authentication

(redirected from authenticator)
Also found in: Dictionary, Thesaurus, Legal, Financial, Encyclopedia, Wikipedia.

authentication

Biometrics
The use of a personal feature—e.g., face, hand, fingerprint, signature, voice, iris, or other highly specific indicator—to verify a person’s identity, and restrict access to private information to authorised persons.

Informatics
Confirmation of a user's identity, generally through a user name and password.

authentication

Biometrics The use of a personal feature, eg, face, hand, fingerprint, signature, voice, iris, or other highly specific indicator to verify a person's identity, and restrict access to information to authorized persons; confirmation of a user's identity, generally through user name and password or biometric characteristics. See Biometrics. Cf Authorization.

au·then·ti·ca·tion

(aw-thenti-kāshŭn)
Protocol to confirm the identify someone logged onto a computer.

authentication

(o-then″ti-kā′shŏn)
In an electronic health record or other computer system, a security mechanism (such as a digital signature) that provides for a unique means of identifying a system user.
References in periodicals archive ?
Authenticator for Apple, a supplement to the flagship 8e6 R3000 Internet Filtering and Reporting Standard and Professional Editions, takes the functionality of the existing Authenticator for Windows and extends that to users of Apple workstations running Mac OS 10.
net about this summer's security breach, calling the the allegations against the authenticator completely untrue and apparently based on a misunderstanding of [its] purpose.
Removing the cost and complexity of purchasing and maintaining authentication solutions like smart cards and tokens, Oracle Mobile Authenticator combines user names and passwords with an additional layer of security at the device level, turning a user s personal mobile device into an authentication device.
For European companies, the enhancements include the potential to use national ID cards as strong authenticators, eliminating the need to purchase separate devices to implement two-factor authentication to tighten security for system and application logon.
TeleSign Authenticator can serve as a stand-alone application for an individual service or can aggregate two-factor authentication functionality into a single app for multiple services or web properties.
a global provider of biometric identity solutions, will display the newest addition to its award-winning line of document readers, the D SCAN[R] Authenticator CF, during the Biometrics 2007 Exhibition in Westminster, London beginning October 18, 2007.
Maxim Integrated's MAX66242 DeepCover Secure Authenticator configures and collects data from any embedded system through its NFC/RFID wireless data communication and simple I2C interfaces.
Users don't need to carry any extra devices with them because the authenticator is already embedded in their cell phone, PDA or laptop computer, and the Diversinet Provisioning Server simplifies obtaining, installing and using the software authenticators.
13, 2010 /PRNewswire/ -- RSA, The Security Division of EMC (NYSE: EMC) announced the availability of the RSA SecurID Software Token for Android(TM) that is engineered to enable an Android powered device to be used as an RSA SecurID authenticator, providing convenient and cost-effective two-factor authentication to enterprise applications and resources.
com), a leading software security company specializing in authentication products, today announced that PartyGaming, a leading online gaming company, decided to extend the protection of its Party-branded online customers with two-factor authentication using VACMAN Controller, VASCO's authentication server technology and equip their customers with a customized PartySecure authenticator.
BOULOGNE-BILLANCOURT, France -- nCryptone, the major actor of strong and multi-channel authentication solutions, and Inteligensa, a Latin-American company, specialized in the development and implementation of intelligent solutions for mass business, are joining their expertise to propose a new multi-purpose authenticator adapted to the diversity of contexts for the final user.