Online Google Dictionary

authenticated 中文解釋 wordnet sense Collocation Usage Collins Definition
Verb
/ôˈTHentiˌkāt/,
Font size:

authenticated, past participle; authenticated, past tense; authenticates, 3rd person singular present; authenticating, present participle;
  1. Prove or show (something, esp. a claim or an artistic work) to be true or genuine
    • - they were invited to authenticate artifacts from the Italian Renaissance
  2. Validate
    • - the nationalist statements authenticated their leadership among the local community
  3. (of a user or process) Have one's identity verified


  1. attested: established as genuine
  2. (authenticate) establish the authenticity of something
  3. (authentication) a mark on an article of trade to indicate its origin and authenticity
  4. (Authentication (law)) Authentication, in the law of evidence, is the process by which documentary evidence and other physical evidence is proven to be genuine, and not a forgery. Generally, authentication can be shown in one of two ways. ...
  5. (authentication) something which validates or confirms the authenticity of something; proof of the identity of a user logging on to some network; a hallmark or assay-mark on a piece of metalwork
  6. (authenticate) to provide identity or origin.
  7. (AUTHENTICATE) To denote authorship of an entry made in a patient's medical or dental record by means of a written signature, identifiable initials, a computer key, or a personally used rubber stamp; also refers to the process of certifying copies as genuine.
  8. (Authenticate (signatures)) To authenticate (prove valid) a signature that has already been signed, a notary compares the document signer's signature on the document to the signature the signer leaves in the notary journal and the signature on the signer's identification.
  9. (Authenticate()) To request or provide a response for a coded challenge.
  10. (Authenticate) Certify bibliographic information in a serial master (OCLC) record under the CONSER program by adding the CONSER symbol to the record.
  11. (Authenticate) Establish the truth or genuineness or validate
  12. (Authenticate) Identify yourself at a TermSecure enabled device using an RFID proximity card (short or long range), a USB flash key, or login manually. Combine authentication methods and greatly increase security.
  13. (Authenticate) To become recognized as a valid AFS user by getting an AFS token using your kerberos TGT. Authenticate by logging onto a machine that uses an AFS enabled login utility or by issuing the aklog command after using kinit to obtain a kerberos TGT. ...
  14. (Authenticate) To verify the sender or source of an email, whether sent by computer or a person.
  15. (Authenticate) Verify a user is who they claim to be by requiring them to provide proof of their identity. There are many techniques that can be used to authenticate an email user, such as a local system username and password, LDAP, and IMAP and POP passwords.
  16. (authenticate) To provide your user name and password, as requested before you can change an important setting, install software, etc
  17. (authenticate) To verify an identity prior to granting access or asserting trust
  18. (authenticate) prove a document is not a forgery.
  19. (Authentication) A process, in which it is determined if an item is genuine and is as described.
  20. (authentication) Determination by a numismatic expert as to the status of a coin being original and genuine - not counterfeit.
  21. (authentication) Security measures designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information (NSTISSI 1997).
  22. (Authentication) Proof by means of a signature or otherwise that a certain document or certain data is of undisputed origin and genuine.
  23. (Authentication) A method for identifying a user prior to granting permission to access, change, or delete a system or network resource.
  24. (authentication) The process of knowing that the data received is the same as the data that was sent, and that the claimed sender is in fact the actual sender.
  25. (Authentication) Any process that ensures that users are who they say they are. When you type your name and password, you are authenticated and allowed access.