|“||a set of characteristics by which an entity (e.g., human, application, device, service or process) is recognizable from every other entity.||”|
|“||[a]ny subset of an individual's attributes, including names, that identifies the individual within a given context. Individuals usually have multiple identities for use in different contexts.||”|
|“||[a] unique name of an individual person. Since the legal names of persons are not necessarily unique, the identity of a person must include sufficient additional information to make the complete name unique."||”|
|“||[a] characteristic or group of characteristics by which an entity is recognizable; can refer to an asymmetric key associated with a person, device, or application.||”|
- "[t]he set of physical and behavioral characteristics by which an individual is uniquely recognizable."
- "[a] unique physical being that identifies somebody or something. Identities can apply to persons or non-persons."
- "[t]he unique biological person defined by DNA; the physical being.
- "[t]he characteristics determining who or what a person or thing is."
Identity is a
|“||technical label which may represent the origin or destination of any telecommunications traffic, as a rule clearly identified by a physical telecommunications identity number (such as a telephone number) or the logical or virtual telecommunications identity number (such as a personal number) which the subscriber can assign to a physical access on a case-by-case basis.||”|
- ↑ Biometrics Identity Management Agency, Biometrics Glossary, at 35 (Ver. 5) (Oct. 2010) (full-text).
- ↑ Privacy Considerations for Internet Protocols, at 9.
- ↑ NIST Special Publication 800-63, at 6.
- ↑ National Security Agency, "Mobility Capability Package," at D-5 (Nov. 4, 2013) (full-text).
- ↑ NIST, FIPS 201.
- ↑ National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy, at 33.
- ↑ Executive Office of the President, Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance, at 173 (Ver. 1.0) (Nov. 10, 2009) (full-text).
- ↑ Framework for Cyber-Physical Systems, at 12.
- ↑ ETSI: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) (full-text).