The graphical identification and authentication (GINA) is a component of Windows NT 3.51, Windows NT 4.0, Windows 2000, Windows XP and Windows Server 2003...
7 KB (790 words) - 10:48, 26 September 2023
conjunction with the United States Department of Defense Graphical identification and authentication, dynamic-link library (DLL) G.I.N.A, album by Amerado...
1 KB (209 words) - 02:21, 2 December 2024
Password (category Password authentication)
identifiers). Requiring more than one authentication system, such as two-factor authentication (something a user has and something the user knows). Using encrypted...
79 KB (9,039 words) - 00:46, 1 May 2025
One-time password (category Password authentication)
traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password...
26 KB (3,542 words) - 04:05, 7 February 2025
Copy detection pattern (redirect from Graphical code)
item authentication applications: As a means of providing a product authentication service using the Internet of Things. For securing identification documents...
16 KB (1,729 words) - 05:23, 11 March 2025
Fingerprint (redirect from Fingerprint authentication)
applications. Fingerprint scanners could be used for login authentication and the identification of computer users. However, some less sophisticated sensors...
112 KB (12,076 words) - 22:05, 15 March 2025
Shoulder surfing (computer security) (section Comparison of risks between alphanumeric and graphical passwords)
observation attacks, in which authentication information is obtained by a person who is directly monitoring the authentication sequence, and recording attacks, in...
16 KB (2,075 words) - 21:16, 28 January 2025
from being able to hijack them. Graphical identification and authentication (GINA), used for secure authentication and interactive logon has been replaced...
45 KB (5,802 words) - 12:27, 25 November 2024
The automatic identification system (AIS) is an automatic tracking system that uses transceivers on ships and is used by vessel traffic services (VTS)...
90 KB (11,133 words) - 15:14, 14 March 2025
Smudge attack (section Multi-touch authentication with Touch with Fingers Straight and Together (TSFT))
A new proposed authentication method called Fractal-Based Authentication Technique (FBAT) uses Sierpinski’s Triangle to authenticate users. This process...
52 KB (6,842 words) - 09:30, 21 September 2024
server-side authentication - typically used when authenticating to a web server using a password. The latter is termed client-side authentication - sometimes...
35 KB (4,119 words) - 04:22, 26 March 2025
Flipper Zero (category Radio-frequency identification)
and emulation of RFID chips such as those found in identification badges, using the built-in radio cloner to open garage doors, unlocking cars, and functioning...
27 KB (2,789 words) - 01:17, 30 April 2025
Proxy server (section Monitoring and filtering)
Intercepting also creates problems for HTTP authentication, especially connection-oriented authentication such as NTLM, as the client browser believes...
47 KB (5,574 words) - 19:45, 18 April 2025
Cognitive password (category Password authentication)
A cognitive password is a form of knowledge-based authentication that requires a user to answer a question, presumably something they intrinsically know...
10 KB (1,273 words) - 03:38, 11 February 2025
opportunistic encryption and authenticated encryption may be supported, but did not make either server or client authentication mandatory. DNS over HTTPS...
69 KB (9,811 words) - 15:40, 28 April 2025
286—Intel 80286 processor 2B1Q—2 binary 1 quaternary 2FA—Two-factor authentication 2GL—second-generation programming language 2NF—second normal form 3GL—third-generation...
92 KB (6,587 words) - 22:31, 24 March 2025
integrity and non-repudiation of origin) ISO 9735-6:2002 Part 6: Secure authentication and acknowledgement message (message type – AUTACK) ISO 9735-7:2002 Part...
67 KB (9,553 words) - 13:02, 8 January 2025
Barcode (category Automatic identification and data capture)
1960s. Developed by General Telephone and Electronics (GTE) and called KarTrak ACI (Automatic Car Identification), this scheme involved placing colored...
92 KB (7,816 words) - 11:32, 22 April 2025
Seal (emblem) (redirect from Seal (authentication))
including an embossment on paper, and is also the impression thus made. The original purpose was to authenticate a document, or to prevent interference...
46 KB (5,743 words) - 04:15, 3 April 2025
– Wireless Terminal Authentication supplementary services ISO/IEC 15434:2006 Information technology – Automatic identification and data capture techniques...
75 KB (10,419 words) - 03:39, 27 April 2024
Fox Broadcasting Company (category Television channels and stations established in 1986)
breaks), and versions with "clean" end tags to allow stations to include local airtime and station information through graphical insertion and verbal continuity...
179 KB (21,133 words) - 00:57, 28 April 2025
Executable UML (section Model testing and execution)
"combines a subset of the UML (Unified Modeling Language) graphical notation with executable semantics and timing rules." The Executable UML method is the successor...
14 KB (1,782 words) - 06:16, 14 September 2024
Home Assistant (category Free and open-source Android software)
in custom integrations HACS, Font Awesome and others". Home Assistant. Retrieved 1 April 2021. "Authentication bypass Supervisor API". GitHub. Retrieved...
33 KB (3,269 words) - 20:18, 27 April 2025
Lock screen (category Graphical user interface elements)
There are various authentication methods to get past the lock screen, with the most popular and common ones being personal identification numbers (PINs)...
18 KB (1,914 words) - 12:25, 3 November 2024
Caldera International (category 2001 mergers and acquisitions)
included features it developed, such as an easy-to-use, graphical installer and graphical and web-based system administration tools, as well as features...
75 KB (7,717 words) - 12:33, 6 November 2024
using software, they are suitable for scenarios where graphical imagery is not appropriate, and they provide a much higher level of accessibility for...
38 KB (3,537 words) - 01:41, 25 April 2025
databases, identification, contamination and authentication. Researchers have been working on standardising sampling, extraction, data analysis and reporting...
74 KB (7,980 words) - 15:43, 11 April 2025
Stylometry (category Personal identification)
about the author short of a full identification. Authors may use adversarial stylometry to resist this identification by eliminating their own stylistic...
59 KB (6,675 words) - 05:08, 5 April 2025
Pattern recognition (redirect from Pattern Recognition and Learning)
identification and authentication: e.g., license plate recognition, fingerprint analysis, face detection/verification, and voice-based authentication...
35 KB (4,259 words) - 17:23, 25 April 2025
Systems engineering (redirect from Industrial and systems engineering)
safety, and systems engineering. It may involve such sub-specialties as authentication of system users, system targets, and others: people, objects, and processes...
56 KB (5,733 words) - 23:48, 28 February 2025