He offers a structured and in-depth look at user identification and authentication
for security and network professionals.
The technologies demonstrated included access to building information database and dynamic building status from sensors, sensor-driven fire model using the NIST Virtual Cybernetic Building Testbed simulator, standardization of communications interface for sensors, biometrics for identification and authentication
, dynamic self-organizing wireless networks for voice and data, voice over Internet, and emergency personnel localization and tracking.
This contract, known as KMI CI-1, encompasses the first capability increment of the DoD's KMI and includes the development and fielding of a system for providing high-assurance digital certificates to DoD and other government agency users for critical online identification and authentication
in electronic commerce and data exchange.
Biometric systems serve two purposes: identification and authentication
. For example, when the police make an arrest, they compare the suspect's fingerprints with fingerprints on file to determine if the person has a criminal record.