biometric authentication - significado y definición. Qué es biometric authentication
Diclib.com
Diccionario ChatGPT
Ingrese una palabra o frase en cualquier idioma 👆
Idioma:

Traducción y análisis de palabras por inteligencia artificial ChatGPT

En esta página puede obtener un análisis detallado de una palabra o frase, producido utilizando la mejor tecnología de inteligencia artificial hasta la fecha:

  • cómo se usa la palabra
  • frecuencia de uso
  • se utiliza con más frecuencia en el habla oral o escrita
  • opciones de traducción
  • ejemplos de uso (varias frases con traducción)
  • etimología

Qué (quién) es biometric authentication - definición

METRICS RELATED TO AN INDIVIDUAL'S CHARACTERISTICS
Recognition of human individuals; Biometric; Biometric technology; Authentication identity; Biometric authentication; Biometric signature; Cognometrics; Biometric identification; Behaviometrics; Biometric software; Identification of human individuals; Biometrics technology; Biometrics (Authentication); Biometric data; Telebiometrics; Adaptive biometric systems; Multimodal biometric system; Multimodal biometric systems; History of biometrics; Privacy issues on biometric systems; Behavioral biometrics; Privacy concerns regarding biometrics; Cancelable biometrics; Biometric privacy; Privacy concerns with biometrics; Privacy and biometrics; International sharing of biometric data; Crossover error rate
  • right
  • upright=1.5

Message authentication         
IN INFORMATION SECURITY
Data authenticity; Authenticity (information security); Data origin authentication; Data-origin authentication; Data Origin Authentication; Message Authentication; Data Authentication; Data authentication; Data origin authenticity; Message authenticity; Data-origin authenticity; Cryptographitcally authenticated; Cryptographic authentication; Cryptographically authenticated
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit (data integrity) and that the receiving party can verify the source of the message. Message authentication does not necessarily include the property of non-repudiation.
Basic access authentication         
METHOD FOR AN HTTP USER AGENT TO PROVIDE A USER NAME AND PASSWORD WHEN MAKING A REQUEST
Basic authentication; BasicAuthenticationScheme; Basic authentication scheme; HTTP basic authentication; Basic auth; Basicauth; HTTP Basic; Basic HTTP authentication
In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent (e.g.
biometrics         
<security, hardware> The use of special input devices to analyse some physical parameter assumed to be unique to an individual, in order to confirm their identity as part of an authentication procedure. Examples include fingerprint scanning, iris recognition, facial recognition, voice recognition ({speaker recognition}), signature, vascular pattern recognition. http://www.findbiometrics.com/Pages/guide2.html. (2007-02-22)

Wikipedia

Biometrics

Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological characteristics which are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina, odor/scent, voice, shape of ears and gait. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to mouse movement, typing rhythm, gait, signature, behavioral profiling, and credentials. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.

More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information.