token authenticator

tõendi autentur

olemus
(a) identsustõendit autentiv olem

ISO/IEC/IEEE 8802, authenticator:
an entity that facilitates authentication of other entities attached to the same LAN

(b) identsustõendi autentimisel genereeritav väljundväärtus
elektroonilisel autentimisel,
aitab kontrollida identsustõendi kuulumist nõudlejale

ISO 12813 e.a.:
data, possibly encrypted, that is used for authentication

NIST SP 800-63-3:
authenticator output
The output value generated by an authenticator. The ability to generate valid authenticator outputs on demand proves that the claimant possesses and controls the authenticator. Protocol messages sent to the verifier are dependent upon the authenticator output, but they may or may not explicitly contain it.

Toimub laadimine

token authenticator

tõendi autentur

olemus
(a) identsustõendit autentiv olem

ISO/IEC/IEEE 8802, authenticator:
an entity that facilitates authentication of other entities attached to the same LAN

(b) identsustõendi autentimisel genereeritav väljundväärtus
elektroonilisel autentimisel,
aitab kontrollida identsustõendi kuulumist nõudlejale

ISO 12813 e.a.:
data, possibly encrypted, that is used for authentication

NIST SP 800-63-3:
authenticator output
The output value generated by an authenticator. The ability to generate valid authenticator outputs on demand proves that the claimant possesses and controls the authenticator. Protocol messages sent to the verifier are dependent upon the authenticator output, but they may or may not explicitly contain it.

Palun oodake...

Tõrge

token authenticator

tõendi autentur

olemus
(a) identsustõendit autentiv olem

ISO/IEC/IEEE 8802, authenticator:
an entity that facilitates authentication of other entities attached to the same LAN

(b) identsustõendi autentimisel genereeritav väljundväärtus
elektroonilisel autentimisel,
aitab kontrollida identsustõendi kuulumist nõudlejale

ISO 12813 e.a.:
data, possibly encrypted, that is used for authentication

NIST SP 800-63-3:
authenticator output
The output value generated by an authenticator. The ability to generate valid authenticator outputs on demand proves that the claimant possesses and controls the authenticator. Protocol messages sent to the verifier are dependent upon the authenticator output, but they may or may not explicitly contain it.

Andmete allalaadimisel või töötlemisel esines tehniline tõrge.
Vabandame!