token authenticator

tõendi autentur

olemus
(a) identsustõendit autentiv olem
ISO/IEC/IEEE 8802, authenticator:
an entity that facilitates authentication of other entities attached to the same LAN

(b) identsustõendi autentimisel genereeritav väljundväärtus
elektroonilisel autentimisel, aitab kontrollida identsustõendi kuulumist nõudlejale
ISO 12813 e.a.:
data, possibly encrypted, that is used for authentication
NIST SP 800-63-3:
authenticator output
The output value generated by an authenticator. The ability to generate valid authenticator outputs on demand proves that the claimant possesses and controls the authenticator. Protocol messages sent to the verifier are dependent upon the authenticator output, but they may or may not explicitly contain it.

Toimub laadimine

token authenticator

tõendi autentur

olemus
(a) identsustõendit autentiv olem
ISO/IEC/IEEE 8802, authenticator:
an entity that facilitates authentication of other entities attached to the same LAN

(b) identsustõendi autentimisel genereeritav väljundväärtus
elektroonilisel autentimisel, aitab kontrollida identsustõendi kuulumist nõudlejale
ISO 12813 e.a.:
data, possibly encrypted, that is used for authentication
NIST SP 800-63-3:
authenticator output
The output value generated by an authenticator. The ability to generate valid authenticator outputs on demand proves that the claimant possesses and controls the authenticator. Protocol messages sent to the verifier are dependent upon the authenticator output, but they may or may not explicitly contain it.

Palun oodake...

Tõrge

token authenticator

tõendi autentur

olemus
(a) identsustõendit autentiv olem
ISO/IEC/IEEE 8802, authenticator:
an entity that facilitates authentication of other entities attached to the same LAN

(b) identsustõendi autentimisel genereeritav väljundväärtus
elektroonilisel autentimisel, aitab kontrollida identsustõendi kuulumist nõudlejale
ISO 12813 e.a.:
data, possibly encrypted, that is used for authentication
NIST SP 800-63-3:
authenticator output
The output value generated by an authenticator. The ability to generate valid authenticator outputs on demand proves that the claimant possesses and controls the authenticator. Protocol messages sent to the verifier are dependent upon the authenticator output, but they may or may not explicitly contain it.

Andmete allalaadimisel või töötlemisel esines tehniline tõrge.
Vabandame!