What is a unique identifier (UID)? | Definition from TechTarget (2024)

By

  • Gavin Wright
  • Ivy Wigmore

A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system. UIDs make it possible to select that entity so that it can be accessed, updated and interacted with.

Unique identifiers can be assigned to anything that needs to be distinguished from other entities, such as individual users, companies, machines, database entries or websites. These distinctive values are usually assigned depending on the needs of the specific application but can either be randomly auto generated with an algorithm, allocated incrementally or chosen by the user.

Examples of UIDs

While UIDs can take a variety of forms depending on the application, the following are a few examples:

What is a unique identifier (UID)? | Definition from TechTarget (1)
  • A Uniform Resource Identifier (URI) is a text string identifier that makes content addressable on the internet or other networks by uniquely targeting items such as text, video, images and applications.
  • A Uniform Resource Locator (URL) is a particular type of URI that targets webpages so that, when a browser requests them, they can be found and served to users.
  • A Universally Unique Identifier (UUID) is a 128-bit hexadecimal number used to uniquely identify data objects or entities on the internet. There is no central UUID issuing authority, but the possible space is large enough to encompass the vast number of internet-connected resources.
  • A Globally Unique Identifier (GUID) is a form of UUID that Microsoft products generate. These can identify an entity such as a Word document or Active Directory user or group.

  • A Bank Identifier Code is a unique identifier for a specific financial institution that participates in international bank exchanges.
  • A Unique Device Identifier is a 24-character string assigned to all Apple devices, including iPhones, iPads and macOS computers.
  • A service set identifier is a sequence of characters that uniquely names a wireless local area network (LAN).
  • A National Provider Identifier is a unique 10-digit identification number required by the Health Insurance Portability and Accountability Act for all healthcare providers in the United States.
  • A media access control address is a computer's unique hardware number in a LAN. In a MAC address, the first half is issued by a central authority to each device manufacturer, and the manufacturer is responsible for the second half.

Other, more basic ways to uniquely identify an entity or user include by Social Security number, email address, username and phone number.

What is a unique identifier (UID)? | Definition from TechTarget (2)

How to create a UID

The defining characteristic of a UID is that it is unique; no other object can share the exact same UID. So, when creating a new UID, some mechanism is required to ensure its uniqueness. It's also vital that the potential size of the UID is large enough to encompass the potential number of objects to be identified. For systems with only a few objects, a simple system may suffice; for large systems with many objects that have multiple agents issuing UIDs, a complex system may be needed.

If two objects share the same UID due to a breakdown in the system, it is often called a collision.

What is a unique identifier (UID)? | Definition from TechTarget (3)

In a sequential or serial numbering system, a single number is incremented each time a new UID is issued. These are often the simplest to implement, but it is important that a central authority enforces that each UID is only used once to prevent collisions.

Some systems allow for user entry, such as a username or email address. A central database enforces the uniqueness of these entries.

In a random numbering system, a number is randomly picked to identify each object. If the possible number space is much larger than the number of potential objects, you can be reasonably sure that it is unique.

In a hash system, a cryptographic one-way hash function is used to create a UID. With a hash function, no central authority is needed to enforce uniqueness. While it is possible for a hash to not be unique, it is quite unlikely. For extremely large databases, this tradeoff of potential for collisions versus decentralization may be worth it.

Some systems may use a combination of these approaches -- for example, a sequential date code prefix combined with a random suffix.

Uses of UIDs

The most widely known use of unique identifiers occurs when users register for a website or service. Customers are often provided with a username or user ID that enables the company they are registering with to differentiate them within their system. Quite often, these UIDs are simply a user's email address or phone number. These identifiers are then used for security and login purposes.

In a database or spreadsheet, unique identifiers may be designated as a specific column or field to help make sorting and filtering through information easier. In a database, the UID of a row is often called the key, and it is used to ensure that the correct data is accessed when doing a read or write.

Another popular application of UIDs is in a physical supply chain. Manufacturers often mark individual pieces of a larger component, such as computer parts, or an entire product with a serial number. This enables users to trace back the origin of the product in case of a malfunction, defect or recall.

Most countries also assign a UID to each citizen to help with taxation and government benefits identification. Since many people may share the same name, relying solely on a name quickly proves infeasible in any reasonably large country. The combination of name, date of birth and a country-specific UID reasonably identifies an individual for a government's purposes.

Unique identifiers are also commonly used within the healthcare industry. Instead of reporting medical information with a patient's name, a personal code is created. This code combats issues of patient privacy, as well as eliminates the possibility of duplicate reports.

UID vs. IUID vs. UII

Within the Department of Defense (DOD), there are three related acronyms associated with the standard of government property. The first is the Item Unique Identification (IUID) Registry. This registry stores information for the DOD about how to track, maintain and deploy government assets. Items are added to the IUID Registry if their acquisition cost is over $5,000, they are mission-critical or they are high risk.

The second and third acronyms are connected with each item in the registry. An item's UID is the physical marking on the item, typically in the form of a barcode, that distinguishes it from other items. An item's unique item identifier (UII) refers to its entry value in a database. UIIs are usually machine-readable and help contractors track each item digitally through all stages of its lifecycle.

Learn how GUIDs are used in designing a custom Hyper-V Integration Services component. Also, explore how to use a public and private key to handle electronic documents using digital signatures, see how to ensure security for three types of digital identity and discover if long URLs are better than short URLs.

This was last updated in September 2024

Continue Reading About What is a unique identifier (UID)?

  • Use digital identity proofing to verify account creation
  • What are the most common digital authentication methods?
  • How do digital signatures work?
  • MAC address vs. IP address: What's the difference?
  • Wireless security: WEP, WPA, WPA2 and WPA3 differences

Related Terms

packet coalescing
Packet coalescing involves using a computer's network interface card (NIC) to reduce the number of generated receive interrupts ...Seecompletedefinition
subnet (subnetwork)
A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...Seecompletedefinition
What is a microcontroller (MCU)?
A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system.Seecompletedefinition

Dig Deeper on Internet of things networking

What is a unique identifier (UID)? | Definition from TechTarget (2024)
Top Articles
Which Forex Pairs to Trade - Day Trading and Swing Trading - Trade That Swing
Social Security Tax Limit (Wage Base) for 2024
Craigslist Home Health Care Jobs
123 Movies Black Adam
Summit County Juvenile Court
Crazybowie_15 tit*
Aries Auhsd
Catsweb Tx State
Craigslist Dog Kennels For Sale
Inevitable Claymore Wow
Lonadine
Fairy Liquid Near Me
Crossword Nexus Solver
Craigslist Toy Hauler For Sale By Owner
Andhrajyothy Sunday Magazine
Officialmilarosee
Water Trends Inferno Pool Cleaner
X-Chromosom: Aufbau und Funktion
Decosmo Industrial Auctions
Kcwi Tv Schedule
Busted Mcpherson Newspaper
Buying Cars from Craigslist: Tips for a Safe and Smart Purchase
Rapv Springfield Ma
Finding Safety Data Sheets
14 Top-Rated Attractions & Things to Do in Medford, OR
Craigslist List Albuquerque: Your Ultimate Guide to Buying, Selling, and Finding Everything - First Republic Craigslist
24 Hour Drive Thru Car Wash Near Me
Used Safari Condo Alto R1723 For Sale
Rush County Busted Newspaper
What does wym mean?
Graphic Look Inside Jeffrey Dresser
Makemkv Key April 2023
El agente nocturno, actores y personajes: quién es quién en la serie de Netflix The Night Agent | MAG | EL COMERCIO PERÚ
Closest 24 Hour Walmart
Ny Post Front Page Cover Today
Omnistorm Necro Diablo 4
ATM Near Me | Find The Nearest ATM Location | ATM Locator NL
Busch Gardens Wait Times
How to play Yahoo Fantasy Football | Yahoo Help - SLN24152
Review: T-Mobile's Unlimited 4G voor Thuis | Consumentenbond
Carroll White Remc Outage Map
Who Is Responsible for Writing Obituaries After Death? | Pottstown Funeral Home & Crematory
Iupui Course Search
Gary Vandenheuvel Net Worth
Spreading Unverified Info Crossword Clue
Actress Zazie Crossword Clue
Mytmoclaim Tracking
Black Adam Showtimes Near Kerasotes Showplace 14
Ics 400 Test Answers 2022
Asisn Massage Near Me
Anthony Weary Obituary Erie Pa
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 5886

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.