The IT Law Wiki
No edit summary
 
(30 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Biometrics ==
+
== Definitions ==
   
  +
=== Biometrics ===
'''Verification''' is the process of [[comparison|comparing]] a submitted [[biometric sample]] ([[trial template]]) against the biometric [[reference template]] of a single [[enrollee]] whose [[identity]] is being claimed, to determine whether it [[match]]es the [[enrollee]]’s [[reference template]].
 
   
[[File:Verification.jpg|thumb|650px|Biometric verification process]]
+
''See'' [[Verification (biometrics)]].
   
== Computer systems ==
+
=== Computer modeling/simulation ===
  +
  +
'''Verification''' is
  +
  +
{{Quote|the [[process]] of determining that a [[model]] or [[simulation]] [[implementation]] accurately represents the [[developer]]'s conceptual description and [[specification]]s.<ref>DOD Dictionary of Military Terms ([http://www.dtic.mil/doctrine/dod_dictionary/ full-text]).</ref>}}
  +
  +
=== Computer systems ===
   
 
'''Verification''' is the process of comparing two levels of [[system]] specification for proper correspondence (e.g., security policy model with top-level specification, top-level specification with [[source code]], or [[source code]] with [[object code]]). This process may or may not be automated.
 
'''Verification''' is the process of comparing two levels of [[system]] specification for proper correspondence (e.g., security policy model with top-level specification, top-level specification with [[source code]], or [[source code]] with [[object code]]). This process may or may not be automated.
   
== Digital certificate ==
+
=== Data ===
  +
  +
'''Verification''' is
  +
  +
{{Quote|the [[process]] of checking or [[testing]] [[performance information]] to [[assess]] types of [[error]]s, such as [[error]]s in [[keying]] [[data]].<ref>[[Identity Theft: Total Extent of Refund Fraud Using Stolen Identities is Unknown]], at 9 n.b.</ref>}}
  +
  +
=== Digital certificate ===
   
 
Before a [[certification authority]] can issue a [[digital certificate]] to a [[user]], it must '''verify''' the [[user]]’s [[identity]] in accordance with the organization’s preset policies. In some cases, the [[certification authority]] is set up to perform the [[identification]] and [[authentication]] of [[user]]s by itself, but often this function is delegated to separate entities called [[registration authorities]]. A [[user]]’s [[identity]] is verified through one of two means, based on the level of [[security]] that is deemed necessary by the organization.
 
Before a [[certification authority]] can issue a [[digital certificate]] to a [[user]], it must '''verify''' the [[user]]’s [[identity]] in accordance with the organization’s preset policies. In some cases, the [[certification authority]] is set up to perform the [[identification]] and [[authentication]] of [[user]]s by itself, but often this function is delegated to separate entities called [[registration authorities]]. A [[user]]’s [[identity]] is verified through one of two means, based on the level of [[security]] that is deemed necessary by the organization.
   
In the first method, the [[user]] would need to appear in person at the [[registration authority]] and present identity documents such as a birth certificate or passport. A second, less secure method, involves the confirmation of a shared secret through an [[online]] application. For example, the [[user]] could verify his identity by confirming something that the agency already knows about him but which is not common knowledge, such as tax return information. After verifying the [[user]]’s [[identity]], the [[registration authority]] creates a unique [[user name]]. This unique name, which may include the [[user]]’s given name, ensures that people who rely on the [[digital certificate|certificate]] can distinguish between several individuals with similar given names, much like an [[e-mail address]]. The [[certification authority]] then creates the [[digital certificate|certificate]] that irrevocably links that unique name to the [[user]]’s [[public key]].
+
In the first method, the [[user]] would need to appear in person at the [[registration authority]] and present identity documents such as a birth certificate or passport. A second, less secure method, involves the confirmation of a shared secret through an [[online]] application. For example, the [[user]] could verify his identity by confirming something that the agency already knows about him but which is not common knowledge, such as tax return information. After verifying the [[user]]'s [[identity]], the [[registration authority]] creates a unique [[user name]]. This unique name, which may include the [[user]]'s given name, ensures that people who rely on the [[digital certificate|certificate]] can distinguish between several individuals with similar given names, much like an [[e-mail address]]. The [[certification authority]] then creates the [[digital certificate|certificate]] that irrevocably links that unique name to the [[user]]'s [[public key]].
  +
  +
=== General ===
  +
  +
'''Verification''' is
  +
  +
{{Quote|[c]onfirmation, through the provision of [[objective evidence]], that specified requirements have been fulfilled (e.g., an entity's requirements have been correctly defined, or an entity's [[attribute]]s have been correctly presented; or a [[procedure]] or [[function]] performs as intended and leads to the expected outcome).<ref>[[NIST Special Publication 800-160]], at B-16; [[CNSSI 4009]].</ref>}}
  +
  +
=== Software/system ===
  +
  +
'''Verification''' is
  +
  +
{{Quote|[t]he [[process]], using formal methods, of evaluating a [[system]] or [[software]] [[component]] to determine whether it satisfies the requirements imposed at the start of development.<ref>[[Wiki.GIS.com]], GIS Glossary ([http://wiki.gis.com/wiki/index.php/GIS_Glossary full-text]).</ref>}}
  +
  +
=== Surveillance ===
  +
  +
'''Verification''' is
  +
  +
{{Quote|[t]he process whereby law enforcement can adequately demonstrate to a judge or [[jury]] that the number or other identifier (e.g., [[telephone number]], [[electronic mail address]]) targeted for [[interception]] corresponds to the person or persons whose [[communication]]s are being [[intercept]]ed.<ref>[[Electronic Surveillance in a Digital Age]], at 74.</ref>}}
  +
  +
== References ==
  +
<references />
  +
  +
== See also ==
  +
  +
* [[Automated system verification]]
  +
* [[Formal verification]]
  +
* [[Independent Verification and Validation]]
  +
* [[Verification and validation]]
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Technology]]
 
[[Category:Technology]]
  +
[[Category:Surveillance]]
  +
[[Category:Definition]]
  +
[[Category:Computing]]
  +
[[Category:Software]]

Latest revision as of 03:35, 1 July 2019

Definitions[]

Biometrics[]

See Verification (biometrics).

Computer modeling/simulation[]

Verification is

the process of determining that a model or simulation implementation accurately represents the developer's conceptual description and specifications.[1]

Computer systems[]

Verification is the process of comparing two levels of system specification for proper correspondence (e.g., security policy model with top-level specification, top-level specification with source code, or source code with object code). This process may or may not be automated.

Data[]

Verification is

the process of checking or testing performance information to assess types of errors, such as errors in keying data.[2]

Digital certificate[]

Before a certification authority can issue a digital certificate to a user, it must verify the user’s identity in accordance with the organization’s preset policies. In some cases, the certification authority is set up to perform the identification and authentication of users by itself, but often this function is delegated to separate entities called registration authorities. A user’s identity is verified through one of two means, based on the level of security that is deemed necessary by the organization.

In the first method, the user would need to appear in person at the registration authority and present identity documents such as a birth certificate or passport. A second, less secure method, involves the confirmation of a shared secret through an online application. For example, the user could verify his identity by confirming something that the agency already knows about him but which is not common knowledge, such as tax return information. After verifying the user's identity, the registration authority creates a unique user name. This unique name, which may include the user's given name, ensures that people who rely on the certificate can distinguish between several individuals with similar given names, much like an e-mail address. The certification authority then creates the certificate that irrevocably links that unique name to the user's public key.

General[]

Verification is

[c]onfirmation, through the provision of objective evidence, that specified requirements have been fulfilled (e.g., an entity's requirements have been correctly defined, or an entity's attributes have been correctly presented; or a procedure or function performs as intended and leads to the expected outcome).[3]

Software/system[]

Verification is

[t]he process, using formal methods, of evaluating a system or software component to determine whether it satisfies the requirements imposed at the start of development.[4]

Surveillance[]

Verification is

[t]he process whereby law enforcement can adequately demonstrate to a judge or jury that the number or other identifier (e.g., telephone number, electronic mail address) targeted for interception corresponds to the person or persons whose communications are being intercepted.[5]

References[]

See also[]