Part 2 – Identity Assurance by Our Own Volition and Memory
Identity Assurance We believe that the reliable identity assurance (See part 1) must be built on three prerequisite principles as follows. Volition of the User – with Self-Determination, Identity authentication [...]