Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.10: Biometrics in identity management
Negative identity verification
The biometric factor has special qualities for the authentication process. Unlike a secret or a token, biometric characteristics are tightly bound to a physical person. A person cannot deny that he or she carries a certain biometric. This opens the unique possibility to authenticate an uncooperative person or even to prove to an impostor his true identity (negative identification) if the person can be urged to deliver a biometric sample.
Thus biometric identification has the unique potential to prove that a person that claims to have a certain identity is an impostor or that he or she has already enrolled under another identity, for example, in a biometric Type I government controlled ID model. This can be used, for example, for preventing terrorists from boarding airplanes. As opposed to other identification or verification systems, e.g. username password systems or the possession of a physical token, only biometrics offer this mode of operation. It is inherent to the identification mode that a large number of false matches will be triggered. This problem is adequately described by Prabhakar et al.
Thus biometrics may become a useful method to deploy a reliable identity verification system in a hostile or non cooperative community. This quality of biometrics is also useful in forensics to discharge innocent persons.
25 / 40 |