07.05.2013 Views

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Adoption of a<br />

common glossary<br />

514<br />

7 For the purpose of social electronic identification, of the inhabitants<br />

of the Ibero American Community, the Ibero American<br />

States will understand by:<br />

a. Authentication factors: are those elements that integrate the<br />

identification process.<br />

Authentication factors currently used are three, and are based<br />

on:<br />

• Something that I know: l the individual is authenticated<br />

by means of something that he or she knows: a key, an<br />

identification number– PIN, a phrase or an answer to a<br />

security question.<br />

• Something that I have: the person is authenticated using<br />

something that he or she has: a token, a smart card, a digital<br />

certificate.<br />

• Something that I am: the individual is authenticated based<br />

on an own characteristic, i.e., biometric data<br />

The factors based on knowledge and possession require that<br />

the person who is to be authenticated before a system remember<br />

or carry the device. Instead, when biometric technologies<br />

are applied, the data is carried by that person him/herself, and<br />

it is almost impossible to be tampered with, or in any other<br />

way altered for impersonation purposes. It is said that in the<br />

first two factors the connection between data and their verification<br />

is weak, what facilitates impersonation, as the system<br />

cannot distinguis h between the actual possessor of the device<br />

and someone who has stolen it; the same applies to the key.<br />

b. Biometric technologies: Biometric recognition is understood<br />

as the automated methods that ensure individuals recognition<br />

based on distinguishable physical or behavioural traits. Technologies<br />

used in biometrics include recognition of fingerprints,<br />

face, veins patterns, iris, voice and typing rhythm, among other.<br />

c. Biometric System: It is an IT recognition system based on one<br />

or various patterns that operates requiring biometric data to<br />

an individual, collecting a pattern of the data acquired and<br />

comparing the example against a previously registered template.<br />

Depending on the application, this template can be<br />

stored in a centralized database or in an individual device as<br />

a token or smart card.<br />

d. Public Key Infrastructures: (also known as Digital Signature<br />

Infrastructures or PKI). They can be defined as the set of hardware,<br />

software, persons, policies and procedures necessary to<br />

create, manage, store, distribute and revoke public key certificates<br />

based on asymmetric cryptography, that facilitate the<br />

creation of a verifiable association between a public key and<br />

the identity of the possessor of the corresponding private key.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!