3 Terminology

Terminology used within this specification.

We recognise there are common terms across all ID related Building Blocks (Identity, E-Signature, Consent, Wallet). We define these here.

In addition the following terms are specific to the ID Building Block.

Attribute

Information bound to an entity that specifies a characteristic of the entity. (ITU-T X.1252arrow-up-right)

Authorization

The process or action of authorizing a user to perform an action, for example accessing and using a service. Authorization is not the responsibility of the Identity Building Block

Authentication

The process or action of verifying the identity of a user or process. For the purpose of this project, authentication has been replaced with the term "identity verification" to allow for a clearer definition and for demarcation with other Building Blocks.

Biographic data (or Demographic data)

Set of text attributes representing the identity given at birth. Common attributes: Name, firstname, birthdate, birthplace, parents' biographic data.

Biometric data

Set of physical attributes which can be used to identify a person.

circle-info
  • Most common ones are fingerprints, face, and iris.

  • More can be used like voice, behavioral, veins, etc.

  • Those data can be used for different reasons:

    • Establishing uniqueness of a person;

    • Verifying a person identity;

    • Identifying an unknown person;

    • Claiming an identity;

    • Verifying presence or liveness;

    • Deduplication.

Civil Registry or CRVS (Civil Registry and Vital System)

A civil registry or CRVS (Civil Registry and Vital System) is a system recording life events (birth, death, marriage, divorces, adoptions, name changes, etc.) It is used to keep track of the life events of individuals and to produce statistics for policy making.

Claim

Digital assertion about identity attributes made by an entity about itself or another entity. (ITU-T X.1252arrow-up-right)

circle-info

Examples:

  • Can be pertaining to identity - I am X

  • Can be pertaining to entitlement or eligibility - X is allowed to vote

  • Can be pertaining to membership - X is an employee of Y corp

  • Can be pertaining to ownership - X owns Z car

  • Can be pertaining to role - X is a doctor

  • Can be pertaining to any other identity association - X is an organ donor, X studied subject Y at Institution Z

  • Can protect persons privacy by disclosing the state of attributes without disclosing the attribute itself (i.e. “is older than 18” don’t need to share the age)

  • Can be pertaining to 3rd party claim, i.e. I claim that something is answerable at a 3rd party verification place

Credential Management

  • Is a document lifecycle management regardless of its form. An identity credential can appear in both physical (e.g. ID card, passport, driver’s license) and electronic form (eID);

  • Includes issuance, maintenance, suspension, termination of suspension, revocation, and expiration;

  • There should be no difference between physical and electronic documents with the exception of audit trail kept during usage of the electronic document (eID).

Identity (Digital Identity)

A representation of an entity in the form of one or more attributes that allow the entity or entities to be sufficiently distinguished within a context. (ITU-T X.1252arrow-up-right)

circle-info
  • Identity is the unique representation of a subject engaged in an online transaction. An identity is always unique in the context of a digital service but does not necessarily need to uniquely identify the subject in all contexts. In other words, accessing a digital service may not mean that the subject’s real-life identity is known.

  • Identity allows an entity (citizen, business, administration) to be distinguished from any other.

  • A set of digitally captured and stored attributes and/or credentials that satisfactorily, within context, identify someone or something.

  • Building on this definition, we might state that an identity is the digital representation of an entity detailed enough to make the individual distinguishable within a digital context.

Identifier (Digital Identifier)

Series of digits, characters and symbols used to identify uniquely a subscriber, a user, a network element, a function, a network entity, a service or an application. (ITU-T X.1252arrow-up-right)

circle-info
  • Digital identity fundamentally requires digital identifiers—strings or tokens that are unique within a given scope (globally or locally within a specific domain, community, directory, application, etc.). Identifiers are the key used by the parties to an identification relationship to agree on the entity being represented. Identifiers may be classified as omnidirectional and unidirectional. Omnidirectional identifiers are intended to be public and easily discoverable, while unidirectional identifiers are intended to be private and used only in the context of a specific identity relationship.

  • Identifiers may also be classified as resolvable or non-resolvable. Resolvable identifiers, such as a domain name or e-mail address, may be dereferenced into the entity they represent, or some current state data providing relevant attributes of that entity. Non-resolvable identifiers, such as a person's real-world name, or a subject or topic name, can be compared for equivalence but are not otherwise machine-understandable.

  • There are many different schemes and formats for digital identifiers. The most widely used is Uniform Resource Identifier (URI) and its internationalized version Internationalized Resource Identifier (IRI)—the standard for identifiers on the World Wide Web. OpenID and Light-weight Identity (LID) are two web authentication protocols that use standard HTTP URIs (often called URLs), for example. A Uniform Resource Name (URN) is a persistent, location-independent identifier assigned within the defined namespace.

(Sourcearrow-up-right)

Electronic Identifier (eID)

An electronic identity:

  • is a means for the user to prove electronically that they are who they say they are and thus gain access to services;

  • is presented in an electronic environment;

  • can appear in a form of a certificate as a username, email address, or phone number;

  • preferably associated with an electronic identity hardware token;

  • ideally has a hard link back to digital identity.

Electronic Identity Token

A secure electronic identity token:

  • is a hardware device to be used during electronic transactions in order to provide for electronic identity verification process;

  • provides for additional level of assurance;

  • stores a set of private keys with corresponding public keys;

  • carries at least functions of electronic authentication and digital signature creation.

Electronic Transaction

  • Is between two or more parties

    • The parties can be anonymous (privacy is protected if only attributes/details associated with claims are shared). This may involve a coordination hub that removes metadata that would allow the identity provider to have knowledge of which service was being accessed.

    • The transaction could be indifferent to the identity of the parties involved since it is atomic, or trust and repudiation is not a concern

    • Trust is needed in the identity of the parties for legal recourse, reversal, or non-repudiation

    • Parties are entities - Persons, Businesses, or Things

    • If the party is a Thing, it is then deemed acting on behalf of a Person or a Business

  • A transaction is a multi-step interaction and each step could involve flow of data or instructions

  • At a step level, there is a need for trust in the parties and the data

  • At a transaction level, there is a need for trust in the parties, the data, and factors such as eligibility and permissions

  • Privacy and security principles of need to know, selective disclosure, access control, and information security against snooping are needed

Enrollment

The process of inauguration of an entity into a context. (ITU-T X.1252arrow-up-right)

circle-info

Enrolment may include verification of the entity's identity and establishment of a contextual identity.

Also, enrolment is a pre-requisite for registration. In many cases, the latter is used to describe both processes.

Foundational Identity

Identity credentials that serve as proof of identity for a wide variety of public and private sector transactions and services and are managed by a foundational identity system.

An identification system primarily created to manage identity information for the general population and provide credentials that serve as proof of identity for a wide variety of public and private sector transactions and services. Common types of foundational identification (ID) solutions include civil registries, universal resident or national ID systems, and population registers.

(Adjusted from the World Bank Group's Identification for Development Practitioners Guide Glossaryarrow-up-right)

circle-info

Typical capacities include:

  • Provide recognition before the law and proof of legal identity.

  • The name and nature of legal identification systems vary under national law, but typically include civil registration systems, national identification systems, population registries, and other foundational identification systems.

  • Maintains a registry of natural persons and provides issuance and lifecycle management of foundational identities.

  • Those persons are people needing to interact with a country: citizens, diaspora, foreign residents, foreign workers, refugees, etc.

  • Has an identity issuance and management process that takes care of the accuracy of information in order to act as a reliable root of trust.

  • Offers identity assurance in the form of identity verification in the digital realm.

  • Digital identity and electronic identity serve as foundational level attributes.

Functional Identity

  • Is linked to systems that have a specific function with specific business rules: e.g. education, healthcare, and justice are functional domains that could establish and use functional Identities.

  • Functional identification systems provide official proof of identity and authorization for particular purposes or sectors. This typically includes identification systems that provide voter identification, ration cards, social security numbers, health cards, tax numbers, and more; in some cases, these credentials may also be recognized as proof of identity for other purposes or sectors.

  • Historically functional identities are created in the absence of/as complements to foundational identities. In the presence of a proper foundational eID, there is no further need for a separate functional eID.

  • Is often associated with a credential that provides entitlements - a functional health identity card both provides identity services of a kind and entitles the holder to access health care services.

(Adapted from Principles on Identification for Sustainable Development, February 2021arrow-up-right)

Functional Identity System

  • Maintains a registry of credentials.

  • Associates the identity of a person with the entitlement that the functional credential offers.

  • Optionally offers uniqueness based on the credential type.

  • Optionally offers identity assurance based on the credential type.

  • Optionally digital based on the credential type.

Identity Assurance

The confidence provided in the process of identity validation and verification used to establish the identity of the entity to which the credential was issued, and the degree of confidence that the entity that uses the credential is that entity or the entity to which the credential was issued or assigned. (ITU-T X.1252arrow-up-right)

Identity Credential

  • An identity document in a physical (e.g. ID card, driver's license) or digital (eID) form that an identity credential holder may present to authenticate his identity in a physical or electronic interaction;

  • Data, or the physical object upon which the data may reside, that an identity credential holder may present to authenticate his identity in an electronic or online transaction.

Identity Registry

An identity registry contains individuals identity information, it can be related to group or sub-groups (i.e. for a functional system, a region, a company).

Identity Verification

The process of confirming that a claimed identity is correct by comparing the offered claims of identity with previously proven information. (ITU-T X.1252arrow-up-right)

circle-info

GovStack prefers the term Identity Verification to the term Authentication.

  • Offers mechanisms for verifying a person’s identity locally or by hitting a service offering the verification capabilities.

  • Local verification involves trusting the source of the information by (for example) using digital signatures rather than having to go back to the root source of truth (and hence creating a privacy invasive audit record of the check).

  • Identity verification services might be available in synchronous and asynchronous modes and might have real time or non real time responses.

  • Online identity verification uses a single or multi-factor mechanism. Identity verification involves an identifier and the factors. The identifier may be the User Identification Number (UIN) or an alias that is associated with the UIN in reference to the eID term described above.

  • A foundational identity system can offer verification services in a centralized or multi-provider (federated/distributed) model.

  • In a federated model identity verification has to come from different sources based on the credential used. This means that there is a need for discovery, registration, resolution and routing of verification requests to the appropriate verification service. This needs a web of trust model to be defined. Such a model will also be repeatable for cross border usage where it will be dealing with a federation of foundational identity systems.

Partner

3rd party consuming the services of the building block. Partners should be registered and authorized to use the services (partner management is not yet described in this specification)

Pairwise Pseudonymous Identifier (PPID)

(also: Partner Specific User Token, (PSUT)) Identifier that identifies the Entity to a Relying Party that cannot be correlated with the Entity's PPID at another Relying Party. (OpenID Connect)

Partner Specific User Token (PSUT)

See: Pairwise Pseudonymous Identifier (PPID)

Population Registry

A population registry is a database/system which includes records of the entire population of a country covering citizens but also foreigners staying in the country and also the national diaspora.

UIN

Stands for Unique Identity Number, this number uniquely identifies a person in the Foundational ID system. UIN are an optional approach and not necessary.

Was this helpful?