|“||[a] task where the biometric system searches a database for a reference matching a submitted biometric sample, and if found, returns a corresponding identity. A biometric is collected and compared to all the references in a database. Identification is "closed-set" if the person is known to exist in the database. In "open-set" identification, sometimes referred to as a "watchlist," the person is not guaranteed to exist in the database. The system must determine whether the person is in the database, then return the identity.||”|
|“||[t]he one-to-many (1:N) process of comparing a submitted biometric sample against all of the biometric reference templates on file to determine whether it matches any of the templates and, if so, the known identity of the biometric subject whose template was matched.||”|
|“||[t]he process of verifying the identity of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system.||”|
|“||[t]he process of discovering the true identity (i.e., origin, initial history) of a person or item from the entire collection of similar persons or items.||”|
|“||[a] process whereby a real-world entity is recognized and its identity established. Identity is operationalized in the abstract world of information systems as a set of information about an entity that differentiates it from other similar entities. The set of information may be as small as a single code, specifically designed as an identifier, or may be a compound of such data as a given and family name, date of birth, and address. An organization's identification process comprises the acquisition of the relevant identifying information.||”|
|“||[a] process of recognizing an entity in a particular identity domain as distinct from other entities.||”|
|“||of an individual in a database occurs when a third party learns the identity of the person whose attributes are described there.||”|
|“||[is t]he linking of information to a particular individual to infer an individual's identity or to allow the inference of an individual's identity in some context.||”|
|“||[the] process of using claimed or observed attributes of an entity to single out the entity among other entities in a set of identities.||”|
|“||[t]o develop the organisational understanding required to manage cyber risk to systems, assets, data and capabilities.||”|
"Identification is the process of using claimed or observed attributes of an individual to infer who the individual is. Identification can be done without the individual's having to (or being given the opportunity to) claim any identifier (for example, an unconscious patient in an emergency room might be identified without having to state his or her name)."
"In some contexts, it is perfectly legitimate to identify individuals, whereas in others, identification may potentially stifle individuals' activities or expression by inhibiting their ability to be anonymous or pseudonymous. Identification also makes it easier for individuals to be explicitly controlled by others (e.g., governments) and to be treated differentially compared to other individuals."
- NSTC Subcommittee on Biometrics, Biometrics Glossary, at 15 (Sept. 14, 2006) (full-text).
- Biometrics Identity Management Agency, Biometrics Glossary, at 34 (Ver. 5) (Oct. 2010) (full-text).
- NIST Special Publication 800-47, at D-1.
- FIPS 201.
- Privacy Technology Focus Group Final Report, App. B, at 55.
- Framework for Cyber-Physical Systems, at 12.
- Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data, at 13.
- Privacy Considerations for Internet Protocols, at 9.
- ISO/TS 25237:2008.
- Guidance on Cyber Resilience for Financial Market Infrastructures, App. A, at 25.
- Who Goes There?: Authentication Through the Lens of Privacy, at 19.
- Privacy Considerations for Internet Protocols, at 16.
- Automated Biometric Identification System
- Automated Fingerprint Identification System
- Automated Vehicle Identification
- Automated Identification Management System
- Automatic identification and mobility
- Automatic identification technology
- Automatic Number Identification
- Biometric identification system
- Biometric Identification System for Access
- Closed-set identification
- Defense Biometrics Identification System
- Detection and identification rate
- Employer Identification Number
- Fingerprint identification
- Fingerprint Identification Number
- Fingerprint Identification Records System
- Human Identification at a Distance
- Identifiable form
- Identifiable person
- Identification and Authentication
- Identification card
- Identification disclosure risk
- Identification document
- Identification rate
- Identification system
- Individually identifiable health information
- Integrated Biometric Identification System
- Interstate Identification Index
- Interstate Identification Index System
- Means of identification
- Mobile identification number
- Nailbed identification
- National Identification Index
- Negative identification system
- Open-set identification
- Personal identification card
- Personal identification number
- Personally identifiable information
- Positive identification system
- Risk identification
- Terminal identification
- User identification
- Voice identification