Definitions[]
Biometrics[]
Identity is
“ | a set of characteristics by which an entity (e.g., human, application, device, service or process) is recognizable from every other entity.[1] | ” |
General[]
Identity is:
“ | [a]ny subset of an individual's attributes, including names, that identifies the individual within a given context. Individuals usually have multiple identities for use in different contexts.[2] | ” |
“ | [a] unique name of an individual person. Since the legal names of persons are not necessarily unique, the identity of a person must include sufficient additional information to make the complete name unique."[3] | ” |
“ | [a] characteristic or group of characteristics by which an entity is recognizable; can refer to an asymmetric key associated with a person, device, or application.[4] | ” |
“ | [t]he set of physical, behavioral, and/or other characteristics by which an entity (human, device, service, etc.) is uniquely recognizable by an identity manager.[5] | ” |
Identity is:
- "[t]he set of physical and behavioral characteristics by which an individual is uniquely recognizable."[6]
- "[a] unique physical being that identifies somebody or something. Identities can apply to persons or non-persons."[7]
- "[t]he unique biological person defined by DNA; the physical being.[8]
- "[t]he characteristics determining who or what a person or thing is."[9]
Telecommunications[]
Identity is a
“ | technical label which may represent the origin or destination of any telecommunications traffic, as a rule clearly identified by a physical telecommunications identity number (such as a telephone number) or the logical or virtual telecommunications identity number (such as a personal number) which the subscriber can assign to a physical access on a case-by-case basis.[10] | ” |
References[]
- ↑ Biometrics Identity Management Agency, Biometrics Glossary, at 35 (Ver. 5) (Oct. 2010) (full-text).
- ↑ Privacy Considerations for Internet Protocols, at 9.
- ↑ NIST Special Publication 800-63, at 6.
- ↑ National Security Agency, "Mobility Capability Package," at D-5 (Nov. 4, 2013) (full-text).
- ↑ Report on Securing and Growing the Digital Economy, at 89.
- ↑ NIST, FIPS 201.
- ↑ National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy, at 33.
- ↑ Executive Office of the President, Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance, at 173 (Ver. 1.0) (Nov. 10, 2009) (full-text).
- ↑ Framework for Cyber-Physical Systems, at 12.
- ↑ ETSI: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) (full-text).