Token Authentication definition

Token Authentication means requiring use of a physical device in addition to a password or personal identification number ("PIN" number) in order to access and use an electronic notarization system. Physical devices used in token authentication technologies include magnetic cards or "smart cards" and Universal Serial Bus (USB) memory sticks or "USB keys".
Token Authentication means authentication through the use of a challenge system where a user must enter a response to the challenge provided by the token device — usually a numerical sequence.
Token Authentication means proving the identity of a user by requiring the user to use a physical device in addition to a password or personal identification number ("PIN" number) in order to access and use an electronic notarization system. Note: Examples of physical devices used in token authentication technologies include but are not limited to magnetic cards or "smart cards" and Universal Serial Bus (USB) memory sticks or "USB keys".

Examples of Token Authentication in a sentence

  • API Token Authentication New in version 3.0.Indico users may create API tokens with a custom name and scope.

  • Figure 10 – Token Authentication email Insert the token received (in this example: NPE5FBB5ABRQ) in the authentication form, then click “Confirm”.

  • The Committee voted 7-0 to present this package of consensus recommendations to the Commission on November 8, 1999.

  • To enable the user to also submit data or documents through GinnieNET, the user must be able to perform the SecurID Token Authentication Process in GinnieNET.

  • This is handled during the issuance lifecycle (see section 6)Unauthorized tokens will be detected as they lack valid identificationnumbers, or collide with another tokenActive Token Authentication: Optional – Requires a more complex key management in the tokens as well as in the rest of the system (host if online, controller if semi-offline).

  • Token Authentication System To ensure explicit consent, our model provides for the binding of tokens to devices.

  • Figure 9– Token Authentication form By accessing the email address you specified during registration (refer to paragraph 2.2.1), you will retrieve an e-mail, automatically generated by the system, containing a valid token.

  • Dealing firstly with the third point, the involvement of Mr Owston cannot be seen as an appeal against dismissal, particularly as it pre-dated the Claimant’s dismissal.

  • Like in Kerberos, on page 53, Token Authentication is a centrally managed authentication mechanism that authenticates peers using Magi’s Dynamic Name Service (MDNS).After authentication with the MDNS direct communication between two Magi peers is possible, but they must first obtain a session key from the MDNS.

  • Access to electronic notary signatures and electronic notary seals is to be protected by the use of a Biometric Authentication, Password Authentication, Token Authentication, or other form of authentication approved by the Secretary according to the Electronic Notary Public Act and this Chapter.

Related to Token Authentication

  • Multi-factor Authentication means controlling access to computers and other IT resources by requiring two or more pieces of evidence that the user is who they claim to be. These pieces of evidence consist of something the user knows, such as a password or PIN; something the user has such as a key card, smart card, or physical token; and something the user is, a biometric identifier such as a fingerprint, facial scan, or retinal scan. “PIN” means a personal identification number, a series of numbers which act as a password for a device. Since PINs are typically only four to six characters, PINs are usually used in conjunction with another factor of authentication, such as a fingerprint.

  • Strong Customer Authentication means an authentication based on the use of two or more elements categorised as knowledge (something only the user knows), possession (something only the user possesses) and inherence (something the user is) that are independent, in that the breach of one does not compromise the reliability of the others, and is designed in such a way as to protect the confidentiality of the authentication data;

  • Authenticating Agent means any Person authorized by the Trustee pursuant to Section 614 to act on behalf of the Trustee to authenticate Securities of one or more series.

  • Manual means a document or a set of documents that provide written instructions to staff of the Owner;

  • Private Placement Legend means the legend set forth in Section 2.06(g)(1) hereof to be placed on all Notes issued under this Indenture except where otherwise permitted by the provisions of this Indenture.

  • Global Security Legend means the legend set forth in Section 2.15(c), which is required to be placed on all Global Securities issued under this Indenture.