Agentic AI–Based Federated-Identity Orchestration for Universal Digital Wallets

Authors

  • Vijay Kumar Soni Discover Financial Services, USA Author
  • Karthik Mani CB Richard Ellis, USA Author
  • Debabrata Das Deloitte Consulting, USA Author

Keywords:

federated identity, autonomous agents, OAuth, digital wallets, zero-knowledge proofs, decentralized identifiers

Abstract

The aim of this paper is to presents an agentic AI-driven global digital wallet based on federated-identity orchestration system. Autonomous agents dynamically negotiate OAuth scopes, rotate cryptographic keys, and develop real-time trust across identity issuers, networks, and wallet providers in real-time. The proposed solution speeds up handshakes while providing cryptographic zero-knowledge authentication for privacy. 

Downloads

Download data is not yet available.

References

D. Hardt, “The OAuth 2.0 Authorization Framework,” RFC 6749, Oct. 2012.

P. Hallam-Baker and E. Maler, “Verifiable Credentials Data Model 1.0,” W3C Candidate Recommendation, Jan. 2021.

J. Bradley et al., “OpenID Connect Core 1.0,” OpenID Foundation, Nov. 2014.

T. Lodderstedt, D. Preuss, and M. Hildebrand, “OAuth 2.0 Security Best Current Practice,” IETF Internet-Draft, 2020.

M. Sporny et al., “Decentralized Identifiers (DIDs) v1.0,” W3C Recommendation, Nov. 2020.

R. Sandhu et al., “Role-Based Access Control Models,” IEEE Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996.

Y. Lindell and B. Pinkas, “Secure Multiparty Computation for Privacy-Preserving Data Mining,” J. Privacy and Confidentiality, vol. 1, no. 1, 2009.

C. Cachin and R. Vukolić, “Blockchain Consensus Protocols in the Wild,” arXiv:1707.01873, 2017.

A. Shamir, “How to Share a Secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.

FIDO Alliance, “FIDO2: Web Authentication: An API for accessing Public Key Credentials Level 1,” 2018.

S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008.

N. Zyskind, O. Nathan, and A. Pentland, “Decentralizing Privacy: Using Blockchain to Protect Personal Data,” IEEE Security & Privacy, vol. 16, no. 4, pp. 24–31, 2018.

P. Koshy, D. Koshy, and P. McDaniel, “An Analysis of Anonymity in Bitcoin Using P2P Network Traffic,” in Proc. IEEE INFOCOM, 2014.

C. J. Mitchell, “Security and Privacy Considerations in Federated Identity Management,” IEEE Security & Privacy, vol. 12, no. 5, pp. 18–25, Sept.-Oct. 2014.

L. Kagal, T. Finin, and A. Joshi, “Trust-Based Security in Collaborative Agent Systems,” in Proc. IEEE Int. Conf. on Information Reuse and Integration, 2001.

M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized Trust Management,” in Proc. IEEE Symposium on Security and Privacy, 1996.

B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” 2nd ed., Wiley, 1996.

D. Chaum, “Blind Signatures for Untraceable Payments,” Advances in Cryptology, CRYPTO 1983.

R. C. Merkle, “Protocols for Public Key Cryptosystems,” in Proc. IEEE Symposium on Security and Privacy, 1980.

E. Bertino and N. Shang, “Privacy-Preserving Access Control in Federated Identity Management,” IEEE Computer, vol. 45, no. 9, pp. 24–31, Sept. 2012.

Downloads

Published

05-04-2021

How to Cite

[1]
Vijay Kumar Soni, Karthik Mani, and Debabrata Das, “Agentic AI–Based Federated-Identity Orchestration for Universal Digital Wallets”, American J Auton Syst Robot Eng, vol. 1, pp. 584–616, Apr. 2021, Accessed: Dec. 12, 2025. [Online]. Available: https://ajasre.org/index.php/publication/article/view/70