Skip to main content

Remote Authentication

  • Reference work entry
  • First Online:
Encyclopedia of Biometrics
  • 127 Accesses

Synonyms

e-authentication, Remote access (partial); Remote monitoring (partial); Remote verification

Definition

As with any form of authentication, remote authentication involves the verification of a person’s claim of identity. What makes remote authentication different is that it is performed on individuals located beyond the physical boundaries of the organization – what some call as the extended enterprise.

Remote authentication is distinct from contactless and at a distance. Those two methods refer to the absence of direct contact or proximity between the individual being authenticated and a biometric sensor. Their focus is on the physical relationship between the individual and the sensor.

In contrast, remote authentication says nothing about the proximity of the user to the input device. Both the user and the device are outside the perimeter of the enterprise and may involve contact, contactless, or at-a-distance input of biometric samples.

Remote authentication is also distinct...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. B. Bosen, Network Attacks: Analysis of Department of Justice Prosecutions 1999–2006 (Trusted Strategies Ltd., Pleasanton, 2006)

    Google Scholar 

  2. Authentication in an Internet Banking Environment (FIL 03-2005). United States Federal Deposit Insurance Corporation (2004)

    Google Scholar 

  3. Guidance on Authentication in an Internet Banking Environment. United States Federal Financial Institutions Examination Council (2005)

    Google Scholar 

  4. Q&A on Guidance on Authentication in an Internet Banking Environment. United States Federal Financial Institutions Examination Council (2006)

    Google Scholar 

  5. Health Insurance Portability and Accountability Act of 1996 (Public Law 104 191). United States Department of Health and Human Services (1996)

    Google Scholar 

  6. Telecommunications Carriers’ Use of Customer Proprietary Network Information and Other Customer Information (FCC 07-22A). Federal Communications Commission (2007)

    Google Scholar 

  7. D.R. Kuhn, V.C. Hu, W.T. Polk, S.-J. Chang, Introduction to Public Key Technology and the Federal PKI Infrastructure (SP 800-32) (National Institute of Standards and Technology, Gaithersburg, 2001)

    Google Scholar 

  8. J. Bolton, E-Authentication Guidance for Federal Agencies. (Memorandum M-04-04, Appendix p. 3) Office of Management and Budget (OMB) (2003)

    Google Scholar 

  9. W.E. Burr, D.F. Dodson, W.T. Polk, Electronic Authentication Guideline (SP 800-63 v 1.01.2) (National Institute of Standards and Technology, Gaithersburg, 2006)

    Book  Google Scholar 

  10. C. Tilton, M. Young (eds.), Study Report on Biometrics in E-Authentication (M1/07-0185). American National Standards Institute/International Committee for Information Technology Standards (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Markowitz, J. (2015). Remote Authentication. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_30

Download citation

Publish with us

Policies and ethics