Authentication


Also found in: Dictionary, Thesaurus, Medical, Legal, Acronyms, Encyclopedia, Wikipedia.
Related to Authentication: Authentification

Authentication

In the context of bonds, refers to the validation of a bond certificate.

Authentication

A legal certification that a document is genuine. In business, this is especially applied to bonds, showing that an issue was legitimate.
References in periodicals archive ?
Users of the Naka City Public Library will be given the choice of using an ID card with an embedded IC chip, or use of palm vein authentication system for identity verification.
provides automated authentication services that enable organizations to quickly and cost-effectively provide real-time user authentication during an Internet session.
However, with fingerprint certification, there is a high probability that fingerprints can be duplicated, while iris-based authentication requires bulky equipment.
Many e-mail security vendors have already implemented some form of e-mail authentication, and many others are looking at doing so.
In 2001, Harvard Medical School began implementing a campuswide authentication and access policy management solution for wireless devices.
ASAS is based on the A-Key, a proprietary chip-based authentication token that is smaller than a typical house key and is plugged directly into the Universal Serial Bus (USB) port of any personal computer, laptop, thin client or other terminal device.
Created jointly with Inteligensa, the nC Mobile Token suite combines nCryptone's experience in the field of strong authentication and Inteligensa's expertise in the field of highly secure chips.
Fujitsu's contactless palm vein authentication technology has been adopted for use in financial institutions, hospitals, and universities in Japan thus far.
CHAP was chosen by IETF as the mandatory authentication protocol for iSCSI.
This exciting collaboration between Arcot and Microsoft will showcase how any organization can easily offer strong, multi-factor authentication integrated with a digital identity system - all with a simplified, consistent user experience while helping protect users from identity theft," said Jim Reno, VP of Product Development and Engineering from Arcot.
Since Source Authentication is an e-mail server-based technology, it will often be implemented at the ISP (Internet Service Provider) level.
More information about Green Armor Solutions and its Identity Cues series of authentication products which leverage psychology to deliver maximum security with maximum convenience can be found on the Green Armor Solutions web site at: http://www.

Full browser ?