Development of Identity Recognition Technology and Applications (pre-order)
![](/report_cover/7047/development-of-identity-recognition-technology-n-applications-pre-order_en.gif)
The rise of the Internet in 1995 raised the curtain on information digitization. Today, digitization promises far-reaching applications. From government-driven digital economy, new financial service models such as FinTech and InsurTech, research on virtual currency as commodity or CBDE (Central Banking Digital Currency), to the emergence of new service providers such as e-commerce and social media, all have one thing in common, that is, identity recognition. In other words, identity recognition has existed for hundreds of years, but identity recognition methods have evolved as technology developed to where we are today. This report provides an overview of component and technological development of identity recognition technology and examines industry trends and existing applications.
1. INTRODUCTION
2. WHAT IS IDENTITY RECOGNITION
3. DEVELOPMENT OF IDENTITY RECOGNITION TECHNOLOGY
3.1 Past
3.2 Present
4. FUTURE TRENDS IN IDENTITY RECOGNITION
4.1 Identity Recognition Technology
4.2 Identity Representation Standards
4.3 Impact of Identity Recognition onExisting Vendors
5. APPLICATIONS OF IDENTITY RECOGNITION
5.1 Financial Services: Focus on Compliance
5.2 Sharing Economy: Focus on User Management
5.3 Gaming: Focus on User Monitoring
5.4 Healthcare: Improve Patients' Rights
5.5 Inclusive Financing: Provide Full and Equal Access to Financial Services
6. MIC PERSPECTIVE
APPENDIX
List of Companies
2. WHAT IS IDENTITY RECOGNITION
3. DEVELOPMENT OF IDENTITY RECOGNITION TECHNOLOGY
3.1 Past
3.2 Present
4. FUTURE TRENDS IN IDENTITY RECOGNITION
4.1 Identity Recognition Technology
4.2 Identity Representation Standards
4.3 Impact of Identity Recognition onExisting Vendors
5. APPLICATIONS OF IDENTITY RECOGNITION
5.1 Financial Services: Focus on Compliance
5.2 Sharing Economy: Focus on User Management
5.3 Gaming: Focus on User Monitoring
5.4 Healthcare: Improve Patients' Rights
5.5 Inclusive Financing: Provide Full and Equal Access to Financial Services
6. MIC PERSPECTIVE
APPENDIX
List of Companies
LIST OF TABLES
Table 1 Comparison of Past and Present Identity Recognition Methods
Table 2 Protocols Used by FIDO
Table 3 Benefits of Identity Recognition in Different Applications
Table 1 Comparison of Past and Present Identity Recognition Methods
Table 2 Protocols Used by FIDO
Table 3 Benefits of Identity Recognition in Different Applications
LIST OF FIGURES
Figure 1 Identity Recognition Technology from the 1960s to the Present Day
Figure 2 How FIDO Works
Figure 3 Trends and Impact of Development of Identity Recognition
Figure 4 Financial Services – Fake ID Prevention
Figure 5 Financial Services – Scam Prevention
Figure 6 Sharing Economy – User Management
Figure 7 Gaming – User Monitoring
Figure 8 Healthcare – Authenticate Patients' Identity
Figure 9 Inclusive Financing – Innovative Credit Rating and Identity Recognition
Figure 1 Identity Recognition Technology from the 1960s to the Present Day
Figure 2 How FIDO Works
Figure 3 Trends and Impact of Development of Identity Recognition
Figure 4 Financial Services – Fake ID Prevention
Figure 5 Financial Services – Scam Prevention
Figure 6 Sharing Economy – User Management
Figure 7 Gaming – User Monitoring
Figure 8 Healthcare – Authenticate Patients' Identity
Figure 9 Inclusive Financing – Innovative Credit Rating and Identity Recognition