authentication

(redirected from Security protocol)
Also found in: Dictionary, Thesaurus, Legal, Financial, Acronyms, Encyclopedia.

authentication

Biometrics
The use of a personal feature—e.g., face, hand, fingerprint, signature, voice, iris, or other highly specific indicator—to verify a person’s identity, and restrict access to private information to authorised persons.

Informatics
Confirmation of a user's identity, generally through a user name and password.

authentication

Biometrics The use of a personal feature, eg, face, hand, fingerprint, signature, voice, iris, or other highly specific indicator to verify a person's identity, and restrict access to information to authorized persons; confirmation of a user's identity, generally through user name and password or biometric characteristics. See Biometrics. Cf Authorization.

au·then·ti·ca·tion

(aw-thenti-kāshŭn)
Protocol to confirm the identify someone logged onto a computer.

authentication

(o-then″ti-kā′shŏn)
In an electronic health record or other computer system, a security mechanism (such as a digital signature) that provides for a unique means of identifying a system user.
References in periodicals archive ?
The local staff can also ensure that appropriate security protocols are being met and can communicate changes in protocol between the vendor and the management staff.
These are prime opportunities for an organization to suffer serious knowledge breaches--unless they are sincere and holistic in their security protocols and implementation.
The chip also includes many hardware enhancements that ensure high-throughput by offloading IP and network security protocols from the host processor.
Payment applications interface with the M2 via ReaderWare, which provides an abstraction layer that provides software upgradeability to future tag and security protocols.
Products and core competencies include smart cards and stored value systems, security protocols, data communications, software design and hardware manufacture.
Additional security protocols such as RADIUS, stateful firewall, SSH, SSL, and IKEv1/v2 are also available, as well as products to enable wireless network communication.

Full browser ?