Search results
Jump to navigation
Jump to search
- .... This use case looks forward to the case where the state has combined all identification cards into a single system. ...evice and is not currently enrolled for state services with a state issued identification card.8 KB (1,360 words) - 01:30, 7 January 2021
- ...nt for the first time with a current complaint. The patient provides some identification and subjective information about their history and health problem and then ...been de-identified, and there are mitigating circumstances that prevent re-identification, which minimize risk of harm from unauthorized disclosure. The information20 KB (3,074 words) - 22:40, 21 March 2021
- ...V to approve an individual’s application for a REAL ID driver’s license or identification card.30 KB (4,866 words) - 16:56, 9 June 2021
- ...call SCRA that is supposed to be used by creditors and claims and not for identification purposes. That is the concern. Using the database even with the veteran p6 KB (1,061 words) - 04:02, 28 June 2018
- ...]], [[Microcode]], [[Operator]], [[Output Data]], [[Password]], [[Personal Identification Number]], [[Physical Protection]], [[Plaintext Key]], [[Port]], [[Private K3 KB (379 words) - 03:58, 28 June 2018
- for the Accreditation of PIV Card Issuers; SP 800-87, Codes for the Identification of Federal and1 KB (173 words) - 03:58, 28 June 2018
- for the Accreditation of PIV Card Issuers; SP 800-87, Codes for the Identification of Federal and chain-of-trust for collected identification data, this will contain PII which must be protected and disposed3 KB (374 words) - 00:25, 24 August 2020
- ...question was asked how to prepare the physical card along with some other identification process if the card is missing.7 KB (1,073 words) - 03:58, 28 June 2018
- ...uested by the Relying Party. The need for attributes, in addition to user identification and authentication, stems from access control models in which combinations7 KB (1,007 words) - 03:58, 28 June 2018
- *Strong identification usually with a second factor, like smart cards.8 KB (1,315 words) - 19:29, 30 July 2020
- Countermeasures taken to prevent the unauthorized use of legitimate Identification & Authentication (I&A) data, however it was obtained, to mimic a subject di ...em used to satisfy a subset of requirements related to the verification or identification of an end user's identity so that the end user's identifier can be used to845 KB (86,833 words) - 04:00, 28 June 2018
- ...or in it, and other printed information on it. It may be used for personal identification, physical access to facilities such as buildings and/or logical access to a Contrasts with Identification.135 KB (15,051 words) - 04:00, 28 June 2018
- * Any time a user is asked to provide identification or personal information. In general the user will be able to assume that an10 KB (1,596 words) - 20:11, 15 October 2019
- ...ing one knows (e.g., password/PIN), something one has (e.g., cryptographic identification device, token), or something one is (e.g., biometric). [[IDEF_Glossary_Refe11 KB (1,496 words) - 23:48, 5 September 2020
- [[CPS Summary (or CPS Abstract)]], [[Identification]], [[Issuing Certification Authority (issuing CA)]],2 KB (297 words) - 04:00, 28 June 2018
- ...d rules. The Identity Ecosystem will offer, but will not mandate, stronger identification and authentication while protecting privacy by limiting the amount of infor1 KB (171 words) - 04:00, 28 June 2018
- ...rics. Authentication and the factors that contribute to establishing that identification for authentication needs to be better defined.3 KB (449 words) - 04:02, 28 June 2018
- *#Identification of security standards for IDESG adoption2 KB (361 words) - 04:02, 28 June 2018
- ...perator]], [[Grant Category]], [[Grant (of Rights Ofuse)]], [[Grantee]], [[Identification]], [[Identifier]], [[Identity]], [[Identity Assurance Work Group]], [[Ident2 KB (217 words) - 04:02, 28 June 2018
- ...inct from the user display name and the user email address. Any real-world identification information must be protected as befits the compliance criteria that the RP # What are the canonical terms for identification?24 KB (3,980 words) - 19:57, 13 November 2020