authenticate

[aw-then-ti-keyt]
verb (used with object), authenticated, authenticating.
1.
to establish as genuine.
2.
to establish the authorship or origin of conclusively or unquestionably, chiefly by the techniques of scholarship: to authenticate a painting.
3.
to make authoritative or valid.

Origin:
1565–75; < Medieval Latin authenticātus made authentic (past participle of authenticāre). See authentic, -ate1

authenticatable, adjective
authentication, noun
nonauthenticated, adjective
nonauthentication, noun
reauthenticate, verb (used with object), reauthenticated, reauthenticating.
reauthentication, noun
self-authenticating, adjective
unauthenticated, adjective
well-authenticated, adjective


1. confirm, validate, substantiate.
Dictionary.com Unabridged
Based on the Random House Dictionary, © Random House, Inc. 2014.
Cite This Source Link To authentication
Collins
World English Dictionary
authenticate (ɔːˈθɛntɪˌkeɪt)
 
vb
1.  to establish as genuine or valid
2.  to give authority or legal validity to
 
authenti'cation
 
n
 
au'thenticator
 
n

Collins English Dictionary - Complete & Unabridged 10th Edition
2009 © William Collins Sons & Co. Ltd. 1979, 1986 © HarperCollins
Publishers 1998, 2000, 2003, 2005, 2006, 2007, 2009
Cite This Source
Etymonline
Word Origin & History

authenticate
1650s, "verify, establish the credibility of," from M.L. authenticatus, pp. of authenticare, from authenticus (see authentic). Authentication (1788).
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
FOLDOC
Computing Dictionary

authentication definition

security
The verification of the identity of a person or process. In a communication system, authentication verifies that messages really come from their stated source, like the signature on a (paper) letter. The most common form of authentication is typing a user name (which may be widely known or easily guessable) and a corresponding password that is presumed to be known only to the individual being authenticated. Another form of authentication is biometrics.
(2007-02-22)

The Free On-line Dictionary of Computing, © Denis Howe 2010 http://foldoc.org
Cite This Source
Example sentences
Newer models employ challenge-response authentication over radio frequency and
  are considered much more secure.
Before forensics, the standard process of authentication involved establishing
  provenance.
Our authentication systems could be authenticating programs infected with
  malware.
Alternately the authors could be given the option of removing their own
  duplicates with a simple authentication routine.
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
  • Please Login or Sign Up to use the Recent Searches feature
FAVORITES
RECENT

;