Sync ID Tech Learning Center datasets
Browse files- README.md +60 -0
- cards.jsonl +0 -0
- dataset-manifest.json +51 -0
- glossary.jsonl +23 -0
- schemas/cards.schema.json +107 -0
- schemas/glossary.schema.json +94 -0
- schemas/technologies.schema.json +107 -0
- schemas/vendors.schema.json +106 -0
- technologies.jsonl +30 -0
- vendors.jsonl +0 -0
README.md
ADDED
|
@@ -0,0 +1,60 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: cc-by-4.0
|
| 3 |
+
pretty_name: ID Tech Learning Center
|
| 4 |
+
language:
|
| 5 |
+
- en
|
| 6 |
+
tags:
|
| 7 |
+
- biometrics
|
| 8 |
+
- digital-identity
|
| 9 |
+
- ai-search
|
| 10 |
+
- llm
|
| 11 |
+
- knowledge-base
|
| 12 |
+
- jsonl
|
| 13 |
+
- machine-readable
|
| 14 |
+
---
|
| 15 |
+
|
| 16 |
+
# ID Tech Learning Center
|
| 17 |
+
|
| 18 |
+
This Hugging Face dataset repository mirrors the public machine-readable corpus published by the ID Tech Learning Center at [learn.idtechwire.com](https://learn.idtechwire.com).
|
| 19 |
+
|
| 20 |
+
The canonical source remains the Learning Center itself. This mirror exists to make the datasets easier to discover and consume in AI, retrieval, and model-development workflows that already use the Hugging Face ecosystem.
|
| 21 |
+
|
| 22 |
+
## Included datasets
|
| 23 |
+
|
| 24 |
+
| Dataset | Records | Raw file | Canonical docs | API | Schema | Last updated |
|
| 25 |
+
| --- | ---: | --- | --- | --- | --- | --- |
|
| 26 |
+
| vendors | 43 | [JSONL](https://learn.idtechwire.com/datasets/vendors.jsonl) | [Docs](https://learn.idtechwire.com/for-ai/datasets/vendors) | [API](https://learn.idtechwire.com/api/vendors) | [Schema](https://learn.idtechwire.com/datasets/schemas/vendors.schema.json) | 2026-03-18 |
|
| 27 |
+
| technologies | 30 | [JSONL](https://learn.idtechwire.com/datasets/technologies.jsonl) | [Docs](https://learn.idtechwire.com/for-ai/datasets/technologies) | [API](https://learn.idtechwire.com/api/technologies) | [Schema](https://learn.idtechwire.com/datasets/schemas/technologies.schema.json) | 2026-03-31 |
|
| 28 |
+
| glossary | 23 | [JSONL](https://learn.idtechwire.com/datasets/glossary.jsonl) | [Docs](https://learn.idtechwire.com/for-ai/datasets/glossary) | [API](https://learn.idtechwire.com/api/glossary) | [Schema](https://learn.idtechwire.com/datasets/schemas/glossary.schema.json) | 2025-11-10 |
|
| 29 |
+
| cards | 99 | [JSONL](https://learn.idtechwire.com/datasets/cards.jsonl) | [Docs](https://learn.idtechwire.com/for-ai/datasets/cards) | [API](https://learn.idtechwire.com/api/cards) | [Schema](https://learn.idtechwire.com/datasets/schemas/cards.schema.json) | 2026-03-31 |
|
| 30 |
+
|
| 31 |
+
## Repository contents
|
| 32 |
+
|
| 33 |
+
- `vendors.jsonl`
|
| 34 |
+
- `technologies.jsonl`
|
| 35 |
+
- `glossary.jsonl`
|
| 36 |
+
- `cards.jsonl`
|
| 37 |
+
- `dataset-manifest.json`
|
| 38 |
+
- `schemas/*.schema.json`
|
| 39 |
+
|
| 40 |
+
## Canonical source
|
| 41 |
+
|
| 42 |
+
- Site: [https://learn.idtechwire.com](https://learn.idtechwire.com)
|
| 43 |
+
- AI hub: [https://learn.idtechwire.com/for-ai](https://learn.idtechwire.com/for-ai)
|
| 44 |
+
- Dataset browser: [https://learn.idtechwire.com/for-ai/datasets](https://learn.idtechwire.com/for-ai/datasets)
|
| 45 |
+
- Manifest: [https://learn.idtechwire.com/datasets/dataset-manifest.json](https://learn.idtechwire.com/datasets/dataset-manifest.json)
|
| 46 |
+
- LLM guidance: [https://learn.idtechwire.com/llms.txt](https://learn.idtechwire.com/llms.txt)
|
| 47 |
+
|
| 48 |
+
## Data model
|
| 49 |
+
|
| 50 |
+
Each record includes provenance in an `_meta` block with dataset name, schema version, source path, canonical path, API path, and license.
|
| 51 |
+
|
| 52 |
+
This mirror was generated from catalog version **2.0.0** and schema version **1.0.0**. The source manifest timestamp is **2026-03-31T14:53:40.136Z**.
|
| 53 |
+
|
| 54 |
+
## License
|
| 55 |
+
|
| 56 |
+
Unless otherwise noted, the mirrored Learning Center content is published under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/).
|
| 57 |
+
|
| 58 |
+
## Update policy
|
| 59 |
+
|
| 60 |
+
This dataset mirror is generated from the same source-controlled build artifacts that power the public Learning Center. Do not edit mirrored files directly in the Hub UI; update the canonical repo and re-run the mirror workflow instead.
|
cards.jsonl
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
dataset-manifest.json
ADDED
|
@@ -0,0 +1,51 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"version": "2.0.0",
|
| 3 |
+
"schemaVersion": "1.0.0",
|
| 4 |
+
"lastUpdated": "2026-03-31T14:53:40.136Z",
|
| 5 |
+
"datasets": {
|
| 6 |
+
"vendors": {
|
| 7 |
+
"name": "vendors",
|
| 8 |
+
"entries": 43,
|
| 9 |
+
"lastUpdated": "2026-03-18T00:00:00Z",
|
| 10 |
+
"format": "jsonl",
|
| 11 |
+
"license": "https://creativecommons.org/licenses/by/4.0/",
|
| 12 |
+
"datasetPath": "/datasets/vendors.jsonl",
|
| 13 |
+
"browsePath": "/for-ai/datasets/vendors",
|
| 14 |
+
"apiPath": "/api/vendors",
|
| 15 |
+
"schemaPath": "/datasets/schemas/vendors.schema.json"
|
| 16 |
+
},
|
| 17 |
+
"technologies": {
|
| 18 |
+
"name": "technologies",
|
| 19 |
+
"entries": 30,
|
| 20 |
+
"lastUpdated": "2026-03-31T14:53:40.136Z",
|
| 21 |
+
"format": "jsonl",
|
| 22 |
+
"license": "https://creativecommons.org/licenses/by/4.0/",
|
| 23 |
+
"datasetPath": "/datasets/technologies.jsonl",
|
| 24 |
+
"browsePath": "/for-ai/datasets/technologies",
|
| 25 |
+
"apiPath": "/api/technologies",
|
| 26 |
+
"schemaPath": "/datasets/schemas/technologies.schema.json"
|
| 27 |
+
},
|
| 28 |
+
"glossary": {
|
| 29 |
+
"name": "glossary",
|
| 30 |
+
"entries": 23,
|
| 31 |
+
"lastUpdated": "2025-11-10T00:00:00.000Z",
|
| 32 |
+
"format": "jsonl",
|
| 33 |
+
"license": "https://creativecommons.org/licenses/by/4.0/",
|
| 34 |
+
"datasetPath": "/datasets/glossary.jsonl",
|
| 35 |
+
"browsePath": "/for-ai/datasets/glossary",
|
| 36 |
+
"apiPath": "/api/glossary",
|
| 37 |
+
"schemaPath": "/datasets/schemas/glossary.schema.json"
|
| 38 |
+
},
|
| 39 |
+
"cards": {
|
| 40 |
+
"name": "cards",
|
| 41 |
+
"entries": 99,
|
| 42 |
+
"lastUpdated": "2026-03-31T14:53:40.134Z",
|
| 43 |
+
"format": "jsonl",
|
| 44 |
+
"license": "https://creativecommons.org/licenses/by/4.0/",
|
| 45 |
+
"datasetPath": "/datasets/cards.jsonl",
|
| 46 |
+
"browsePath": "/for-ai/datasets/cards",
|
| 47 |
+
"apiPath": "/api/cards",
|
| 48 |
+
"schemaPath": "/datasets/schemas/cards.schema.json"
|
| 49 |
+
}
|
| 50 |
+
}
|
| 51 |
+
}
|
glossary.jsonl
ADDED
|
@@ -0,0 +1,23 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"slug":"abistemplate","title":"Automated Biometric Identification System (ABIS)","definition":"System for large-scale biometric matching and identification using algorithms and databases.","related":["matching"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is an Automated Biometric Identification System (ABIS)?","answer":"An ABIS is a system that automates large-scale biometric matching and identification using algorithms and centralized databases."},{"question":"How does ABIS improve biometric matching?","answer":"ABIS leverages advanced algorithms to process and compare biometric data at scale, reducing manual verification and improving throughput."},{"question":"What are common applications of ABIS?","answer":"Typical use cases include criminal investigations, border security, and large-scale identity verification in government programs."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/abistemplate.md","canonicalPath":"/glossary/abistemplate","apiPath":"/api/glossary/abistemplate"}}
|
| 2 |
+
{"slug":"consent","title":"Consent","definition":"Voluntary agreement by a person for their personal data to be used for specific purposes.","related":["gdpr"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What does consent mean in data privacy?","answer":"Consent is a person’s voluntary and informed agreement for their personal data to be collected, processed, and used for specific purposes."},{"question":"Why is consent important for biometric data?","answer":"Biometric data is sensitive; obtaining consent ensures compliance with privacy laws and respect for individual autonomy."},{"question":"How can organizations obtain valid consent?","answer":"Valid consent requires clear information, unambiguous opt-in mechanisms, and allows individuals to withdraw consent at any time."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/consent.md","canonicalPath":"/glossary/consent","apiPath":"/api/glossary/consent"}}
|
| 3 |
+
{"slug":"deep-learning","title":"Deep Learning","definition":"Subset of machine learning using neural networks with multiple layers to model complex data representations.","related":["facial-recognition"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is deep learning?","answer":"Deep learning is a subset of machine learning that uses neural networks with multiple layers to model complex patterns and representations."},{"question":"How is deep learning used in biometric systems?","answer":"Techniques like convolutional neural networks (CNNs) extract high-dimensional features from biometric data (e.g., face, fingerprint) to improve recognition accuracy."},{"question":"Why is deep learning important for biometric matching?","answer":"Deep learning models automatically learn discriminative features, reducing manual feature engineering and enhancing performance across varied conditions."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/deep-learning.md","canonicalPath":"/glossary/deep-learning","apiPath":"/api/glossary/deep-learning"}}
|
| 4 |
+
{"title":"Equal Error Rate (EER)","slug":"eer","definition":"A single operating point where the false match rate equals the false non‑match rate. Lower EER generally indicates better discriminative performance for a matcher on a given dataset.","related":["facial-recognition","fingerprint-recognition","iris-recognition","multimodal-biometrics"],"createdAt":"2025-11-10T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/eer.md","canonicalPath":"/glossary/eer","apiPath":"/api/glossary/eer"}}
|
| 5 |
+
{"slug":"eidas","title":"eIDAS","definition":"EU regulation on electronic identification and trust services for secure electronic transactions.","related":["digital-identity"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is eIDAS regulation?","answer":"The eIDAS Regulation is an EU framework for electronic identification and trust services, setting standards for secure online transactions and legally recognized electronic signatures."},{"question":"How does eIDAS impact digital identity services?","answer":"eIDAS ensures cross-border interoperability of digital identity schemes, enabling secure authentication and electronic signatures across EU member states."},{"question":"What are the assurance levels defined by eIDAS?","answer":"eIDAS defines assurance levels (low, substantial, high) based on the rigor of identity proofing and authentication methods required for different security needs."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/eidas.md","canonicalPath":"/glossary/eidas","apiPath":"/api/glossary/eidas"}}
|
| 6 |
+
{"title":"Failure to Acquire (FTA)","slug":"failure-to-acquire","definition":"The proportion of attempts where a usable biometric sample cannot be captured (e.g., sensor or user issues). FTA reduces overall system throughput and may bias evaluations if not accounted for.","related":["fingerprint-recognition","facial-recognition","iris-recognition","behavioral-biometrics"],"createdAt":"2025-11-10T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/failure-to-acquire.md","canonicalPath":"/glossary/failure-to-acquire","apiPath":"/api/glossary/failure-to-acquire"}}
|
| 7 |
+
{"title":"Failure to Enroll (FTE)","slug":"failure-to-enroll","definition":"The proportion of subjects who cannot be enrolled due to poor quality or insufficient data. High FTE indicates capture or process issues that limit coverage of the intended population.","related":["fingerprint-recognition","facial-recognition","iris-recognition","abis-dedup"],"createdAt":"2025-11-10T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/failure-to-enroll.md","canonicalPath":"/glossary/failure-to-enroll","apiPath":"/api/glossary/failure-to-enroll"}}
|
| 8 |
+
{"slug":"fido","title":"FIDO Alliance","definition":"Industry consortium promoting standards for strong authentication like U2F and FIDO2.","related":["u2f"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is the FIDO Alliance?","answer":"The FIDO Alliance is an industry consortium that develops open authentication standards to reduce reliance on passwords and enhance security with strong, phishing-resistant methods."},{"question":"What authentication protocols does FIDO support?","answer":"FIDO supports protocols like U2F (Universal 2nd Factor) and FIDO2, which use public key cryptography and hardware or platform authenticators."},{"question":"How does FIDO improve online authentication security?","answer":"By replacing shared secrets with unique cryptographic keys tied to a user’s device and requiring user presence, FIDO mitigates phishing and credential theft."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/fido.md","canonicalPath":"/glossary/fido","apiPath":"/api/glossary/fido"}}
|
| 9 |
+
{"title":"FMR and FNMR","slug":"fmr-fnmr","definition":"FMR (False Match Rate) is the proportion of impostor comparisons incorrectly accepted; FNMR (False Non‑Match Rate) is the proportion of genuine comparisons incorrectly rejected. They trade off with the decision threshold.","related":["facial-recognition","fingerprint-recognition","iris-recognition"],"createdAt":"2025-11-10T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/fmr-fnmr.md","canonicalPath":"/glossary/fmr-fnmr","apiPath":"/api/glossary/fmr-fnmr"}}
|
| 10 |
+
{"slug":"gdpr","title":"General Data Protection Regulation (GDPR)","definition":"EU regulation enforcing data protection and privacy for individuals within the European Union.","related":["privacy"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is the GDPR?","answer":"The General Data Protection Regulation (GDPR) is an EU regulation that governs the collection, processing, and protection of personal data for individuals within the European Union."},{"question":"How does GDPR treat biometric data?","answer":"Under GDPR, biometric data is classified as sensitive personal data, requiring explicit consent, strict security measures, and legal justification for processing."},{"question":"What rights do individuals have under GDPR?","answer":"GDPR grants rights such as access, rectification, erasure, data portability, and the right to object to processing of personal data."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/gdpr.md","canonicalPath":"/glossary/gdpr","apiPath":"/api/glossary/gdpr"}}
|
| 11 |
+
{"title":"Identification vs Verification","slug":"identification-vs-verification","definition":"Identification answers ‘who is this?’ via 1:N search against a gallery. Verification answers ‘is this person who they claim?’ via 1:1 comparison between a probe and a claimed identity’s reference.","related":["abis-dedup","facial-recognition","fingerprint-recognition","passkeys-webauthn"],"createdAt":"2025-11-10T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/identification-vs-verification.md","canonicalPath":"/glossary/identification-vs-verification","apiPath":"/api/glossary/identification-vs-verification"}}
|
| 12 |
+
{"slug":"identity-proofing","title":"Identity Proofing","definition":"Process of verifying that a person is who they claim to be, often using ID documents and biometric checks.","related":["digital-identity"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is identity proofing?","answer":"Identity proofing is the process of verifying that a person is who they claim to be, often using documents, biometric checks, and trusted data sources."},{"question":"Why is identity proofing essential for digital services?","answer":"It prevents identity fraud by ensuring only legitimate users can enroll and access services, supporting security and regulatory compliance."},{"question":"Which methods are used for identity proofing?","answer":"Common methods include document verification, facial recognition with liveness detection, and database checks against authoritative records."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/identity-proofing.md","canonicalPath":"/glossary/identity-proofing","apiPath":"/api/glossary/identity-proofing"}}
|
| 13 |
+
{"slug":"matching","title":"Biometric Matching","definition":"Comparing a biometric sample against stored templates to verify or identify an individual.","related":["abistemplate","template"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is biometric matching?","answer":"Biometric matching compares a captured biometric sample against stored templates to verify or identify an individual based on similarity scores."},{"question":"What are verification and identification in biometric matching?","answer":"Verification (1:1) confirms a claimed identity, while identification (1:N) searches a database to find a matching identity without a prior claim."},{"question":"What factors influence matching accuracy?","answer":"Accuracy depends on sample quality, sensor reliability, algorithm robustness, environmental conditions, and threshold settings."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/matching.md","canonicalPath":"/glossary/matching","apiPath":"/api/glossary/matching"}}
|
| 14 |
+
{"slug":"multi-factor-authentication","title":"Multi-Factor Authentication (MFA)","definition":"Authentication method requiring two or more verification factors, such as something you know and something you are.","related":["u2f","fido"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is multi-factor authentication (MFA)?","answer":"MFA is an authentication method requiring two or more verification factors, such as something you know (password), something you have (token), and something you are (biometric)."},{"question":"How does MFA improve security?","answer":"By combining independent factors, MFA reduces the risk of unauthorized access if one factor is compromised, strengthening overall protection."},{"question":"What are common MFA examples?","answer":"Examples include password plus SMS OTP, hardware tokens with PIN, smartphone push notifications, and biometric factors like fingerprint or face recognition."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/multi-factor-authentication.md","canonicalPath":"/glossary/multi-factor-authentication","apiPath":"/api/glossary/multi-factor-authentication"}}
|
| 15 |
+
{"slug":"nist-frvt","title":"NIST Face Recognition Vendor Test (FRVT)","definition":"A series of evaluations by NIST to benchmark face recognition algorithms under controlled and uncontrolled conditions.","related":["facial-recognition"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is NIST FRVT?","answer":"The NIST Face Recognition Vendor Test (FRVT) is a benchmarking program evaluating face recognition algorithm performance under various conditions."},{"question":"How does NIST FRVT assess face recognition?","answer":"FRVT measures accuracy, speed, and interoperability by testing algorithms on standard datasets and reporting metrics like false match and non-match rates."},{"question":"Why are NIST FRVT results important?","answer":"Unbiased FRVT results guide organizations in selecting reliable face recognition solutions by providing standardized performance benchmarks."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/nist-frvt.md","canonicalPath":"/glossary/nist-frvt","apiPath":"/api/glossary/nist-frvt"}}
|
| 16 |
+
{"title":"On‑Device vs Server‑Side Matching","slug":"on-device-vs-server-matching","definition":"Design choice where biometric matching happens locally on a user’s device (with templates kept device‑bound) versus centrally on a server. On‑device improves privacy and reduces breach scope; server‑side can enable centralized management and large‑scale search (1:N).","related":["passkeys-webauthn","facial-recognition","digital-id"],"createdAt":"2025-11-10T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/on-device-vs-server-matching.md","canonicalPath":"/glossary/on-device-vs-server-matching","apiPath":"/api/glossary/on-device-vs-server-matching"}}
|
| 17 |
+
{"slug":"pad","title":"Presentation Attack Detection (PAD)","definition":"PAD refers to techniques used to detect artefacts (masks, photos, deepfakes) intended to spoof biometric systems.","related":["facial-recognition","fingerprint-recognition","voice-recognition","iris-recognition"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is Presentation Attack Detection (PAD)?","answer":"PAD refers to techniques used to detect and prevent spoofing attacks by verifying that a biometric sample originates from a live human rather than artificial artefacts."},{"question":"Why is PAD critical for biometric systems?","answer":"PAD ensures security by preventing attackers from using masks, photos, or deepfake videos to spoof biometric authentication."},{"question":"What methods are used for PAD?","answer":"Common methods include texture analysis, motion/liveness detection, infrared imaging for vein patterns, and challenge-response protocols."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/pad.md","canonicalPath":"/glossary/pad","apiPath":"/api/glossary/pad"}}
|
| 18 |
+
{"slug":"privacy","title":"Privacy","definition":"The right of individuals to control the collection, use, and disclosure of their personal data.","related":["gdpr"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What does privacy mean in biometrics?","answer":"Privacy in biometrics refers to individuals’ rights to control how their biometric data is collected, processed, stored, and shared."},{"question":"How do privacy regulations protect biometric data?","answer":"Regulations like GDPR and CCPA enforce data minimization, consent requirements, and security controls for handling biometric information."},{"question":"What are best practices for ensuring biometric privacy?","answer":"Best practices include encryption of data at rest and in transit, anonymization, strict access controls, transparent policies, and user consent."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/privacy.md","canonicalPath":"/glossary/privacy","apiPath":"/api/glossary/privacy"}}
|
| 19 |
+
{"title":"ROC and DET Curves","slug":"roc-det","definition":"Receiver Operating Characteristic (ROC) and Detection Error Tradeoff (DET) curves visualize biometric performance across thresholds. ROC plots true accept vs false accept; DET plots false reject vs false accept on normal deviate scales for readability.","related":["fmr-fnmr","facial-recognition","fingerprint-recognition","iris-recognition"],"createdAt":"2025-11-10T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/roc-det.md","canonicalPath":"/glossary/roc-det","apiPath":"/api/glossary/roc-det"}}
|
| 20 |
+
{"slug":"spoofing","title":"Biometric Spoofing","definition":"Attempt to deceive a biometric system by presenting artificial traits like masks or fake fingerprints.","related":["pad"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is biometric spoofing?","answer":"Biometric spoofing is the act of deceiving a biometric system by presenting fake traits like silicone fingerprints, printed face images, or masks."},{"question":"How do systems detect spoofing attacks?","answer":"Detection uses PAD techniques, liveness detection algorithms, multi-modal biometrics, and machine learning classifiers to identify artefacts."},{"question":"What are the security risks of biometric spoofing?","answer":"Successful spoofing can grant unauthorized access, compromise security, and undermine trust in biometric authentication solutions."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/spoofing.md","canonicalPath":"/glossary/spoofing","apiPath":"/api/glossary/spoofing"}}
|
| 21 |
+
{"title":"Template Inversion","slug":"template-inversion","definition":"An attack that attempts to reconstruct a biometric sample (e.g., a face image or fingerprint) from its stored template or embedding. Strong template protection schemes aim to make inversion computationally infeasible or yield unusable reconstructions.","related":["template-protection","facial-recognition","fingerprint-recognition"],"createdAt":"2025-11-10T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/template-inversion.md","canonicalPath":"/glossary/template-inversion","apiPath":"/api/glossary/template-inversion"}}
|
| 22 |
+
{"slug":"template","title":"Biometric Template","definition":"Digital representation of biometric features extracted from a sample for matching and storage.","related":["matching"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is a biometric template?","answer":"A biometric template is a digital representation of extracted features (e.g., fingerprint minutiae or facial embeddings) used for matching and storage."},{"question":"How are biometric templates protected?","answer":"Templates are secured through encryption, hashing, cancelable biometric schemes, and secure hardware to prevent theft and misuse."},{"question":"Why use templates instead of raw biometric data?","answer":"Templates abstract away raw images, reducing storage requirements, protecting privacy, and enabling fast and secure comparisons."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/template.md","canonicalPath":"/glossary/template","apiPath":"/api/glossary/template"}}
|
| 23 |
+
{"slug":"u2f","title":"Universal 2nd Factor (U2F)","definition":"Open authentication standard that adds a second factor using hardware tokens for stronger security.","related":["fido"],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-05-07T00:00:00.000Z","faq":[{"question":"What is Universal 2nd Factor (U2F)?","answer":"U2F is an open authentication standard by the FIDO Alliance that uses hardware tokens (USB/NFC) to provide phishing-resistant two-factor authentication."},{"question":"How does U2F prevent phishing attacks?","answer":"U2F uses origin-bound cryptographic challenge-response, ensuring tokens only authenticate legitimate websites and thwarting phishing attempts."},{"question":"Can one U2F device be used with multiple services?","answer":"Yes, U2F tokens generate unique key pairs per service, allowing secure, cross-platform authentication with a single physical device."}],"license":"CC-BY-4.0","_meta":{"dataset":"glossary","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/glossary/u2f.md","canonicalPath":"/glossary/u2f","apiPath":"/api/glossary/u2f"}}
|
schemas/cards.schema.json
ADDED
|
@@ -0,0 +1,107 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"$schema": "https://json-schema.org/draft/2020-12/schema",
|
| 3 |
+
"title": "Data Cards dataset schema",
|
| 4 |
+
"description": "Date-stamped news cards that keep vendor and technology knowledge fresh for AI ingestion and retrieval.",
|
| 5 |
+
"schemaVersion": "1.0.0",
|
| 6 |
+
"catalogVersion": "2.0.0",
|
| 7 |
+
"license": "https://creativecommons.org/licenses/by/4.0/",
|
| 8 |
+
"type": "object",
|
| 9 |
+
"required": [
|
| 10 |
+
"slug",
|
| 11 |
+
"title",
|
| 12 |
+
"summary",
|
| 13 |
+
"datePublished",
|
| 14 |
+
"about",
|
| 15 |
+
"_meta"
|
| 16 |
+
],
|
| 17 |
+
"fields": [
|
| 18 |
+
{
|
| 19 |
+
"name": "slug",
|
| 20 |
+
"type": "string",
|
| 21 |
+
"required": true,
|
| 22 |
+
"description": "Stable card identifier including a date suffix."
|
| 23 |
+
},
|
| 24 |
+
{
|
| 25 |
+
"name": "title",
|
| 26 |
+
"type": "string",
|
| 27 |
+
"required": true,
|
| 28 |
+
"description": "Headline for the card."
|
| 29 |
+
},
|
| 30 |
+
{
|
| 31 |
+
"name": "summary",
|
| 32 |
+
"type": "string",
|
| 33 |
+
"required": true,
|
| 34 |
+
"description": "Short machine-readable summary."
|
| 35 |
+
},
|
| 36 |
+
{
|
| 37 |
+
"name": "datePublished",
|
| 38 |
+
"type": "string",
|
| 39 |
+
"required": true,
|
| 40 |
+
"description": "ISO publication date."
|
| 41 |
+
},
|
| 42 |
+
{
|
| 43 |
+
"name": "about",
|
| 44 |
+
"type": "object[]",
|
| 45 |
+
"required": true,
|
| 46 |
+
"description": "Technology references attached to the card."
|
| 47 |
+
},
|
| 48 |
+
{
|
| 49 |
+
"name": "mentions",
|
| 50 |
+
"type": "object[]",
|
| 51 |
+
"required": false,
|
| 52 |
+
"description": "Vendor references attached to the card."
|
| 53 |
+
},
|
| 54 |
+
{
|
| 55 |
+
"name": "sources",
|
| 56 |
+
"type": "string[]",
|
| 57 |
+
"required": false,
|
| 58 |
+
"description": "External source URLs supporting the card."
|
| 59 |
+
},
|
| 60 |
+
{
|
| 61 |
+
"name": "_meta",
|
| 62 |
+
"type": "object",
|
| 63 |
+
"required": true,
|
| 64 |
+
"description": "Provenance and contract metadata for this record."
|
| 65 |
+
}
|
| 66 |
+
],
|
| 67 |
+
"properties": {
|
| 68 |
+
"slug": {
|
| 69 |
+
"type": "string",
|
| 70 |
+
"description": "Stable card identifier including a date suffix."
|
| 71 |
+
},
|
| 72 |
+
"title": {
|
| 73 |
+
"type": "string",
|
| 74 |
+
"description": "Headline for the card."
|
| 75 |
+
},
|
| 76 |
+
"summary": {
|
| 77 |
+
"type": "string",
|
| 78 |
+
"description": "Short machine-readable summary."
|
| 79 |
+
},
|
| 80 |
+
"datePublished": {
|
| 81 |
+
"type": "string",
|
| 82 |
+
"description": "ISO publication date."
|
| 83 |
+
},
|
| 84 |
+
"about": {
|
| 85 |
+
"type": "array",
|
| 86 |
+
"description": "Technology references attached to the card."
|
| 87 |
+
},
|
| 88 |
+
"mentions": {
|
| 89 |
+
"type": "array",
|
| 90 |
+
"description": "Vendor references attached to the card."
|
| 91 |
+
},
|
| 92 |
+
"sources": {
|
| 93 |
+
"type": "array",
|
| 94 |
+
"description": "External source URLs supporting the card."
|
| 95 |
+
},
|
| 96 |
+
"_meta": {
|
| 97 |
+
"type": "object",
|
| 98 |
+
"description": "Provenance and contract metadata for this record."
|
| 99 |
+
}
|
| 100 |
+
},
|
| 101 |
+
"distribution": {
|
| 102 |
+
"datasetPath": "/datasets/cards.jsonl",
|
| 103 |
+
"browsePath": "/for-ai/datasets/cards",
|
| 104 |
+
"apiPath": "/api/cards",
|
| 105 |
+
"entityPathPattern": "/cards/[slug]"
|
| 106 |
+
}
|
| 107 |
+
}
|
schemas/glossary.schema.json
ADDED
|
@@ -0,0 +1,94 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"$schema": "https://json-schema.org/draft/2020-12/schema",
|
| 3 |
+
"title": "Glossary dataset schema",
|
| 4 |
+
"description": "Defined terms and related concepts for grounding identity-tech language and terminology.",
|
| 5 |
+
"schemaVersion": "1.0.0",
|
| 6 |
+
"catalogVersion": "2.0.0",
|
| 7 |
+
"license": "https://creativecommons.org/licenses/by/4.0/",
|
| 8 |
+
"type": "object",
|
| 9 |
+
"required": [
|
| 10 |
+
"slug",
|
| 11 |
+
"definition",
|
| 12 |
+
"_meta"
|
| 13 |
+
],
|
| 14 |
+
"fields": [
|
| 15 |
+
{
|
| 16 |
+
"name": "slug",
|
| 17 |
+
"type": "string",
|
| 18 |
+
"required": true,
|
| 19 |
+
"description": "Stable glossary identifier."
|
| 20 |
+
},
|
| 21 |
+
{
|
| 22 |
+
"name": "term",
|
| 23 |
+
"type": "string",
|
| 24 |
+
"required": false,
|
| 25 |
+
"description": "Preferred display label when present."
|
| 26 |
+
},
|
| 27 |
+
{
|
| 28 |
+
"name": "title",
|
| 29 |
+
"type": "string",
|
| 30 |
+
"required": false,
|
| 31 |
+
"description": "Legacy equivalent to term."
|
| 32 |
+
},
|
| 33 |
+
{
|
| 34 |
+
"name": "definition",
|
| 35 |
+
"type": "string",
|
| 36 |
+
"required": true,
|
| 37 |
+
"description": "Plain-language definition used in retrieval and entity pages."
|
| 38 |
+
},
|
| 39 |
+
{
|
| 40 |
+
"name": "related",
|
| 41 |
+
"type": "string[]",
|
| 42 |
+
"required": false,
|
| 43 |
+
"description": "Related vendor or technology slugs."
|
| 44 |
+
},
|
| 45 |
+
{
|
| 46 |
+
"name": "faq",
|
| 47 |
+
"type": "object[]",
|
| 48 |
+
"required": false,
|
| 49 |
+
"description": "Optional FAQ entries for grounding."
|
| 50 |
+
},
|
| 51 |
+
{
|
| 52 |
+
"name": "_meta",
|
| 53 |
+
"type": "object",
|
| 54 |
+
"required": true,
|
| 55 |
+
"description": "Provenance and contract metadata for this record."
|
| 56 |
+
}
|
| 57 |
+
],
|
| 58 |
+
"properties": {
|
| 59 |
+
"slug": {
|
| 60 |
+
"type": "string",
|
| 61 |
+
"description": "Stable glossary identifier."
|
| 62 |
+
},
|
| 63 |
+
"term": {
|
| 64 |
+
"type": "string",
|
| 65 |
+
"description": "Preferred display label when present."
|
| 66 |
+
},
|
| 67 |
+
"title": {
|
| 68 |
+
"type": "string",
|
| 69 |
+
"description": "Legacy equivalent to term."
|
| 70 |
+
},
|
| 71 |
+
"definition": {
|
| 72 |
+
"type": "string",
|
| 73 |
+
"description": "Plain-language definition used in retrieval and entity pages."
|
| 74 |
+
},
|
| 75 |
+
"related": {
|
| 76 |
+
"type": "array",
|
| 77 |
+
"description": "Related vendor or technology slugs."
|
| 78 |
+
},
|
| 79 |
+
"faq": {
|
| 80 |
+
"type": "array",
|
| 81 |
+
"description": "Optional FAQ entries for grounding."
|
| 82 |
+
},
|
| 83 |
+
"_meta": {
|
| 84 |
+
"type": "object",
|
| 85 |
+
"description": "Provenance and contract metadata for this record."
|
| 86 |
+
}
|
| 87 |
+
},
|
| 88 |
+
"distribution": {
|
| 89 |
+
"datasetPath": "/datasets/glossary.jsonl",
|
| 90 |
+
"browsePath": "/for-ai/datasets/glossary",
|
| 91 |
+
"apiPath": "/api/glossary",
|
| 92 |
+
"entityPathPattern": "/glossary/[slug]"
|
| 93 |
+
}
|
| 94 |
+
}
|
schemas/technologies.schema.json
ADDED
|
@@ -0,0 +1,107 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"$schema": "https://json-schema.org/draft/2020-12/schema",
|
| 3 |
+
"title": "Technology dataset schema",
|
| 4 |
+
"description": "Technology primers with summaries, descriptions, references, FAQ content, and provenance.",
|
| 5 |
+
"schemaVersion": "1.0.0",
|
| 6 |
+
"catalogVersion": "2.0.0",
|
| 7 |
+
"license": "https://creativecommons.org/licenses/by/4.0/",
|
| 8 |
+
"type": "object",
|
| 9 |
+
"required": [
|
| 10 |
+
"slug",
|
| 11 |
+
"name",
|
| 12 |
+
"summary",
|
| 13 |
+
"description",
|
| 14 |
+
"references",
|
| 15 |
+
"_meta"
|
| 16 |
+
],
|
| 17 |
+
"fields": [
|
| 18 |
+
{
|
| 19 |
+
"name": "slug",
|
| 20 |
+
"type": "string",
|
| 21 |
+
"required": true,
|
| 22 |
+
"description": "Stable technology identifier."
|
| 23 |
+
},
|
| 24 |
+
{
|
| 25 |
+
"name": "name",
|
| 26 |
+
"type": "string",
|
| 27 |
+
"required": true,
|
| 28 |
+
"description": "Human-readable technology label."
|
| 29 |
+
},
|
| 30 |
+
{
|
| 31 |
+
"name": "summary",
|
| 32 |
+
"type": "string",
|
| 33 |
+
"required": true,
|
| 34 |
+
"description": "Short primer summary."
|
| 35 |
+
},
|
| 36 |
+
{
|
| 37 |
+
"name": "description",
|
| 38 |
+
"type": "string",
|
| 39 |
+
"required": true,
|
| 40 |
+
"description": "Full Markdown-derived primer body."
|
| 41 |
+
},
|
| 42 |
+
{
|
| 43 |
+
"name": "references",
|
| 44 |
+
"type": "object[]",
|
| 45 |
+
"required": true,
|
| 46 |
+
"description": "Reference links used for sourcing and citation."
|
| 47 |
+
},
|
| 48 |
+
{
|
| 49 |
+
"name": "faq",
|
| 50 |
+
"type": "object[]",
|
| 51 |
+
"required": false,
|
| 52 |
+
"description": "Optional FAQ entries for grounding and answer generation."
|
| 53 |
+
},
|
| 54 |
+
{
|
| 55 |
+
"name": "published",
|
| 56 |
+
"type": "boolean",
|
| 57 |
+
"required": false,
|
| 58 |
+
"description": "Controls public visibility in the human interface."
|
| 59 |
+
},
|
| 60 |
+
{
|
| 61 |
+
"name": "_meta",
|
| 62 |
+
"type": "object",
|
| 63 |
+
"required": true,
|
| 64 |
+
"description": "Provenance and contract metadata for this record."
|
| 65 |
+
}
|
| 66 |
+
],
|
| 67 |
+
"properties": {
|
| 68 |
+
"slug": {
|
| 69 |
+
"type": "string",
|
| 70 |
+
"description": "Stable technology identifier."
|
| 71 |
+
},
|
| 72 |
+
"name": {
|
| 73 |
+
"type": "string",
|
| 74 |
+
"description": "Human-readable technology label."
|
| 75 |
+
},
|
| 76 |
+
"summary": {
|
| 77 |
+
"type": "string",
|
| 78 |
+
"description": "Short primer summary."
|
| 79 |
+
},
|
| 80 |
+
"description": {
|
| 81 |
+
"type": "string",
|
| 82 |
+
"description": "Full Markdown-derived primer body."
|
| 83 |
+
},
|
| 84 |
+
"references": {
|
| 85 |
+
"type": "array",
|
| 86 |
+
"description": "Reference links used for sourcing and citation."
|
| 87 |
+
},
|
| 88 |
+
"faq": {
|
| 89 |
+
"type": "array",
|
| 90 |
+
"description": "Optional FAQ entries for grounding and answer generation."
|
| 91 |
+
},
|
| 92 |
+
"published": {
|
| 93 |
+
"type": "boolean",
|
| 94 |
+
"description": "Controls public visibility in the human interface."
|
| 95 |
+
},
|
| 96 |
+
"_meta": {
|
| 97 |
+
"type": "object",
|
| 98 |
+
"description": "Provenance and contract metadata for this record."
|
| 99 |
+
}
|
| 100 |
+
},
|
| 101 |
+
"distribution": {
|
| 102 |
+
"datasetPath": "/datasets/technologies.jsonl",
|
| 103 |
+
"browsePath": "/for-ai/datasets/technologies",
|
| 104 |
+
"apiPath": "/api/technologies",
|
| 105 |
+
"entityPathPattern": "/technologies/[slug]"
|
| 106 |
+
}
|
| 107 |
+
}
|
schemas/vendors.schema.json
ADDED
|
@@ -0,0 +1,106 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"$schema": "https://json-schema.org/draft/2020-12/schema",
|
| 3 |
+
"title": "Vendor dataset schema",
|
| 4 |
+
"description": "Structured identity-tech vendor and association records for retrieval, indexing, and training pipelines.",
|
| 5 |
+
"schemaVersion": "1.0.0",
|
| 6 |
+
"catalogVersion": "2.0.0",
|
| 7 |
+
"license": "https://creativecommons.org/licenses/by/4.0/",
|
| 8 |
+
"type": "object",
|
| 9 |
+
"required": [
|
| 10 |
+
"slug",
|
| 11 |
+
"name",
|
| 12 |
+
"description",
|
| 13 |
+
"website",
|
| 14 |
+
"_meta"
|
| 15 |
+
],
|
| 16 |
+
"fields": [
|
| 17 |
+
{
|
| 18 |
+
"name": "slug",
|
| 19 |
+
"type": "string",
|
| 20 |
+
"required": true,
|
| 21 |
+
"description": "Stable primary key for URLs and APIs."
|
| 22 |
+
},
|
| 23 |
+
{
|
| 24 |
+
"name": "name",
|
| 25 |
+
"type": "string",
|
| 26 |
+
"required": true,
|
| 27 |
+
"description": "Display name of the vendor or association."
|
| 28 |
+
},
|
| 29 |
+
{
|
| 30 |
+
"name": "description",
|
| 31 |
+
"type": "string",
|
| 32 |
+
"required": true,
|
| 33 |
+
"description": "Short evergreen summary used in listings and retrieval."
|
| 34 |
+
},
|
| 35 |
+
{
|
| 36 |
+
"name": "website",
|
| 37 |
+
"type": "string",
|
| 38 |
+
"required": true,
|
| 39 |
+
"description": "Canonical external website."
|
| 40 |
+
},
|
| 41 |
+
{
|
| 42 |
+
"name": "technologies",
|
| 43 |
+
"type": "string[]",
|
| 44 |
+
"required": false,
|
| 45 |
+
"description": "Linked technology slugs covered by the vendor."
|
| 46 |
+
},
|
| 47 |
+
{
|
| 48 |
+
"name": "products",
|
| 49 |
+
"type": "string[]",
|
| 50 |
+
"required": false,
|
| 51 |
+
"description": "Curated product or solution names."
|
| 52 |
+
},
|
| 53 |
+
{
|
| 54 |
+
"name": "overview",
|
| 55 |
+
"type": "string",
|
| 56 |
+
"required": false,
|
| 57 |
+
"description": "Long-form company overview for richer prompts and entity pages."
|
| 58 |
+
},
|
| 59 |
+
{
|
| 60 |
+
"name": "_meta",
|
| 61 |
+
"type": "object",
|
| 62 |
+
"required": true,
|
| 63 |
+
"description": "Provenance and contract metadata for this record."
|
| 64 |
+
}
|
| 65 |
+
],
|
| 66 |
+
"properties": {
|
| 67 |
+
"slug": {
|
| 68 |
+
"type": "string",
|
| 69 |
+
"description": "Stable primary key for URLs and APIs."
|
| 70 |
+
},
|
| 71 |
+
"name": {
|
| 72 |
+
"type": "string",
|
| 73 |
+
"description": "Display name of the vendor or association."
|
| 74 |
+
},
|
| 75 |
+
"description": {
|
| 76 |
+
"type": "string",
|
| 77 |
+
"description": "Short evergreen summary used in listings and retrieval."
|
| 78 |
+
},
|
| 79 |
+
"website": {
|
| 80 |
+
"type": "string",
|
| 81 |
+
"description": "Canonical external website."
|
| 82 |
+
},
|
| 83 |
+
"technologies": {
|
| 84 |
+
"type": "array",
|
| 85 |
+
"description": "Linked technology slugs covered by the vendor."
|
| 86 |
+
},
|
| 87 |
+
"products": {
|
| 88 |
+
"type": "array",
|
| 89 |
+
"description": "Curated product or solution names."
|
| 90 |
+
},
|
| 91 |
+
"overview": {
|
| 92 |
+
"type": "string",
|
| 93 |
+
"description": "Long-form company overview for richer prompts and entity pages."
|
| 94 |
+
},
|
| 95 |
+
"_meta": {
|
| 96 |
+
"type": "object",
|
| 97 |
+
"description": "Provenance and contract metadata for this record."
|
| 98 |
+
}
|
| 99 |
+
},
|
| 100 |
+
"distribution": {
|
| 101 |
+
"datasetPath": "/datasets/vendors.jsonl",
|
| 102 |
+
"browsePath": "/for-ai/datasets/vendors",
|
| 103 |
+
"apiPath": "/api/vendors",
|
| 104 |
+
"entityPathPattern": "/vendors/[slug]"
|
| 105 |
+
}
|
| 106 |
+
}
|
technologies.jsonl
ADDED
|
@@ -0,0 +1,30 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"title":"ABIS & Deduplication","slug":"abis-dedup","summary":"Automated Biometric Identification Systems perform large-scale 1:N searches to resolve identities and detect duplicates.","order":23,"published":true,"also_known_as":["ABIS","deduplication","1:N search"],"category":"Technology","tags":["biometrics","identity","standards"],"see_also":["fingerprint-recognition","facial-recognition","iris-recognition"],"standards":[{"label":"ANSI/NIST-ITL 1-2011 biometric data format","url":"https://www.nist.gov/publications/ansi-nist-itl-1-2011-data-format"}],"last_reviewed":"2025-11-10","faq":[{"question":"What does an ABIS do?","answer":"It searches biometric databases to identify individuals and flag duplicate enrollments across large populations."},{"question":"What’s the difference between identification and verification?","answer":"Identification is 1:N (who is this?); verification is 1:1 (is this person who they claim?). ABIS primarily supports 1:N at scale."},{"question":"How are false positives managed?","answer":"Systems tune thresholds and use adjudication workflows; quality checks and multi‑modal fusion reduce spurious hits."}],"references":[{"label":"NIST biometric standards resources","url":"https://www.nist.gov/itl/iad/image-group/biometric-standards"},{"label":"ANSI/NIST-ITL 1 data format","url":"https://www.nist.gov/publications/ansi-nist-itl-1-2011-data-format"},{"label":"ISO/IEC 19795-1 performance testing","url":"https://www.iso.org/standard/41446.html"}],"createdAt":"2026-03-31T14:53:40.135Z","updatedAt":"2026-03-31T14:53:40.135Z","name":"ABIS & Deduplication","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/abis-dedup.mdx","canonicalPath":"/technologies/abis-dedup","apiPath":"/api/technologies/abis-dedup"},"description":"## Overview\nABIS platforms store and search biometric templates at national or global scale. Deduplication ensures each person has only one identity record.\n\n## How it works\n1. Capture biometric samples during enrollment. \n2. Extract features and store templates. \n3. Run 1:N searches to detect matches or duplicates. \n4. Adjudicate hits and maintain watchlists.\n\n## Common use cases\n- National ID enrollment\n- Border and visa vetting\n- Civil or criminal watchlists\n\n## Strengths and limitations\n**Strengths:** Scales to millions; prevents multiple identities. \n**Limitations:** Infrastructure cost; privacy and governance.\n\n## Key terms\n- **1:N search:** Matching a probe against all records. \n- **Deduplication:** Removing duplicate identities in a database."}
|
| 2 |
+
{"title":"Age Assurance (Verification & Estimation)","slug":"age-assurance","summary":"Processes that verify age via trusted documents or estimate age from signals like face or behavior for online safety compliance.","order":18,"published":true,"also_known_as":["age verification","age estimation"],"category":"Technology","tags":["privacy","regulation","standards"],"see_also":["facial-recognition","digital-id"],"standards":[{"label":"PAS 1296: Age verification","url":"https://shop.bsigroup.com/products/pas-1296-age-verification"}],"last_reviewed":"2025-11-10","faq":[{"question":"How does age estimation differ from verification?","answer":"Estimation predicts age from signals, while verification checks authoritative documents or records."},{"question":"What inputs are used for estimation?","answer":"Commonly face images or short videos; some systems consider behavioral signals. Estimation should include bias and uncertainty reporting."},{"question":"How is privacy handled?","answer":"Prefer on-device processing, minimize retention, and use privacy-preserving proofs where possible; follow regulator guidance (e.g., data minimization)."}],"references":[{"label":"UK Ofcom guidance on age assurance","url":"https://www.ofcom.org.uk/online-safety/age-assurance"},{"label":"ICO Age Appropriate Design Code","url":"https://ico.org.uk/for-organisations/ico-codes-of-practice/age-appropriate-design-a-code-of-practice-for-online-services/"},{"label":"BSI PAS 1296: Age verification","url":"https://shop.bsigroup.com/products/pas-1296-age-verification"}],"createdAt":"2026-03-31T14:53:40.135Z","updatedAt":"2026-03-31T14:53:40.135Z","name":"Age Assurance (Verification & Estimation)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/age-assurance.mdx","canonicalPath":"/technologies/age-assurance","apiPath":"/api/technologies/age-assurance"},"description":"## Overview\nAge assurance tools help platforms meet legal requirements by verifying or estimating user ages before granting access to restricted content or services.\n\n## How it works\n1. **Verification:** Validate a government ID or authoritative record. \n2. **Estimation:** Use biometrics or behavior (e.g., face, voice, activity) to infer age. \n3. **Decision:** Apply policy thresholds (e.g., over 18) and handle appeals or manual review.\n\n## Common use cases\n- Social media sign-up\n- Online gaming and gambling\n- Adult content gateways\n\n## Strengths and limitations\n**Strengths:** Supports regulatory compliance; multiple methods. \n**Limitations:** Privacy concerns; estimation accuracy varies.\n\n## Key terms\n- **Age verification:** Checking an ID or database to confirm age. \n- **Age estimation:** Predicting age from biometric or behavioral signals."}
|
| 3 |
+
{"slug":"behavioral-biometrics","name":"Behavioral Biometrics","summary":"Behavioral biometrics analyzes patterns in user interactions—such as typing rhythm, mouse movement, or touchscreen gestures—to continuously verify identity.","order":10,"published":true,"references":[{"label":"NIST: Behavioral biometrics program overview","url":"https://www.nist.gov/programs-projects/behavioral-biometrics"},{"label":"NIST SP 800-63B (AAL, user verification context)","url":"https://pages.nist.gov/800-63-3/sp800-63b.html"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is behavioral biometrics?","answer":"Behavioral biometrics analyzes patterns in user interactions, such as typing rhythm, mouse movements, or touchscreen gestures, to verify identity continuously."},{"question":"How does behavioral biometrics differ from physiological biometrics?","answer":"Behavioral biometrics focuses on how users behave, whereas physiological biometrics rely on static physical traits like fingerprints or iris patterns."},{"question":"Where is behavioral biometrics commonly used?","answer":"It is used for continuous authentication, fraud detection, and adaptive security in banking, healthcare, and enterprise environments."},{"question":"What about privacy and consent?","answer":"Deployments should disclose passive monitoring and adhere to privacy laws; many systems process derived features rather than raw inputs to reduce risk."}],"title":"Behavioral Biometrics","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/behavioral-biometrics.md","canonicalPath":"/technologies/behavioral-biometrics","apiPath":"/api/technologies/behavioral-biometrics"},"description":"Behavioral biometrics leverages how a user interacts with devices or interfaces rather than physical traits. By monitoring characteristics like keystroke dynamics, touchscreen swipes, or navigation habits, systems can provide continuous and passive authentication. This modality enhances security by detecting anomalies in real-time and can complement physiological biometrics for multifactor authentication."}
|
| 4 |
+
{"slug":"biometric-border-control","name":"Biometric Border Control","summary":"Biometric border control uses face or fingerprint recognition at checkpoints to verify travelers and automate border processes.","order":7,"published":true,"references":[{"label":"ICAO Doc 9303 (series overview)","url":"https://www.icao.int/publications/doc-series/doc-9303"},{"label":"EU Smart Borders / Entry-Exit System overview","url":"https://home-affairs.ec.europa.eu/policies/schengen-borders-and-visa/smart-borders_en"},{"label":"NIST Biometrics program overview","url":"https://www.nist.gov/programs-projects/biometrics"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","updates":[],"faq":[{"question":"What is biometric border control?","answer":"It uses biometrics like fingerprints or face images at border crossings to verify travelers."},{"question":"Where is it used?","answer":"Many countries deploy biometric e-gates at airports and land checkpoints for security."},{"question":"How does it help travelers?","answer":"Automated gates reduce wait times while enhancing identity assurance."},{"question":"What’s the difference between entry and exit checks?","answer":"Entry typically verifies a traveler against their travel document and watchlists (1:1 and 1:N). Exit can confirm departure and detect overstays, often with facial verification at gates."},{"question":"How do systems handle spoofing?","answer":"They combine document checks, live capture quality controls, and presentation attack detection (PAD) to detect photos, masks, or replays."}],"title":"Biometric Border Control","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/biometric-border-control.md","canonicalPath":"/technologies/biometric-border-control","apiPath":"/api/technologies/biometric-border-control"},"description":"Biometric border control systems automate entry and exit checks with biometric capture and matching at e-gates or manual stations.\n\n### Latest Updates\n* **2025-06-30:** Somalia deployed the U.S.-backed PISCES border system at Mogadishu airport, capturing fingerprints and face images for real-time watch-list checks, with national roll-out planned."}
|
| 5 |
+
{"slug":"biometric-id-cards","name":"Biometric ID Cards","summary":"Biometric ID cards embed fingerprints or facial data on a chip for secure identity verification in travel and public services.","order":19,"published":true,"references":[{"label":"ICAO Doc 9303 (eMRTD fundamentals)","url":"https://www.icao.int/publications/doc-series/doc-9303"},{"label":"EU Regulation 2019/1157 (ID card security features)","url":"https://eur-lex.europa.eu/eli/reg/2019/1157/oj"},{"label":"ISO/IEC 7816 (smart cards)","url":"https://www.iso.org/committee/54028.html"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","updates":[],"faq":[{"question":"What is a biometric ID card?","answer":"A physical identity card containing a chip with biometric templates such as fingerprints."},{"question":"Where are biometric ID cards used?","answer":"They are used in national ID programs and for travel documents."},{"question":"Are biometrics stored securely?","answer":"Yes, data is typically encrypted and access-protected on the card chip."},{"question":"How are cards verified?","answer":"Inspectors read the chip and validate signatures using PKI (e.g., CSCA/DSC for eMRTD) and check data consistency with the printed document."}],"title":"Biometric ID Cards","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/biometric-id-cards.md","canonicalPath":"/technologies/biometric-id-cards","apiPath":"/api/technologies/biometric-id-cards"},"description":"Biometric ID cards store biometric templates on a secure chip to verify the holder and prevent fraud during identity checks.\n\n### Latest Updates\n* **2025-07-01:** Switzerland confirmed biometric ID cards will launch by end-2026, storing face and fingerprints on a secure chip in line with EU Regulation 2019/1157."}
|
| 6 |
+
{"title":"Contactless Fingerprinting","slug":"contactless-fingerprints","summary":"Touch-free fingerprint capture using cameras or scanners, enabling mobile or hygienic enrollment.","order":20,"published":true,"also_known_as":["touchless fingerprints","mobile fingerprint capture"],"category":"Technology","tags":["fingerprint","contactless","standards"],"see_also":["fingerprint-recognition"],"standards":[{"label":"NIST SP 500-334: Contactless fingerprint guidelines","url":"https://www.nist.gov/publications/sp-500-334-contactless-fingerprint-devices"}],"last_reviewed":"2025-11-10","faq":[{"question":"Why use contactless capture?","answer":"It improves hygiene and allows capture with commodity cameras on phones or kiosks."},{"question":"Will contactless images match legacy databases?","answer":"Systems reconstruct contact-equivalent images and templates; adherence to emerging profiles improves interoperability with contact-based AFIS."},{"question":"What about spoofing and PAD?","answer":"Optics and software can detect prints-on-displays or photos; PAD should be evaluated separately from matching accuracy."}],"references":[{"label":"FBI contactless fingerprint pilot specs","url":"https://fbibiospecs.fbi.gov/standards-and-specifications"},{"label":"NIST SP 500-334: Contactless devices","url":"https://www.nist.gov/publications/sp-500-334-contactless-fingerprint-devices"}],"createdAt":"2026-03-31T14:53:40.135Z","updatedAt":"2026-03-31T14:53:40.135Z","name":"Contactless Fingerprinting","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/contactless-fingerprints.mdx","canonicalPath":"/technologies/contactless-fingerprints","apiPath":"/api/technologies/contactless-fingerprints"},"description":"## Overview\nContactless fingerprinting collects ridge detail without touching a platen, using optical setups or smartphone cameras to reconstruct flat equivalents.\n\n## How it works\n1. Capture multiple finger images in 3D or at angles. \n2. Normalize and flatten ridges into a standard fingerprint image. \n3. Generate templates compatible with contact-based databases.\n\n## Common use cases\n- Mobile enrollment for civil ID\n- Border kiosks with hygiene requirements\n- Workforce or time-and-attendance apps\n\n## Strengths and limitations\n**Strengths:** Hygienic; uses commodity hardware. \n**Limitations:** Image distortion; interoperability with contact-based standards still evolving.\n\n## Key terms\n- **Contactless capture:** Imaging without touching a sensor. \n- **Platen:** Surface used in traditional fingerprint scanners."}
|
| 7 |
+
{"title":"Deepfake Detection","slug":"deepfake-detection","summary":"Methods that detect synthetic or manipulated media (audio, images, video) used to impersonate people in identity verification and biometric systems.","published":true,"order":999,"category":"Technology","tags":["synthetic-media","deepfakes","biometrics","identity-verification","security"],"see_also":["pad","face-recognition","voice-recognition","document-verification-nfc"],"last_reviewed":"2026-01-07","createdAt":"2026-01-07T00:00:00.000Z","updatedAt":"2026-01-07T00:00:00.000Z","references":[{"label":"NIST: Face Recognition Technology Evaluation (FRTE)","url":"https://www.nist.gov/programs-projects/face-recognition-technology-evaluation-frte"},{"label":"ISO/IEC 30107-3 (PAD testing and metrics)","url":"https://www.iso.org/standard/67381.html"}],"name":"Deepfake Detection","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/deepfake-detection.mdx","canonicalPath":"/technologies/deepfake-detection","apiPath":"/api/technologies/deepfake-detection"},"description":"## Overview\nDeepfake detection aims to identify AI-generated or heavily manipulated media intended to defeat identity verification (e.g., selfie checks) or to enable fraud via impersonation.\n\n## How it’s used in identity systems\n- As a **signal** alongside PAD/liveness, device checks, and document verification.\n- To **flag suspicious submissions** for step-up or manual review.\n- To **harden enrollment and re-verification**, where synthetic media can create or take over accounts.\n\n## Common challenges\n- Rapidly evolving generation methods and attack techniques.\n- Domain shifts (lighting, cameras, compression) that can affect detector performance."}
|
| 8 |
+
{"slug":"digital-id","name":"Digital ID","summary":"Digital ID represents electronic identity credentials that can be used to authenticate individuals and access services online.","order":5,"published":true,"references":[{"label":"EU eIDAS Regulation overview","url":"https://digital-strategy.ec.europa.eu/en/policies/eidas-regulation"},{"label":"W3C Decentralized Identifiers (DID) v1.0","url":"https://www.w3.org/TR/did-core/"},{"label":"NIST SP 800-63 Digital Identity Guidelines","url":"https://pages.nist.gov/800-63-3/"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is a Digital ID?","answer":"A Digital ID is an electronic representation of a person’s identity credentials, used to authenticate and authorize access to online services."},{"question":"How are Digital IDs issued and managed?","answer":"Digital IDs are issued by trusted entities (e.g., governments or certification authorities) and managed through secure identity providers, often leveraging public key infrastructure (PKI)."},{"question":"Why are standards like eIDAS important for Digital IDs?","answer":"Standards such as eIDAS ensure interoperability, security, and legal trust across jurisdictions for cross-border digital identity services."}],"title":"Digital ID","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/digital-id.md","canonicalPath":"/technologies/digital-id","apiPath":"/api/technologies/digital-id"},"description":"Digital identity (Digital ID) systems bind personal attributes—such as name, date of birth, and biometric data—to a secure digital credential. These credentials can be issued by governments or trusted entities and used for online authentication, e-government services, and financial inclusion. Standards like eIDAS in Europe and W3C Decentralized Identifiers (DIDs) shape interoperability and privacy."}
|
| 9 |
+
{"title":"Document Verification & NFC e-Chip Reading (eMRTD / ICAO 9303)","slug":"document-verification-nfc","summary":"How modern ID documents are verified using optical checks, NFC chip reading, and PKI validation per ICAO Doc 9303.","order":3,"published":true,"also_known_as":["eMRTD inspection","ePassport NFC","ICAO 9303 verification","LDS/PKD validation","BAC/PACE/AA/PA/CA/EAC"],"category":"Technology","tags":["digital-onboarding","travel-documents","nfc","pkd","pki","icao-9303","standards"],"see_also":["digital-id","mobile-id","national-e-id","facial-recognition"],"standards":[{"label":"ICAO Doc 9303 (series overview)","url":"https://www.icao.int/publications/doc-series/doc-9303"},{"label":"ICAO Public Key Directory (PKD)","url":"https://www.icao.int/icao-pkd"}],"last_reviewed":"2025-11-10","faq":[{"question":"What’s in the chip?","answer":"The LDS stores data groups (e.g., DG1 MRZ, DG2 face image, DG3 fingerprints, DG4 iris) plus the SOD file containing signed hashes."},{"question":"How do inspectors validate authenticity?","answer":"They verify the SOD’s signature against trusted CSCA/DSC certificates (often via the ICAO PKD) and ensure DG digests match the chip contents."},{"question":"Which access protocols are used?","answer":"BAC or PACE establish secure messaging; AA/CA/EAC provide stronger document authenticity and biometric access controls where applicable."}],"references":[{"label":"ICAO PKD overview","url":"https://www.icao.int/icao-pkd"},{"label":"ICAO Doc 9303 (series overview)","url":"https://www.icao.int/publications/doc-series/doc-9303"},{"label":"NFC passport reading – developer guide (example)","url":"https://www.nordicapis.com/what-you-need-to-know-about-nfc-passport-reading/"}],"createdAt":"2026-03-31T14:53:40.135Z","updatedAt":"2026-03-31T14:53:40.135Z","name":"Document Verification & NFC e-Chip Reading (eMRTD / ICAO 9303)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/document-verification-nfc.mdx","canonicalPath":"/technologies/document-verification-nfc","apiPath":"/api/technologies/document-verification-nfc"},"description":"## Overview\nModern passports and many IDs are **electronic Machine-Readable Travel Documents (eMRTDs)** with an NFC chip. Verifying them combines visual checks with **chip reading** and **PKI cryptographic validation** to confirm authenticity and detect tampering.\n\n## How it works\n1. **Optical checks:** MRZ, VIZ, security features. \n2. **Secure messaging:** Use MRZ or CAN to start BAC/PACE. \n3. **Chip read:** Extract LDS data groups (e.g., DG2 face, DG1 MRZ) and SOD. \n4. **PKI validation:** Verify SOD signature using issuer’s DSC/CSCA; trust roots often fetched via the **ICAO PKD**. \n5. **Consistency checks:** Compare chip data vs printed data; run face match to selfie if needed.\n\n## Common use cases\n- Border control; eGate flows \n- Remote KYC / onboarding (NFC on smartphones) \n- Airport or workplace issuance/verification\n\n## Strengths and limitations\n**Strengths:** Cryptographic authenticity, global standards, offline verification with cached trust lists. \n**Limitations:** Access to trust anchors; device NFC variability; privacy rules on biometric access.\n\n## Key terms\n- **LDS (Logical Data Structure):** Standardized layout of chip data (DG1..DG16 + SOD). \n- **PKD:** Global repository of signing keys and revocation material."}
|
| 10 |
+
{"title":"Ear Recognition","slug":"ear-recognition","summary":"Identifies people by the unique shape and texture of the outer ear, often for surveillance or forensic support.","order":21,"published":true,"also_known_as":["ear biometrics"],"category":"Technology","tags":["biometrics","surveillance"],"see_also":["facial-recognition"],"standards":[],"last_reviewed":"2025-11-10","faq":[{"question":"Is ear recognition accurate?","answer":"Modern CNN-based approaches show promise, but occlusions and hairstyles can reduce reliability."},{"question":"How is it used with face recognition?","answer":"As a supplemental cue in surveillance or re-identification when the face is partially visible or at oblique angles."}],"references":[{"label":"Survey on ear biometrics","url":"https://www.mdpi.com/1424-8220/22/3/1017"},{"label":"NIST biometrics program overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2026-03-31T14:53:40.135Z","updatedAt":"2026-03-31T14:53:40.135Z","name":"Ear Recognition","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/ear-recognition.mdx","canonicalPath":"/technologies/ear-recognition","apiPath":"/api/technologies/ear-recognition"},"description":"## Overview\nEar recognition uses images of the ear’s contours and texture as a supplemental biometric, particularly in surveillance footage.\n\n## How it works\n1. Detect the ear region in images or video. \n2. Extract features (e.g., shape descriptors, deep embeddings). \n3. Compare with stored ear templates or multi-modal records.\n\n## Common use cases\n- Surveillance in public spaces\n- Forensic photo analysis\n- Research on unobtrusive biometrics\n\n## Strengths and limitations\n**Strengths:** Can work at a distance; stable shape over time. \n**Limitations:** Susceptible to occlusion by hair or accessories; smaller dataset availability.\n\n## Key terms\n- **Auricle:** External part of the ear captured for matching. \n- **Occlusion:** Blocking or covering of the ear in images."}
|
| 11 |
+
{"slug":"facial-recognition","name":"Facial Recognition","summary":"Facial recognition matches a photo of a face to an identity.","order":1,"published":true,"references":[{"label":"NIST Face Recognition Vendor Test (FRVT)","url":"https://www.nist.gov/programs-projects/face-recognition-vendor-test-frvt"},{"label":"ISO/IEC 19795-1: Biometric performance testing and reporting","url":"https://www.iso.org/standard/41446.html"},{"label":"ICAO Doc 9303: Machine Readable Travel Documents (Face images)","url":"https://www.icao.int/publications/pages/publication.aspx?docnum=9303"}],"createdAt":"2025-05-07T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","updates":[],"faq":[{"question":"How does facial recognition work?","answer":"Facial recognition uses algorithms to analyze facial features—such as the distance between eyes or the shape of cheekbones—to create a unique digital signature for identification."},{"question":"How accurate is facial recognition technology?","answer":"Modern facial recognition systems can achieve very low false match rates (below 0.1%) under controlled conditions, but accuracy may vary with lighting, pose, and image quality."},{"question":"What are common concerns around facial recognition?","answer":"Concerns include privacy violations, potential bias against certain demographic groups, and misuse by surveillance systems without consent."},{"question":"What is Presentation Attack Detection (PAD)?","answer":"PAD aims to detect spoofing attempts (e.g., photos, masks, deepfakes) and is evaluated separately from matching accuracy using standards-driven tests."},{"question":"What are 1:1 vs 1:N operations?","answer":"1:1 verifies a claimed identity (authentication), while 1:N searches across a gallery (identification). They have different accuracy and scalability considerations."}],"title":"Facial Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/face-recognition.md","canonicalPath":"/technologies/facial-recognition","apiPath":"/api/technologies/facial-recognition"},"description":"Facial recognition is a biometric modality that analyses the geometry and texture of a person’s face to establish identity. Modern systems rely on CNN embeddings and achieve <0.1% FNMR on NIST FRVT benchmarks.\n\n### Latest Updates\n* **2025-07-01:** Tinder, Deliveroo, Uber Eats and Just Eat expanded selfie or facial-verification checks to fight bots, deepfakes and illegal-account rentals in CA and UK gig-economy platforms."}
|
| 12 |
+
{"title":"Finger Vein Recognition","slug":"finger-vein","summary":"Near-infrared imaging of vascular patterns inside fingers provides high liveness assurance for authentication.","order":22,"published":true,"also_known_as":["finger vein biometrics"],"category":"Technology","tags":["biometrics","vein","liveness"],"see_also":["palm-vein-recognition"],"standards":[],"last_reviewed":"2025-11-10","faq":[{"question":"Where is finger vein used?","answer":"It appears in banking ATMs, physical access systems, and some consumer devices."},{"question":"How does it compare to fingerprints?","answer":"Vein patterns are sub-dermal and difficult to copy, offering strong liveness properties; sensors are more specialized and costlier."}],"references":[{"label":"Survey on finger vein recognition","url":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8502037/"},{"label":"NIST biometrics program overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2026-03-31T14:53:40.135Z","updatedAt":"2026-03-31T14:53:40.135Z","name":"Finger Vein Recognition","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/finger-vein.mdx","canonicalPath":"/technologies/finger-vein","apiPath":"/api/technologies/finger-vein"},"description":"## Overview\nFinger vein systems illuminate the finger with near-infrared light and capture subdermal vein patterns that are difficult to replicate.\n\n## How it works\n1. Shine near-infrared light through the finger. \n2. Image absorbed vs transmitted light to reveal veins. \n3. Extract features and match against stored templates.\n\n## Common use cases\n- ATM and banking authentication\n- High-security access points\n- Research on wearable devices\n\n## Strengths and limitations\n**Strengths:** Built-in liveness; privacy-friendly since patterns are internal. \n**Limitations:** Specialized sensors; smaller vendor ecosystem.\n\n## Key terms\n- **NIR (Near-Infrared):** Wavelength used to image veins. \n- **Vein template:** Feature representation of vascular patterns."}
|
| 13 |
+
{"slug":"fingerprint-recognition","name":"Fingerprint Recognition","summary":"Fingerprint recognition identifies individuals by analyzing unique patterns of ridges and valleys on the fingertip.","order":2,"published":true,"references":[{"label":"ISO/IEC 19794-2: Finger minutiae data","url":"https://www.iso.org/standard/73515.html"},{"label":"NIST: Fingerprint recognition overview","url":"https://www.nist.gov/programs-projects/fingerprint-recognition"},{"label":"NIST MINEX overview","url":"https://www.nist.gov/programs-projects/minutiae-interoperability-exchange-minex-overview"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"How does fingerprint recognition work?","answer":"Fingerprint recognition captures the unique ridge and valley patterns on a fingertip using sensors, then extracts key minutiae points to match against stored templates."},{"question":"Can fingerprint recognition work with wet or damaged fingers?","answer":"Most modern sensors use capacitive or multispectral imaging to handle moisture and minor skin abrasions, but extreme conditions may reduce accuracy."},{"question":"What are common uses of fingerprint recognition?","answer":"Fingerprint recognition is used for smartphone unlocking, access control, time and attendance tracking, and large-scale identity verification systems."}],"title":"Fingerprint Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/fingerprint-recognition.md","canonicalPath":"/technologies/fingerprint-recognition","apiPath":"/api/technologies/fingerprint-recognition"},"description":"Fingerprint recognition is one of the oldest and most widely used biometric modalities. It captures and compares the distinctive ridge patterns of a person's fingertip using optical or capacitive sensors. Modern algorithms extract minutiae points and match them against stored templates, achieving high accuracy and fast performance in applications ranging from smartphone unlocking to large-scale national ID systems."}
|
| 14 |
+
{"slug":"gait-recognition","name":"Gait Recognition","summary":"Gait recognition identifies individuals by analyzing their unique walking style and body movements from video or sensor data.","order":24,"published":true,"references":[{"label":"NIST: Gait recognition research overview","url":"https://www.nist.gov/programs-projects/gait-recognition"},{"label":"Survey of gait biometrics","url":"https://www.sciencedirect.com/topics/engineering/gait-recognition"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is gait recognition?","answer":"Gait recognition analyzes an individual’s unique walking pattern and body movements, captured via video or wearable sensors, to identify them."},{"question":"How accurate is gait recognition?","answer":"Gait recognition can achieve moderate accuracy in controlled settings, but performance may degrade under varying speeds, shoe types, or carrying conditions."},{"question":"What factors can affect gait recognition accuracy?","answer":"Factors like clothing, walking surface, speed, and camera angle can impact accuracy, requiring robust normalization and feature extraction methods."},{"question":"Is gait privacy sensitive?","answer":"Yes. It can be captured at a distance; deployments should evaluate proportionality, transparency, and legal frameworks before use."}],"title":"Gait Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/gait-recognition.md","canonicalPath":"/technologies/gait-recognition","apiPath":"/api/technologies/gait-recognition"},"description":"Gait recognition captures a person's walking pattern using video cameras or wearable sensors, extracting features like stride length, joint angles, and motion dynamics. Since gait can be captured at a distance without user cooperation, it is valuable for surveillance and forensic applications. Environmental factors and clothing can affect accuracy, so robust algorithms are essential."}
|
| 15 |
+
{"slug":"hand-biometrics","name":"Hand Biometrics","summary":"Hand biometrics identifies people using characteristics of the entire hand, such as geometry, vein patterns, or palm prints.","order":25,"published":true,"references":[{"label":"ISO/IEC 19794-10: Hand geometry data","url":"https://www.iso.org/standard/54064.html"},{"label":"NIST Hand geometry resources","url":"https://www.nist.gov/services-resources/software/hand-geometry"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What are hand biometrics?","answer":"Hand biometrics analyze traits of the whole hand, including geometry, palm prints, or vein structure, to confirm identity."},{"question":"How do hand biometrics differ from fingerprint recognition?","answer":"While fingerprint systems focus on ridge patterns of fingertips, hand biometrics capture broader features like hand shape or subcutaneous veins."},{"question":"Where are hand biometrics used?","answer":"They are common in access control, time and attendance systems, and high-security checkpoints requiring contactless identification."}],"title":"Hand Biometrics","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/hand-biometrics.md","canonicalPath":"/technologies/hand-biometrics","apiPath":"/api/technologies/hand-biometrics"},"description":"Hand biometrics encompass techniques that measure unique attributes across the hand. Systems may scan three-dimensional hand geometry, image palm or finger veins using near-infrared light, or analyze palm prints. These methods provide an alternative when fingerprints are obscured or when contactless capture is preferred, offering reliable identification in environments such as secure facilities and workforce management."}
|
| 16 |
+
{"slug":"iris-recognition","name":"Iris Recognition","summary":"Iris recognition uses the unique patterns in the colored ring surrounding the pupil to verify identity.","order":6,"published":true,"references":[{"label":"ISO/IEC 19794-6: Iris image data","url":"https://www.iso.org/standard/60346.html"},{"label":"NIST: Iris recognition overview","url":"https://www.nist.gov/programs-projects/iris-recognition"},{"label":"NIST IREX program","url":"https://www.nist.gov/programs-projects/iris-exchange-irex"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What makes iris recognition unique compared to other biometrics?","answer":"The iris has highly distinctive and stable texture patterns, offering very low false match rates and resistance to aging."},{"question":"How accurate is iris recognition?","answer":"Iris recognition typically achieves false match rates well below 0.1%, making it one of the most accurate biometric modalities."},{"question":"What are common applications of iris recognition?","answer":"Iris recognition is used in border control, national identity programs, secure building access, and even smartphone authentication in some devices."}],"title":"Iris Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/iris-recognition.md","canonicalPath":"/technologies/iris-recognition","apiPath":"/api/technologies/iris-recognition"},"description":"Iris recognition captures high-resolution images of the eye, isolating the iris region and encoding its intricate texture patterns. Since the iris texture is highly unique and stable over time, this modality offers one of the highest levels of accuracy with low false match rates. It is widely used in border control, national ID programs, and secure access credentials."}
|
| 17 |
+
{"title":"Keystroke Dynamics","slug":"keystroke-dynamics","summary":"Authenticates users by timing patterns in how they type on a keyboard or touchscreen.","order":15,"published":true,"also_known_as":["typing biometrics","keystroke biometrics"],"category":"Technology","tags":["behavioral-biometrics","continuous-auth"],"see_also":["behavioral-biometrics"],"standards":[],"last_reviewed":"2025-11-10","faq":[{"question":"What features are analyzed?","answer":"Hold times, key-to-key latencies, and higher-level timing rhythms across sessions."},{"question":"How do models handle context changes?","answer":"Adaptive or per-device profiles, domain adaptation, and periodic re-enrollment help account for keyboard and posture shifts."},{"question":"Can bots spoof keystroke patterns?","answer":"Scripted automation can mimic simple averages; richer timing distributions and anomaly detection increase resilience."}],"references":[{"label":"Antispoofing wiki on keystroke dynamics","url":"https://antispoofing.org/keystroke-dynamics"},{"label":"NIST: Behavioral biometrics overview","url":"https://www.nist.gov/programs-projects/behavioral-biometrics"}],"createdAt":"2026-03-31T14:53:40.135Z","updatedAt":"2026-03-31T14:53:40.135Z","name":"Keystroke Dynamics","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/keystroke-dynamics.mdx","canonicalPath":"/technologies/keystroke-dynamics","apiPath":"/api/technologies/keystroke-dynamics"},"description":"## Overview\nKeystroke dynamics track how users type to provide a behavioral biometric signal for login or continuous authentication.\n\n## How it works\n1. Record timing of key presses and releases. \n2. Build a profile using statistical or machine-learning models. \n3. Compare new typing samples to the stored profile.\n\n## Common use cases\n- Continuous authentication on desktops\n- Fraud detection in online banking\n- Step-up identity verification\n\n## Strengths and limitations\n**Strengths:** Passive and continuous; works with existing hardware. \n**Limitations:** Sensitive to context changes like device or posture.\n\n## Key terms\n- **Dwell time:** Duration a key is pressed. \n- **Flight time:** Time between consecutive key presses."}
|
| 18 |
+
{"slug":"mobile-id","name":"Mobile ID","summary":"Mobile ID leverages smartphones to store and present digital identity credentials securely, often using SIM-based security and biometric unlock.","order":11,"published":true,"references":[{"label":"GSMA Mobile Identity overview","url":"https://www.gsma.com/mobileid/"},{"label":"ISO/IEC 18013-5: Mobile driver’s license (mDL)","url":"https://www.iso.org/standard/69084.html"},{"label":"NIST SP 800-63A (Enrollment & Identity Proofing)","url":"https://pages.nist.gov/800-63-3/sp800-63a.html"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is Mobile ID?","answer":"Mobile ID refers to digital identity credentials stored on smartphones, enabling secure user authentication for online and offline services."},{"question":"How are Mobile IDs secured on the device?","answer":"Credentials are stored in secure elements like SIM cards or hardware-backed keystores, protected by device-level authentication such as PIN, fingerprint, or face unlock."},{"question":"What are common applications for Mobile ID?","answer":"Mobile ID is used for e-government services, mobile banking, and secure enterprise access, offering convenient two-factor or multi-factor authentication."},{"question":"How do mDLs relate to Mobile ID?","answer":"mDLs are a standardized form of Mobile ID for driver’s licenses (ISO/IEC 18013-5), enabling local verification and selective disclosure via mobile devices."}],"title":"Mobile ID","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/mobile-id.md","canonicalPath":"/technologies/mobile-id","apiPath":"/api/technologies/mobile-id"},"description":"Mobile ID solutions enable users to enroll and authenticate using their mobile devices. Credentials may be provisioned to secure elements such as SIM cards or device hardware, and biometric sensors ensure that only the legitimate holder can use them. Common use cases include e-government portals, banking, and secure access to enterprise resources."}
|
| 19 |
+
{"title":"Multimodal Biometrics (Fusion)","slug":"multimodal-biometrics","summary":"Combining two or more biometric signals (e.g., face + fingerprint) to boost accuracy, resilience, and spoof resistance.","order":13,"published":true,"also_known_as":["multi-biometric","biometric fusion"],"category":"Technology","tags":["fusion","biometrics","performance","security"],"see_also":["facial-recognition","fingerprint-recognition","voice-recognition","pad"],"standards":[{"label":"ISO/IEC 19795-1: Biometric performance testing (metrics, reporting)","url":"https://www.iso.org/standard/73515.html"}],"last_reviewed":"2025-11-10","faq":[{"question":"Which fusion levels are typical?","answer":"Sensor, feature, score, and decision-level fusion. Score-level is common in practice due to availability and interoperability."},{"question":"What benefits should I expect?","answer":"Lower false rejects at fixed false accept rates; robustness to sensor/environment variability; better PAD via ‘liveness stacking’."},{"question":"How do you tune thresholds across modalities?","answer":"Normalize scores per modality (e.g., z-norm) and set an operating point using development data to meet target FAR/FRR under fusion."}],"references":[{"label":"NIST on performance testing (19795-1)","url":"https://cdn.standards.iteh.ai/samples/73515/544e07f312664b1da1a84368dca02899/ISO-IEC-19795-1-2021.pdf"},{"label":"NIST studies on score-level fusion","url":"https://www.nist.gov/document/ir7346appendixbpdf"},{"label":"Recent fusion survey","url":"https://www.sciencedirect.com/science/article/pii/S1566253522002081"}],"createdAt":"2026-03-31T14:53:40.136Z","updatedAt":"2026-03-31T14:53:40.136Z","name":"Multimodal Biometrics (Fusion)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/multimodal-biometrics.mdx","canonicalPath":"/technologies/multimodal-biometrics","apiPath":"/api/technologies/multimodal-biometrics"},"description":"## Overview\n**Multimodal biometrics** fuse signals (e.g., face + finger, iris + vein) to improve accuracy and resilience. Fusion can also harden systems against presentation attacks when combined with modality-specific PAD.\n\n## How it works\n- **Feature-level fusion:** combine feature vectors before matching. \n- **Score-level fusion:** normalize and combine matcher scores (e.g., sum, weighted, learned). \n- **Decision-level fusion:** combine accept/deny votes (e.g., AND/OR rules).\n\n## Common use cases\n- Border & national ID deduplication (1:N)\n- High-assurance workforce access\n- Financial KYC with PAD stacking\n\n## Strengths and limitations\n**Strengths:** Higher accuracy; graceful degradation; spoof resistance. \n**Limitations:** Cost/complexity; correlation between signals can cap gains; tuning/maintenance.\n\n## Key terms\n- **Score fusion:** Combining matcher scores, often after normalization. \n- **Decision fusion:** Using voting or logic rules on match outcomes."}
|
| 20 |
+
{"slug":"national-eid","name":"National e-ID","summary":"National e-ID programs issue electronic identity credentials tied to biometrics for secure access to government and private services.","order":14,"published":true,"references":[{"label":"World Bank ID4D initiative","url":"https://www.worldbank.org/en/programs/id4d"},{"label":"EU eIDAS Regulation overview","url":"https://digital-strategy.ec.europa.eu/en/policies/eidas-regulation"},{"label":"MOSIP (Modular Open Source Identity Platform)","url":"https://www.mosip.io/"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","updates":[],"faq":[{"question":"What is a national e-ID?","answer":"It is a government-issued digital identity card or credential with embedded biometrics."},{"question":"Why implement national e-IDs?","answer":"They enable secure access to services and help prevent identity fraud."},{"question":"What data do e-IDs store?","answer":"They typically store personal data and biometric templates on a secure chip."},{"question":"How do national e-IDs relate to passports and ICAO 9303?","answer":"Many e-IDs reuse eMRTD technology (chips, PKI). Some also support online authentication and qualified signatures per regional frameworks like eIDAS."},{"question":"How are duplicates prevented at enrollment?","answer":"Systems use ABIS deduplication (1:N) on face/fingerprint/iris to catch multiple enrollments under different identities."}],"title":"National e-ID","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/national-eid.md","canonicalPath":"/technologies/national-eid","apiPath":"/api/technologies/national-eid"},"description":"National electronic ID systems provide citizens with a secure credential, often backed by biometric verification, to authenticate for public and private services.\n\n### Latest Updates\n* **2025-07-01:** Vietnam began issuing Level-2 e-ID accounts (VNeID) to foreign residents; processing in 3-7 days after biometric capture at immigration offices."}
|
| 21 |
+
{"title":"Online Signature Verification (Dynamic)","slug":"online-signature","summary":"Analyzes pen dynamics such as pressure, speed, and trajectory to authenticate handwritten signatures.","order":12,"published":true,"also_known_as":["dynamic signature verification"],"category":"Technology","tags":["behavioral-biometrics","signature"],"see_also":["behavioral-biometrics"],"standards":[{"label":"ISO/IEC 19794-7: Signature/sign behavioral data","url":"https://www.iso.org/standard/50866.html"}],"last_reviewed":"2025-11-10","faq":[{"question":"What data is captured?","answer":"Time-stamped x/y coordinates, pressure, and sometimes pen-tilt or velocity."},{"question":"How is it different from image-based signature matching?","answer":"Online methods use temporal dynamics captured during signing, which are harder to forge than a static image of a signature."},{"question":"What sensors are used?","answer":"Signature tablets, stylus-enabled devices, or capacitive touchscreens with pen support capture the necessary dynamics."}],"references":[{"label":"Overview of online signature verification","url":"https://www.iso.org/standard/50866.html"},{"label":"NIST Biometric testing overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2026-03-31T14:53:40.136Z","updatedAt":"2026-03-31T14:53:40.136Z","name":"Online Signature Verification (Dynamic)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/online-signature.mdx","canonicalPath":"/technologies/online-signature","apiPath":"/api/technologies/online-signature"},"description":"## Overview\nOnline signature verification captures the dynamic process of signing to provide stronger assurance than static image comparison.\n\n## How it works\n1. Capture pen movement and pressure over time. \n2. Extract features like speed, direction, and acceleration. \n3. Compare against stored signature templates using temporal alignment.\n\n## Common use cases\n- Financial document signing\n- Point-of-sale terminals\n- Digital contracts requiring biometric evidence\n\n## Strengths and limitations\n**Strengths:** Difficult to forge precisely; continuous temporal data. \n**Limitations:** Requires specialized tablets or stylus input.\n\n## Key terms\n- **Dynamic features:** Time-based measurements of the signing process. \n- **DTW (Dynamic Time Warping):** Technique for aligning signature trajectories."}
|
| 22 |
+
{"title":"Presentation Attack Detection (Liveness / PAD)","slug":"pad","summary":"Techniques and tests that detect spoofed biometric samples (e.g., masks, replays, synthetics) to ensure the sample is from a live, consenting subject.","order":9,"published":true,"also_known_as":["liveness detection","anti-spoofing","PAD"],"category":"Technology","tags":["biometrics","security","testing","iso-30107","standards"],"see_also":["facial-recognition","voice-recognition","fingerprint-recognition","iris-recognition","multimodal-biometrics"],"standards":[{"label":"ISO/IEC 30107-1: Terms & framework for PAD","url":"https://www.iso.org/standard/83828.html"},{"label":"ISO/IEC 30107-3: PAD testing & metrics (APCER/BPCER)","url":"https://www.nist.gov/system/files/documents/2020/09/15/12_buschthieme-ibpc-pad-160504.pdf"},{"label":"iBeta guidance on ISO 30107-3 conformance","url":"https://www.ibeta.com/iso-30107-3-presentation-attack-detection-confirmation-letters/"}],"last_reviewed":"2025-11-10","faq":[{"question":"What metrics does ISO/IEC 30107-3 define?","answer":"APCER (attack presentations misclassified as bona fide) and BPCER (bona fide misclassified as attacks). Vendors often report operating points across attack species and attack potential."},{"question":"Is PAD the same as liveness?","answer":"‘Liveness’ is commonly used, but PAD is broader: it covers detecting presentation attacks of many kinds (physical and digital), not only vitality cues."},{"question":"How is PAD evaluated in practice?","answer":"Independent labs test across PAI types and attack potentials, reporting APCER/BPCER at defined thresholds; results are separate from core matcher accuracy."}],"references":[{"label":"ISO/IEC 30107-1 overview","url":"https://www.iso.org/standard/83828.html"},{"label":"ISO/IEC 30107-3 testing primer (NIST slide deck)","url":"https://www.nist.gov/system/files/documents/2020/09/15/12_buschthieme-ibpc-pad-160504.pdf"},{"label":"iBeta PAD tiers and test descriptions","url":"https://www.ibeta.com/iso-30107-3-presentation-attack-detection-confirmation-letters/"}],"createdAt":"2026-03-31T14:53:40.136Z","updatedAt":"2026-03-31T14:53:40.136Z","name":"Presentation Attack Detection (Liveness / PAD)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/pad.mdx","canonicalPath":"/technologies/pad","apiPath":"/api/technologies/pad"},"description":"## Overview\nPresentation Attack Detection (PAD) protects biometric systems from spoofs such as printed photos, silicone fingerprints, recorded voices, or AI-generated samples. It’s a cross-cutting layer used with face, voice, fingerprint, iris and other modalities.\n\n## How it works\n1. **Capture:** Sensor or camera acquires the sample. \n2. **Signal analysis:** Algorithms look for cues inconsistent with live traits (e.g., texture, reflectance, micro-motions, audio artifacts). \n3. **Decision & score:** The PAD subsystem outputs a score or decision (bona fide vs attack). \n4. **Policy:** Systems combine PAD with biometric matching and business rules to accept/deny or request step-up verification.\n\n## Common use cases\n- Remote onboarding / selfie match\n- Contactless border checks\n- KYC and high-risk transactions\n- Access control and workforce auth\n\n## Strengths and limitations\n**Strengths:** Mitigates common spoofs; complements matching; standard metrics for evaluation. \n**Limitations:** Attack diversity; new synthetic media; environment variability; false rejections at strict thresholds.\n\n## Key terms\n- **APCER/BPCER:** Core PAD error metrics from ISO/IEC 30107-3. \n- **PAI (Presentation Attack Instrument):** The artifact used to attack. \n- **Attack potential:** Effort/resources required to mount an attack."}
|
| 23 |
+
{"slug":"palm-vein-recognition","name":"Palm Vein Recognition","summary":"Palm vein recognition uses near-infrared light to capture the unique vascular patterns beneath the skin of the palm.","order":16,"published":true,"references":[{"label":"Fujitsu PalmSecure overview","url":"https://www.fujitsu.com/jp/group/frontech/en/solutions/business-technology/security/palmsecure/"},{"label":"NIST Biometrics program overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is palm vein recognition?","answer":"Palm vein recognition uses near-infrared light to image the unique vascular patterns beneath the skin of the palm for identity verification."},{"question":"How does palm vein recognition prevent spoofing?","answer":"Since veins are located beneath the skin, palm vein recognition inherently offers liveness detection and resists fake artifacts like lifecasts."},{"question":"Where is palm vein recognition commonly deployed?","answer":"It is used in high-security access control, financial authentication, and healthcare applications requiring strong liveness assurance."}],"title":"Palm Vein Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/palm-vein-recognition.md","canonicalPath":"/technologies/palm-vein-recognition","apiPath":"/api/technologies/palm-vein-recognition"},"description":"Palm vein recognition illuminates the palm with near-infrared light, revealing the vein structure that lies beneath the skin. These vein patterns are unique to each individual and difficult to replicate, providing a high level of liveness assurance. This modality is used in secure access control, banking authentication, and identity verification in sensitive environments."}
|
| 24 |
+
{"title":"Palmprint Recognition","slug":"palmprint-recognition","summary":"Uses dermal ridge patterns across the palm for identification, distinct from vein-based methods.","order":17,"published":true,"also_known_as":["palm print biometrics"],"category":"Technology","tags":["biometrics","palm","forensics"],"see_also":["hand-biometrics","fingerprint-recognition"],"standards":[{"label":"ISO/IEC 19794 series (palmprint, hand)","url":"https://www.iso.org/standard/54064.html"}],"last_reviewed":"2025-11-10","faq":[{"question":"Where are palmprints used?","answer":"In forensics and access control systems where more surface area improves matching."},{"question":"How is palmprint different from palm vein?","answer":"Palmprint uses surface ridge patterns; palm vein uses sub-dermal vascular patterns captured with NIR illumination."}],"references":[{"label":"Overview of palmprint recognition","url":"https://www.sciencedirect.com/topics/engineering/palmprint-recognition"},{"label":"NIST Biometrics program overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2026-03-31T14:53:40.136Z","updatedAt":"2026-03-31T14:53:40.136Z","name":"Palmprint Recognition","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/palmprint-recognition.mdx","canonicalPath":"/technologies/palmprint-recognition","apiPath":"/api/technologies/palmprint-recognition"},"description":"## Overview\nPalmprint recognition analyzes ridge detail across the palm, offering a larger surface area than fingerprints for feature extraction.\n\n## How it works\n1. Capture the palm using optical or contactless sensors. \n2. Extract ridge minutiae and orientation fields. \n3. Match against enrolled templates.\n\n## Common use cases\n- Law-enforcement forensic databases\n- Secure facility access\n- Research on hand-based biometrics\n\n## Strengths and limitations\n**Strengths:** Large feature area; resistant to minor cuts. \n**Limitations:** Bulkier sensors; less standardized than fingerprints.\n\n## Key terms\n- **Palmprint:** Ridge patterns of the palm surface. \n- **Minutiae:** Ridge endings and bifurcations used for matching."}
|
| 25 |
+
{"title":"Passkeys / FIDO2 / WebAuthn","slug":"passkeys-webauthn","summary":"Passwordless authentication based on public-key cryptography, delivered through WebAuthn (W3C) and CTAP (FIDO).","order":4,"published":true,"also_known_as":["FIDO2","WebAuthn","CTAP2","passkeys"],"category":"Technology","tags":["authentication","passwordless","webauthn","ctap","fido","standards"],"see_also":["behavioral-biometrics","mobile-id","digital-id"],"standards":[{"label":"W3C WebAuthn Level 3","url":"https://www.w3.org/TR/webauthn-3/"},{"label":"FIDO CTAP 2.x","url":"https://fidoalliance.org/specifications/"},{"label":"FIDO Alliance: Passkeys overview","url":"https://fidoalliance.org/passkeys/"}],"last_reviewed":"2025-11-10","faq":[{"question":"What is a passkey?","answer":"A FIDO credential (public/private key pair) bound to a user and relying party. The private key stays on the device; the public key is registered with the service."},{"question":"How is this phishing-resistant?","answer":"Credentials are origin-bound and never revealed; a signed challenge is produced locally after user verification (biometric or PIN)."},{"question":"CTAP vs WebAuthn?","answer":"WebAuthn is the browser API; CTAP connects clients to authenticators (platform or roaming security keys)."},{"question":"What’s the difference between multi-device and single-device passkeys?","answer":"Single-device credentials live only on one device; multi-device credentials can sync across an ecosystem under vendor security policies."},{"question":"How do recoveries and device loss work?","answer":"RPs should provide recovery paths (additional authenticators, admin-recovery, or re-enrollment) while balancing phishing resistance and account takeover risks."}],"references":[{"label":"WebAuthn L3 spec","url":"https://www.w3.org/TR/webauthn-3/"},{"label":"CTAP 2.x spec","url":"https://fidoalliance.org/specifications/"},{"label":"FIDO Alliance passkeys explainer","url":"https://fidoalliance.org/passkeys/"}],"createdAt":"2026-03-31T14:53:40.136Z","updatedAt":"2026-03-31T14:53:40.136Z","name":"Passkeys / FIDO2 / WebAuthn","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/passkeys-webauthn.mdx","canonicalPath":"/technologies/passkeys-webauthn","apiPath":"/api/technologies/passkeys-webauthn"},"description":"## Overview\n**Passkeys** implement passwordless login using **public-key cryptography**. Users authenticate with a device-bound credential and local user verification (biometric or PIN), via the **WebAuthn API** and **CTAP** protocols.\n\n## How it works\n1. **Registration:** Site asks for a new credential via WebAuthn; an authenticator creates a key pair and returns a public key + attestation. \n2. **Authentication:** Site sends a challenge. Authenticator signs it with the private key after local user verification. \n3. **Device portability:** Platform sync or roaming authenticators (security keys) enable use across devices in line with vendor policies.\n\n## Common use cases\n- Consumer sign-in replacing passwords \n- Workforce phishing-resistant MFA \n- Step-up auth for high-risk transactions\n\n## Strengths and limitations\n**Strengths:** Phishing resistance; no shared secrets; fast UX. \n**Limitations:** Cross-ecosystem portability; attestation policy; account recovery patterns.\n\n## Key terms\n- **WebAuthn:** W3C API for creating/using credentials. \n- **CTAP:** FIDO protocol between client and authenticator. \n- **Attestation:** Evidence about the authenticator model/security."}
|
| 26 |
+
{"slug":"physiological-biometrics","name":"Physiological Biometrics","summary":"Physiological biometrics refers to verifying identity based on unique physical characteristics such as fingerprints, face, iris, and vein patterns.","order":27,"published":true,"references":[{"label":"ISO/IEC 19794 series overview","url":"https://www.iso.org/committee/45144.html"},{"label":"NIST Biometrics program overview","url":"https://www.nist.gov/itl/iad/image-group/biometrics"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What are physiological biometrics?","answer":"Physiological biometrics verify identity based on unique physical characteristics like fingerprints, iris patterns, or vein structures."},{"question":"How do physiological biometrics differ from behavioral biometrics?","answer":"Physiological biometrics rely on stable physical traits, whereas behavioral biometrics analyze dynamic user behaviors like typing or gait."},{"question":"What are common examples of physiological biometrics?","answer":"Common examples include fingerprint, facial, iris, and palm vein recognition, all based on inherent physical features."}],"title":"Physiological Biometrics","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/physiological-biometrics.md","canonicalPath":"/technologies/physiological-biometrics","apiPath":"/api/technologies/physiological-biometrics"},"description":"Physiological biometrics encompasses modalities that rely on inherent physical attributes of an individual. Common examples include fingerprint, facial, iris, and palm vein recognition. These traits are generally stable over a person’s lifetime and provide strong authentication guarantees when sensors and matching algorithms are implemented securely."}
|
| 27 |
+
{"title":"Biometric Template Protection","slug":"template-protection","summary":"Techniques like cancellable biometrics and encryption safeguard stored biometric templates from misuse or breach.","order":28,"published":true,"also_known_as":["cancellable biometrics","template security"],"category":"Technology","tags":["biometrics","security","privacy","standards"],"see_also":["fingerprint-recognition","iris-recognition"],"standards":[{"label":"ISO/IEC 24745: Biometric information protection","url":"https://www.iso.org/standard/43734.html"}],"last_reviewed":"2025-11-10","faq":[{"question":"What is cancellable biometrics?","answer":"A method that transforms templates so they can be revoked and reissued if compromised."},{"question":"How is matching done on protected data?","answer":"Approaches include secure enclaves for plaintext-in-TEE matching, helper-data schemes, or privacy-preserving computation (e.g., homomorphic encryption)."},{"question":"Can template protection stop inversion attacks?","answer":"Properly designed schemes reduce the risk and utility of reconstructions, but security depends on threat models and implementation."}],"references":[{"label":"ISO/IEC 24745: Biometric information protection","url":"https://www.iso.org/standard/43734.html"},{"label":"NIST biometrics program overview","url":"https://www.nist.gov/programs-projects/biometrics"},{"label":"ISO/IEC 24745: Biometric information protection","url":"https://www.iso.org/standard/43734.html"}],"createdAt":"2026-03-31T14:53:40.136Z","updatedAt":"2026-03-31T14:53:40.136Z","name":"Biometric Template Protection","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/template-protection.mdx","canonicalPath":"/technologies/template-protection","apiPath":"/api/technologies/template-protection"},"description":"## Overview\nTemplate protection techniques reduce the risk that stolen biometric data can be reused or inverted, supporting privacy regulations.\n\n## How it works\n1. Transform or encrypt templates at enrollment. \n2. Perform matching in protected form (e.g., homomorphic encryption or secure enclaves). \n3. Allow template revocation and reissue when needed.\n\n## Common use cases\n- Privacy-sensitive biometric databases\n- Mobile devices with secure enclaves\n- Research on secure multi-party matching\n\n## Strengths and limitations\n**Strengths:** Limits impact of data breaches; supports revocation. \n**Limitations:** Performance overhead; interoperability challenges.\n\n## Key terms\n- **Cancellable biometrics:** Reversible transform of templates. \n- **Biometric cryptosystem:** Uses cryptographic schemes to protect matching."}
|
| 28 |
+
{"title":"Verifiable Credentials & Identity Wallets (W3C VC 2.0)","slug":"verifiable-credentials","summary":"Cryptographically verifiable claims issued by trusted parties and presented via identity wallets, enabling selective disclosure and offline verification.","order":8,"published":true,"also_known_as":["W3C VC","identity wallets","decentralized identity"],"category":"Technology","tags":["digital-id","identity-wallet","vc2.0","standards","privacy"],"see_also":["mobile-id","digital-id","document-verification-nfc"],"standards":[{"label":"W3C Verifiable Credentials Data Model 2.0","url":"https://www.w3.org/TR/vc-data-model-2.0/"},{"label":"W3C VC Overview (roadmap)","url":"https://www.w3.org/TR/vc-overview/"}],"last_reviewed":"2025-11-10","faq":[{"question":"What is a Verifiable Credential (VC)?","answer":"A tamper-evident set of claims with metadata proving who issued it; holders store VCs in wallets and present verifiable proofs to verifiers."},{"question":"How does selective disclosure work?","answer":"Cryptographic proofs reveal only needed attributes (e.g., ‘over 18’) rather than the full credential."},{"question":"How do VCs relate to government IDs?","answer":"They can complement physical documents; issuers (e.g., agencies, universities) issue VCs that can be verified online or offline."},{"question":"What about revocation/status?","answer":"Verifiers check credential status lists or cryptographic status proofs to ensure a VC hasn’t been revoked without contacting the issuer."}],"references":[{"label":"VC Data Model 2.0","url":"https://www.w3.org/TR/vc-data-model-2.0/"},{"label":"VC overview","url":"https://www.w3.org/TR/vc-overview/"},{"label":"Decentralized Identifiers (DID) v1.0","url":"https://www.w3.org/TR/did-core/"}],"createdAt":"2026-03-31T14:53:40.136Z","updatedAt":"2026-03-31T14:53:40.136Z","name":"Verifiable Credentials & Identity Wallets (W3C VC 2.0)","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/verifiable-credentials.mdx","canonicalPath":"/technologies/verifiable-credentials","apiPath":"/api/technologies/verifiable-credentials"},"description":"## Overview\n**Verifiable Credentials (VCs)** allow entities to issue cryptographically signed credentials that holders store and present through **identity wallets**. Verifiers check proofs without calling the issuer, enabling privacy-preserving flows and offline checks.\n\n## How it works\n1. **Issuance:** Issuer signs a credential to the holder’s wallet. \n2. **Presentation:** Holder creates a verifiable presentation with selective attributes. \n3. **Verification:** Verifier validates signature, status/revocation, and schema against trusted keys/registries.\n\n## Common use cases\n- Digital diplomas & licenses\n- Age or attribute checks\n- Travel & cross-border credentials\n\n## Strengths and limitations\n**Strengths:** Privacy via selective disclosure; offline verification; open standards. \n**Limitations:** Interop profiles; governance/trust frameworks; revocation/status infrastructure.\n\n## Key terms\n- **Verifiable presentation:** A bundle proving certain claims to a verifier. \n- **Issuer/Holder/Verifier:** Roles in VC ecosystems."}
|
| 29 |
+
{"title":"Video Injection Detection","slug":"video-injection-detection","summary":"Controls that detect injected, replayed, or pre-recorded video streams used to bypass selfie and liveness checks during remote identity verification.","published":true,"order":999,"category":"Technology","tags":["identity-verification","biometrics","pad","replay-attacks","video"],"see_also":["pad","face-recognition","deepfake-detection"],"last_reviewed":"2026-01-07","createdAt":"2026-01-07T00:00:00.000Z","updatedAt":"2026-01-07T00:00:00.000Z","references":[{"label":"ISO/IEC 30107-3 (PAD testing and metrics)","url":"https://www.iso.org/standard/67381.html"}],"name":"Video Injection Detection","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"mdx","sourcePath":"content/technologies/video-injection-detection.mdx","canonicalPath":"/technologies/video-injection-detection","apiPath":"/api/technologies/video-injection-detection"},"description":"## Overview\nVideo injection detection focuses on identifying attempts to feed a verification system a manipulated or pre-recorded stream (for example, via virtual cameras, screen replays, or intermediaries) instead of a live capture from the user’s device camera.\n\n## Typical signals and controls\n- Capture pipeline integrity checks (e.g., detecting virtual camera sources).\n- Consistency checks across frames and metadata (timing, encoding artifacts).\n- Challenge-response or motion prompts combined with PAD/liveness.\n\n## Where it shows up\n- Remote onboarding / selfie identity verification\n- Account recovery re-verification\n- High-risk transaction step-up checks"}
|
| 30 |
+
{"slug":"voice-recognition","name":"Voice Recognition","summary":"Voice recognition authenticates individuals based on their unique vocal characteristics like pitch, cadence, and spectral features.","order":29,"published":true,"references":[{"label":"ISO/IEC 19794-13: Voice data","url":"https://www.iso.org/standard/54115.html"},{"label":"NIST: Voice recognition / ASV resources","url":"https://www.nist.gov/programs-projects/voice-identity-verification"},{"label":"ASVspoof initiative (attack corpora)","url":"https://www.asvspoof.org/"}],"createdAt":"2025-05-17T00:00:00.000Z","updatedAt":"2025-11-10T00:00:00.000Z","faq":[{"question":"What is voice recognition?","answer":"Voice recognition authenticates individuals by analyzing unique vocal characteristics such as pitch, cadence, and spectral features."},{"question":"How does voice recognition handle background noise?","answer":"Modern systems use noise reduction and robust feature extraction techniques to maintain accuracy in noisy environments."},{"question":"What prevents voice spoofing in recognition systems?","answer":"Anti-spoofing measures include liveness detection, voice challenge-response prompts, and model training against replay attacks."},{"question":"How do systems handle deepfake speech?","answer":"Modern anti-spoofing (CM) models are trained on synthetic speech corpora and combined with challenge-response or secondary factors for riskier flows."}],"title":"Voice Recognition","category":"Technology","license":"CC-BY-4.0","_meta":{"dataset":"technologies","schemaVersion":"1.0.0","license":"CC-BY-4.0","sourceType":"markdown","sourcePath":"content/technologies/voice-recognition.md","canonicalPath":"/technologies/voice-recognition","apiPath":"/api/technologies/voice-recognition"},"description":"Voice recognition systems analyze the physiological and behavioral traits of a person's speech to verify identity. They extract features such as Mel-frequency cepstral coefficients (MFCCs) and match them using statistical or deep-learning models. While highly convenient for remote authentication, voice recognition can be affected by background noise and requires robust anti-spoofing measures."}
|
vendors.jsonl
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|