Security measures designed to verify or validate the identity of a user or station prior to granting access to resources. Authentication mechanisms include passwords and intelligent tokens. See also intelligent token NAS, password, RADIUS, and RAS.
The process of identifying an individual, message, file, and other data. The two major roles for authentication, therefore, are as follows: (1) confirming that the user is who he or she claims to be; and (2) that the message is authentic and not altered or forged. The term authentication should not be confused with a closely related term, authorization, which means determining what a user is allowed to do or see.
In recent years, a number of products have been developed to assist in the authentication process, including biometrics (assessing users’ signatures, facial features, and other biological identifiers); smart cards (having microprocessor chips that run cryptographic algorithms and store a private key); digital certificates containing public or private keys; and SecureID, a commercialized product using a key and the current time to generate a random numbers stream that is verifiable by a server—thus ensuring that a potential user puts in the number on the card within a set amount of time (typically 5 or 10 seconds).
Graham, R. Hacking Lexicon. Robert Graham Website. http://www .linuxsecurity.com/resource_files/documentation/hacking-dict.html.
The regulations will require games in which players can kill other players to have identity authentication systems; these systems will require each player to enter their Citizen ID Card number in order to play a game.
It was originally designed an an authentication protocol, with non-repudiation added as an afterthought.
Another website, My Poupette.com, offers authentication services (for a fee), as well as a list of more general ways to tell true designer goods from fake in the article Top 10 Red Flags When Purchasing Online.
In the East the custom which has prevailed for centuries, and which is a practice at the present day, of using the seal as a stamp wherewith to print its device in ink or pigment in authentication of a document is parallel to our western habit of inscribing a signature for the same purpose.
The basics of confidentiality, authentication, and some major cryptographic algorithms are outlined in chapter two.