authentication

(redirected from Authentication token)
Also found in: Dictionary, Thesaurus, Legal, Financial, Acronyms, Encyclopedia.

authentication

Biometrics
The use of a personal feature—e.g., face, hand, fingerprint, signature, voice, iris, or other highly specific indicator—to verify a person’s identity, and restrict access to private information to authorised persons.

Informatics
Confirmation of a user's identity, generally through a user name and password.

authentication

Biometrics The use of a personal feature, eg, face, hand, fingerprint, signature, voice, iris, or other highly specific indicator to verify a person's identity, and restrict access to information to authorized persons; confirmation of a user's identity, generally through user name and password or biometric characteristics. See Biometrics. Cf Authorization.

au·then·ti·ca·tion

(aw-thenti-kāshŭn)
Protocol to confirm the identify someone logged onto a computer.

authentication

(o-then″ti-kā′shŏn)
In an electronic health record or other computer system, a security mechanism (such as a digital signature) that provides for a unique means of identifying a system user.
References in periodicals archive ?
Using Authentication Tokens to Bypass iCloud Login and Password
Being able to use authentication tokens acquired from the suspect's computer is of major importance to forensic investigators.
Developed for real-world networks - where Linux and Mac workstations often live in a mixed Microsoft (Nasdaq: MSFT) Windows domain, with Windows clients and Apache or IIS Web servers - CRYPTOCard's event-based two-factor authentication tokens make it simple and cost effective to replace weak static passwords with a password that is randomly generated for every logon attempt.
com), the leading authentication technology developer for heterogeneous environments, has been endorsed in Mark Osborne's "How to Cheat at Managing Information Security" for making it simple to integrate "One-Time Password" authentication tokens with existing PSTN, SSL VPN, and IPsec VPN systems.
By certifying that PrivateArk accepts authentication tokens generated by RSA SecurID technology, we ensure PrivateArk is an option for these security-conscious organizations.
com), the leading authentication technology developer for heterogeneous environments, has announced that it has been awarded a security contract by the UK's largest mental health trust to roll out 400 of its KT-1 key chain two-factor authentication tokens to staff working around London.
Pyn Logic prides itself on providing its clients with the finest database security available, and CRYPTOCard's two-factor authentication tokens have simplified this task," explained Herve Roggero, Managing Partner, Pyn Logic LLC.
0 Servers or workstations, this Remote Authentication Dial-In User Service (RADIUS) software provides hackerproof authentication for remote users of corporate LANs by combining dynamic event-driven password generation with the user's choice of five different software and hardware authentication tokens.
0 Servers or workstations, this Remote Access Dial-In User Service (RADIUS) software provides hacker-proof authentication for remote users of corporate LANs by combining dynamic event-driven password generation with the user's choice of five different software and hardware authentication tokens.
The ProtectDrive software also integrates with the widely-deployed SafeNet iKey and Smart Card authentication tokens to provide even stronger data protection.
Digital signatures, private keys, certificates and authentication tokens are only part of the identity management concept.

Full browser ?