Examples of 'authentication data' in a sentence

Meaning of "authentication data"

authentication data - information or credentials used to verify the identity of a user or system

How to use "authentication data" in a sentence

Basic
Advanced
authentication data
Authentication data in silos can not be merged.
Receiving step of the second authentication data.
Authentication data comparison criteria for this algorithm.
Use a wallet to store authentication data.
Type in your authentication data necessary to open the image.
Insufficient credentials to access authentication data.
The whole authentication data thing.
The first four characters of the authentication data.
Identification and authentication data such as a specimen signature.
Payment account information may also be used as authentication data.
The authentication data request shall include a user identity.
The result is placed in the authentication data field.
The initial authentication data can be sufficient for authorization.
The second data is intended to be valid or genuine authentication data.
The authentication data may include a secret cryptographic key.

See also

User account or authentication data.
Sensitive authentication data must never be stored after authorization.
The latter simply can not forget or lose authentication data.
This is done using authentication data securely stored the device.
You are responsible for maintaining the confidentiality of your information and authentication data.
Waiting for authentication data.
These authentication data are required for authenticating the user terminals.
Sending the request to provide authentication data via the second network.
The authentication data will be stored in order to document your authorization.
Enter your authentication data.
Authentication data is transmitted from the mobile device over a secondary channel.
The authentication centre contains subscriber authentication data and authentication algorithms.
The second authentication data may be sent to the second domain.
That button will clear all cached authentication data from the.
Processing the authentication data to determine whether the mobile device is a trusted device.
The application of truncation limits the number of possible different biometric authentication data.
Do not store sensitive authentication data after authorization even if encrypted.
Means for including said transaction identifier in the request to provide authentication data.
This or these reference authentication data are used during authentication of the user.
Both web sites are thus involved in user authentication using the authentication data.
This ensures that the authentication data received is that of the document.
Fingerprints can also be useful when automating the exchange or storage of key authentication data.
Comparison step of the first authentication data and the second authentication data.
The authentication data is processed to determine whether the mobile device is a trusted device.
The authentication center stores subscriber related authentication data and authentication algorithms.
The authentication data field is extracted before zeroing out to calculate the hash.
Comparison step that compares the first authentication data and second authentication data.
The authentication data and the user accounts are managed in centralized manner by the server.
A first node receives from a network node authentication data unique to the first node.
The authentication data is transferred with the application program from an SD.
A user receiving the advertisement then needs to request authentication data and the siblings.
The length of the authentication data field is dependent on the hash algorithm used.
The count value indicates the number of times the dynamic authentication data has been updates.
Do not store sensitive authentication data once the card authorization process has been completed.
XML based standard to exchanging authentication data.

You'll also be interested in:

Examples of using Data
Select the data to display on that line
There is also evidence based on modelling data
Data on these populations are often not available
Show more
Examples of using Authentication
Authentication between vehicle units and cards
Electronic signature and authentication methods continued
Authentication of internet sites and digital identities
Show more

Search by letter in the English dictionary