07.05.2013 Views

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

easons, it is possible to assert that the evolution of law has exceeded the initial vision tending<br />

to accept only digital signatures. (UNCITRAL; 2007)<br />

In this sense, the legal scenario is sufficiently wide as to validate any electronic authentication<br />

method that is agreed upon between the parties or which procedures has any type of<br />

procedural framework. Therefore, symmetric keys, biometrics technologies, digital signatures<br />

issued by not licensed certification authorities are accepted, all them with the same legal value<br />

as an electronic signature susceptible to satisfy the legal requirement of a “signature” as an<br />

expression of the individual’s consent.<br />

b.-Authentication factors<br />

The Social e-ID Framework contains a glossary of terms that are the starting point for<br />

establishing agreements among our countries.<br />

It defines the authentication factors as those “elements that comprise the identification<br />

process”, namely:<br />

• Something that I know: the individual is authenticated by means of something that he or she<br />

knows: a key, an identification number– PIN, a phrase or an answer to a security question.<br />

• Something that I have: the person is authenticated using something that he or she has: a<br />

token, a smart card, a digital certificate.<br />

• Something that I am: the individual is authenticated based on an own characteristic, i.e.,<br />

biometric data.<br />

The glossary also defines the biometrics technology, concept as those “methods that ensure<br />

individuals recognition based on distinguishable physical or behavioural traits. Technologies<br />

used in biometrics include recognition of fingerprints, face, veins patterns, iris, voice and typing<br />

rhythm, among others.” (MARCO; 2011)<br />

As regards biometrics systems, the Social e-ID Framework, defines them as “a computerized<br />

recognition system based on one or various patterns that operates requiring biometric data<br />

to an individual, collecting a pattern of the data acquired and comparing the sample against a<br />

previously registered template. Depending on the application, this template can be stored in a<br />

centralized database or in an individual device as a token or smart card.” (MARCO; 2011)<br />

Following these definitions the Social e-ID Framework defines the Public Key Infrastructures,<br />

also known as Digital Signature Infrastructures or PKI. They can be defined as “the set of<br />

hardware, software, persons, policies and procedures necessary to create, manage, store,<br />

distribute and revoke public key certificates based on asymmetric cryptography, that facilitate<br />

the creation of a verifiable association between a public key and the identity of the possessor of<br />

the corresponding private key.” (MARCO; 2011)<br />

It follows making reference to digital signature, also called safe electronic signature, advanced<br />

electronic signature or acknowledged electronic signature. The Social e-ID Framework<br />

recognizes two aspects for a digital signature: the technological and the legal ones. The<br />

technological meaning is related to public key technologies. The legal one is related to the<br />

490

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!