authentication


Also found in: Dictionary, Thesaurus, Legal, Financial, Acronyms, Encyclopedia, Wikipedia.
Related to authentication: Authentification

authentication

Biometrics
The use of a personal feature—e.g., face, hand, fingerprint, signature, voice, iris, or other highly specific indicator—to verify a person’s identity, and restrict access to private information to authorised persons.

Informatics
Confirmation of a user's identity, generally through a user name and password.

authentication

Biometrics The use of a personal feature, eg, face, hand, fingerprint, signature, voice, iris, or other highly specific indicator to verify a person's identity, and restrict access to information to authorized persons; confirmation of a user's identity, generally through user name and password or biometric characteristics. See Biometrics. Cf Authorization.

au·then·ti·ca·tion

(aw-thenti-kāshŭn)
Protocol to confirm the identify someone logged onto a computer.

authentication

(o-then″ti-kā′shŏn)
In an electronic health record or other computer system, a security mechanism (such as a digital signature) that provides for a unique means of identifying a system user.
References in periodicals archive ?
[17] P Baracca, N Laurenti and S Tomasin, "Physical Layer Authentication over MIMO Fading Wiretap Channels," IEEE Transactions on Wireless Communications, vol.
[18] Dan Shan, Kai Zeng, Weidong Xiang and P Richardson, "PHY-CRAM: physical layer challenge-response authentication mechanism for wireless networks," IEEE Journal on Selected Areas in Communications, vol.
Furthermore, the presence of many out-of-band (OOB) authentication vendors, as well as, widespread awareness about these solutions would continue to account for the North America region's highest market share during the forecast period.
Furthermore, Asia Pacific Out-of-Band authentication market is gaining traction as the number of smart devices and BYOD trend is increasing in developed and emerging economies such as, India, China, and Japan.
Fujitsu plans to extend the Online Biometric Authentication Service to other use cases going forward.
[2] introduce a symmetric authentication protocol for NFC mobile payment applications called a secure lightweight protocol.
"The 'Face Authentication' provides additional option for all residents to have inclusive authentication.
The UIDAI said that face authentication would be allowed "only in fusion mode", meaning along with either fingerprint or iris or one-time password to verify the details of Aadhaar holder.
The visible light palm authentication used in this trial actually combines palm vein pattern authentication with palm print search of the data base to find the person's information.
The implementation vulnerability case of using the initialization function includes the case of data not being deleted even after the initialization of the management program provided by the company "S" and thus the data being recovered with a data recovery tool in order to access the internally saved data without authentication [7].
Password-based authentication represents, very often, a solution vulnerable to attacks.
For better protection, Javelin deems high-assurance strong authentication, which merges multifactor authentication with public key cryptography, as the strongest authentication option available and the one it recommends businesses adopt moving forward.

Full browser ?