07.05.2013 Views

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Social e-ID Framework makes a distinction between the following concepts which are<br />

defined as:<br />

1. “Social Electronic Identification”: understanding as such the “procedure by means of which<br />

external elements enable assigning an identity with determined attributes to a concrete<br />

individual, i.e., it is the verification of the data that prove that an individual is effectively the<br />

person he/she claims to be, an individual subject of law, with determined attributes.”<br />

2. “Electronic Authentication”: understanding as such the “process to verify the authenticity of<br />

the identifications performed or required by an individual, either a physical person or a legal<br />

entity, or about information such as a message or other means of electronic transmission.<br />

The authentication process is the second of two steps that involve: 1) The submission of a<br />

means to prove the identification before a system and, 2) The presentation or generation of<br />

information that corroborates the binding between the means submitted and the individual<br />

or entity identified.”<br />

In this sense, the Social e-ID Framework in its text defines two concepts that usually appear<br />

dissociated. In effect, “social electronic identification” refers to the procedure of binding the<br />

attributes of an individual and the individual him/herself, and also the process of verifying that<br />

information with the concrete individual. It mentions two moments, that would be comprised<br />

in the social electronic identification concept. A first moment in which the authority certifies<br />

the identity of an individual, after being bound to determined attributes (name, place of<br />

birth, family information, biometric data) with the physical individual him/herself, through an<br />

established procedure. And a second moment in which somebody verifies the correlation of<br />

such data with that individual.<br />

This procedure shall be based on elements that are external to the individual, which shall appear<br />

on an official document that will prove such identity thereafter. This document shall contain<br />

these data in a manner that allows the identification process by third parties.<br />

The “electronic authentication” concept is innovative. It is the first time it appears on documents<br />

related to identification. This concept makes reference to a third moment: verification of the<br />

authenticity of the identifications made or requested by a physical person or legal entity, about<br />

information such as a data message or other means of electronic identification. This concept<br />

introduces some innovative elements that we would like to highlight.<br />

On the one hand, it is applied to physical individuals as well as legal identities, i.e., to automated<br />

electronic devices as servers, computer systems, etc. that interact between each other o with<br />

particular individuals. Thus, the value of the action performed by a computer system is included,<br />

even with no direct human activity. This element is already in the Argentine digital signature<br />

Law, which in its article 10 acknowledges the presumption of the sender. This law established<br />

that it is presumed, except if it is otherwise proved, and that the document digitally signed<br />

comes from the sender, in those cases where this digital document has been automatically sent<br />

by a programmed device and bears the digital signature of the sender.<br />

488

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!