Synonyms
e-authentication, Remote access (partial); Remote monitoring (partial); Remote verification
Definition
As with any form of authentication, remote authentication involves the verification of a person’s claim of identity. What makes remote authentication different is that it is performed on individuals located beyond the physical boundaries of the organization – what some call as the extended enterprise.
Remote authentication is distinct from contactless and at a distance. Those two methods refer to the absence of direct contact or proximity between the individual being authenticated and a biometric sensor. Their focus is on the physical relationship between the individual and the sensor.
In contrast, remote authentication says nothing about the proximity of the user to the input device. Both the user and the device are outside the perimeter of the enterprise and may involve contact, contactless, or at-a-distance input of biometric samples.
Remote authentication is also distinct...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
B. Bosen, Network Attacks: Analysis of Department of Justice Prosecutions 1999–2006 (Trusted Strategies Ltd., Pleasanton, 2006)
Authentication in an Internet Banking Environment (FIL 03-2005). United States Federal Deposit Insurance Corporation (2004)
Guidance on Authentication in an Internet Banking Environment. United States Federal Financial Institutions Examination Council (2005)
Q&A on Guidance on Authentication in an Internet Banking Environment. United States Federal Financial Institutions Examination Council (2006)
Health Insurance Portability and Accountability Act of 1996 (Public Law 104 191). United States Department of Health and Human Services (1996)
Telecommunications Carriers’ Use of Customer Proprietary Network Information and Other Customer Information (FCC 07-22A). Federal Communications Commission (2007)
D.R. Kuhn, V.C. Hu, W.T. Polk, S.-J. Chang, Introduction to Public Key Technology and the Federal PKI Infrastructure (SP 800-32) (National Institute of Standards and Technology, Gaithersburg, 2001)
J. Bolton, E-Authentication Guidance for Federal Agencies. (Memorandum M-04-04, Appendix p. 3) Office of Management and Budget (OMB) (2003)
W.E. Burr, D.F. Dodson, W.T. Polk, Electronic Authentication Guideline (SP 800-63 v 1.01.2) (National Institute of Standards and Technology, Gaithersburg, 2006)
C. Tilton, M. Young (eds.), Study Report on Biometrics in E-Authentication (M1/07-0185). American National Standards Institute/International Committee for Information Technology Standards (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Markowitz, J. (2015). Remote Authentication. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_30
Download citation
DOI: https://doi.org/10.1007/978-1-4899-7488-4_30
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4899-7487-7
Online ISBN: 978-1-4899-7488-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering