(Askeri) PAROLA SORMA: Bir yayın veya mesajın doğruluğunu anlamak üzere ses veya elektrikli araçlarla yapılan deneme. AUTHENTICATION (AMERİKA SAVUNMA BAKANLIĞI; AMERİKAN SAVUNMA KURULU): PAROLA (MUHABERE): Bir yayını, mesajı veya bunların ve bunların kaynağını doğrulamak suretiyle bir muhabere sistemini sahte ve taklit yayınlara karşı korumak üzere tasarlanmış bir güvenlik önlemi. AUTHENTICATION (AMERİKA SAVUNMA BAKANLIĞI; AMERİKAN SAVUNMA KURULU): PAROLA: Belirli kişileri tanımak ve bu kişilerin özel kategorilerdeki bilgileri alma yetkileri olup olmadığını belirlemek için kullanılan bir yöntem. AUTHENTICATION (AMERİKA SAVUNMA BAKANLIĞI; AMERİKAN SAVUNMA KURULU): DOĞRULAMA: Bir dokümanın gerçek ve resmi olduğunu gösteren imza veya mühür
Englisch - Englisch
Definition von authenticating im Englisch Englisch wörterbuch
In the law of evidence, a piece of evidence which will automatically be presumed authentic for purposes of admissibility based on the character of the evidence itself. Examples include certified copy of public or business records, official publications of government agencies, and newspaper articles
The process of verifying the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system
If you authenticate something, you state officially that it is genuine after examining it. He says he'll have no problem authenticating the stamp. to prove that something is true or real
To verify the identity of an Internet user or computer or person For example, some merchants will use advanced security systems to authenticate your identity before they will accept your online order
The process of proving to the sending system that you are who you say you are and not someone else This may consist of providing a sending system user ID and password It could also be a swipe card, fingerprint scanner, or other identity proving system
(1) to verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system (2) to verify the integrity of data that have been stored, transmitted, or otherwise exposed to possible unauthorized modification
To positively verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system