Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Acronyms, Wikipedia.
Related to authentication: Authentification


Security measure designed to protect a communications system against fraudulent transmissions and establish the authenticity of a message.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.


The verification of the identity of a person or process. In a communication system, authentication verifies that messages really come from their stated source, like the signature on a (paper) letter. The most common form of authentication is typing a user name (which may be widely known or easily guessable) and a corresponding password that is presumed to be known only to the individual being authenticated. Another form of authentication is biometrics.
This article is provided by FOLDOC - Free Online Dictionary of Computing (


(1) Verifying the integrity of a transmitted message. See message integrity, email authentication and MAC.

(2) Verifying the identity of a user logging into a network or computer. Passwords, digital certificates, smart cards and biometrics can be used to prove user identity (see below). Digital certificates can also be used to identify the network to the client. See digital certificate, identity management, identity metasystem, OpenID, human authentication, challenge/response, IP spoofing and CAPTCHA.

Four Levels of Proof

The four levels of proof follow in order of least secure to most secure. None of them are entirely foolproof, which is why two methods are widely used (see two-factor authentication).

1 - What You Know
Passwords only verify that somebody knows the correct combination of characters. The answer to a security question such as "what is the name of your grandmother?" is in the same category. Although more personal, almost any data can be researched on the Web. See password.

2 - What You Have
A private cryptographic key in the computer is far more secure than a password, and authentication tokens, such as a USB key, verify that there is a physical item in the user's possession. However, computers and USB tokens can be stolen. See challenge/response, digital signature, public key cryptography and authentication token.

3 - What You Are
Biometrics such as fingerprint and iris recognition are more difficult to forge, but these systems can be fooled. See biometrics.

4 - What You Do
Dynamic biometrics such as hand writing a signature and speaking a particular phrase are the most secure; however, replay attacks can fool the system.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
[9] Kai Zeng, K Govindan and P Mohapatra, "Non-cryptographic authentication and identification in wireless networks," Wireless Communications, vol.
Fujitsu customers can leverage the NNL S3 Suite to easily build online personal authentication systems with robust security, eliminating passwords for a variety of day-to-day situations.
RAM Group also said that it has met several challenges with a more innovative and secure approach to authentication based on a unique digital signature from the electromagnetic signals in the body, or the BIO KEY created from the signals that the new sensor can detect from any contact point on the body.
A sample label reel incorporating a DNP's LED authentication hologram as a stripe.
Sentegrity provides risk-based authentication. By leveraging the latest sensory and machine learning technology Sentegrity replaces control with trust, allowing customers to embrace the freedoms of mobile computing without sacrificing data security.
This has resulted in increased adoption of out-of-band (OOB) authentication methods.
For the new system developed by TEPCO Systems, in addition to providing the servers and software on the cloud necessary for FIDO authentication, Fujitsu also offers a service supporting the development of the client app.
[31] introduce a mutual authentication protocol between NFC Phone device and NFC POS based on asymmetric method.
Not only will this new facility help in an inclusive authentication of those who are not able to biometrically verify their identity, due to worn out fingerprints, old age, or hard working conditions, but also add another layer of security.
New Delhi: Aadhaar will include face recognition alongside iris or fingerprint scan as a means of verifying users, helping those who face issues in biometric authentication or have worn-out fingerprints, the authority in charge of the national identity card system said on Monday.
TOKYO, Jan 5, 2018 - (ACN Newswire) - JCB Co., Ltd., announced that JCB will be running a trial of multipurpose server-based visible light palm authentication in February at JCB headquarters in Tokyo, Japan, in collaboration with Universal Robot Co., Ltd.
A secure USB flash drive is a USB flash drive that comprises a security function designed to safely protect data stored inside a USB and supplements the vulnerability of a conventional USB flash drive with data encryption/decryption, user authentication and identification, prevention of arbitrary data copying, and data erasure technology to protect the data at the time of loss [3, 4].

Full browser ?