When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. eSign (India) - Wikipedia

    en.wikipedia.org/wiki/ESign_(India)

    The signature service is facilitated by authenticating the Aadhaar holder via the Aadhaar-based e-KYC (electronic Know Your Customer) service. [2] To eSign a document, one has to have an Aadhaar card and a mobile number registered with Aadhaar. With these two things, an Indian citizen can sign a document remotely without being physically present.

  3. National Electoral Roll Purification and Authentication ...

    en.wikipedia.org/wiki/National_Electoral_Roll...

    He said the data collected by linking the EPICs with Aadhaars may result in misuse such as discriminating against a section of citizens. He also asked Zaidi to clarify that possession of an Aadhaar was not mandatory for voting and that linking with Aadhaar was voluntary. He said that the SMS sent to voters made it seem like it was mandatory.

  4. Aadhaar - Wikipedia

    en.wikipedia.org/wiki/Aadhaar

    The Unique Identification Authority of India (UIDAI) introduces Face Authentication to further strengthen Aadhaar security. [100] It decided to enable 'Face Authentication' in fusion mode on registered devices by 1 July 2018, so that people facing difficulties in other existing mode of verification such as iris , Fingerprint or One Time ...

  5. Aadhaar Act, 2016 - Wikipedia

    en.wikipedia.org/wiki/Aadhaar_Act,_2016

    The Aadhaar (Targeted Delivery of Financial and other Subsidies, benefits and services) Act, 2016 is a money bill of the Parliament of India. It aims to provide legal backing to the Aadhaar unique identification number project.

  6. Authenticator - Wikipedia

    en.wikipedia.org/wiki/Authenticator

    The proprietary mobile push authentication protocol runs on an out-of-band secondary channel, which provides flexible deployment options. Since the protocol requires an open network path to the claimant's mobile phone, if no such path is available (due to network issues, e.g.), the authentication process can not proceed. [13]

  7. Biometric voter registration - Wikipedia

    en.wikipedia.org/wiki/Biometric_voter_registration

    Biometric voter registration implicates using biometric technology (capturing unique physical features of an individual – fingerprinting is the most commonly used), most of the times in addition to demographics of the voter, for polling registration and/or authentication. The enrollment infrastructure allows collecting and maintaining a ...

  8. Electronic authentication - Wikipedia

    en.wikipedia.org/wiki/Electronic_authentication

    Digital authentication, or e-authentication, may be used synonymously when referring to the authentication process that confirms or certifies a person's identity and works. When used in conjunction with an electronic signature , it can provide evidence of whether data received has been tampered with after being signed by its original sender.

  9. Biometric device - Wikipedia

    en.wikipedia.org/wiki/Biometric_device

    It is one of the most secure forms of authentication, as while fingerprints can be left behind on surfaces, iris prints are extremely hard to be stolen. Iris recognition is widely applied by organisations dealing with the masses, one being the Aadhaar identification carried out by the Government of India to keep records of its population. The ...