CINXE.COM
Authentication - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Authentication - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"78e29b0b-5eeb-41c4-8b4d-8394ffc7f2aa","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Authentication","wgTitle":"Authentication","wgCurRevisionId":1255787232,"wgRevisionId":1255787232,"wgArticleId":47967,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Webarchive template wayback links","CS1 maint: others","Articles with short description","Short description is different from Wikidata","Articles containing Greek-language text","All articles with specifically marked weasel-worded phrases","Articles with specifically marked weasel-worded phrases from December 2016","All articles with unsourced statements","Articles with unsourced statements from December 2016","Authentication","Access control","Applications of cryptography", "Computer access control","Notary","Packaging"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Authentication","wgRelevantArticleId":47967,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":40000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true, "wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q212108","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready", "jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/6/69/ATMUser.140209.jpg/1200px-ATMUser.140209.jpg"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="795"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/6/69/ATMUser.140209.jpg/800px-ATMUser.140209.jpg"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="530"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/6/69/ATMUser.140209.jpg/640px-ATMUser.140209.jpg"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="424"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Authentication - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Authentication"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Authentication&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Authentication"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Authentication rootpage-Authentication skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=Authentication" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=Authentication" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=Authentication" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=Authentication" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Methods" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Methods"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Methods</span> </div> </a> <ul id="toc-Methods-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Authentication_factors" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Authentication_factors"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Authentication factors</span> </div> </a> <button aria-controls="toc-Authentication_factors-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Authentication factors subsection</span> </button> <ul id="toc-Authentication_factors-sublist" class="vector-toc-list"> <li id="toc-Single-factor_authentication" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Single-factor_authentication"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>Single-factor authentication</span> </div> </a> <ul id="toc-Single-factor_authentication-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Multi-factor_authentication" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Multi-factor_authentication"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2</span> <span>Multi-factor authentication</span> </div> </a> <ul id="toc-Multi-factor_authentication-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Authentication_types" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Authentication_types"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Authentication types</span> </div> </a> <button aria-controls="toc-Authentication_types-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Authentication types subsection</span> </button> <ul id="toc-Authentication_types-sublist" class="vector-toc-list"> <li id="toc-Strong_authentication" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Strong_authentication"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Strong authentication</span> </div> </a> <ul id="toc-Strong_authentication-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Continuous_authentication" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Continuous_authentication"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>Continuous authentication</span> </div> </a> <ul id="toc-Continuous_authentication-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Digital_authentication" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Digital_authentication"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.3</span> <span>Digital authentication</span> </div> </a> <ul id="toc-Digital_authentication-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Product_authentication" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Product_authentication"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.4</span> <span>Product authentication</span> </div> </a> <ul id="toc-Product_authentication-sublist" class="vector-toc-list"> <li id="toc-Packaging" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Packaging"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.4.1</span> <span>Packaging</span> </div> </a> <ul id="toc-Packaging-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </li> <li id="toc-Information_content" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Information_content"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Information content</span> </div> </a> <button aria-controls="toc-Information_content-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Information content subsection</span> </button> <ul id="toc-Information_content-sublist" class="vector-toc-list"> <li id="toc-Literacy_and_literature_authentication" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Literacy_and_literature_authentication"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>Literacy and literature authentication</span> </div> </a> <ul id="toc-Literacy_and_literature_authentication-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-History_and_state-of-the-art" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#History_and_state-of-the-art"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>History and state-of-the-art</span> </div> </a> <ul id="toc-History_and_state-of-the-art-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Authorization" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Authorization"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Authorization</span> </div> </a> <ul id="toc-Authorization-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Access_control" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Access_control"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Access control</span> </div> </a> <ul id="toc-Access_control-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Authentication</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 51 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-51" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">51 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D9%85%D8%B5%D8%A7%D8%AF%D9%82%D8%A9_(%D8%AD%D9%88%D8%B3%D8%A8%D8%A9)" title="مصادقة (حوسبة) – Arabic" lang="ar" hreflang="ar" data-title="مصادقة (حوسبة)" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-ast mw-list-item"><a href="https://ast.wikipedia.org/wiki/Autenticaci%C3%B3n" title="Autenticación – Asturian" lang="ast" hreflang="ast" data-title="Autenticación" data-language-autonym="Asturianu" data-language-local-name="Asturian" class="interlanguage-link-target"><span>Asturianu</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/Autentifikasiya" title="Autentifikasiya – Azerbaijani" lang="az" hreflang="az" data-title="Autentifikasiya" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-bn mw-list-item"><a href="https://bn.wikipedia.org/wiki/%E0%A6%AA%E0%A7%8D%E0%A6%B0%E0%A6%AE%E0%A6%BE%E0%A6%A3%E0%A7%80%E0%A6%95%E0%A6%B0%E0%A6%A3" title="প্রমাণীকরণ – Bangla" lang="bn" hreflang="bn" data-title="প্রমাণীকরণ" data-language-autonym="বাংলা" data-language-local-name="Bangla" class="interlanguage-link-target"><span>বাংলা</span></a></li><li class="interlanguage-link interwiki-bg mw-list-item"><a href="https://bg.wikipedia.org/wiki/%D0%90%D0%B2%D1%82%D0%B5%D0%BD%D1%82%D0%B8%D0%BA%D0%B0%D1%86%D0%B8%D1%8F" title="Автентикация – Bulgarian" lang="bg" hreflang="bg" data-title="Автентикация" data-language-autonym="Български" data-language-local-name="Bulgarian" class="interlanguage-link-target"><span>Български</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Autenticaci%C3%B3_(inform%C3%A0tica)" title="Autenticació (informàtica) – Catalan" lang="ca" hreflang="ca" data-title="Autenticació (informàtica)" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Autentizace" title="Autentizace – Czech" lang="cs" hreflang="cs" data-title="Autentizace" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Autenticitet" title="Autenticitet – Danish" lang="da" hreflang="da" data-title="Autenticitet" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Authentifizierung" title="Authentifizierung – German" lang="de" hreflang="de" data-title="Authentifizierung" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Autentimine" title="Autentimine – Estonian" lang="et" hreflang="et" data-title="Autentimine" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%91%CF%85%CE%B8%CE%B5%CE%BD%CF%84%CE%B9%CE%BA%CE%BF%CF%80%CE%BF%CE%AF%CE%B7%CF%83%CE%B7" title="Αυθεντικοποίηση – Greek" lang="el" hreflang="el" data-title="Αυθεντικοποίηση" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Autenticaci%C3%B3n" title="Autenticación – Spanish" lang="es" hreflang="es" data-title="Autenticación" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Kautotze" title="Kautotze – Basque" lang="eu" hreflang="eu" data-title="Kautotze" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%A7%D8%B5%D8%A7%D9%84%D8%AA%E2%80%8C%D8%B3%D9%86%D8%AC%DB%8C" title="اصالتسنجی – Persian" lang="fa" hreflang="fa" data-title="اصالتسنجی" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Authentification" title="Authentification – French" lang="fr" hreflang="fr" data-title="Authentification" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ga mw-list-item"><a href="https://ga.wikipedia.org/wiki/F%C3%ADordheimhni%C3%BA" title="Fíordheimhniú – Irish" lang="ga" hreflang="ga" data-title="Fíordheimhniú" data-language-autonym="Gaeilge" data-language-local-name="Irish" class="interlanguage-link-target"><span>Gaeilge</span></a></li><li class="interlanguage-link interwiki-gl mw-list-item"><a href="https://gl.wikipedia.org/wiki/Autenticaci%C3%B3n" title="Autenticación – Galician" lang="gl" hreflang="gl" data-title="Autenticación" data-language-autonym="Galego" data-language-local-name="Galician" class="interlanguage-link-target"><span>Galego</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%9D%B8%EC%A6%9D" title="인증 – Korean" lang="ko" hreflang="ko" data-title="인증" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hy mw-list-item"><a href="https://hy.wikipedia.org/wiki/%D5%8E%D5%A1%D5%BE%D5%A5%D6%80%D5%A1%D6%81%D5%B8%D6%82%D5%B4_(%D5%AB%D5%B6%D6%86%D5%B8%D6%80%D5%B4%D5%A1%D5%BF%D5%AB%D5%AF%D5%A1%D5%B5%D5%AB_%D5%B8%D5%AC%D5%B8%D6%80%D5%BF)" title="Վավերացում (ինֆորմատիկայի ոլորտ) – Armenian" lang="hy" hreflang="hy" data-title="Վավերացում (ինֆորմատիկայի ոլորտ)" data-language-autonym="Հայերեն" data-language-local-name="Armenian" class="interlanguage-link-target"><span>Հայերեն</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%85%E0%A4%A7%E0%A4%BF%E0%A4%AA%E0%A5%8D%E0%A4%B0%E0%A4%AE%E0%A4%BE%E0%A4%A3%E0%A4%A8" title="अधिप्रमाणन – Hindi" lang="hi" hreflang="hi" data-title="अधिप्रमाणन" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-hr mw-list-item"><a href="https://hr.wikipedia.org/wiki/Autentifikacija" title="Autentifikacija – Croatian" lang="hr" hreflang="hr" data-title="Autentifikacija" data-language-autonym="Hrvatski" data-language-local-name="Croatian" class="interlanguage-link-target"><span>Hrvatski</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Autentikasi" title="Autentikasi – Indonesian" lang="id" hreflang="id" data-title="Autentikasi" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Autenticazione" title="Autenticazione – Italian" lang="it" hreflang="it" data-title="Autenticazione" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%90%D7%99%D7%9E%D7%95%D7%AA_%D7%96%D7%94%D7%95%D7%AA" title="אימות זהות – Hebrew" lang="he" hreflang="he" data-title="אימות זהות" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-sw mw-list-item"><a href="https://sw.wikipedia.org/wiki/Uthibitishaji" title="Uthibitishaji – Swahili" lang="sw" hreflang="sw" data-title="Uthibitishaji" data-language-autonym="Kiswahili" data-language-local-name="Swahili" class="interlanguage-link-target"><span>Kiswahili</span></a></li><li class="interlanguage-link interwiki-lv mw-list-item"><a href="https://lv.wikipedia.org/wiki/Autentific%C4%93%C5%A1ana" title="Autentificēšana – Latvian" lang="lv" hreflang="lv" data-title="Autentificēšana" data-language-autonym="Latviešu" data-language-local-name="Latvian" class="interlanguage-link-target"><span>Latviešu</span></a></li><li class="interlanguage-link interwiki-ml mw-list-item"><a href="https://ml.wikipedia.org/wiki/%E0%B4%93%E0%B4%A4%E0%B4%A8%E0%B5%8D%E0%B4%B1%E0%B4%BF%E0%B4%95%E0%B5%8D%E0%B4%95%E0%B5%87%E0%B4%B7%E0%B5%BB" title="ഓതന്റിക്കേഷൻ – Malayalam" lang="ml" hreflang="ml" data-title="ഓതന്റിക്കേഷൻ" data-language-autonym="മലയാളം" data-language-local-name="Malayalam" class="interlanguage-link-target"><span>മലയാളം</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Authenticatie" title="Authenticatie – Dutch" lang="nl" hreflang="nl" data-title="Authenticatie" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E8%AA%8D%E8%A8%BC" title="認証 – Japanese" lang="ja" hreflang="ja" data-title="認証" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Autentisering" title="Autentisering – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Autentisering" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-uz mw-list-item"><a href="https://uz.wikipedia.org/wiki/Autentifikatsiya" title="Autentifikatsiya – Uzbek" lang="uz" hreflang="uz" data-title="Autentifikatsiya" data-language-autonym="Oʻzbekcha / ўзбекча" data-language-local-name="Uzbek" class="interlanguage-link-target"><span>Oʻzbekcha / ўзбекча</span></a></li><li class="interlanguage-link interwiki-pa mw-list-item"><a href="https://pa.wikipedia.org/wiki/%E0%A8%AA%E0%A9%8D%E0%A8%B0%E0%A8%AE%E0%A8%BE%E0%A8%A3%E0%A8%BF%E0%A8%95%E0%A8%A4%E0%A8%BE" title="ਪ੍ਰਮਾਣਿਕਤਾ – Punjabi" lang="pa" hreflang="pa" data-title="ਪ੍ਰਮਾਣਿਕਤਾ" data-language-autonym="ਪੰਜਾਬੀ" data-language-local-name="Punjabi" class="interlanguage-link-target"><span>ਪੰਜਾਬੀ</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Uwierzytelnianie" title="Uwierzytelnianie – Polish" lang="pl" hreflang="pl" data-title="Uwierzytelnianie" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Autentica%C3%A7%C3%A3o" title="Autenticação – Portuguese" lang="pt" hreflang="pt" data-title="Autenticação" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-kaa mw-list-item"><a href="https://kaa.wikipedia.org/wiki/Autentifikaciya" title="Autentifikaciya – Kara-Kalpak" lang="kaa" hreflang="kaa" data-title="Autentifikaciya" data-language-autonym="Qaraqalpaqsha" data-language-local-name="Kara-Kalpak" class="interlanguage-link-target"><span>Qaraqalpaqsha</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Autentificare" title="Autentificare – Romanian" lang="ro" hreflang="ro" data-title="Autentificare" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%90%D1%83%D1%82%D0%B5%D0%BD%D1%82%D0%B8%D1%84%D0%B8%D0%BA%D0%B0%D1%86%D0%B8%D1%8F" title="Аутентификация – Russian" lang="ru" hreflang="ru" data-title="Аутентификация" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Authentication" title="Authentication – Simple English" lang="en-simple" hreflang="en-simple" data-title="Authentication" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sk mw-list-item"><a href="https://sk.wikipedia.org/wiki/Autentifik%C3%A1cia" title="Autentifikácia – Slovak" lang="sk" hreflang="sk" data-title="Autentifikácia" data-language-autonym="Slovenčina" data-language-local-name="Slovak" class="interlanguage-link-target"><span>Slovenčina</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Overjanje_(ra%C4%8Dunalni%C5%A1tvo)" title="Overjanje (računalništvo) – Slovenian" lang="sl" hreflang="sl" data-title="Overjanje (računalništvo)" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-ckb mw-list-item"><a href="https://ckb.wikipedia.org/wiki/%D8%B3%DB%95%D9%86%DA%AF%D8%A7%D9%86%D8%AF%D9%86%DB%8C_%DA%95%DB%95%D8%B3%DB%95%D9%86%D8%A7%DB%8C%DB%95%D8%AA%DB%8C" title="سەنگاندنی ڕەسەنایەتی – Central Kurdish" lang="ckb" hreflang="ckb" data-title="سەنگاندنی ڕەسەنایەتی" data-language-autonym="کوردی" data-language-local-name="Central Kurdish" class="interlanguage-link-target"><span>کوردی</span></a></li><li class="interlanguage-link interwiki-sr badge-Q70893996 mw-list-item" title=""><a href="https://sr.wikipedia.org/wiki/Autentikacija" title="Autentikacija – Serbian" lang="sr" hreflang="sr" data-title="Autentikacija" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Todennus" title="Todennus – Finnish" lang="fi" hreflang="fi" data-title="Todennus" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Autentisering" title="Autentisering – Swedish" lang="sv" hreflang="sv" data-title="Autentisering" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Kimlik_do%C4%9Frulama" title="Kimlik doğrulama – Turkish" lang="tr" hreflang="tr" data-title="Kimlik doğrulama" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%90%D0%B2%D1%82%D0%B5%D0%BD%D1%82%D0%B8%D1%84%D1%96%D0%BA%D0%B0%D1%86%D1%96%D1%8F" title="Автентифікація – Ukrainian" lang="uk" hreflang="uk" data-title="Автентифікація" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-ur mw-list-item"><a href="https://ur.wikipedia.org/wiki/%D8%AA%D9%88%D8%AB%DB%8C%D9%82" title="توثیق – Urdu" lang="ur" hreflang="ur" data-title="توثیق" data-language-autonym="اردو" data-language-local-name="Urdu" class="interlanguage-link-target"><span>اردو</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/X%C3%A1c_th%E1%BB%B1c" title="Xác thực – Vietnamese" lang="vi" hreflang="vi" data-title="Xác thực" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-wuu mw-list-item"><a href="https://wuu.wikipedia.org/wiki/%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81" title="身份验证 – Wu" lang="wuu" hreflang="wuu" data-title="身份验证" data-language-autonym="吴语" data-language-local-name="Wu" class="interlanguage-link-target"><span>吴语</span></a></li><li class="interlanguage-link interwiki-zh-yue mw-list-item"><a href="https://zh-yue.wikipedia.org/wiki/%E9%91%91%E5%88%A5" title="鑑別 – Cantonese" lang="yue" hreflang="yue" data-title="鑑別" data-language-autonym="粵語" data-language-local-name="Cantonese" class="interlanguage-link-target"><span>粵語</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81" title="身份验证 – Chinese" lang="zh" hreflang="zh" data-title="身份验证" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q212108#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Authentication" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Authentication" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Authentication"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Authentication&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Authentication&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Authentication"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Authentication&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Authentication&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Authentication" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Authentication" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Authentication&oldid=1255787232" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Authentication&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=Authentication&id=1255787232&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FAuthentication"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FAuthentication"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=Authentication&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Authentication&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Authentication" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q212108" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Act of proving an assertion</div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Not to be confused with <a href="/wiki/Authenticity_(disambiguation)" class="mw-redirect mw-disambig" title="Authenticity (disambiguation)">Authenticity</a> or <a href="/wiki/Authorization" title="Authorization">Authorization</a>.</div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:ATMUser.140209.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/6/69/ATMUser.140209.jpg/220px-ATMUser.140209.jpg" decoding="async" width="220" height="146" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/6/69/ATMUser.140209.jpg/330px-ATMUser.140209.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/6/69/ATMUser.140209.jpg/440px-ATMUser.140209.jpg 2x" data-file-width="1920" data-file-height="1272" /></a><figcaption>ATM user authenticating himself</figcaption></figure> <p><b>Authentication</b> (from <a href="/wiki/Greek_language" title="Greek language">Greek</a>: <span lang="el">αὐθεντικός</span> <i>authentikos</i>, "real, genuine", from αὐθέντης <i>authentes</i>, "author") is the act of proving an <a href="/wiki/Logical_assertion" class="mw-redirect" title="Logical assertion">assertion</a>, such as the <a href="/wiki/Digital_identity" title="Digital identity">identity</a> of a computer system user. In contrast with <a href="/wiki/Identity_(philosophy)" title="Identity (philosophy)">identification</a>, the act of indicating a person or thing's identity, authentication is the process of verifying that identity.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:1_2-0" class="reference"><a href="#cite_note-:1-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> It might involve validating personal <a href="/wiki/Identity_document" title="Identity document">identity documents</a>, verifying the authenticity of a <a href="/wiki/Website" title="Website">website</a> with a <a href="/wiki/Public_key_certificate" title="Public key certificate">digital certificate</a>,<sup id="cite_ref-Turner-DigitalAuthentication-Basics_3-0" class="reference"><a href="#cite_note-Turner-DigitalAuthentication-Basics-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> determining the age of an artifact by <a href="/wiki/Carbon_dating" class="mw-redirect" title="Carbon dating">carbon dating</a>, or ensuring that a product or document is not <a href="/wiki/Counterfeit" title="Counterfeit">counterfeit</a>. </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Methods">Methods</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=1" title="Edit section: Methods"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Provenance" title="Provenance">Provenance</a></div> <p>Authentication is relevant to multiple fields. In <a href="/wiki/Art" title="Art">art</a>, <a href="/wiki/Antique" title="Antique">antiques</a>, and <a href="/wiki/Anthropology" title="Anthropology">anthropology</a>, a common problem is verifying that a given artifact was produced by a certain person or in a certain place or period of history. In <a href="/wiki/Computer_science" title="Computer science">computer science</a>, verifying a user's identity is often required to allow access to confidential data or systems.<sup id="cite_ref-:0_4-0" class="reference"><a href="#cite_note-:0-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> </p><p>Authentication can be considered to be of three types: </p><p>The first type of authentication is accepting proof of identity given by a credible person who has first-hand evidence that the identity is genuine. When authentication is required of art or physical objects, this proof could be a friend, family member, or colleague attesting to the item's provenance, perhaps by having witnessed the item in its creator's possession. With autographed sports memorabilia, this could involve someone attesting that they witnessed the object being signed. A vendor selling branded items implies authenticity, while they may not have evidence that every step in the supply chain was authenticated. Centralized authority-based trust relationships back most secure internet communication through known public certificate authorities; decentralized peer-based trust, also known as a <a href="/wiki/Web_of_trust" title="Web of trust">web of trust</a>,<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> is used for personal services such as email or files and trust is established by known individuals signing each other's <a href="/wiki/Key_(cryptography)" title="Key (cryptography)">cryptographic key</a> for instance. </p><p>The second type of authentication is comparing the attributes of the object itself to what is known about objects of that origin. For example, an art expert might look for similarities in the style of painting, check the location and form of a signature, or compare the object to an old photograph. An <a href="/wiki/Archaeologist" class="mw-redirect" title="Archaeologist">archaeologist</a>, on the other hand, might use carbon dating to verify the age of an artifact, do a chemical and <a href="/wiki/Spectroscopy" title="Spectroscopy">spectroscopic</a> analysis of the materials used, or compare the style of construction or decoration to other artifacts of similar origin. The physics of sound and light, and comparison with a known physical environment, can be used to examine the authenticity of audio recordings, photographs, or videos. Documents can be verified as being created on ink or paper readily available at the time of the item's implied creation. </p><p>Attribute comparison may be vulnerable to forgery. In general, it relies on the facts that creating a forgery indistinguishable from a genuine artifact requires expert knowledge, that mistakes are easily made, and that the amount of effort required to do so is considerably greater than the amount of profit that can be gained from the forgery. </p><p>In art and antiques, certificates are of great importance for authenticating an object of interest and value. Certificates can, however, also be forged, and the authentication of these poses a problem. For instance, the son of <a href="/wiki/Han_van_Meegeren" title="Han van Meegeren">Han van Meegeren</a>, the well-known art-forger, forged the work of his father and provided a certificate for its provenance as well. </p><p>Criminal and civil penalties for <a href="/wiki/Fraud" title="Fraud">fraud</a>, <a href="/wiki/Forgery" title="Forgery">forgery</a>, and counterfeiting can reduce the incentive for falsification, depending on the risk of getting caught. </p><p>Currency and other financial instruments commonly use this second type of authentication method. Bills, coins, and <a href="/wiki/Cheque" title="Cheque">cheques</a> incorporate hard-to-duplicate physical features, such as fine printing or engraving, distinctive feel, watermarks, and holographic imagery, which are easy for trained receivers to verify. </p><p>The third type of authentication relies on documentation or other external affirmations. In criminal courts, the <a href="/wiki/Rules_of_evidence" class="mw-redirect" title="Rules of evidence">rules of evidence</a> often require establishing the <a href="/wiki/Chain_of_custody" title="Chain of custody">chain of custody</a> of evidence presented. This can be accomplished through a written evidence log, or by testimony from the police detectives and forensics staff that handled it. Some antiques are accompanied by certificates attesting to their authenticity. Signed sports memorabilia is usually accompanied by a certificate of authenticity. These external records have their own problems of forgery and <a href="/wiki/Perjury" title="Perjury">perjury</a> and are also vulnerable to being separated from the artifact and lost. </p><p>In computer science, a user can be given access to secure systems based on user credentials that imply authenticity.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> A network administrator can give a user a password, or provide the user with a key card or other access devices to allow system access. In this case, authenticity is implied but not guaranteed. </p><p><a href="/wiki/Consumer_goods" class="mw-redirect" title="Consumer goods">Consumer goods</a> such as pharmaceuticals,<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> perfume, and clothing can use all forms of authentication to prevent counterfeit goods from taking advantage of a popular brand's reputation. As mentioned above, having an item for sale in a reputable store implicitly attests to it being genuine, the first type of authentication. The second type of authentication might involve comparing the quality and craftsmanship of an item, such as an expensive handbag, to genuine articles. The third type of authentication could be the presence of a <a href="/wiki/Trademark" title="Trademark">trademark</a> on the item, which is a legally protected marking, or any other identifying feature which aids consumers in the identification of genuine brand-name goods. With software, companies have taken great steps to protect from counterfeiters, including adding holograms, security rings, security threads and color shifting ink.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Authentication_factors">Authentication factors</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=2" title="Edit section: Authentication factors"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The ways in which someone may be authenticated fall into three categories, based on what is known as the factors of authentication: something the user knows, something the user has, and something the user is. Each authentication factor covers a range of elements used to authenticate or verify a person's identity before being granted access, approving a transaction request, signing a document or other work product, granting authority to others, and establishing a chain of authority. </p><p>Security research has determined that for a positive authentication, elements from at least two, and preferably all three, factors should be verified.<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> The three factors (classes) and some of the elements of each factor are: </p> <ol><li>Knowledge: Something the user knows (e.g., a password, <a href="/wiki/Partial_password" title="Partial password">partial password</a>, <a href="/wiki/Pass_phrase" class="mw-redirect" title="Pass phrase">passphrase</a>, <a href="/wiki/Personal_identification_number" title="Personal identification number">personal identification number</a> (PIN), <a href="/wiki/Challenge%E2%80%93response" class="mw-redirect" title="Challenge–response">challenge–response</a> (the user must answer a question or pattern), <a href="/wiki/Security_question" title="Security question">security question</a>).<sup id="cite_ref-:2_11-0" class="reference"><a href="#cite_note-:2-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup></li> <li>Ownership: Something the user has (e.g., wrist band, <a href="/wiki/ID_card" class="mw-redirect" title="ID card">ID card</a>, <a href="/wiki/Security_token" title="Security token">security token</a>, <a href="/wiki/Microchip_implant_(human)" title="Microchip implant (human)">implanted device</a>, cell phone with a built-in <a href="/wiki/Hardware_token" class="mw-redirect" title="Hardware token">hardware token</a>, <a href="/wiki/Software_token" title="Software token">software token</a>, or cell phone holding a <a href="/wiki/Software_token" title="Software token">software token</a>).<sup id="cite_ref-:2_11-1" class="reference"><a href="#cite_note-:2-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup></li> <li>Inherence: Something the user is or does (e.g., fingerprint, <a href="/wiki/Retinal_scan" title="Retinal scan">retinal pattern</a>, <a href="/wiki/DNA" title="DNA">DNA</a> sequence (there are assorted definitions of what is sufficient), signature, face, voice, unique bio-electric signals, or other <a href="/wiki/Biometric" class="mw-redirect" title="Biometric">biometric</a> identifiers).<sup id="cite_ref-:2_11-2" class="reference"><a href="#cite_note-:2-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup></li></ol> <div class="mw-heading mw-heading3"><h3 id="Single-factor_authentication">Single-factor authentication</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=3" title="Edit section: Single-factor authentication"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>As the weakest level of authentication, only a single component from one of the three categories of factors is used to authenticate an individual's identity. The use of only one factor does not offer much protection from misuse or malicious intrusion. This type of authentication is not recommended for financial or personally relevant transactions that warrant a higher level of security.<sup id="cite_ref-Turner-DigitalAuthentication-Basics_3-1" class="reference"><a href="#cite_note-Turner-DigitalAuthentication-Basics-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Multi-factor_authentication">Multi-factor authentication</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=4" title="Edit section: Multi-factor authentication"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Multi-factor_authentication" title="Multi-factor authentication">Multi-factor authentication</a></div> <p>Multi-factor authentication involves two or more authentication factors (something you know, something you have, or something you are). Two-factor authentication is a special case of multi-factor authentication involving exactly two factors.<sup id="cite_ref-Turner-DigitalAuthentication-Basics_3-2" class="reference"><a href="#cite_note-Turner-DigitalAuthentication-Basics-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> </p><p>For example, using a bank card (something the user has) along with a PIN (something the user knows) provides two-factor authentication. Business networks may require users to provide a password (knowledge factor) and a pseudorandom number from a security token (ownership factor). Access to a very-high-security system might require a <a href="/wiki/Mantrap_(access_control)" title="Mantrap (access control)">mantrap</a> screening of height, weight, facial, and fingerprint checks (several inherence factor elements) plus a PIN and a day code (knowledge factor elements),<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> but this is still a two-factor authentication. </p> <div class="mw-heading mw-heading2"><h2 id="Authentication_types">Authentication types</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=5" title="Edit section: Authentication types"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Strong_authentication">Strong authentication</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=6" title="Edit section: Strong authentication"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The United States government's <a href="/wiki/National_Information_Assurance_Glossary" title="National Information Assurance Glossary">National Information Assurance Glossary</a> defines <a href="/wiki/Strong_authentication" title="Strong authentication">strong authentication</a> as a layered authentication approach relying on two or more authenticators to establish the identity of an originator or receiver of information.<sup id="cite_ref-NCSC-StrongAuthentication_13-0" class="reference"><a href="#cite_note-NCSC-StrongAuthentication-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> </p><p>The European Central Bank (ECB) has defined strong authentication as "a procedure based on two or more of the three authentication factors". The factors that are used must be mutually independent and at least one factor must be "non-reusable and non-replicable", except in the case of an inherence factor and must also be incapable of being stolen off the Internet. In the European, as well as in the US-American understanding, strong authentication is very similar to multi-factor authentication or 2FA, but exceeding those with more rigorous requirements.<sup id="cite_ref-Turner-DigitalAuthentication-Basics_3-3" class="reference"><a href="#cite_note-Turner-DigitalAuthentication-Basics-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-ECB-Recommendations_14-0" class="reference"><a href="#cite_note-ECB-Recommendations-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> </p><p>The <a href="/wiki/FIDO_Alliance" title="FIDO Alliance">FIDO Alliance</a> has been striving to establish technical specifications for strong authentication.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Continuous_authentication">Continuous authentication</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=7" title="Edit section: Continuous authentication"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Conventional computer systems authenticate users only at the initial log-in session, which can be the cause of a critical security flaw. To resolve this problem, systems need continuous user authentication methods that continuously monitor and authenticate users based on some biometric trait(s). A study used behavioural biometrics based on writing styles as a continuous authentication method.<sup id="cite_ref-BROC2017_16-0" class="reference"><a href="#cite_note-BROC2017-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-Patel_49–61_17-0" class="reference"><a href="#cite_note-Patel_49–61-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> </p><p>Recent research has shown the possibility of using smartphones sensors and accessories to extract some behavioral attributes such as touch dynamics, <a href="/wiki/Keystroke_dynamics" title="Keystroke dynamics">keystroke dynamics</a> and <a href="/wiki/Gait_recognition" class="mw-redirect" title="Gait recognition">gait recognition</a>.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> These attributes are known as behavioral biometrics and could be used to verify or identify users implicitly and continuously on smartphones. The authentication systems that have been built based on these behavioral biometric traits are known as active or continuous authentication systems.<sup id="cite_ref-MAHFOUZ201728_19-0" class="reference"><a href="#cite_note-MAHFOUZ201728-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-Patel_49–61_17-1" class="reference"><a href="#cite_note-Patel_49–61-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Digital_authentication">Digital authentication</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=8" title="Edit section: Digital authentication"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The term digital authentication, also known as <a href="/wiki/Electronic_authentication" title="Electronic authentication">electronic authentication</a> or e-authentication, refers to a group of processes where the confidence for user identities is established and presented via electronic methods to an information system. The digital authentication process creates technical challenges because of the need to authenticate individuals or entities remotely over a network. The American <a href="/wiki/National_Institute_of_Standards_and_Technology" title="National Institute of Standards and Technology">National Institute of Standards and Technology</a> (NIST) has created a generic model for digital authentication that describes the processes that are used to accomplish secure authentication: </p> <ol><li>Enrollment – an individual applies to a credential service provider (CSP) to initiate the enrollment process. After successfully proving the applicant's identity, the CSP allows the applicant to become a subscriber.</li> <li>Authentication – After becoming a subscriber, the user receives an <a href="/wiki/Authenticator" title="Authenticator">authenticator</a> e.g., a token and credentials, such as a user name. He or she is then permitted to perform online transactions within an authenticated session with a relying party, where they must provide proof that he or she possesses one or more authenticators.</li> <li>Life-cycle maintenance – the CSP is charged with the task of maintaining the user's credential over the course of its lifetime, while the subscriber is responsible for maintaining his or her authenticator(s).<sup id="cite_ref-Turner-DigitalAuthentication-Basics_3-4" class="reference"><a href="#cite_note-Turner-DigitalAuthentication-Basics-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-NIST-Authentication_20-0" class="reference"><a href="#cite_note-NIST-Authentication-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup></li></ol> <p>The authentication of information can pose special problems with electronic communication, such as vulnerability to <a href="/wiki/Man-in-the-middle_attack" title="Man-in-the-middle attack">man-in-the-middle attacks</a>, whereby a third party taps into the communication stream, and poses as each of the two other communicating parties, in order to intercept information from each. Extra identity factors can be required to authenticate each party's identity. </p> <div class="mw-heading mw-heading3"><h3 id="Product_authentication">Product authentication</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=9" title="Edit section: Product authentication"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:GatewayTracingHologramLabel.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/d/da/GatewayTracingHologramLabel.jpg/220px-GatewayTracingHologramLabel.jpg" decoding="async" width="220" height="165" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/da/GatewayTracingHologramLabel.jpg/330px-GatewayTracingHologramLabel.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/da/GatewayTracingHologramLabel.jpg/440px-GatewayTracingHologramLabel.jpg 2x" data-file-width="1067" data-file-height="800" /></a><figcaption>A <a href="/wiki/Security_hologram" title="Security hologram">security hologram</a> label on an electronics box for authentication</figcaption></figure> <p>Counterfeit products are often offered to consumers as being authentic. <a href="/wiki/Counterfeit_consumer_goods" class="mw-redirect" title="Counterfeit consumer goods">Counterfeit consumer goods</a>, such as electronics, music, apparel, and <a href="/wiki/Counterfeit_medications" title="Counterfeit medications">counterfeit medications</a>, have been sold as being legitimate. Efforts to control the <a href="/wiki/Supply_chain" title="Supply chain">supply chain</a> and educate consumers help ensure that authentic products are sold and used. Even <a href="/wiki/Security_printing" title="Security printing">security printing</a> on packages, labels, and nameplates, however, is subject to counterfeiting.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> </p><p>In their anti-counterfeiting technology guide,<sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> the <a href="/wiki/EUIPO" class="mw-redirect" title="EUIPO">EUIPO</a> Observatory on Infringements of Intellectual Property Rights categorizes the main anti-counterfeiting technologies on the market currently into five main categories: electronic, marking, chemical and physical, mechanical, and technologies for digital media.<sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> </p><p>Products or their packaging can include a variable <a href="/wiki/QR_Code" class="mw-redirect" title="QR Code">QR Code</a>. A QR Code alone is easy to verify but offers a weak level of authentication as it offers no protection against counterfeits unless scan data is analyzed at the system level to detect anomalies.<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> To increase the security level, the QR Code can be combined with a <a href="/wiki/Digital_watermark" class="mw-redirect" title="Digital watermark">digital watermark</a> or <a href="/wiki/Copy_detection_pattern" title="Copy detection pattern">copy detection pattern</a> that are robust to copy attempts and can be authenticated with a smartphone. </p><p>A <a href="/wiki/Secure_cryptoprocessor" title="Secure cryptoprocessor">secure key storage device</a> can be used for authentication in consumer electronics, network authentication, license management, supply chain management, etc. Generally, the device to be authenticated needs some sort of wireless or wired digital connection to either a host system or a network. Nonetheless, the component being authenticated need not be electronic in nature as an authentication chip can be mechanically attached and read through a connector to the host e.g. an authenticated ink tank for use with a printer. For products and services that these secure coprocessors can be applied to, they can offer a solution that can be much more difficult to counterfeit than most other options while at the same time being more easily verified.<sup id="cite_ref-:1_2-1" class="reference"><a href="#cite_note-:1-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Packaging">Packaging</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=10" title="Edit section: Packaging"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Packaging and labeling can be engineered to help reduce the risks of counterfeit consumer goods or the theft and resale of products.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> Some package constructions are more difficult to copy and some have pilfer indicating seals. Counterfeit goods, unauthorized sales (diversion), material substitution and tampering can all be reduced with these anti-counterfeiting technologies. Packages may include authentication seals and use <a href="/wiki/Security_printing" title="Security printing">security printing</a> to help indicate that the package and contents are not counterfeit; these too are subject to counterfeiting. Packages also can include anti-theft devices, such as dye-packs, <a href="/wiki/Radio-frequency_identification" title="Radio-frequency identification">RFID</a> tags, or <a href="/wiki/Electronic_article_surveillance" title="Electronic article surveillance">electronic article surveillance</a><sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> tags that can be activated or detected by devices at exit points and require specialized tools to deactivate. Anti-counterfeiting technologies that can be used with packaging include: </p> <ul><li><a href="/wiki/Taggant" title="Taggant">Taggant</a> fingerprinting – uniquely coded microscopic materials that are verified from a database</li> <li>Encrypted micro-particles – unpredictably placed markings (numbers, layers and colors) not visible to the human eye</li> <li><a href="/wiki/Hologram" class="mw-redirect" title="Hologram">Holograms</a> – graphics printed on seals, patches, foils or labels and used at the point of sale for visual verification</li> <li>Micro-printing – second-line authentication often used on currencies</li> <li>Serialized <a href="/wiki/Barcode" title="Barcode">barcodes</a></li> <li>UV printing – marks only visible under UV light</li> <li><a href="/wiki/Track_and_trace" title="Track and trace">Track and trace</a> systems – use codes to link products to the database tracking system</li> <li>Water indicators – become visible when contacted with water</li> <li>DNA tracking – genes embedded onto labels that can be traced</li> <li>Color-shifting ink or film – visible marks that switch colors or texture when tilted</li> <li><a href="/wiki/Tamper_evident" class="mw-redirect" title="Tamper evident">Tamper evident</a> seals and tapes – destructible or graphically verifiable at point of sale</li> <li>2d barcodes – data codes that can be tracked</li> <li>RFID chips</li> <li><a href="/wiki/Near-field_communication" title="Near-field communication">NFC</a> chips</li></ul> <div class="mw-heading mw-heading2"><h2 id="Information_content">Information content</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=11" title="Edit section: Information content"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Literary_forgery" title="Literary forgery">Literary forgery</a> can involve imitating the style of a famous author. If an original <a href="/wiki/Manuscript" title="Manuscript">manuscript</a>, typewritten text, or recording is available, then the medium itself (or its packaging – anything from a box to <a href="/wiki/E-mail_headers" class="mw-redirect" title="E-mail headers">e-mail headers</a>) can help prove or disprove the authenticity of the document. However, text, audio, and video can be copied into new media, possibly leaving only the informational content itself to use in authentication. Various systems have been invented to allow authors to provide a means for readers to reliably authenticate that a given message originated from or was relayed by them. These involve authentication factors like: </p> <ul><li>A difficult-to-reproduce physical artifact, such as a <a href="/wiki/Seal_(device)" class="mw-redirect" title="Seal (device)">seal</a>, <a href="/wiki/Signature" title="Signature">signature</a>, <a href="/wiki/Watermark" title="Watermark">watermark</a>, special <a href="/wiki/Stationery" title="Stationery">stationery</a>, or fingerprint.</li> <li>A <a href="/wiki/Shared_secret" title="Shared secret">shared secret</a>, such as a passphrase, in the content of the message.</li> <li>An <a href="/wiki/Electronic_signature" title="Electronic signature">electronic signature</a>; <a href="/wiki/Public-key_infrastructure" class="mw-redirect" title="Public-key infrastructure">public-key infrastructure</a> is often used to cryptographically guarantee that a message has been signed by the holder of a particular private key.</li></ul> <p>The opposite problem is the detection of <a href="/wiki/Plagiarism" title="Plagiarism">plagiarism</a>, where information from a different author is passed off as a person's own work. A common technique for proving plagiarism is the discovery of another copy of the same or very similar text, which has different attribution. In some cases, excessively high quality or a style mismatch may raise suspicion of plagiarism. </p> <div class="mw-heading mw-heading3"><h3 id="Literacy_and_literature_authentication">Literacy and literature authentication</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=12" title="Edit section: Literacy and literature authentication"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In literacy, authentication is a readers’ process of questioning the veracity of an aspect of literature and then verifying those questions via research. The fundamental question for authentication of literature is – Does one believe it? Related to that, an authentication project is therefore a reading and writing activity in which students document the relevant research process (<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup>). It builds students' critical literacy. The documentation materials for literature go beyond narrative texts and likely include informational texts, primary sources, and multimedia. The process typically involves both internet and hands-on library research. When authenticating historical fiction in particular, readers consider the extent that the major historical events, as well as the culture portrayed (e.g., the language, clothing, food, gender roles), are believable for the period.<sup id="cite_ref-:0_4-1" class="reference"><a href="#cite_note-:0-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="History_and_state-of-the-art">History and state-of-the-art</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=13" title="Edit section: History and state-of-the-art"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:KAL-55B_Tactical_Authentication_System_(Vietnam_War_era)_-_National_Cryptologic_Museum_-_DSC08013.JPG" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/f/fc/KAL-55B_Tactical_Authentication_System_%28Vietnam_War_era%29_-_National_Cryptologic_Museum_-_DSC08013.JPG/220px-KAL-55B_Tactical_Authentication_System_%28Vietnam_War_era%29_-_National_Cryptologic_Museum_-_DSC08013.JPG" decoding="async" width="220" height="128" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/fc/KAL-55B_Tactical_Authentication_System_%28Vietnam_War_era%29_-_National_Cryptologic_Museum_-_DSC08013.JPG/330px-KAL-55B_Tactical_Authentication_System_%28Vietnam_War_era%29_-_National_Cryptologic_Museum_-_DSC08013.JPG 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/fc/KAL-55B_Tactical_Authentication_System_%28Vietnam_War_era%29_-_National_Cryptologic_Museum_-_DSC08013.JPG/440px-KAL-55B_Tactical_Authentication_System_%28Vietnam_War_era%29_-_National_Cryptologic_Museum_-_DSC08013.JPG 2x" data-file-width="4320" data-file-height="2522" /></a><figcaption>NSA KAL-55B Tactical Authentication System used by the U.S. military during the <a href="/wiki/Vietnam_War" title="Vietnam War">Vietnam War</a> – <a href="/wiki/National_Cryptologic_Museum" title="National Cryptologic Museum">National Cryptologic Museum</a></figcaption></figure> <p>Historically, fingerprints have been used as the most authoritative method of authentication, but court cases in the US and elsewhere have raised fundamental doubts about fingerprint reliability.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> Outside of the legal system as well, fingerprints are easily <a href="/wiki/Spoofing_attack" title="Spoofing attack">spoofable</a>, with <a href="/wiki/British_Telecom" class="mw-redirect" title="British Telecom">British Telecom</a>'s top computer security official noting that "few" fingerprint readers have not already been tricked by one spoof or another.<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> Hybrid or two-tiered authentication methods offer a compelling<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Manual_of_Style/Words_to_watch#Unsupported_attributions" title="Wikipedia:Manual of Style/Words to watch"><span title="The material near this tag may use weasel words or too-vague attribution. (December 2016)">according to whom?</span></a></i>]</sup> solution, such as private keys encrypted by fingerprint inside of a USB device. </p><p>In a computer data context, cryptographic methods have been developed which are not spoofable if the originator's key has not been compromised. That the originator (or anyone other than an <a href="/wiki/Adversary_(cryptography)" title="Adversary (cryptography)">attacker</a>) knows (or doesn't know) about a compromise is irrelevant. However, it is not known whether these cryptographically based authentication methods are provably secure, since unanticipated mathematical developments may make them vulnerable to attack in the future. If that were to occur, it may call into question much of the authentication in the past. In particular, a <a href="/wiki/Digital_signature" title="Digital signature">digitally signed</a> <a href="/wiki/Legal_instrument" title="Legal instrument">contract</a> may be questioned when a new attack on the cryptography underlying the signature is discovered.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (December 2016)">citation needed</span></a></i>]</sup> </p> <div class="mw-heading mw-heading2"><h2 id="Authorization">Authorization</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=14" title="Edit section: Authorization"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:US_Navy_050308-N-2385R-029_Master-at-Arms_Seaman_Carly_Farmer_checks_an_identification_card_(ID)_before_allowing_a_driver_to_enter_the_gate_at_U.S._Fleet_Activities_Sasebo,_Japan.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/4/42/US_Navy_050308-N-2385R-029_Master-at-Arms_Seaman_Carly_Farmer_checks_an_identification_card_%28ID%29_before_allowing_a_driver_to_enter_the_gate_at_U.S._Fleet_Activities_Sasebo%2C_Japan.jpg/220px-thumbnail.jpg" decoding="async" width="220" height="151" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/42/US_Navy_050308-N-2385R-029_Master-at-Arms_Seaman_Carly_Farmer_checks_an_identification_card_%28ID%29_before_allowing_a_driver_to_enter_the_gate_at_U.S._Fleet_Activities_Sasebo%2C_Japan.jpg/330px-thumbnail.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/42/US_Navy_050308-N-2385R-029_Master-at-Arms_Seaman_Carly_Farmer_checks_an_identification_card_%28ID%29_before_allowing_a_driver_to_enter_the_gate_at_U.S._Fleet_Activities_Sasebo%2C_Japan.jpg/440px-thumbnail.jpg 2x" data-file-width="2535" data-file-height="1735" /></a><figcaption>A military police officer checks a driver's identification card before allowing her to enter a military base.</figcaption></figure> <p>The process of <a href="/wiki/Authorization" title="Authorization">authorization</a> is distinct from that of authentication. Whereas authentication is the process of verifying that "you are who you say you are", authorization is the process of verifying that "you are permitted to do what you are trying to do". While authorization often happens immediately after authentication (e.g., when logging into a computer system), this does not mean authorization presupposes authentication: an anonymous agent could be authorized to a limited action set.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Access_control">Access control</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=15" title="Edit section: Access control"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>One familiar use of authentication and authorization is <a href="/wiki/Access_control" title="Access control">access control</a>. A computer system that is supposed to be used only by those authorized must attempt to detect and exclude the unauthorized. Access to it is therefore usually controlled by insisting on an authentication procedure to establish with some degree of confidence the identity of the user, granting privileges established for that identity. </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=16" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Authentication_protocol" title="Authentication protocol">Authentication protocol</a></li> <li><a href="/wiki/Electronic_signature" title="Electronic signature">Electronic signature</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=17" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist"> <div class="mw-references-wrap mw-references-columns"><ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFAbu-Nimeh2011" class="citation cs2">Abu-Nimeh, Saeed (2011), van Tilborg, Henk C. A.; Jajodia, Sushil (eds.), <a rel="nofollow" class="external text" href="http://link.springer.com/10.1007/978-1-4419-5906-5_793">"Three-Factor Authentication"</a>, <i>Encyclopedia of Cryptography and Security</i>, Boston, MA: <a href="/wiki/Springer_Publishing" title="Springer Publishing">Springer Publishing</a>, pp. 1287–1288, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-1-4419-5906-5_793">10.1007/978-1-4419-5906-5_793</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-4419-5905-8" title="Special:BookSources/978-1-4419-5905-8"><bdi>978-1-4419-5905-8</bdi></a>, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240423025557/http://link.springer.com/10.1007/978-1-4419-5906-5_793">archived</a> from the original on 2024-04-23</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Encyclopedia+of+Cryptography+and+Security&rft.atitle=Three-Factor+Authentication&rft.pages=1287-1288&rft.date=2011&rft_id=info%3Adoi%2F10.1007%2F978-1-4419-5906-5_793&rft.isbn=978-1-4419-5905-8&rft.aulast=Abu-Nimeh&rft.aufirst=Saeed&rft_id=http%3A%2F%2Flink.springer.com%2F10.1007%2F978-1-4419-5906-5_793&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-:1-2"><span class="mw-cite-backlink">^ <a href="#cite_ref-:1_2-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:1_2-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://economictimes.indiatimes.com/definition/authentication">"What is Authentication? Definition of Authentication, Authentication Meaning"</a>. <i>The Economic Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2020-11-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Economic+Times&rft.atitle=What+is+Authentication%3F+Definition+of+Authentication%2C+Authentication+Meaning&rft_id=https%3A%2F%2Feconomictimes.indiatimes.com%2Fdefinition%2Fauthentication&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-Turner-DigitalAuthentication-Basics-3"><span class="mw-cite-backlink">^ <a href="#cite_ref-Turner-DigitalAuthentication-Basics_3-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Turner-DigitalAuthentication-Basics_3-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Turner-DigitalAuthentication-Basics_3-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-Turner-DigitalAuthentication-Basics_3-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-Turner-DigitalAuthentication-Basics_3-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTurner2017" class="citation web cs1">Turner, Dawn M. (2 August 2017). <a rel="nofollow" class="external text" href="http://www.cryptomathic.com/news-events/blog/digital-authentication-the-basics">"Digital Authentication: The Basics"</a>. Cryptomathic. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160814214552/http://www.cryptomathic.com/news-events/blog/digital-authentication-the-basics">Archived</a> from the original on 14 August 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">9 August</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Digital+Authentication%3A+The+Basics&rft.pub=Cryptomathic&rft.date=2017-08-02&rft.aulast=Turner&rft.aufirst=Dawn+M.&rft_id=http%3A%2F%2Fwww.cryptomathic.com%2Fnews-events%2Fblog%2Fdigital-authentication-the-basics&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-:0-4"><span class="mw-cite-backlink">^ <a href="#cite_ref-:0_4-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:0_4-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcTigueThorntonWiese2013" class="citation journal cs1">McTigue, E.; Thornton, E.; Wiese, P. (2013). <a rel="nofollow" class="external text" href="http://eric.ed.gov/?id=EJ1012775">"Authentication Projects for Historical Fiction: Do you believe it?"</a>. <i>The Reading Teacher</i>. <b>66</b> (6): 495–505. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2Ftrtr.1132">10.1002/trtr.1132</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150707211148/http://eric.ed.gov/?id=EJ1012775">Archived</a> from the original on 7 July 2015.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Reading+Teacher&rft.atitle=Authentication+Projects+for+Historical+Fiction%3A+Do+you+believe+it%3F&rft.volume=66&rft.issue=6&rft.pages=495-505&rft.date=2013&rft_id=info%3Adoi%2F10.1002%2Ftrtr.1132&rft.aulast=McTigue&rft.aufirst=E.&rft.au=Thornton%2C+E.&rft.au=Wiese%2C+P.&rft_id=http%3A%2F%2Feric.ed.gov%2F%3Fid%3DEJ1012775&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDe_FilippiMannanReijers2020" class="citation journal cs1">De Filippi, Primavera; Mannan, Morshed; Reijers, Wessel (2020-08-01). <a rel="nofollow" class="external text" href="https://linkinghub.elsevier.com/retrieve/pii/S0160791X20303067">"Blockchain as a confidence machine: The problem of trust & challenges of governance"</a>. <i>Technology in Society</i>. <b>62</b>: 101284. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.techsoc.2020.101284">10.1016/j.techsoc.2020.101284</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0160-791X">0160-791X</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Technology+in+Society&rft.atitle=Blockchain+as+a+confidence+machine%3A+The+problem+of+trust+%26+challenges+of+governance&rft.volume=62&rft.pages=101284&rft.date=2020-08-01&rft_id=info%3Adoi%2F10.1016%2Fj.techsoc.2020.101284&rft.issn=0160-791X&rft.aulast=De+Filippi&rft.aufirst=Primavera&rft.au=Mannan%2C+Morshed&rft.au=Reijers%2C+Wessel&rft_id=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS0160791X20303067&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRanjanOm2016" class="citation journal cs1">Ranjan, Pratik; Om, Hari (2016-05-06). <a rel="nofollow" class="external text" href="http://link.springer.com/10.1007/s11277-016-3342-5">"An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem"</a>. <i>Wireless Personal Communications</i>. <b>90</b> (1): 217–244. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs11277-016-3342-5">10.1007/s11277-016-3342-5</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0929-6212">0929-6212</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:21912076">21912076</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Wireless+Personal+Communications&rft.atitle=An+Efficient+Remote+User+Password+Authentication+Scheme+based+on+Rabin%27s+Cryptosystem&rft.volume=90&rft.issue=1&rft.pages=217-244&rft.date=2016-05-06&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A21912076%23id-name%3DS2CID&rft.issn=0929-6212&rft_id=info%3Adoi%2F10.1007%2Fs11277-016-3342-5&rft.aulast=Ranjan&rft.aufirst=Pratik&rft.au=Om%2C+Hari&rft_id=http%3A%2F%2Flink.springer.com%2F10.1007%2Fs11277-016-3342-5&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKingsleySchafferChiarot2024" class="citation journal cs1">Kingsley, Bryce J.; Schaffer, J. David; Chiarot, Paul R. (10 June 2024). <a rel="nofollow" class="external text" href="https://www.nature.com/articles/s41598-024-63834-x">"Electrospray deposition of physical unclonable functions for drug anti-counterfeiting"</a>. <i>Scientific Reports</i>. <b>14</b> (1). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1038%2Fs41598-024-63834-x">10.1038/s41598-024-63834-x</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2045-2322">2045-2322</a>. <a href="/wiki/PMC_(identifier)" class="mw-redirect" title="PMC (identifier)">PMC</a> <span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11164866">11164866</a></span>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a> <a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/38858516">38858516</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Scientific+Reports&rft.atitle=Electrospray+deposition+of+physical+unclonable+functions+for+drug+anti-counterfeiting&rft.volume=14&rft.issue=1&rft.date=2024-06-10&rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC11164866%23id-name%3DPMC&rft.issn=2045-2322&rft_id=info%3Apmid%2F38858516&rft_id=info%3Adoi%2F10.1038%2Fs41598-024-63834-x&rft.aulast=Kingsley&rft.aufirst=Bryce+J.&rft.au=Schaffer%2C+J.+David&rft.au=Chiarot%2C+Paul+R.&rft_id=https%3A%2F%2Fwww.nature.com%2Farticles%2Fs41598-024-63834-x&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHaleemJavaidSinghSuman2022" class="citation journal cs1">Haleem, Abid; Javaid, Mohd; Singh, Ravi Pratap; Suman, Rajiv; Rab, Shanay (2022). <a rel="nofollow" class="external text" href="https://linkinghub.elsevier.com/retrieve/pii/S2667345222000141">"Holography and its applications for industry 4.0: An overview"</a>. <i>Internet of Things and Cyber-Physical Systems</i>. <b>2</b>: 42–48. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.iotcps.2022.05.004">10.1016/j.iotcps.2022.05.004</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2667-3452">2667-3452</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Internet+of+Things+and+Cyber-Physical+Systems&rft.atitle=Holography+and+its+applications+for+industry+4.0%3A+An+overview&rft.volume=2&rft.pages=42-48&rft.date=2022&rft_id=info%3Adoi%2F10.1016%2Fj.iotcps.2022.05.004&rft.issn=2667-3452&rft.aulast=Haleem&rft.aufirst=Abid&rft.au=Javaid%2C+Mohd&rft.au=Singh%2C+Ravi+Pratap&rft.au=Suman%2C+Rajiv&rft.au=Rab%2C+Shanay&rft_id=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS2667345222000141&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFederal_Financial_Institutions_Examination_Council2008" class="citation web cs1">Federal Financial Institutions Examination Council (2008). <a rel="nofollow" class="external text" href="https://www.ffiec.gov/pdf/authentication_guidance.pdf">"Authentication in an Internet Banking Environment"</a> <span class="cs1-format">(PDF)</span>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20100505203410/http://www.ffiec.gov/pdf/authentication_guidance.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2010-05-05<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-12-31</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Authentication+in+an+Internet+Banking+Environment&rft.date=2008&rft.au=Federal+Financial+Institutions+Examination+Council&rft_id=http%3A%2F%2Fwww.ffiec.gov%2Fpdf%2Fauthentication_guidance.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLee2007" class="citation journal cs1">Lee, Robert D (Winter 2007). <a rel="nofollow" class="external text" href="https://www.fdic.gov/bank-examinations/authentication-internet-banking-lesson-risk-management">"Authentication in Internet Banking: A Lesson in Risk Management"</a>. <i>Supervisory Insights</i>. <a href="/wiki/Federal_Deposit_Insurance_Corporation" title="Federal Deposit Insurance Corporation">Federal Deposit Insurance Corporation</a>: 42.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Supervisory+Insights&rft.atitle=Authentication+in+Internet+Banking%3A+A+Lesson+in+Risk+Management&rft.ssn=winter&rft.pages=42&rft.date=2007&rft.aulast=Lee&rft.aufirst=Robert+D&rft_id=https%3A%2F%2Fwww.fdic.gov%2Fbank-examinations%2Fauthentication-internet-banking-lesson-risk-management&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-:2-11"><span class="mw-cite-backlink">^ <a href="#cite_ref-:2_11-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:2_11-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:2_11-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWangWangChenLiu2020" class="citation journal cs1">Wang, Chen; Wang, Yan; Chen, Yingying; Liu, Hongbo; Liu, Jian (April 2020). <a rel="nofollow" class="external text" href="https://linkinghub.elsevier.com/retrieve/pii/S1389128618312799">"User authentication on mobile devices: Approaches, threats and trends"</a>. <i>Computer Networks</i>. <b>170</b>: 107118. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.comnet.2020.107118">10.1016/j.comnet.2020.107118</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Computer+Networks&rft.atitle=User+authentication+on+mobile+devices%3A+Approaches%2C+threats+and+trends&rft.volume=170&rft.pages=107118&rft.date=2020-04&rft_id=info%3Adoi%2F10.1016%2Fj.comnet.2020.107118&rft.aulast=Wang&rft.aufirst=Chen&rft.au=Wang%2C+Yan&rft.au=Chen%2C+Yingying&rft.au=Liu%2C+Hongbo&rft.au=Liu%2C+Jian&rft_id=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS1389128618312799&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAliAl_BalushiNadirKhadeer_Hussain2018" class="citation book cs1">Ali, Saqib; Al Balushi, Taiseera; Nadir, Zia; Khadeer Hussain, Omar (2018). "ICS/SCADA System Security for CPS". <i>Cyber Security for Cyber Physical Systems</i>. Studies in Computational Intelligence. <a href="/wiki/Springer_Nature" title="Springer Nature">Springer Nature</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-319-75880-0">10.1007/978-3-319-75880-0</a>. <a href="/wiki/EISSN_(identifier)" class="mw-redirect" title="EISSN (identifier)">eISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1860-9503">1860-9503</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-319-75879-4" title="Special:BookSources/978-3-319-75879-4"><bdi>978-3-319-75879-4</bdi></a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1860-949X">1860-949X</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=ICS%2FSCADA+System+Security+for+CPS&rft.btitle=Cyber+Security+for+Cyber+Physical+Systems&rft.series=Studies+in+Computational+Intelligence&rft.pub=Springer+Nature&rft.date=2018&rft_id=info%3Adoi%2F10.1007%2F978-3-319-75880-0&rft.issn=1860-949X&rft.eissn=1860-9503&rft.isbn=978-3-319-75879-4&rft.aulast=Ali&rft.aufirst=Saqib&rft.au=Al+Balushi%2C+Taiseera&rft.au=Nadir%2C+Zia&rft.au=Khadeer+Hussain%2C+Omar&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-NCSC-StrongAuthentication-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-NCSC-StrongAuthentication_13-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCommittee_on_National_Security_Systems" class="citation web cs1">Committee on National Security Systems. <a rel="nofollow" class="external text" href="https://www.ncsc.gov/nittf/docs/CNSSI-4009_National_Information_Assurance.pdf">"National Information Assurance (IA) Glossary"</a> <span class="cs1-format">(PDF)</span>. National Counterintelligence and Security Center. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161121224542/https://www.ncsc.gov/nittf/docs/CNSSI-4009_National_Information_Assurance.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 21 November 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">9 August</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=National+Information+Assurance+%28IA%29+Glossary&rft.pub=National+Counterintelligence+and+Security+Center&rft.au=Committee+on+National+Security+Systems&rft_id=https%3A%2F%2Fwww.ncsc.gov%2Fnittf%2Fdocs%2FCNSSI-4009_National_Information_Assurance.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-ECB-Recommendations-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-ECB-Recommendations_14-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEuropean_Central_Bank" class="citation web cs1">European Central Bank. <a rel="nofollow" class="external text" href="https://www.ecb.europa.eu/pub/pdf/other/recommendationssecurityinternetpaymentsoutcomeofpcfinalversionafterpc201301en.pdf">"Recommendations for the Security of Internet Payments"</a> <span class="cs1-format">(PDF)</span>. European Central Bank. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161106212218/https://www.ecb.europa.eu/pub/pdf/other/recommendationssecurityinternetpaymentsoutcomeofpcfinalversionafterpc201301en.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 6 November 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">9 August</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Recommendations+for+the+Security+of+Internet+Payments&rft.pub=European+Central+Bank&rft.au=European+Central+Bank&rft_id=https%3A%2F%2Fwww.ecb.europa.eu%2Fpub%2Fpdf%2Fother%2Frecommendationssecurityinternetpaymentsoutcomeofpcfinalversionafterpc201301en.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSeals2016" class="citation news cs1">Seals, Tara (5 April 2016). <a rel="nofollow" class="external text" href="https://www.infosecurity-magazine.com/news/fido-alliance-passes-150/">"FIDO Alliance Passes 150 Post-Password Certified Products"</a>. <i>Infosecurity Magazine</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240926182246/https://www.infosecurity-magazine.com/news/fido-alliance-passes-150/">Archived</a> from the original on 26 September 2024.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Infosecurity+Magazine&rft.atitle=FIDO+Alliance+Passes+150+Post-Password+Certified+Products&rft.date=2016-04-05&rft.aulast=Seals&rft.aufirst=Tara&rft_id=https%3A%2F%2Fwww.infosecurity-magazine.com%2Fnews%2Ffido-alliance-passes-150%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-BROC2017-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-BROC2017_16-0">^</a></b></span> <span class="reference-text">Brocardo ML, Traore I, Woungang I, Obaidat MS. "<a rel="nofollow" class="external text" href="http://onlinelibrary.wiley.com/doi/10.1002/dac.3259/full">Authorship verification using deep belief network systems</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170322015517/http://onlinelibrary.wiley.com/doi/10.1002/dac.3259/full">Archived</a> 2017-03-22 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>". Int J Commun Syst. 2017. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2Fdac.3259">10.1002/dac.3259</a></span> </li> <li id="cite_note-Patel_49–61-17"><span class="mw-cite-backlink">^ <a href="#cite_ref-Patel_49–61_17-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Patel_49–61_17-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPatelChellappaChandraBarbello2016" class="citation journal cs1">Patel, Vishal M.; Chellappa, Rama; Chandra, Deepak; Barbello, Brandon (July 2016). "Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges". <i>IEEE Signal Processing Magazine</i>. <b>33</b> (4): 49–61. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2016ISPM...33...49P">2016ISPM...33...49P</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Fmsp.2016.2555335">10.1109/msp.2016.2555335</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1053-5888">1053-5888</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:14179050">14179050</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=IEEE+Signal+Processing+Magazine&rft.atitle=Continuous+User+Authentication+on+Mobile+Devices%3A+Recent+progress+and+remaining+challenges&rft.volume=33&rft.issue=4&rft.pages=49-61&rft.date=2016-07&rft_id=info%3Adoi%2F10.1109%2Fmsp.2016.2555335&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A14179050%23id-name%3DS2CID&rft.issn=1053-5888&rft_id=info%3Abibcode%2F2016ISPM...33...49P&rft.aulast=Patel&rft.aufirst=Vishal+M.&rft.au=Chellappa%2C+Rama&rft.au=Chandra%2C+Deepak&rft.au=Barbello%2C+Brandon&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDe_MarsicoFartadeMecca2018" class="citation book cs1">De Marsico, Maria; Fartade, Eduard Gabriel; Mecca, Alessio (2018). "Feature-based Analysis of Gait Signals for Biometric Recognition - Automatic Extraction and Selection of Features from Accelerometer Signals". <i>Proceedings of the 7th International Conference on Pattern Recognition Applications and Methods</i>. SCITEPRESS - Science and Technology Publications. pp. 630–637. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.5220%2F0006719106300637">10.5220/0006719106300637</a></span>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-989-758-276-9" title="Special:BookSources/978-989-758-276-9"><bdi>978-989-758-276-9</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Feature-based+Analysis+of+Gait+Signals+for+Biometric+Recognition+-+Automatic+Extraction+and+Selection+of+Features+from+Accelerometer+Signals&rft.btitle=Proceedings+of+the+7th+International+Conference+on+Pattern+Recognition+Applications+and+Methods&rft.pages=630-637&rft.pub=SCITEPRESS+-+Science+and+Technology+Publications&rft.date=2018&rft_id=info%3Adoi%2F10.5220%2F0006719106300637&rft.isbn=978-989-758-276-9&rft.aulast=De+Marsico&rft.aufirst=Maria&rft.au=Fartade%2C+Eduard+Gabriel&rft.au=Mecca%2C+Alessio&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-MAHFOUZ201728-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-MAHFOUZ201728_19-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMahfouzMahmoudEldin2017" class="citation journal cs1">Mahfouz, Ahmed; Mahmoud, Tarek M.; Eldin, Ahmed Sharaf (2017). "A survey on behavioral biometric authentication on smartphones". <i>Journal of Information Security and Applications</i>. <b>37</b>: 28–37. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1801.09308">1801.09308</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.jisa.2017.10.002">10.1016/j.jisa.2017.10.002</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:21265344">21265344</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Information+Security+and+Applications&rft.atitle=A+survey+on+behavioral+biometric+authentication+on+smartphones&rft.volume=37&rft.pages=28-37&rft.date=2017&rft_id=info%3Aarxiv%2F1801.09308&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A21265344%23id-name%3DS2CID&rft_id=info%3Adoi%2F10.1016%2Fj.jisa.2017.10.002&rft.aulast=Mahfouz&rft.aufirst=Ahmed&rft.au=Mahmoud%2C+Tarek+M.&rft.au=Eldin%2C+Ahmed+Sharaf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-NIST-Authentication-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-NIST-Authentication_20-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://pages.nist.gov/800-63-3/sp800-63-3.html">"Draft NIST Special Publication 800-63-3: Digital Authentication Guideline"</a>. National Institute of Standards and Technology, USA. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160913153728/https://pages.nist.gov/800-63-3/sp800-63-3.html">Archived</a> from the original on 13 September 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">9 August</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Draft+NIST+Special+Publication+800-63-3%3A+Digital+Authentication+Guideline&rft.pub=National+Institute+of+Standards+and+Technology%2C+USA&rft_id=https%3A%2F%2Fpages.nist.gov%2F800-63-3%2Fsp800-63-3.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGraham2007" class="citation magazine cs1">Graham, Marty (2007-02-07). <a rel="nofollow" class="external text" href="https://www.wired.com/2007/02/2163064/">"Fake Holograms a 3-D Crime Wave"</a>. <i>Wired</i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1059-1028">1059-1028</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2020-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Wired&rft.atitle=Fake+Holograms+a+3-D+Crime+Wave&rft.date=2007-02-07&rft.issn=1059-1028&rft.aulast=Graham&rft.aufirst=Marty&rft_id=https%3A%2F%2Fwww.wired.com%2F2007%2F02%2F2163064%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.euipo.europa.eu/en/publications/anti-counterfeiting-technology-guide">"EUIPO Anti-Counterfeiting Technology Guide"</a>. <i>European Observatory on Infringements of Intellectual Property Rights</i>. 2021-02-26. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210317234513/https://euipo.europa.eu/ohimportal/en/web/observatory/news/-/action/view/8550135">Archived</a> from the original on 2021-03-17.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=European+Observatory+on+Infringements+of+Intellectual+Property+Rights&rft.atitle=EUIPO+Anti-Counterfeiting+Technology+Guide&rft.date=2021-02-26&rft_id=https%3A%2F%2Fwww.euipo.europa.eu%2Fen%2Fpublications%2Fanti-counterfeiting-technology-guide&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLinsner2021" class="citation web cs1">Linsner, Bristows LLP-Marc (2 March 2021). <a rel="nofollow" class="external text" href="https://www.lexology.com/library/detail.aspx?g=91842dca-ae41-424a-867c-d8c9c53b68a0">"EUIPO Observatory publishes Anti-counterfeiting Technology Guide | Lexology"</a>. <i>www.lexology.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2021-03-18</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.lexology.com&rft.atitle=EUIPO+Observatory+publishes+Anti-counterfeiting+Technology+Guide+%7C+Lexology&rft.date=2021-03-02&rft.aulast=Linsner&rft.aufirst=Bristows+LLP-Marc&rft_id=https%3A%2F%2Fwww.lexology.com%2Flibrary%2Fdetail.aspx%3Fg%3D91842dca-ae41-424a-867c-d8c9c53b68a0&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><i>Survey of techniques for the fight against counterfeit goods and Intellectual Property Rights (IPR) infringement</i>. Baldini, Gianmarco., Nai Fovino, Igor., Satta, Riccardo., Tsois, Aris., Checchi, Enrico., European Commission. Joint Research Centre. Luxembourg: Publications Office. 2015. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-92-79-54543-6" title="Special:BookSources/978-92-79-54543-6"><bdi>978-92-79-54543-6</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/948769705">948769705</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Survey+of+techniques+for+the+fight+against+counterfeit+goods+and+Intellectual+Property+Rights+%28IPR%29+infringement.&rft.place=Luxembourg&rft.pub=Publications+Office&rft.date=2015&rft_id=info%3Aoclcnum%2F948769705&rft.isbn=978-92-79-54543-6&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_book" title="Template:Cite book">cite book</a>}}</code>: CS1 maint: others (<a href="/wiki/Category:CS1_maint:_others" title="Category:CS1 maint: others">link</a>)</span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEliassonMatousek2007" class="citation journal cs1">Eliasson, C; Matousek (2007). "Noninvasive Authentication of Pharmaceutical Products through Packaging Using Spatially Offset Raman Spectroscopy". <i>Analytical Chemistry</i>. <b>79</b> (4): 1696–1701. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1021%2Fac062223z">10.1021/ac062223z</a>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a> <a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/17297975">17297975</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Analytical+Chemistry&rft.atitle=Noninvasive+Authentication+of+Pharmaceutical+Products+through+Packaging+Using+Spatially+Offset+Raman+Spectroscopy&rft.volume=79&rft.issue=4&rft.pages=1696-1701&rft.date=2007&rft_id=info%3Adoi%2F10.1021%2Fac062223z&rft_id=info%3Apmid%2F17297975&rft.aulast=Eliasson&rft.aufirst=C&rft.au=Matousek&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLi2013" class="citation journal cs1">Li, Ling (March 2013). "Technology designed to combat fakes in the global supply chain". <i>Business Horizons</i>. <b>56</b> (2): 167–177. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.bushor.2012.11.010">10.1016/j.bushor.2012.11.010</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Business+Horizons&rft.atitle=Technology+designed+to+combat+fakes+in+the+global+supply+chain&rft.volume=56&rft.issue=2&rft.pages=167-177&rft.date=2013-03&rft_id=info%3Adoi%2F10.1016%2Fj.bushor.2012.11.010&rft.aulast=Li&rft.aufirst=Ling&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://electronics.howstuffworks.com/anti-shoplifting-device.htm">How Anti-shoplifting Devices Work"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20060427081528/http://electronics.howstuffworks.com/anti-shoplifting-device.htm">Archived</a> 2006-04-27 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, HowStuffWorks.com</span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text">Norton, D. E. (2004). <i>The effective teaching of language arts</i>. New York: Pearson/Merrill/Prentice Hall.</span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMoenssensMeagher2014" class="citation book cs1">Moenssens, Andre A.; Meagher, Stephen B. (2014). "13". <a rel="nofollow" class="external text" href="https://www.ojp.gov/pdffiles1/nij/225333.pdf"><i>The Fingerprint Sourcebook</i></a> <span class="cs1-format">(PDF)</span>. United States: CreateSpace Independent Publishing Platform. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9781500674151" title="Special:BookSources/9781500674151"><bdi>9781500674151</bdi></a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220522184117/https://www.ojp.gov/pdffiles1/nij/225333.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 22 May 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">3 November</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=13&rft.btitle=The+Fingerprint+Sourcebook&rft.place=United+States&rft.pub=CreateSpace+Independent+Publishing+Platform&rft.date=2014&rft.isbn=9781500674151&rft.aulast=Moenssens&rft.aufirst=Andre+A.&rft.au=Meagher%2C+Stephen+B.&rft_id=https%3A%2F%2Fwww.ojp.gov%2Fpdffiles1%2Fnij%2F225333.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2008/03/30/german_interior_minister_fingerprint_appropriated"><i>The Register</i>, UK; Dan Goodin; 30 March 2008; <i>Get your German Interior Minister's fingerprint, here</i>. Compared to other solutions, "It's basically like leaving the password to your computer everywhere you go, without you being able to control it anymore", one of the hackers comments.</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170810131615/https://www.theregister.co.uk/2008/03/30/german_interior_minister_fingerprint_appropriated">Archived</a> 10 August 2017 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://technet.microsoft.com/en-us/library/ff687018.aspx">"Best Practices for Creating a Secure Guest Account"</a>. 31 August 2016. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171107060852/https://technet.microsoft.com/en-us/library/ff687018.aspx">Archived</a> from the original on 2017-11-07<span class="reference-accessdate">. Retrieved <span class="nowrap">2017-11-06</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Best+Practices+for+Creating+a+Secure+Guest+Account&rft.date=2016-08-31&rft_id=https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fff687018.aspx&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Authentication&action=edit&section=18" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNational_Institute_of_Standards_and_Technology,_U.S._Department_of_Commerce2013" class="citation web cs1"><a href="/wiki/National_Institute_of_Standards_and_Technology" title="National Institute of Standards and Technology">National Institute of Standards and Technology</a>, <a href="/wiki/U.S._Department_of_Commerce" class="mw-redirect" title="U.S. Department of Commerce">U.S. Department of Commerce</a> (August 2013). <a rel="nofollow" class="external text" href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-2.pdf">"Electronic Authentication Guideline – NIST Special Publication 800-63-2"</a> <span class="cs1-format">(PDF)</span>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131003163229/http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-2.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2013-10-03.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Electronic+Authentication+Guideline+%E2%80%93+NIST+Special+Publication+800-63-2&rft.date=2013-08&rft.au=National+Institute+of+Standards+and+Technology%2C+U.S.+Department+of+Commerce&rft_id=http%3A%2F%2Fnvlpubs.nist.gov%2Fnistpubs%2FSpecialPublications%2FNIST.SP.800-63-2.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AAuthentication" class="Z3988"></span></li> <li><a rel="nofollow" class="external text" href="https://www.nist.gov/itl/csd/piv_090809.cfm">"New NIST Publications Describe Standards for Identity Credentials and Authentication Systems"</a></li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Information_security" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="3"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Information_security" title="Template:Information security"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Information_security" title="Template talk:Information security"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Information_security" title="Special:EditPage/Template:Information security"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Information_security" style="font-size:114%;margin:0 4em"><a href="/wiki/Information_security" title="Information security">Information security</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related security categories</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_security" title="Computer security">Computer security</a></li> <li><a href="/wiki/Automotive_security" title="Automotive security">Automotive security</a></li> <li><a href="/wiki/Cybercrime" title="Cybercrime">Cybercrime</a> <ul><li><a href="/wiki/Cybersex_trafficking" title="Cybersex trafficking">Cybersex trafficking</a></li> <li><a href="/wiki/Computer_fraud" title="Computer fraud">Computer fraud</a></li></ul></li> <li><a href="/wiki/Cybergeddon" title="Cybergeddon">Cybergeddon</a></li> <li><a href="/wiki/Cyberterrorism" title="Cyberterrorism">Cyberterrorism</a></li> <li><a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></li> <li><a href="/wiki/Electromagnetic_warfare" class="mw-redirect" title="Electromagnetic warfare">Electromagnetic warfare</a></li> <li><a href="/wiki/Information_warfare" title="Information warfare">Information warfare</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li> <li><a href="/wiki/Copy_protection" title="Copy protection">Copy protection</a></li> <li><a href="/wiki/Digital_rights_management" title="Digital rights management">Digital rights management</a></li></ul> </div></td><td class="noviewer navbox-image" rowspan="3" style="width:1px;padding:0 0 0 2px"><div><figure class="mw-halign-center" typeof="mw:File"><a href="/wiki/File:CIAJMK1209-en.svg" class="mw-file-description" title="vectorial version"><img alt="vectorial version" src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/150px-CIAJMK1209-en.svg.png" decoding="async" width="150" height="150" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/225px-CIAJMK1209-en.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/300px-CIAJMK1209-en.svg.png 2x" data-file-width="496" data-file-height="496" /></a><figcaption>vectorial version</figcaption></figure></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">Threats</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Advanced_persistent_threat" title="Advanced persistent threat">Advanced persistent threat</a></li> <li><a href="/wiki/Arbitrary_code_execution" title="Arbitrary code execution">Arbitrary code execution</a></li> <li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoors</a></li> <li>Bombs <ul><li><a href="/wiki/Fork_bomb" title="Fork bomb">Fork</a></li> <li><a href="/wiki/Logic_bomb" title="Logic bomb">Logic</a></li> <li><a href="/wiki/Time_bomb_(software)" title="Time bomb (software)">Time</a></li> <li><a href="/wiki/Zip_bomb" title="Zip bomb">Zip</a></li></ul></li> <li><a href="/wiki/Hardware_backdoor" title="Hardware backdoor">Hardware backdoors</a></li> <li><a href="/wiki/Code_injection" title="Code injection">Code injection</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Cross-site_scripting" title="Cross-site scripting">Cross-site scripting</a></li> <li><a href="/wiki/Cross-site_leaks" title="Cross-site leaks">Cross-site leaks</a></li> <li><a href="/wiki/DOM_clobbering" title="DOM clobbering">DOM clobbering</a></li> <li><a href="/wiki/History_sniffing" title="History sniffing">History sniffing</a></li> <li><a href="/wiki/Cryptojacking" title="Cryptojacking">Cryptojacking</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnets</a></li> <li><a href="/wiki/Data_breach" title="Data breach">Data breach</a></li> <li><a href="/wiki/Drive-by_download" title="Drive-by download">Drive-by download</a></li> <li><a href="/wiki/Browser_Helper_Object" title="Browser Helper Object">Browser Helper Objects</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Viruses</a></li> <li><a href="/wiki/Data_scraping" title="Data scraping">Data scraping</a></li> <li><a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">Denial-of-service attack</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/Email_fraud" title="Email fraud">Email fraud</a></li> <li><a href="/wiki/Email_spoofing" title="Email spoofing">Email spoofing</a></li> <li><a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">Exploits</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialers</a></li> <li><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Insecure_direct_object_reference" title="Insecure direct object reference">Insecure direct object reference</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke loggers</a></li> <li><a href="/wiki/Malware" title="Malware">Malware</a></li> <li><a href="/wiki/Payload_(computing)" title="Payload (computing)">Payload</a></li> <li><a href="/wiki/Phishing" title="Phishing">Phishing</a> <ul><li><a href="/wiki/Voice_phishing" title="Voice phishing">Voice</a></li></ul></li> <li><a href="/wiki/Polymorphic_engine" title="Polymorphic engine">Polymorphic engine</a></li> <li><a href="/wiki/Privilege_escalation" title="Privilege escalation">Privilege escalation</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkits</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Shellcode" title="Shellcode">Shellcode</a></li> <li><a href="/wiki/Spamming" title="Spamming">Spamming</a></li> <li><a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">Social engineering</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Software_bug" title="Software bug">Software bugs</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horses</a></li> <li><a href="/wiki/Hardware_Trojan" title="Hardware Trojan">Hardware Trojans</a></li> <li><a href="/wiki/Remote_access_trojan" class="mw-redirect" title="Remote access trojan">Remote access trojans</a></li> <li><a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">Vulnerability</a></li> <li><a href="/wiki/Web_shell" title="Web shell">Web shells</a></li> <li><a href="/wiki/Wiper_(malware)" title="Wiper (malware)">Wiper</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worms</a></li> <li><a href="/wiki/SQL_injection" title="SQL injection">SQL injection</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Defenses</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Application_security" title="Application security">Application security</a> <ul><li><a href="/wiki/Secure_coding" title="Secure coding">Secure coding</a></li> <li>Secure by default</li> <li><a href="/wiki/Secure_by_design" title="Secure by design">Secure by design</a> <ul><li><a href="/wiki/Misuse_case" title="Misuse case">Misuse case</a></li></ul></li></ul></li> <li><a href="/wiki/Computer_access_control" title="Computer access control">Computer access control</a> <ul><li><a class="mw-selflink selflink">Authentication</a> <ul><li><a href="/wiki/Multi-factor_authentication" title="Multi-factor authentication">Multi-factor authentication</a></li></ul></li> <li><a href="/wiki/Authorization" title="Authorization">Authorization</a></li></ul></li> <li><a href="/wiki/Computer_security_software" title="Computer security software">Computer security software</a> <ul><li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Security-focused_operating_system" title="Security-focused operating system">Security-focused operating system</a></li></ul></li> <li><a href="/wiki/Data-centric_security" title="Data-centric security">Data-centric security</a></li> <li><a href="/wiki/Code_obfuscation" class="mw-redirect" title="Code obfuscation">Obfuscation (software)</a></li> <li><a href="/wiki/Data_masking" title="Data masking">Data masking</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a> <ul><li><a href="/wiki/Host-based_intrusion_detection_system" title="Host-based intrusion detection system">Host-based intrusion detection system</a> (HIDS)</li> <li><a href="/wiki/Anomaly_detection" title="Anomaly detection">Anomaly detection</a></li></ul></li> <li><a href="/wiki/Information_security_management" title="Information security management">Information security management</a> <ul><li><a href="/wiki/Information_risk_management" class="mw-redirect" title="Information risk management">Information risk management</a></li> <li><a href="/wiki/Security_information_and_event_management" title="Security information and event management">Security information and event management</a> (SIEM)</li></ul></li> <li><a href="/wiki/Runtime_application_self-protection" title="Runtime application self-protection">Runtime application self-protection</a></li> <li><a href="/wiki/Site_isolation" title="Site isolation">Site isolation</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Authentication" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Authentication" title="Template:Authentication"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Authentication" title="Template talk:Authentication"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Authentication" title="Special:EditPage/Template:Authentication"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Authentication" style="font-size:114%;margin:0 4em"><a class="mw-selflink selflink">Authentication</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Authentication<br />APIs</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/BSD_Authentication" title="BSD Authentication">BSD Authentication</a> (BSD Auth)</li> <li><a href="/wiki/EAuthentication" class="mw-redirect" title="EAuthentication">eAuthentication</a> (eAuth)</li> <li><a href="/wiki/Generic_Security_Services_Application_Program_Interface" title="Generic Security Services Application Program Interface">Generic Security Services API</a> (GSSAPI)</li> <li><a href="/wiki/Java_Authentication_and_Authorization_Service" title="Java Authentication and Authorization Service">Java Authentication and Authorization Service</a> (JAAS)</li> <li><a href="/wiki/Pluggable_authentication_module" title="Pluggable authentication module">Pluggable Authentication Modules</a> (PAM)</li> <li><a href="/wiki/Simple_Authentication_and_Security_Layer" title="Simple Authentication and Security Layer">Simple Authentication and Security Layer</a> (SASL)</li> <li><a href="/wiki/Security_Support_Provider_Interface" title="Security Support Provider Interface">Security Support Provider Interface</a> (SSPI)</li> <li><a href="/wiki/XUDA" title="XUDA">XCert Universal Database API</a> (XUDA)</li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Authentication_protocol" title="Authentication protocol">Authentication<br />protocols</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/ACF2" title="ACF2">ACF2</a></li> <li><a href="/wiki/Authentication_and_Key_Agreement_(protocol)" class="mw-redirect" title="Authentication and Key Agreement (protocol)">Authentication and Key Agreement</a> (AKA)</li> <li><a href="/wiki/CAVE-based_authentication" title="CAVE-based authentication">CAVE-based authentication</a></li> <li><a href="/wiki/Challenge-Handshake_Authentication_Protocol" title="Challenge-Handshake Authentication Protocol">Challenge-Handshake Authentication Protocol</a> (CHAP) <ul><li><a href="/wiki/MS-CHAP" title="MS-CHAP">MS-CHAP</a></li></ul></li> <li><a href="/wiki/Central_Authentication_Service" title="Central Authentication Service">Central Authentication Service</a> (CAS)</li> <li><a href="/wiki/CRAM-MD5" title="CRAM-MD5">CRAM-MD5</a></li> <li><a href="/wiki/Diameter_(protocol)" title="Diameter (protocol)">Diameter</a></li> <li><a href="/wiki/Extensible_Authentication_Protocol" title="Extensible Authentication Protocol">Extensible Authentication Protocol</a> (EAP)</li> <li><a href="/wiki/Host_Identity_Protocol" title="Host Identity Protocol">Host Identity Protocol</a> (HIP)</li> <li><a href="/wiki/IndieAuth" title="IndieAuth">IndieAuth</a></li> <li><a href="/wiki/Kerberos_(protocol)" title="Kerberos (protocol)">Kerberos</a></li> <li><a href="/wiki/LAN_Manager" title="LAN Manager">LAN Manager</a></li> <li><a href="/wiki/NT_LAN_Manager" class="mw-redirect" title="NT LAN Manager">NT LAN Manager</a> (NTLM)</li> <li><a href="/wiki/OAuth" title="OAuth">OAuth</a></li> <li><a href="/wiki/OpenID" title="OpenID">OpenID</a></li> <li><a href="/wiki/OpenID_Connect" class="mw-redirect" title="OpenID Connect">OpenID Connect</a> (OIDC)</li> <li><a href="/wiki/Password-authenticated_key_agreement" title="Password-authenticated key agreement">Password-authenticated key agreement</a> protocols</li> <li><a href="/wiki/Password_Authentication_Protocol" title="Password Authentication Protocol">Password Authentication Protocol</a> (PAP)</li> <li><a href="/wiki/Protected_Extensible_Authentication_Protocol" title="Protected Extensible Authentication Protocol">Protected Extensible Authentication Protocol</a> (PEAP)</li> <li><a href="/wiki/RADIUS" title="RADIUS">Remote Access Dial In User Service</a> (RADIUS)</li> <li><a href="/wiki/Resource_Access_Control_Facility" title="Resource Access Control Facility">Resource Access Control Facility</a> (RACF)</li> <li><a href="/wiki/Secure_Remote_Password_protocol" title="Secure Remote Password protocol">Secure Remote Password protocol</a> (SRP)</li> <li><a href="/wiki/TACACS" title="TACACS">TACACS</a></li> <li><a href="/wiki/Woo%E2%80%93Lam" title="Woo–Lam">Woo–Lam</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:Authentication" title="Category:Authentication">Category</a></li> <li><span class="noviewer" typeof="mw:File"><span title="Commons page"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/12px-Commons-logo.svg.png" decoding="async" width="12" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/18px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/24px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></span></span> <a href="https://commons.wikimedia.org/wiki/Category:Authentication" class="extiw" title="commons:Category:Authentication">Commons</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><style data-mw-deduplicate="TemplateStyles:r1038841319">.mw-parser-output .tooltip-dotted{border-bottom:1px dotted;cursor:help}</style></div><div role="navigation" class="navbox authority-control" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a>: National <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q212108#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://id.loc.gov/authorities/sh85009783">United States</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://catalogue.bnf.fr/ark:/12148/cb11976657c">France</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://data.bnf.fr/ark:/12148/cb11976657c">BnF data</a></span></li><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="認証 (コンピュータ)"><a rel="nofollow" class="external text" href="https://id.ndl.go.jp/auth/ndlna/01209225">Japan</a></span></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="http://olduli.nli.org.il/F/?func=find-b&local_base=NLX10&find_code=UID&request=987007295743005171">Israel</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐rbglq Cached time: 20241122140409 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 0.691 seconds Real time usage: 0.829 seconds Preprocessor visited node count: 2521/1000000 Post‐expand include size: 95234/2097152 bytes Template argument size: 1952/2097152 bytes Highest expansion depth: 12/100 Expensive parser function count: 7/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 134655/5000000 bytes Lua time usage: 0.478/10.000 seconds Lua memory usage: 24527317/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 722.155 1 -total 40.22% 290.432 1 Template:Reflist 15.55% 112.264 1 Template:Langx 14.64% 105.705 2 Template:Navbox 13.26% 95.735 1 Template:Information_security 12.04% 86.973 1 Template:Citation 9.33% 67.359 11 Template:Cite_journal 9.31% 67.205 1 Template:Short_description 8.82% 63.724 10 Template:Cite_web 5.55% 40.106 2 Template:Pagetype --> <!-- Saved in parser cache with key enwiki:pcache:idhash:47967-0!canonical and timestamp 20241122140409 and revision id 1255787232. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Authentication&oldid=1255787232">https://en.wikipedia.org/w/index.php?title=Authentication&oldid=1255787232</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Authentication" title="Category:Authentication">Authentication</a></li><li><a href="/wiki/Category:Access_control" title="Category:Access control">Access control</a></li><li><a href="/wiki/Category:Applications_of_cryptography" title="Category:Applications of cryptography">Applications of cryptography</a></li><li><a href="/wiki/Category:Computer_access_control" title="Category:Computer access control">Computer access control</a></li><li><a href="/wiki/Category:Notary" title="Category:Notary">Notary</a></li><li><a href="/wiki/Category:Packaging" title="Category:Packaging">Packaging</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:CS1_maint:_others" title="Category:CS1 maint: others">CS1 maint: others</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Articles_containing_Greek-language_text" title="Category:Articles containing Greek-language text">Articles containing Greek-language text</a></li><li><a href="/wiki/Category:All_articles_with_specifically_marked_weasel-worded_phrases" title="Category:All articles with specifically marked weasel-worded phrases">All articles with specifically marked weasel-worded phrases</a></li><li><a href="/wiki/Category:Articles_with_specifically_marked_weasel-worded_phrases_from_December_2016" title="Category:Articles with specifically marked weasel-worded phrases from December 2016">Articles with specifically marked weasel-worded phrases from December 2016</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_December_2016" title="Category:Articles with unsourced statements from December 2016">Articles with unsourced statements from December 2016</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 6 November 2024, at 17:47<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Authentication&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-b49cm","wgBackendResponseTime":199,"wgPageParseReport":{"limitreport":{"cputime":"0.691","walltime":"0.829","ppvisitednodes":{"value":2521,"limit":1000000},"postexpandincludesize":{"value":95234,"limit":2097152},"templateargumentsize":{"value":1952,"limit":2097152},"expansiondepth":{"value":12,"limit":100},"expensivefunctioncount":{"value":7,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":134655,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 722.155 1 -total"," 40.22% 290.432 1 Template:Reflist"," 15.55% 112.264 1 Template:Langx"," 14.64% 105.705 2 Template:Navbox"," 13.26% 95.735 1 Template:Information_security"," 12.04% 86.973 1 Template:Citation"," 9.33% 67.359 11 Template:Cite_journal"," 9.31% 67.205 1 Template:Short_description"," 8.82% 63.724 10 Template:Cite_web"," 5.55% 40.106 2 Template:Pagetype"]},"scribunto":{"limitreport-timeusage":{"value":"0.478","limit":"10.000"},"limitreport-memusage":{"value":24527317,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-rbglq","timestamp":"20241122140409","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Authentication","url":"https:\/\/en.wikipedia.org\/wiki\/Authentication","sameAs":"http:\/\/www.wikidata.org\/entity\/Q212108","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q212108","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2002-04-06T14:53:58Z","dateModified":"2024-11-06T17:47:08Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/6\/69\/ATMUser.140209.jpg","headline":"act of confirming the truth of an attribute of a datum or entity, often used as part of access control"}</script> </body> </html>