authenticated copy - significado y definición. Qué es authenticated copy
Diclib.com
Diccionario ChatGPT
Ingrese una palabra o frase en cualquier idioma 👆
Idioma:

Traducción y análisis de palabras por inteligencia artificial ChatGPT

En esta página puede obtener un análisis detallado de una palabra o frase, producido utilizando la mejor tecnología de inteligencia artificial hasta la fecha:

  • cómo se usa la palabra
  • frecuencia de uso
  • se utiliza con más frecuencia en el habla oral o escrita
  • opciones de traducción
  • ejemplos de uso (varias frases con traducción)
  • etimología

Qué (quién) es authenticated copy - definición

ACT OF CONFIRMING THE TRUTH OF AN ATTRIBUTE OF A DATUM OR ENTITY, OFTEN USED AS PART OF ACCESS CONTROL
Authenticate; Authentification; Authentication factor; Authentication factors; Authenticated copy; Forgery detection; AuthN; Authentications; Authenticates; Authenticated; Authenticating; Authn; Client authentication; Server authentication; Service authentication; Product authentication; Single-factor authentication; Continuous authentication
  • ATM user authenticating himself
  • A [[security hologram]] label on an electronics box for authentication
  • NSA KAL-55B Tactical Authentication System used by the U.S. military during the [[Vietnam War]] – [[National Cryptologic Museum]]
  • A military police officer checks a driver's identification card before allowing her to enter a military base.

Copy (command)         
COMMAND OF RT-11, RSX-11, OPENVMS, DOS, OS/2 AND MICROSOFT WINDOWS OPERATING SYSTEMS
Copy Con; Copy con; COPY (command); COPY (DOS command); COPY (DOS); COPY/FTP (command)
In computing, copy is a command in various operating systems. The command copies computer files from one directory to another.
Password-authenticated key agreement         
INTERACTIVE METHOD FOR TWO OR MORE PARTIES TO ESTABLISH CRYPTOGRAPHIC KEYS BASED ON ONE OR MORE PARTY'S KNOWLEDGE OF A PASSWORD
PAKE; Password Authenticated Key Exchange; Password-authenticated key exchange
In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password.
Authenticated encryption         
  • E&M approach
  • EtM approach
  • MtE approach
CIPHERS WHICH SIMULTANEOUSLY ASSURE CONFIDENTIALITY AND AUTHENTICITY
AEAD block cipher modes of operation; AEAD; Encrypt-then-MAC; Encrypt-and-MAC; MAC-then-Encrypt; Authenticated Encryption with Associated Data; Authenticated encryption with associated data; Authenticated Encryption; Generic composition; Authenticated cipher; AE scheme; Additional authenticated data
Authenticated Encryption (AE) and Authenticated Encryption with Associated Data (AEAD) are forms of encryption which simultaneously assure the confidentiality and authenticity of data.

Wikipedia

Authentication

Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

Ejemplos de uso de authenticated copy
1. Among the documents required for business and commercial visits are an authenticated copy of the contract with the agency they belong to and a letter from the licensing agency of their occupation.