Publications
July 19, 2023: URLs for CSRC publication details pages have changed. Legacy URLs should automatically redirect to the new URLs. However, links to the actual publications have NOT changed (e.g., DOIs and PDFs on nvlpubs.nist.gov). Please send inquiries to
csrc-inquiry@nist.gov. [12:20 pm ET - If you received "Page Not Found" errors recently, please retry accessing those files. File synchronization should now be complete.]
Withdrawn on February 08, 2005.
Guidelines on Evaluation of Techniques for Automated Personal Identification
Documentation
Date Published: April 1, 1977
Planning Note (02/08/2005):
The withdrawal of this FIPS was announced in the Federal Register.
Author(s)
National Bureau of Standards
This publication provides a guideline to be used by Federal organizations in the selection and evaluation of techniques for automatically verifying the identity of individuals seeking access to computer systems and networks via terminals, where controlled accessibility is required for security purposes. The guideline describes various techniques for verifying identity and provides a set of criteria for the evaluation of automated identification systems embodying these techniques.
This publication provides a guideline to be used by Federal organizations in the selection and evaluation of techniques for automatically verifying the identity of individuals seeking access to computer systems and networks via terminals, where controlled accessibility is required for security...
See full abstract
This publication provides a guideline to be used by Federal organizations in the selection and evaluation of techniques for automatically verifying the identity of individuals seeking access to computer systems and networks via terminals, where controlled accessibility is required for security purposes. The guideline describes various techniques for verifying identity and provides a set of criteria for the evaluation of automated identification systems embodying these techniques.
Hide full abstract
Keywords
ADP security; computer networks; controlled accessibility; encryption; evaluation criteria; key; password; personal identification; terminals; verification
Control Families
None selected