|“||[a] task where the biometric system searches a database for a reference matching a submitted biometric sample, and if found, returns a corresponding identity. A biometric is collected and compared to all the references in a database. Identification is "closed-set" if the person is known to exist in the database. In "open-set" identification, sometimes referred to as a "watchlist," the person is not guaranteed to exist in the database. The system must determine whether the person is in the database, then return the identity.||”|
|“||[t]he one-to-many (1:N) process of comparing a submitted biometric sample against all of the biometric reference templates on file to determine whether it matches any of the templates and, if so, the known identity of the biometric subject whose template was matched.||”|
Computer systems Edit
|“||[t]he process of verifying the identity of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system.||”|
|“||[t]he process of discovering the true identity (i.e., origin, initial history) of a person or item from the entire collection of similar persons or items.||”|
|“||[a] process whereby a real-world entity is recognized and its identity established. Identity is operationalized in the abstract world of information systems as a set of information about an entity that differentiates it from other similar entities. The set of information may be as small as a single code, specifically designed as an identifier, or may be a compound of such data as a given and family name, date of birth, and address. An organization's identification process comprises the acquisition of the relevant identifying information.||”|
|“||[a] process of recognizing an entity in a particular identity domain as distinct from other entities.||”|
|“||of an individual in a database occurs when a third party learns the identity of the person whose attributes are described there.||”|
"Identification is the process of using claimed or observed attributes of an individual to infer who the individual is. Identification can be done without the individual's having to (or being given the opportunity to) claim any identifier (for example, an unconscious patient in an emergency room might be identified without having to state his or her name)."
- ↑ NSTC Subcommittee on Biometrics, Biometrics Glossary, at 15 (Sept. 14, 2006) (full-text).
- ↑ Biometrics Identity Management Agency, Biometrics Glossary, at 34 (Ver. 5) (Oct. 2010) (full-text).
- ↑ NIST Special Publication 800-47, at D-1.
- ↑ FIPS 201.
- ↑ Privacy Technology Focus Group Final Report, App. B, at 55.
- ↑ Framework for Cyber-Physical Systems, at 12.
- ↑ Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data, at 13.
- ↑ Who Goes There?: Authentication Through the Lens of Privacy, at 19.
See also Edit
- Automated Biometric Identification System
- Automated Fingerprint Identification System
- Automated Vehicle Identification
- Automated Identification Management System
- Automatic identification and mobility
- Automatic identification technology
- Automatic Number Identification
- Biometric identification system
- Biometric Identification System for Access
- Closed-set identification
- Defense Biometrics Identification System
- Detection and identification rate
- Employer Identification Number
- Fingerprint identification
- Fingerprint Identification Number
- Fingerprint Identification Records System
- Human Identification at a Distance
- Identification and Authentication
- Identification card
- Identification disclosure risk
- Identification document
- Identification rate
- Identification system
- Integrated Biometric Identification System
- Interstate Identification Index
- Interstate Identification Index System
- Means of identification
- Mobile identification number
- Nailbed identification
- National Identification Index
- Negative identification system
- Open-set identification
- Personal identification card
- Personal identification number
- Positive identification system
- Risk identification
- Terminal identification
- User identification
- Voice identification