Â·Â Â Â Â Â Â Â Â Describing both the institutional mechanisms and the individual actions that can keep an individualâ€™s personal identity information private.
Â·Â Â Â Â Â Â Â Â Defining what information constitutes an identity and how systems should be designed to put individuals in control of their private information.
Â·Â Â Â Â Â Â Â Â Assessing how governments respond to new technologies that can provide solutions to identity challenges.
Â·Â Â Â Â Â Â Â Â Analyzing the challenges posed by breeder documents and discussing potential solutions that could lead to more accurate proofing of an individualâ€™s identity.
Â·Â Â Â Â Â Â Â Â Discussing how a secure identity can be created and used throughout the identity life cycle.
Â·Â Â Â Â Â Â Â Â Defining the different types of identity credentials and offering guidance on key considerations for using a credential for multiple applications.
Â·Â Â Â Â Â Â Â Â Describing how new technologies are being used to verify an individualâ€™s identity in the online world.
Â·Â Â Â Â Â Â Â Â Defining how biometric technology is used in identity systems to bind an individual to an identity credential and verification event.
Secure, trusted identity systems will result only if policy, process, and technology issues are considered when new systems are being designed.Â The Identity Councilâ€™s goal is to provide guidance on important identity issues, thereby helping policy-makers and implementing organizations understand how smart card and related technologies can best be applied to deliver the benefits of secure identity.Â
The Identity Council welcomes input from government, businesses, and the public.Â For additional information about Council activities, please visit http://www.smartcardalliance.org.
Many studies have attempted to define what a personâ€™s identity is.Â Some consider identity to be part of an individualâ€™s personality; others consider identity to be the characteristic that defines individuality and distinguishes one individual from another.Â This paper defines identity as the distinguishing characteristics that determine unequivocally that a person is who that person claims to be.Â
Human beings classify their surroundings by assigning names to the components of those surroundings.Â Everything has a name and everybody has a name.Â Naming is our way of ordering our world so that we can correctly address something or somebody.Â Knowing a personâ€™s name allows us to associate an identity with them, which in turn allows us to recognize whom we are dealing with and tell them apart from others.
Although people may want to maintain public anonymity, such anonymity is difficult to achieve.Â It is nearly impossible to maintain anonymity and operate in modern society.Â Birth certificates record our entry into society; Social Security numbers identify us to our government.Â We have passports to attest to our identity and citizenship; we have driverâ€™s licenses to show that we are considered competent to operate a motor vehicle.Â Each of these identity documents conveys our claimed identity to society for a specific purpose.Â Collectively, these documents form a series of reference points that attest to our identity.Â When we desire to achieve some form of anonymity, we use â€œpersonasâ€ to represent us to a community where we wish to be less identifiable.Â For example, many people use personas on the Internet.Â By creating a â€œhandleâ€ or username in a web community, we can be invisible or not identifiable to some degree.Â Ultimately, however, the same individual is behind a real-world identity and the persona that the individual uses.Â Personas are simply a projection of a pseudo-identity masking the individualâ€™s actual identity.Â In many cases a persona may not be deemed sufficient identification to undertake activities such as financial transactions and therefore have limited use.