Identity authentication is
|“||the process of establishing an understood level of confidence that an identifier refers to an identity. The authenticated identity may or may not be linkable to an individual.||”|
|“||[a] formalized process of identity verification that, if successful, results in an authenticated identity for an entity.||”|
It may or may not be possible to link the authenticated identity to an individual. For example, verification of the password associated with a Hotmail account authenticates an identity (email@example.com) that may not be possible to link to any specific individual. Identity authentication happens in two phases: (1) an identification phase, during which an identifier to be authenticated is selected in some way (often the identifier is selected by a claimant), and (2) an authentication phase, during which the required level of confidence is established (often by challenging the claimant to produce one or more authenticators supporting the claim that the selected identifier refers to the identity).
- ↑ Who Goes There?: Authentication Through the Lens of Privacy, at 19.
- ↑ Framework for Cyber-Physical Systems, at 12.
- ↑ Id.