Identity-based security is a type of
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
that focuses on access to digital information or services based on the authenticated identity of an individual. It ensures that the users of these digital services are entitled to what they receive. The most common form of identity-based security involves the login of an account with a username and password. However, recent technology has evolved into
fingerprint
A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfa ...
ing or
facial recognition Facial recognition or face recognition may refer to:
* Face detection, often a step done before facial recognition
* Face perception, the process by which the human brain understands and interprets the face
* Pareidolia, which involves, in part, se ...
.
While most forms of identity-based security are secure and reliable, none of them are perfect and each contains its own flaws and issues.
History
The earliest forms of Identity-based security was introduced in the 1960s by computer scientist
Fernando Corbató. During this time, Corbató invented computer passwords to prevent users from going through other people's files, a problem evident in his
Compatible Time-Sharing System (C.T.S.S.), which allowed multiple users access to a computer concurrently. Fingerprinting however, although not digital when first introduced, dates back even further to the 2nd and 3rd century, with King
Hammurabi
Hammurabi (Akkadian: ; ) was the sixth Amorite king of the Old Babylonian Empire, reigning from to BC. He was preceded by his father, Sin-Muballit, who abdicated due to failing health. During his reign, he conquered Elam and the city-state ...
sealing contracts through his fingerprints in ancient Babylon. Evidence of fingerprinting was also discovered in ancient China as a method of identification in official courts and documents. It was then introduced in the U.S. during the early 20th century through prison systems as a method of identification. On the other hand, facial recognition was developed in the 1960s, funded by American intelligence agencies and the military.
Types of identity-based security
Account Login
The most common form of Identity-based security is password authentication involving the login of an online account. Most of the largest digital corporations rely on this form of s