radius

(redirected from Authentication server)
Also found in: Dictionary, Thesaurus, Legal, Financial, Acronyms, Encyclopedia, Wikipedia.

radius

 [ra´de-us] (L.)
1. a line radiating from a center, or a circular limit defined by a fixed distance from an established point or center.
2. in anatomy, the bone on the outer or thumb side of the forearm.
grid radius grid focus.

ra·di·us

, gen. and pl.

ra·di·i

(rā'dē-ŭs, rā'dē-ī),
1. The lateral and shorter of the two bones of the forearm.
2. A straight line passing from the center to the periphery of a circle.
Synonym(s): radio- (3)
[L. spoke of a wheel, rod, ray]

RADIUS

Obstetrics A study–Routine Antenatal Diagnostic Imaging with Ultrasound–involving 15,000 ♀ that evaluated fetal ultrasonography Conclusion No benefit

ra·di·us

, pl. radii (rā'dē-ŭs, -ī)
1. [TA] The lateral and shorter of the two bones of the forearm.
2. A straight line passing from the center to the periphery of a circle.
[L. spoke of a wheel, rod, ray]

radius

One of the two forearm bones, the other being the ULNA. The radius is on the thumb side and lies parallel to the ulna when the palm is facing forward. When the hand is rotated so that the thumb turns inward, the upper end of the radius rotates on a boss on the lower end of the upper arm bone (HUMERUS) but the lower end crosses over the ulna.

radius

the anterior bone in the lower part of the forelimb of vertebrates. see PENTADACTYL LIMB.

ra·di·us

, pl. radii (rā'dē-ŭs, -ī)
1. [TA] Lateral and shorter of two bones of forearm.
2. Straight line passing from center to periphery of a circle.
[L. spoke of a wheel, rod, ray]
References in periodicals archive ?
(5) Remote user creates secret key ([K.sub.A]) using his password and time stamp and acquires token, session key, and random value by decrypting the message received from the authentication server.
An approach has been proposed to stop access to authentication server for a period of time to enable the distribution of randomly generated keys to users [6].
Like this, two-factor authentication server can provide general authentication token such as {ID | PW} and extend token.
Installing login-authentication software as standard-equipped software, sophisticated authentication can be handled by the PC itself, with no need for an authentication server.
Tan Teik Guan, vice president Authentication Server and Software Solutions at Gemalto, said, 'Internet banking is a crucial service that allows BMI to effectively serve its physically distributed customer base.
Based on a random challenge r sent from the authentication server on the network side, the mobile subscriber sends its identity id and the response f(k, r) to the authentication server, where k is a secret key of the mobile subscriber shared with the authentication server beforehand.
Sunnyvale, CA, February 10, 2011 --(PR.com)-- Yubico, a leading provider of easy and secure login solutions, and Data Security Systems Solutions Pte Ltd (aka DS3), a leader in end-to-end security and large-scale multi-factor authentication, announced today that the YubiKey USB authentication key is now supported on DS3's authentication server.
The addition of a chip on the card also enables PKI login, e-mail encryption and digital signature capabilities, and is fully integrated with the ActivIdentity Software portfolio, including SecureLogin SSO, ActivClient, ActivID Card Management System, 4TRESS AAA Server and 4TRESS Authentication Server, the company said.
Once inserted into the USB port, the A-Guard (authentication server) initiates a unique challenge-response exchange with the key, utilizing Advanced Encryption Standard (AES), the next generation of strong encryption approved by the US government.
The customer does not need to look for his or her credit card, or copy the 16-figure number, the expiry date and the three-figure security code on the back of the card, nor wait for confirmation via text message and copy the password onto the 3DSecure authentication server site.
By combining the hardware token YubiKey from Yubico and the OTP authentication server from Nordic Edge, organizations have a wide choice of cutting edge authentication methods available at their fingertips.

Full browser ?