authentication


Also found in: Dictionary, Thesaurus, Legal, Financial, Acronyms, Encyclopedia, Wikipedia.
Related to authentication: Authentification

authentication

Biometrics
The use of a personal feature—e.g., face, hand, fingerprint, signature, voice, iris, or other highly specific indicator—to verify a person’s identity, and restrict access to private information to authorised persons.

Informatics
Confirmation of a user's identity, generally through a user name and password.

authentication

Biometrics The use of a personal feature, eg, face, hand, fingerprint, signature, voice, iris, or other highly specific indicator to verify a person's identity, and restrict access to information to authorized persons; confirmation of a user's identity, generally through user name and password or biometric characteristics. See Biometrics. Cf Authorization.

au·then·ti·ca·tion

(aw-thenti-kāshŭn)
Protocol to confirm the identify someone logged onto a computer.

authentication

(o-then″ti-kā′shŏn)
In an electronic health record or other computer system, a security mechanism (such as a digital signature) that provides for a unique means of identifying a system user.
References in periodicals archive ?
Hitachi's finger vein authentication technology employs a method whereby light is transmitted through the finger to enable high-contrast matching of vein patterns.
If the message is spoofed, the sending e-mail server will not show up as an approved sending addresses for that domain, and your e-mail authentication engine can automatically drop the offending e-mail.
Since 1987, Inteligensa provides Cards (Banking,ID,GSM), Personalization, POS Systems & Smart Card Developments and Authentication products which have brought them as de facto partner for nCryptone on nC DOT product by leveraging their strong experience on Chip personalization in secure environment and expertise on RFID and NFC solutions.
Meiwa Estate plans to incorporate Fujitsu's contactless palm vein authentication technology as a standard feature for other condominiums in their "Clio La Mode" urban-style condominium series.
PKI as the foundation and a certificate-based protocol provide numerous advantages, particularly in providing for strong authentication and management data integrity.
Mail Harvesting Fails Against Source Authentication
the authentication authority) creates a SAML authentication assertion for Tom.
The Diversinet solution is the first CT-KIP provisioning server to integrate with RSA Authentication Manager technology, and it offers a highly secure way for organizations to extend their existing RSA SecurID deployments in the form of cost-effective software authenticators," said Stuart Vaeth, chief security officer and vice president of business development for Diversinet.
It stands out in its simplicity for users (users do not need to enroll, install any software, carry any devices, memorize any information, or perform extra steps during login), and its security (for example, offering multiple defenses against man-in-the-middle attacks as well as against next generation psychology-based attacks, both of which are beginning to surface as serious vulnerabilities in many authentication systems).
com) launches AuthEngine, a solution that embeds token-based, two-factor authentication in any custom application or environment, including websites, databases, and directories, at the RSA Conference.
Arcot Systems provides a complete range of risk-based authentication, strong authentication and digital signing solutions that deliver secure online transactions and secure internet access to B2B and consumer portals.
OATH, the initiative for Open AuTHentication and a leading proponent of industry-backed standards for royalty-free open authentication, commemorates its third anniversary at the RSA Conference 2007 at the OATH Pavilion Booth 1724 at the Moscone Center in San Francisco.

Full browser ?