The IT Law Wiki

Identity authentication

32,068pages on
this wiki
Add New Page
Add New Page Talk0

Definitions Edit

Identity authentication is

the process of establishing an understood level of confidence that an identifier refers to an identity. The authenticated identity may or may not be linkable to an individual.[1]
[a] formalized process of identity verification that, if successful, results in an authenticated identity for an entity.[2]

Overview Edit

It may or may not be possible to link the authenticated identity to an individual. For example, verification of the password associated with a Hotmail account authenticates an identity ( that may not be possible to link to any specific individual. Identity authentication happens in two phases: (1) an identification phase, during which an identifier to be authenticated is selected in some way (often the identifier is selected by a claimant), and (2) an authentication phase, during which the required level of confidence is established (often by challenging the claimant to produce one or more authenticators supporting the claim that the selected identifier refers to the identity).[3]

References Edit

  1. Who Goes There?: Authentication Through the Lens of Privacy, at 19.
  2. Framework for Cyber-Physical Systems, at 12.
  3. Id.

See also Edit

Also on Fandom

Random Wiki