authentication


Also found in: Dictionary, Thesaurus, Legal, Financial, Acronyms, Encyclopedia, Wikipedia.
Related to authentication: Authentification

authentication

Biometrics
The use of a personal feature—e.g., face, hand, fingerprint, signature, voice, iris, or other highly specific indicator—to verify a person’s identity, and restrict access to private information to authorised persons.

Informatics
Confirmation of a user's identity, generally through a user name and password.

authentication

Biometrics The use of a personal feature, eg, face, hand, fingerprint, signature, voice, iris, or other highly specific indicator to verify a person's identity, and restrict access to information to authorized persons; confirmation of a user's identity, generally through user name and password or biometric characteristics. See Biometrics. Cf Authorization.

au·then·ti·ca·tion

(aw-thenti-kāshŭn)
Protocol to confirm the identify someone logged onto a computer.

authentication

(o-then″ti-kā′shŏn)
In an electronic health record or other computer system, a security mechanism (such as a digital signature) that provides for a unique means of identifying a system user.
References in periodicals archive ?
Hitachi's finger vein authentication technology employs a method whereby light is transmitted through the finger to enable high-contrast matching of vein patterns.
Figure 5: Consumers Prefer Immediate Authentication for Unusual Activities
If the message is spoofed, the sending e-mail server will not show up as an approved sending addresses for that domain, and your e-mail authentication engine can automatically drop the offending e-mail.
Since 1987, Inteligensa provides Cards (Banking,ID,GSM), Personalization, POS Systems & Smart Card Developments and Authentication products which have brought them as de facto partner for nCryptone on nC DOT product by leveraging their strong experience on Chip personalization in secure environment and expertise on RFID and NFC solutions.
Meiwa Estate plans to incorporate Fujitsu's contactless palm vein authentication technology as a standard feature for other condominiums in their "Clio La Mode" urban-style condominium series.
PKI as the foundation and a certificate-based protocol provide numerous advantages, particularly in providing for strong authentication and management data integrity.
Since Source Authentication is an e-mail server-based technology, it will often be implemented at the ISP (Internet Service Provider) level.
More information about Green Armor Solutions and its Identity Cues series of authentication products which leverage psychology to deliver maximum security with maximum convenience can be found on the Green Armor Solutions web site at: http://www.
Tom logs into the investment brokerage portal using whatever authentication method the brokerage firm prefers.
OTCBB:DVNTF), a leading provider of mobile authentication security and access solutions, today introduced the Diversinet Provisioning Server for RSA SecurID([R]), a fast, easy and secure way for enterprises to deploy cost-effective RSA SecurID two-factor software authenticators.
Driven by a year-end deadline to expedite deployments of risk-based authentication solutions and seeking to work with technology vendors with exceptional customer service as well as easy-to-deploy solutions, banks, credits unions and technology partners are relying on Digital Resolve's Fraud Analyst solution to reduce online fraud by as much as 90 percent.
com), the leading authentication technology developer for heterogeneous environments, today announced the launch of CRYPTO-MAS, the first Managed Authentication Service to fully support Apple's Mac OS X.

Full browser ?