digital identity


Also found in: Wikipedia.

digital identity

An online identification system. The term is used to contrast computer-based systems, such as passwords and biometrics, with manual systems, such as a driver's license and business card. See identity metasystem and Identity 2.0.
Mentioned in ?
References in periodicals archive ?
Gemalto's Trusted Digital Identity solutions encompass three fully integrated steps: capturing ID documents, verifying their authenticity as well as the holder's identity, and then creating the Trusted Digital Identity itself.
ThreatMetrix[R], The Digital Identity company[R], has announced a partnership with GlobalOnePay, a division of Pivotal Payments, to enhance GlobalOnePay's online fraud detection and scoring engine, Sentinel Defend, the company said.
Self-sovereign identity refers to a digital identity that remains entirely under the individual's control.
TELECOMWORLDWIRE-February 23, 2017-Sonera chooses UXP Systems to power digital identity
13 -- The Asia-Pacific region is facing unprecedented levels of complex cybercrime and fraud attacks, as revealed in the "2016 Q3 Cybercrime Report -- APAC Deep Dive" from ThreatMetrix(R), The Digital Identity Company(R).
Forty-four students were guided to create and construct a digital identity website and report perceptions and results of the creative project.
Digital identity and access management; technologies and frameworks.
Next'11 conference today, the Australian company, Edentiti, has won the Novay Digital Identity Award for the best new concept or product in the field of digital identity.
According to Emirates 24|7: "A new project will be implemented to apply digital identity applications in electronic trade in the country.
Constructing the digital identity is a dynamic process (digital identity management is developing rapidly).
NASDAQ:ACTI), a global provider of strong authentication and trusted digital identity solutions for secure remote access, single sign-on and enterprise access cards.
And each digital identity has its own life cycle, with attributes, credentials, and access permissions changing sometimes daily.

Full browser ?