The IT Law Wiki
Tag: Source edit
Tag: Source edit
 
Line 14: Line 14:
   
 
{{Quote|the unique representation of a subject engaged in an [[online]] [[transaction]].<ref>[[NIST Special Publications 800-63-B]], § 2.</ref>}}
 
{{Quote|the unique representation of a subject engaged in an [[online]] [[transaction]].<ref>[[NIST Special Publications 800-63-B]], § 2.</ref>}}
  +
  +
{{Quote|an entity's [[online]] presence, encompassing [[personal identifying information]]. It can be interpreted as the [[codification]] of identity names and [[attribute]]s of a physical instance. The use of digital identities is now widespread as the entire collection of [[information]] generated by a person's [[online]] activity.<ref>[[Big Data: Big Today, Normal Tomorrow]], at 1.</ref>}}
   
 
== Overview (General) ==
 
== Overview (General) ==

Latest revision as of 04:29, 22 May 2021

Definitions[]

Blockchain technology[]

A digital identity is

an online or networked identity adopted or claimed in cyberspace by an individual, organization, or electronic device.[1]

General[]

A digital identity is

[t]he electronic representation of an entity (e.g., a device, software, service, organization or individual) in cyberspace that is comprised of an information artifact or correlated information sets.[2]
the unique representation of a subject engaged in an online transaction.[3]
an entity's online presence, encompassing personal identifying information. It can be interpreted as the codification of identity names and attributes of a physical instance. The use of digital identities is now widespread as the entire collection of information generated by a person's online activity.[4]

Overview (General)[]

"A digital identity is always unique in the context of a digital service, but does not necessarily need to be traceable back to a specific real-life subject. In other words, accessing a digital service may not mean that the underlying subject's real-life representation is known. Identity proofing establishes that a subject is actually who they claim to be."[5]

References[]

  1. "Blockchain Technology Glossary" (full-text).
  2. National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy, at 32.
  3. NIST Special Publications 800-63-B, § 2.
  4. Big Data: Big Today, Normal Tomorrow, at 1.
  5. Id

See also[]