Authentication

(redirected from authenticator)
Also found in: Dictionary, Thesaurus, Medical, Legal, Encyclopedia, Wikipedia.

Authentication

In the context of bonds, refers to the validation of a bond certificate.

Authentication

A legal certification that a document is genuine. In business, this is especially applied to bonds, showing that an issue was legitimate.
References in periodicals archive ?
Integrated security workflow - With the addition of MobileIron Authenticator, the MobileIron Access solution now brings MFA policies into a rich security workflow that already includes adaptive access and single sign-on for mobile apps.
This is further important because of the status of efforts at passing legislation in New York to protect authenticators. A bill proposed a handful of years ago would have required those pleading against authenticators to provide a higher level of detail to prove the plausibility of their claim, as well as a 'clear and convincing evidence' burden of proof during the trial, and a one-sided attorneys' fees provision.
This random seed S is used for security purpose; when any authenticator node receives network joining request from any new node, it calculates the encryption key [K.sub.E] from any random seed S by using key generation algorithm and sends the same random seed to new node.
[3] In a deniable authenticated decryption query, the adversary A submits an IBDAE authenticator [delta] and a receiver's identity I[D.sub.j], to X, then X runs Extract algorithm to obtain the receiver's private key [S.sub.j].
B) computes the authenticator [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and sends it to S.
33-41); together with Searle's principle of binary structure, this datum implies that the common formula "Thus will X do to Y" cannot function as the oath's fronted (i.e., topicalized) apodosis, but rather as its authenticator, standing syntactically separate from the oath's protasis (and gapped apodosis).
In the same way that the press is an authenticator and a sense maker, the aggregation it engages in should save people time and steer them to trusted sources.
According to the authors, "The letters 'USA' appear to have been dug out of the ground, while the code appeared to have been fashioned from rice straw." The code, or symbol, is "a highly classified Vietnam War-era USAF/USN Escape & Evasion code in a rice paddy in a narrow mountain valley." The authors add that "similar codes, secret messages, and secret authenticators in rice paddies, fields and garden plots along trails in Laos and Vietnam" have also been seen from the sky.
MobileGov, based in Sophia Antipolis in southern France, is about to move into an office in Charlotte Square, Newcastle, after signing distribution agreements for its mobile device authenticator product.
If an intruder captures user information from a local computer system, they obtain the user's authentication information (ID, password, etc.) with the decoy authenticator. When the intruder then tries to access the local computer system using the captured authenticator and identifier, the system recognizes that the authenticator file has been compromised and takes a number of steps to protect the environment including stopping the intrusion, sending alerts and other actions as mandated by the security administrator.
"The standard answer is to find a third-party authenticator to give that item a blessing, to ensure that it is not a forgery," said Dan Schmidt, manager, casino and charity sales, at Carlsbad, Calif.-based Upper Deck, which has under autograph contract the signatures of Michael Jordan and Tiger Woods.
Intervoice recently announced that its Omvia Authenticator now provides customers with leading-edge voice authentication technology to increase the security of their voice applications and foster more trusted relationships with their own customers.

Full browser ?