authentication\ procedure

authentication\ procedure
процедура аутентификации. Заключается в проверке истинности идентификатора абонента.

Англо-русский cловарь терминов и сокращений по мобильной радиосвязи стандарта GSM. 2013.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "authentication\ procedure" в других словарях:

  • Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… …   Wikipedia

  • Authentication Authorization Accounting — Protocole AAA En sécurité informatique, AAA correspond à un protocole qui réalise trois fonctions : l authentification, l autorisation, et la traçabilité (en Anglais : Authentication, Authorization, Accounting/Auditing). AAA est un… …   Wikipédia en Français

  • CAVE-based Authentication — Articleissues context = September 2008 deadend = September 2008 intromissing = September 2008 jargon = September 2008 unreferenced = September 2008 wikify = September 2008 CAVE based Authentication a.k.a. HLR Authentication, 2G Authentication,… …   Wikipedia

  • Internet Authentication Service — (IAS) is a component of Windows Server operating systems that provides centralized user authentication and authorization, auditing and accounting. Overview While Routing and Remote Access (RRAS) security is sufficient for small networks, larger… …   Wikipedia

  • Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… …   Wikipedia

  • E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… …   Wikipedia

  • Extensible Authentication Protocol — Pour les articles homonymes, voir EAP. Extensible Authentication Protocol (EAP) est un mécanisme d identification universel, fréquemment utilisé dans les réseaux sans fil (ex : de type Wi Fi) et les liaisons point à point. Sommaire 1… …   Wikipédia en Français

  • Federal Rules of Civil Procedure — The Federal Rules of Civil Procedure (FRCP) are rules governing civil procedure in United States district (federal) courts, that is, court procedures for civil suits. The FRCP are promulgated by the United States Supreme Court pursuant to the… …   Wikipedia

  • Protected Extensible Authentication Protocol — Protected Extensible Authentication Protocol, Protected EAP, ou plus simplement PEAP, est une méthode de transfert sécurisée d informations d authentification, créée au départ pour les réseaux sans fil. Ce protocole a été développé conjointement… …   Wikipédia en Français

  • Open Network Computing Remote Procedure Call — (ONC RPC) is a widely deployed remote procedure call system. ONC was originally developed by Sun Microsystems as part of their Network File System project, and is sometimes referred to as Sun ONC or Sun RPC. ONC is considered lean and mean , but… …   Wikipedia

  • Attaque par relais — Une attaque par relais, connu en anglais sous le nom de relay attack, est un type d attaque informatique, similaire à l attaque de l homme du milieu et l attaque par rejeu, dans lequel un attaquant ne fait que relayer mot pour mot un message d un …   Wikipédia en Français


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»