(Askeri) PAROLA SORMA: Bir yayın veya mesajın doğruluğunu anlamak üzere ses veya elektrikli araçlarla yapılan deneme. AUTHENTICATION (AMERİKA SAVUNMA BAKANLIĞI; AMERİKAN SAVUNMA KURULU): PAROLA (MUHABERE): Bir yayını, mesajı veya bunların ve bunların kaynağını doğrulamak suretiyle bir muhabere sistemini sahte ve taklit yayınlara karşı korumak üzere tasarlanmış bir güvenlik önlemi. AUTHENTICATION (AMERİKA SAVUNMA BAKANLIĞI; AMERİKAN SAVUNMA KURULU): PAROLA: Belirli kişileri tanımak ve bu kişilerin özel kategorilerdeki bilgileri alma yetkileri olup olmadığını belirlemek için kullanılan bir yöntem. AUTHENTICATION (AMERİKA SAVUNMA BAKANLIĞI; AMERİKAN SAVUNMA KURULU): DOĞRULAMA: Bir dokümanın gerçek ve resmi olduğunu gösteren imza veya mühür
الإنجليزية - الإنجليزية
تعريف to authenticate في الإنجليزية الإنجليزية القاموس.
To prove authentic; to determine as real and true; as, to authenticate a portrait
The process of verifying the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system
To establish the identity of the origination or originator of a transaction or other data-processing request
If you authenticate something, you state officially that it is genuine after examining it. He says he'll have no problem authenticating the stamp. to prove that something is true or real
To verify the identity of an Internet user or computer or person For example, some merchants will use advanced security systems to authenticate your identity before they will accept your online order
The process of proving to the sending system that you are who you say you are and not someone else This may consist of providing a sending system user ID and password It could also be a swipe card, fingerprint scanner, or other identity proving system
To reliably determine whether someone is who they declare to be, or something is what it is declared to be
(1) to verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system (2) to verify the integrity of data that have been stored, transmitted, or otherwise exposed to possible unauthorized modification
To positively verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system