- password-based user identification
- идентификация пользователей по паролям
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Cognitive password — A cognitive password is a form of knowledge based authentication that requires a user to answer a question, presumably something they intrinsically know, to verify their identity. Cognitive password systems have been researched for many years and … Wikipedia
Graphical identification and authentication — The graphical identification and authentication (GINA) library is a component of some Microsoft Windows operating systems that provides secure authentication and interactive logon services. GINA is a dynamically linked library that is loaded in… … Wikipedia
Claims-based identity — is a common way for applications to acquire the identity information they need about users inside their organization, in other organizations, and on the Internet.[1] It also provides a consistent approach for applications running on premises or… … Wikipedia
Personal identification number — A personal identification number (PIN) is a secret numeric password shared between a user and a system that can be used to authenticate the user to the system. Typically, the user is required to provide a non confidential user identifier or token … Wikipedia
Common Access Card — An example DoD Common Access Card The Common Access Card (CAC) is a United States Department of Defense (DoD) smart card issued as standard identification for active duty military personnel, reserve personnel, civilian employees, other non DoD… … Wikipedia
Biometrics — For the academic journal of statistics in biology, see Biometrics (journal). For the application of statistics to topics in biology, see Biostatistics. At Walt Disney World, biometric measurements are taken from the fingers of guests to ensure… … Wikipedia
Files-11 — Files 11, also known as on disk structure, is the file system used by Hewlett Packard s OpenVMS operating system, and also (in a simpler form) by the older RSX 11. It is a hierarchical file system, with support for access control lists, record… … Wikipedia
Avaya Unified Communications Management — Developer(s) Nortel (now Avaya) Operating system MS Windows, and Linux Type Unified Communications Configuration and Management Avaya Unified Communications Management in computer networking is the name of a collection o … Wikipedia
Logical security — consists of software safeguards for an organization’s systems, including user ID and password access, authentication, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or… … Wikipedia
HTTP cookie — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia