentality, Innovative thinking, emotional intelligence, I.T skills like developers and UI/ UX designers and social networking skills.
The revenue model would have several prongs which can be further developed:
1. Government Service fees: Government and other database agencies would be consulting the G.Code for verifications and confirmations.
2. Fees for service. The G.Code would become a go-to verification API for the public and private sector. Subscribers for support like Know Your Customer (KYC) or and other economic initiatives will be directed to the G.Code for verification of all their address related data, a service they will pay for.
My research work on nations and the peculiarities of my country Nigeria helped me study ways of filling some civilization gaps we have here. I came up with the solution some years back, but realize that it is a solution that would be leveraged for several other countries around Africa and beyond. The need for support, funding and connections drew me to the Mission Billion Challenge. I hope to take the work further and impact the lives and economies of many challenged nations.
BARRIERS:
1. Funding, first, to fully develop prototypes in Nigeria before a full roll out is built across the country
2. Political and Bureaucratic bottlenecks such as non committal from entities of concern to leverage on resources.
NECESSARY TO OVERCOME:
1. Identification of appropriate partners to develop this with in country government
