Examples of using Authentication system in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
Role-based authentication System.
Authentication system using challenge- response.
Mobile biometric authentication system.
The authentication system was based on Kerberos, and the authorization system based on Access Control Lists(ACLs).
Face ID replaces the Touch ID authentication system.
Kerberos is a network authentication system based on the principal of a trusted third party.
The GÉANT community includes 40 partners from across Europe, the IT systems of which shouldbe accessible using the community-developed federated authentication system.
Face ID is a powerful and secure authentication system that's incredibly easy and intuitive to use.
This solution applies RFID technology to wine and other containers with caps, and realizesthe anti-counterfeiting of commodities through the bottle structure design and background authentication system.
In addition,“3-D Secure” is an identity authentication system for the card owners in online medium.
The IMI authentication system is an advanced version of single factorauthentication as it combines a user name and password with a PIN.
The access points should develop into a network with an authentication system that is valid in the whole European Union territory.
Adobe's authentication system of record, which cryptographically hashes and salts customer passwords, was not the source of the database that was taken.
The Fijitsu Palmsecure is a palm-vein based authentication system that utilizes the latest in Biometric Security Technology.
In addition there is technical data used to identify participants in the system, which in some cases can contain personal information,such as email address or EU Login(European Commission user authentication system) ID;
For example,you could send the unique IDs generated by your own authentication system to Analytics as values for User-ID.
With this, features like user authentication system, which notifies users to provide details before printing, can easily be incorporated into the software.
Crooks also don't shy away from mounting more traditional brute-force attacks when they get the chance, which is why,when Checkmarx's researchers started their investigation into SoundCloud's authentication system, one of their first tasks was to see whether the streaming platform's users were protected against this sort of activities.
The European Commission Authentication System(ECAS) is one such tool and is already used by a growing number of IT services including the European e-Justice portal and CIRCABC8.
Due to its flexibility,the Electra system can be connected to any token-based authentication system. Currently, it has an existing connection to the Vasco system. .
In Phase II, there will be a single registration and authentication system available at EU level that will harmonise the method to on-board users and give them easy access to digital services.
The direct costs would be marginal andrelate to the re-configuring of the user authentication system from the geo-blocking approach to the temporary access approach.
(f12)‘conditional access system' means any technical measure, ð authentication system ï and/or arrangement whereby access to a protected radio or television broadcasting service in intelligible form is made conditional upon subscription or other form of prior individual authorisation;
Nu go into details because I use Kubuntu/ KDE4,and probably differs from kiwi authentication system, but most should be to find an option which allows login without asking password.
The palm vein device by Fujitsu is an authentication system that utilizes the latest in biometric security technology.
All analytics data communication is encrypted via SSL protocol. The analytical reports generated by Europa Analytics canonly be accessed through the European Commission Authentication System(ECAS) by European institution staff or by duly authorised external sub-contractors, who may be required to analyse, develop and/or maintain certain sites.
The CRIS access procedure uses both the ECAS authentication system and the‘Commission Enterprise Directory' group membership-based authorisation system. .
The analytical reports generated byEEA Matomo can only be accessed through the Eionet User Directory authentication system to EEA staff, other relevant EU's institution staff or by duly authorised external sub-contractors, who may be required to analyse, develop and/or regularly maintain certain sites.
The analytical reports generated by Europa Analytics canonly be accessed through the European Commission Authentication System(ECAS) by authorised Commission staff dealing with Piwik, the relevant European institution staff or by duly authorised external sub-contractors, who may be required to analyse, develop and/or regularly maintain certain sites.