A Review of Personal identity Security and Authentication

Authors

  • Sanjay Kumar

Keywords:

Authentication, Identity, Identification, Personal, Security

Abstract

Due to the increasing rise in Governments,
institutions, and federal criminal units from
all over the world has given identity theft and
related criminality, as well as the concerns of
identity, identification, and authenticity, a
great deal of attention. The development of
one's "identity" is influenced by a variety of
personal identifiers... A person's identity is
constructed from a variety of characteristics,
some of which may be hereditary, ascribed,
acquired, or socially based. Before the advent
of identification cards, organizations and
individuals relied on conventional paper
documents to prove their identities. However,
as a result of technological advancements, this
trend is slowly losing popularity. Although
"identity" is a somewhat nebulous term; it
has now unquestionably taken on a physical
form. Identification is becoming more and
more of a must, both offline and online. In
this review article, the areas of identity,
identification, and authenticity are studied.
The techniques for identifying individuals,
including modern technologies, are listed. It
also takes a look at emerging technologies
that might displace tried-and-true methods of
authenticating claimed identities.

Published

2022-11-29

Issue

Section

Articles