authentication token - определение. Что такое authentication token
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое authentication token - определение

PERIPHERAL DEVICE USED TO GAIN ACCESS TO AN ELECTRONICALLY RESTRICTED RESOURCE
Security-Token; Hardware token; Authentication token; Usb token; Token card; Enigma card; Security tokens; Secure token; Security key; VeriSign Identity Protection; Time-synchronized one-time passwords; Secure Token; Security Token; Digipass; Contactless token; Cryptographic tokens
  • PASSCODE]] field by hand.
  • Asynchronous password token for HSBC online banking.
  • A GoldKey security token connected to a laptop
Найдено результатов: 238
Security token         
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password.
Token coin         
  • $2 coin]] which can also be used to unlock a trolley
  • Token coins in an arcade game
  • Brass trade token from [[Fort Laramie]], Dakota Territory
  • [[Philadelphia Transportation Company]] transit tokens (1940–68)
  • Aluminum trade token from [[Osage City, Kansas]]
  • Show World Center token, New York City, c. 1990
  • Presto]] smart card.
PHYSICAL COIN-LIKE OBJECT USED INSTEAD OF COINS
Token (numismatics); Token (Numismatics); Token coins; Subway token; Subway Token; Arcade token; Game token; Private coin; Trade token; Fare token; Provincial token
In numismatics, token coins or trade tokens are coin-like objects used instead of coins. The field of token coins is part of exonumia and token coins are token money.
token money         
  • Former tokens are collected and displayed
FORM OF MONEY THAT HAS LITTLE INTRINSIC VALUE COMPARED TO ITS FACE VALUE
Digital token
¦ noun money where the face value of notes or coins is unrelated to the value of the material of which they are composed.
token bus         
COMPUTER NETWORK ARCHITECTURE
Token Bus; IEEE 802.4; 802.4; Token-bus network; Token bus
<networking> (IEEE 802.4) A networking protocol which mediates access to a bus topology network as though it were a {token ring}. This eliminates the collisions found in {carrier sense collision detect} protocols. Nodes can be configured to pass the token in any order, not necessarily related to their physical ordering on the bus. The token is sent from one node to its successor in the logical ring by broadcast on the bus and is ignored by the other nodes. (1996-12-13)
Message authentication         
IN INFORMATION SECURITY
Data authenticity; Authenticity (information security); Data origin authentication; Data-origin authentication; Data Origin Authentication; Message Authentication; Data Authentication; Data authentication; Data origin authenticity; Message authenticity; Data-origin authenticity; Cryptographitcally authenticated; Cryptographic authentication; Cryptographically authenticated
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit (data integrity) and that the receiving party can verify the source of the message. Message authentication does not necessarily include the property of non-repudiation.
IEEE 802.4         
COMPUTER NETWORK ARCHITECTURE
Token Bus; IEEE 802.4; 802.4; Token-bus network; Token bus
<networking, standard> The IEEE Token Bus standard. (1996-12-12)
Basic access authentication         
METHOD FOR AN HTTP USER AGENT TO PROVIDE A USER NAME AND PASSWORD WHEN MAKING A REQUEST
Basic authentication; BasicAuthenticationScheme; Basic authentication scheme; HTTP basic authentication; Basic auth; Basicauth; HTTP Basic; Basic HTTP authentication
In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent (e.g.
Type–token distinction         
  • thumbtime=6
DISTINCTION THAT SEPARATES A CONCEPT FROM THE OBJECTS WHICH ARE PARTICULAR INSTANCES OF THE CONCEPT
Type (metaphysics); Type--metaphysics; Type versus token distinction; Token-type distinction; Type-token distinction; Occurrence (type–token distinction); Type/token distinction; Type and token; Token and type; Charles Sanders Peirce's type–token distinction; Type–token relations; Pierce's type-token distinction; Pierce's type–token distinction; Class-token relationship; Peirce's type-token distinction; Charles Sanders Peirce's type-token distinction; Type-token relations; Occurrences of numerals; Numeral occurrence; Occurrence of numerals; Type–token relation; Type-token relation; Occurrence (type-token distinction)
The type–token distinction is the difference between naming a class (type) of objects and naming the individual instances (tokens) of that class. Since each type may be exemplified by multiple tokens, there are generally more tokens than types of an object.
Security token offering         
Draft:Security token offering
A security token offering (STO) / tokenized IPO is a type of public offering in which tokenized digital securities, known as security tokens, are sold in security token exchanges. Tokens can be used to trade real financial assets such as equities and fixed income, and use a blockchain virtual ledger system to store and validate token transactions.
Message authentication code         
KEYED HASH FUNCTION USED TO PROTECT A MESSAGE'S INTEGRITY AND AUTHENTICITY
Message Authentication Code; Message Integrity Code; Partial MAC; Message footprint; Message authentication codes; Message-authentication code; Message integrity code; Message Integrity Check; Keyed hash function; Authentication tag
In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used for authenticating a message. In other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed.

Википедия

Security token

A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password. It acts like an electronic key to access something. Examples of security tokens include wireless keycards used to open locked doors, or a banking token used as a digital authenticator for signing in to online banking, or signing a transaction such as a wire transfer.

Security tokens can be used to store information such as passwords, cryptographic keys used to generate digital signatures, or biometric data (such as fingerprints). Some designs incorporate tamper resistant packaging, while others may include small keypads to allow entry of a PIN or a simple button to start a generating routine with some display capability to show a generated key number. Connected tokens utilize a variety of interfaces including USB, near-field communication (NFC), radio-frequency identification (RFID), or Bluetooth. Some tokens have audio capabilities designed for those who are vision-impaired.