Identical - authentic - verified?
When talking about access control you inevitably come across three terms: identification, verification and authentication.
Although these terms are generally defined in very different ways, the following definition has become generally accepted in the security market:
Identification is the process of determining the identity of a person from a group of practically any size. For this purpose, the data of this person is compared with all data in the system (1:n comparison). In a face recognition system, for example, all facial features stored in a database can be compared with the currently recorded face.
During verification or validation, a specific feature on a data medium is compared with a feature of the person (1:1 comparison). The classic example is the fingerprint, which is stored on an access card and compared with the finger placed on the fingerprint terminal.
Authentication (Greek: authentikós: genuine, vouched for) is the process of establishing a person's identity beyond doubt. The system establishes that it is the person himself, and not just that person's card.