The IT Law Wiki


32,181pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definitions Edit

Computer security Edit

An authenticator is

[a] device that provides an internally stored or calculated response to verify a user's identity when logging onto a computer. Only authorized users are likely to both know a unique piece of information (the password) and be in possession of a unique piece of equipment (the authenticator).[1]

E-mail Edit

An authenticator is

[a] symbol or group of symbols, or a series of bits, selected or derived in a prearranged manner and usually inserted at a predetermined point within a message or transmission for the purpose of attesting to the validity of the message or transmission.[2]

Evidence Edit

An authenticator is

evidence presented to support the authentication of a claim. It increases confidence in the truth of the claim.[3]

General Edit

An authenticator is

[t]he means used to confirm the identity of a user, processor, or device (e.g., user password or token).[4]
[a] letter, number or group of letters and/or numbers, attesting to the authenticity of a transmission, a message or data, or to the identity of a net, station or user.[5]

Overview Edit

"A receipt, for example, can act as an authenticator of a claim that an item was purchased at a specific store. A driver's license can act as an authenticator that a particular name (a form of identifier) refers to the individual who carries the license. Knowledge of a secret or the ability to display some distinctive physical characteristic such as a fingerprint can also serve as the authenticators of an individual's name."[6]

References Edit

  1. Bringing Health Care Online: The Role of Information Technologies, at 216.
  2. U.S. Department of Defense, Joint Pub. 1–02: DOD Dictionary of Military and Associated Terms (Nov. 8, 2010, as amended through June 15, 2015) (full-text).
  3. Who Goes There?: Authentication Through the Lens of Privacy, at 20.
  4. NIST Special Publication 800-53, App. B, Glossary.
  5. NATO Standardization Agency, NATO Glossary of Terms and Definitions 2-A-21 (2008) (full-text).
  6. Who Goes There?: Authentication Through the Lens of Privacy, at 20.

Also on Fandom

Random Wiki