Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!


Index Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity. [1]

130 relations: Access control, Access Control Service, Acuant, Adversary (cryptography), Anthropology, Archaeology, Atomic authorization, Authentication Open Service Interface Definition, Authenticity in art, Authorization, Automated teller machine, Barcode, Basic access authentication, Biometrics, Blind credential, BT Group, CAPTCHA, Chain of custody, Challenge–response authentication, Cheque, Chip Authentication Program, Closed-loop authentication, Computer security, Counterfeit, Counterfeit consumer goods, Counterfeit medications, Credit card, Currency, Delegation (computer security), Detective, Diameter (protocol), Digital identity, Digital signature, DNA, Electronic article surveillance, Electronic authentication, Electronic signature, Email, Encrypted key exchange, Evidence (law), Experiment, Extensible Authentication Protocol, Fact checking, Federal government of the United States, FIDO Alliance, Final good, Fingerprint, Fingerprint Verification Competition, Forgery, Fraud, ..., Geolocation, GNU Privacy Guard, Han van Meegeren, HMAC, Holography, Identification (information), Identity document, Jacques van Meegeren, Java Authentication and Authorization Service, Kantara Initiative, Kerberos (protocol), Key (cryptography), Key signing party, Label, Layer 8, Legal instrument, Literary forgery, Login, Man-in-the-middle attack, Mantrap (access control), Manuscript, Microchip implant (human), Mobile phone, Multi-factor authentication, Nameplate, National Information Assurance Glossary, National Institute of Standards and Technology, Near-field communication, Needham–Schroeder protocol, OAuth, Online banking, OpenAthens, OpenID, OpenID Connect, Packaging and labeling, Passphrase, Passport, Password, Perjury, Personal identification number, Plagiarism, Pretty Good Privacy, Provenance, Public key certificate, Public key infrastructure, Public-key cryptography, Radio-frequency identification, Radiocarbon dating, RADIUS, Reliance authentication, Retina, Seal (emblem), Secret sharing, Secure cryptoprocessor, Secure Remote Password protocol, Secure Shell, Security printing, Security question, Security token, Shared secret, Signature, Software token, Spoofing attack, SQRL, Stationery, Strong authentication, Supply chain, Taggant, Tamper-evident technology, TCP Wrappers, Time-based authentication, Track and trace, Trademark, Truth, United States, United States Department of Commerce, Usability of web authentication systems, Watermark, Web of trust, Woo–Lam. Expand index (80 more) »

Access control

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource.

New!!: Authentication and Access control · See more »

Access Control Service

Access Control Service, or Windows Azure Access Control Service (ACS) is a Microsoft-owned cloud-based service that provides an easy way of authenticating and authorizing users to gain access to web applications and services while allowing the features of authentication and authorization to be factored out of the application code.

New!!: Authentication and Access Control Service · See more »


Acuant is an identity verification, document authentication and fraud prevention technology services provider headquartered in Los Angeles, with engineering and development centers in New Hampshire and Israel.

New!!: Authentication and Acuant · See more »

Adversary (cryptography)

In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving their goal (primarily privacy, integrity, and availability of data).

New!!: Authentication and Adversary (cryptography) · See more »


Anthropology is the study of humans and human behaviour and societies in the past and present.

New!!: Authentication and Anthropology · See more »


Archaeology, or archeology, is the study of humanactivity through the recovery and analysis of material culture.

New!!: Authentication and Archaeology · See more »

Atomic authorization

Atomic authorization is the act of securing authorization rights independently from the intermediary applications to which they are granted and the parties to which they apply.

New!!: Authentication and Atomic authorization · See more »

Authentication Open Service Interface Definition

The Authentication Open Service Interface Definition (OSID) is an O.K.I. specification which supports invoking an authentication process.

New!!: Authentication and Authentication Open Service Interface Definition · See more »

Authenticity in art

Authenticity in art is the different ways in which a work of art or an artistic performance may be considered authentic.

New!!: Authentication and Authenticity in art · See more »


Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.

New!!: Authentication and Authorization · See more »

Automated teller machine

An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, transfer funds, or obtaining account information, at any time and without the need for direct interaction with bank staff.

New!!: Authentication and Automated teller machine · See more »


A barcode (also bar code) is an optical, machine-readable, representation of data; the data usually describes something about the object that carries the barcode.

New!!: Authentication and Barcode · See more »

Basic access authentication

In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent (e.g. a web browser) to provide a user name and password when making a request.

New!!: Authentication and Basic access authentication · See more »


Biometrics is the technical term for body measurements and calculations.

New!!: Authentication and Biometrics · See more »

Blind credential

A blind credential is a token asserting that someone qualifies under some criteria or has some status or right, without revealing "who" that person is — without including their name or address, for instance.

New!!: Authentication and Blind credential · See more »

BT Group

BT Group plc (trading as BT and formerly British Telecom) is a British multinational telecommunications holding company with head offices in London, United Kingdom.

New!!: Authentication and BT Group · See more »


A CAPTCHA (an acronym for "Completely Automated Public '''T'''uring test to tell Computers and Humans Apart") is a type of challenge–response test used in computing to determine whether or not the user is human.

New!!: Authentication and CAPTCHA · See more »

Chain of custody

Chain of custody (CoC), in legal contexts, refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.

New!!: Authentication and Chain of custody · See more »

Challenge–response authentication

In computer security, challenge–response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.

New!!: Authentication and Challenge–response authentication · See more »


A cheque, or check (American English; see spelling differences), is a document that orders a bank to pay a specific amount of money from a person's account to the person in whose name the cheque has been issued.

New!!: Authentication and Cheque · See more »

Chip Authentication Program

A Gemalto EZIO CAP device with Barclays PINsentry styling The Chip Authentication Program (CAP) is a MasterCard initiative and technical specification for using EMV banking smartcards for authenticating users and transactions in online and telephone banking.

New!!: Authentication and Chip Authentication Program · See more »

Closed-loop authentication

Closed-loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of a token transmitted to the canonical or trusted point of contact for that identity.

New!!: Authentication and Closed-loop authentication · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Authentication and Computer security · See more »


The counterfeit means to imitate something.

New!!: Authentication and Counterfeit · See more »

Counterfeit consumer goods

Counterfeit consumer goods are goods, often of inferior quality, made or sold under another's brand name without the brand owner’s authorization.

New!!: Authentication and Counterfeit consumer goods · See more »

Counterfeit medications

A counterfeit medication or a counterfeit drug is a medication or pharmaceutical product which is produced and sold with the intent to deceptively represent its origin, authenticity or effectiveness.

New!!: Authentication and Counterfeit medications · See more »

Credit card

A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's promise to the card issuer to pay them for the amounts so paid plus the other agreed charges.

New!!: Authentication and Credit card · See more »


A currency (from curraunt, "in circulation", from currens, -entis), in the most specific use of the word, refers to money in any form when in actual use or circulation as a medium of exchange, especially circulating banknotes and coins.

New!!: Authentication and Currency · See more »

Delegation (computer security)

Delegation is the process of a computer user handing over their authentication credentials to another user.

New!!: Authentication and Delegation (computer security) · See more »


A detective is an investigator, usually a member of a law enforcement agency.

New!!: Authentication and Detective · See more »

Diameter (protocol)

Diameter is an authentication, authorization, and accounting protocol for computer networks.

New!!: Authentication and Diameter (protocol) · See more »

Digital identity

A digital identity is information on an entity used by computer systems to represent an external agent.

New!!: Authentication and Digital identity · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: Authentication and Digital signature · See more »


Deoxyribonucleic acid (DNA) is a thread-like chain of nucleotides carrying the genetic instructions used in the growth, development, functioning and reproduction of all known living organisms and many viruses.

New!!: Authentication and DNA · See more »

Electronic article surveillance

Electronic article surveillance is a technological method for preventing shoplifting from retail stores, pilferage of books from libraries or removal of properties from office buildings.

New!!: Authentication and Electronic article surveillance · See more »

Electronic authentication

Electronic authentication is the process of establishing confidence in user identities electronically presented to an information system.

New!!: Authentication and Electronic authentication · See more »

Electronic signature

An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign.

New!!: Authentication and Electronic signature · See more »


Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.

New!!: Authentication and Email · See more »

Encrypted key exchange

Encrypted Key Exchange (also known as EKE) is a family of password-authenticated key agreement methods described by Steven M. Bellovin and Michael Merritt.

New!!: Authentication and Encrypted key exchange · See more »

Evidence (law)

The law of evidence, also known as the rules of evidence, encompasses the rules and legal principles that govern the proof of facts in a legal proceeding.

New!!: Authentication and Evidence (law) · See more »


An experiment is a procedure carried out to support, refute, or validate a hypothesis.

New!!: Authentication and Experiment · See more »

Extensible Authentication Protocol

Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections.

New!!: Authentication and Extensible Authentication Protocol · See more »

Fact checking

Fact checking is the act of checking factual assertions in non-fictional text in order to determine the veracity and correctness of the factual statements in the text.

New!!: Authentication and Fact checking · See more »

Federal government of the United States

The federal government of the United States (U.S. federal government) is the national government of the United States, a constitutional republic in North America, composed of 50 states, one district, Washington, D.C. (the nation's capital), and several territories.

New!!: Authentication and Federal government of the United States · See more »

FIDO Alliance

The FIDO ("Fast IDentity Online") Alliance is an industry consortium launched in February 2013 to address the lack of interoperability among strong authentication devices and the problems users face creating and remembering multiple usernames and passwords.

New!!: Authentication and FIDO Alliance · See more »

Final good

In economics, any commodity which is produced and subsequently consumed by the consumer, to satisfy his current wants or needs, is a consumer good or final good.

New!!: Authentication and Final good · See more »


A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.

New!!: Authentication and Fingerprint · See more »

Fingerprint Verification Competition

The Fingerprint Verification Competition (FVC) is an international competition focused on fingerprint verification software assessment.

New!!: Authentication and Fingerprint Verification Competition · See more »


Forgery is the process of making, adapting, or imitating objects, statistics, or documents with the intent to deceive for the sake of altering the public perception, or to earn profit by selling the forged item.

New!!: Authentication and Forgery · See more »


In law, fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.

New!!: Authentication and Fraud · See more »


Geolocation is the identification or estimation of the real-world geographic location of an object, such as a radar source, mobile phone, or Internet-connected computer terminal.

New!!: Authentication and Geolocation · See more »

GNU Privacy Guard

GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite.

New!!: Authentication and GNU Privacy Guard · See more »

Han van Meegeren

Henricus Antonius "Han" van Meegeren (10 October 1889 – 30 December 1947) was a Dutch painter and portraitist and is considered to be one of the most ingenious art forgers of the 20th century.

New!!: Authentication and Han van Meegeren · See more »


In cryptography, an HMAC (sometimes disabbreviated as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.

New!!: Authentication and HMAC · See more »


Holography is the science and practice of making holograms.

New!!: Authentication and Holography · See more »

Identification (information)

The function of identification is to map a known quantity to an unknown entity so as to make it known.

New!!: Authentication and Identification (information) · See more »

Identity document

An identity document (also called a piece of identification or ID, or colloquially as papers) is any document which may be used to prove a person's identity.

New!!: Authentication and Identity document · See more »

Jacques van Meegeren

Jacques Henri Emil van Meegeren (26 August 1912 – 26 October 1977) was a Dutch illustrator and painter.

New!!: Authentication and Jacques van Meegeren · See more »

Java Authentication and Authorization Service

Java Authentication and Authorization Service, or JAAS, pronounced "Jazz", is the Java implementation of the standard Pluggable Authentication Module (PAM) information security framework.

New!!: Authentication and Java Authentication and Authorization Service · See more »

Kantara Initiative

Kantara Initiative, Inc. is a 501 c(6) non-profit industry consortium and professional trade association dedicated to advancing technical & legal innovation and trust framework operations related to digital identity management and data privacy.

New!!: Authentication and Kantara Initiative · See more »

Kerberos (protocol)

Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

New!!: Authentication and Kerberos (protocol) · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: Authentication and Key (cryptography) · See more »

Key signing party

In public-key cryptography, a key signing party is an event at which people present their public keys to others in person, who, if they are confident the key actually belongs to the person who claims it, digitally sign the certificate containing that public key and the person's name, etc.

New!!: Authentication and Key signing party · See more »


A label (as distinct from signage) is a piece of paper, plastic film, cloth, metal, or other material affixed to a container or product, on which is written or printed information or symbols about the product or item.

New!!: Authentication and Label · See more »

Layer 8

Layer 8 is used to refer to "user" or "political" layer on top of the OSI model of computer networking.

New!!: Authentication and Layer 8 · See more »

Legal instrument

Legal instrument is a legal term of art that is used for any formally executed written document that can be formally attributed to its author, records and formally expresses a legally enforceable act, process, or contractual duty, obligation, or right, and therefore evidences that act, process, or agreement.

New!!: Authentication and Legal instrument · See more »

Literary forgery

Literary forgery (also known as literary mystification, literary fraud or literary hoax) is writing, such as a manuscript or a literary work, which is either deliberately misattributed to a historical or invented author, or is a purported memoir or other presumably nonfictional writing deceptively presented as true when, in fact, it presents untrue or imaginary information.

New!!: Authentication and Literary forgery · See more »


In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.

New!!: Authentication and Login · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: Authentication and Man-in-the-middle attack · See more »

Mantrap (access control)

A mantrap, air lock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.

New!!: Authentication and Mantrap (access control) · See more »


A manuscript (abbreviated MS for singular and MSS for plural) was, traditionally, any document written by hand -- or, once practical typewriters became available, typewritten -- as opposed to being mechanically printed or reproduced in some indirect or automated way.

New!!: Authentication and Manuscript · See more »

Microchip implant (human)

A human microchip implant is typically an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being.

New!!: Authentication and Microchip implant (human) · See more »

Mobile phone

A mobile phone, known as a cell phone in North America, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.

New!!: Authentication and Mobile phone · See more »

Multi-factor authentication

Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).

New!!: Authentication and Multi-factor authentication · See more »


A nameplate identifies and displays a person or product's name.

New!!: Authentication and Nameplate · See more »

National Information Assurance Glossary

Committee on National Security Systems Instruction No.

New!!: Authentication and National Information Assurance Glossary · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Authentication and National Institute of Standards and Technology · See more »

Near-field communication

Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.

New!!: Authentication and Near-field communication · See more »

Needham–Schroeder protocol

The Needham–Schroeder protocol is one of the two key transport protocols intended for use over an insecure network, both proposed by Roger Needham and Michael Schroeder.

New!!: Authentication and Needham–Schroeder protocol · See more »


OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.

New!!: Authentication and OAuth · See more »

Online banking

Online banking, also known as internet banking, it is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution's website.

New!!: Authentication and Online banking · See more »


OpenAthens is an identity and access management service, supplied by Eduserv, a British not-for-profit information technology services company.

New!!: Authentication and OpenAthens · See more »


OpenID is an open standard and decentralized authentication protocol.

New!!: Authentication and OpenID · See more »

OpenID Connect

OpenID Connect (OIDC) is an authentication layer on top of OAuth 2.0, an authorization framework.

New!!: Authentication and OpenID Connect · See more »

Packaging and labeling

Packaging is the science, art and technology of enclosing or protecting products for distribution, storage, sale, and use.

New!!: Authentication and Packaging and labeling · See more »


A passphrase is a sequence of words or other text used to control access to a computer system, program or data.

New!!: Authentication and Passphrase · See more »


A passport is a travel document, usually issued by a country's government, that certifies the identity and nationality of its holder primarily for the purpose of international travel.

New!!: Authentication and Passport · See more »


A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Authentication and Password · See more »


Perjury is the intentional act of swearing a false oath or falsifying an affirmation to tell the truth, whether spoken or in writing, concerning matters a generation material to an official proceeding.

New!!: Authentication and Perjury · See more »

Personal identification number

A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.

New!!: Authentication and Personal identification number · See more »


Plagiarism is the "wrongful appropriation" and "stealing and publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own original work.

New!!: Authentication and Plagiarism · See more »

Pretty Good Privacy

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.

New!!: Authentication and Pretty Good Privacy · See more »


Provenance (from the French provenir, 'to come from/forth') is the chronology of the ownership, custody or location of a historical object.

New!!: Authentication and Provenance · See more »

Public key certificate

In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key.

New!!: Authentication and Public key certificate · See more »

Public key infrastructure

A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

New!!: Authentication and Public key infrastructure · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Authentication and Public-key cryptography · See more »

Radio-frequency identification

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.

New!!: Authentication and Radio-frequency identification · See more »

Radiocarbon dating

Radiocarbon dating (also referred to as carbon dating or carbon-14 dating) is a method for determining the age of an object containing organic material by using the properties of radiocarbon, a radioactive isotope of carbon.

New!!: Authentication and Radiocarbon dating · See more »


Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.

New!!: Authentication and RADIUS · See more »

Reliance authentication

Reliance authentication is a part of the trust-based identity attribution process whereby a second entity relies upon the authentication processes put in place by a first entity.

New!!: Authentication and Reliance authentication · See more »


The retina is the innermost, light-sensitive "coat", or layer, of shell tissue of the eye of most vertebrates and some molluscs.

New!!: Authentication and Retina · See more »

Seal (emblem)

A seal is a device for making an impression in wax, clay, paper, or some other medium, including an embossment on paper, and is also the impression thus made.

New!!: Authentication and Seal (emblem) · See more »

Secret sharing

Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret.

New!!: Authentication and Secret sharing · See more »

Secure cryptoprocessor

A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.

New!!: Authentication and Secure cryptoprocessor · See more »

Secure Remote Password protocol

The Secure Remote Password protocol (SRP) is an augmented password-authenticated key agreement (PAKE) protocol, specifically designed to work around existing patents.

New!!: Authentication and Secure Remote Password protocol · See more »

Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

New!!: Authentication and Secure Shell · See more »

Security printing

Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps and identity cards.

New!!: Authentication and Security printing · See more »

Security question

A security question is form of shared secret used as an authenticator.

New!!: Authentication and Security question · See more »

Security token

Security tokens are physical devices used to gain access to an electronically restricted resource.

New!!: Authentication and Security token · See more »

Shared secret

In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication.

New!!: Authentication and Shared secret · See more »


A signature (from signare, "to sign") is a handwritten (and often stylized) depiction of someone's name, nickname, or even a simple "X" or other mark that a person writes on documents as a proof of identity and intent.

New!!: Authentication and Signature · See more »

Software token

A software token (a.k.a. soft token) is a type of two-factor authentication security device that may be used to authorize the use of computer services.

New!!: Authentication and Software token · See more »

Spoofing attack

In the context of network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.

New!!: Authentication and Spoofing attack · See more »


SQRL (pronounced "squirrel") or Secure, Quick, Reliable Login (formerly Secure QR Login) is a draft open standard for secure website login and authentication.

New!!: Authentication and SQRL · See more »


Stationery is a mass noun referring to commercially manufactured writing materials, including cut paper, envelopes, writing implements, continuous form paper, and other office supplies.

New!!: Authentication and Stationery · See more »

Strong authentication

Strong authentication is a notion with several unofficial definitions.

New!!: Authentication and Strong authentication · See more »

Supply chain

A supply chain is a system of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer.

New!!: Authentication and Supply chain · See more »


A taggant can mean a radio frequency microchip used in automated identification and data capture (see RFID).

New!!: Authentication and Taggant · See more »

Tamper-evident technology

Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected.

New!!: Authentication and Tamper-evident technology · See more »

TCP Wrappers

TCP Wrappers (also known as tcp_wrappers) is a host-based networking ACL system, used to filter network access to Internet Protocol servers on (Unix-like) operating systems such as Linux or BSD.

New!!: Authentication and TCP Wrappers · See more »

Time-based authentication

Time-based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its presence at a scheduled time of day or within a scheduled time interval and on a distinct location.

New!!: Authentication and Time-based authentication · See more »

Track and trace

In distribution and logistics of many types of products, track and trace or tracking and tracing, concerns a process of determining the current and past locations (and other information) of a unique item or property.

New!!: Authentication and Track and trace · See more »


A trademark, trade mark, or trade-markThe styling of trademark as a single word is predominantly used in the United States and Philippines only, while the two-word styling trade mark is used in many other countries around the world, including the European Union and Commonwealth and ex-Commonwealth jurisdictions (although Canada officially uses "trade-mark" pursuant to the Trade-mark Act, "trade mark" and "trademark" are also commonly used).

New!!: Authentication and Trademark · See more »


Truth is most often used to mean being in accord with fact or reality, or fidelity to an original or standard.

New!!: Authentication and Truth · See more »

United States

The United States of America (USA), commonly known as the United States (U.S.) or America, is a federal republic composed of 50 states, a federal district, five major self-governing territories, and various possessions.

New!!: Authentication and United States · See more »

United States Department of Commerce

The United States Department of Commerce is the Cabinet department of the United States government concerned with promoting economic growth.

New!!: Authentication and United States Department of Commerce · See more »

Usability of web authentication systems

Usability of web authentication systems refers to the efficiency and user acceptance of online authentication systems.

New!!: Authentication and Usability of web authentication systems · See more »


A watermark is an identifying image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, atop a dark background), caused by thickness or density variations in the paper.

New!!: Authentication and Watermark · See more »

Web of trust

In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner.

New!!: Authentication and Web of trust · See more »


In cryptography, Woo–Lam refers to various computer network authentication protocols designed by Simon S. Lam and Thomas Woo.

New!!: Authentication and Woo–Lam · See more »

Redirects here:

AuthN, Authenticate, Authenticated, Authenticated copy, Authenticates, Authenticating, Authentication factor, Authentication factors, Authentications, Authentification, Authn, Client authentication, Forgery detection, Server authentication.


[1] https://en.wikipedia.org/wiki/Authentication

Hey! We are on Facebook now! »