Tags » Authentication

Authenticating records is crucial to reliability on electronic documents

Demonstrating authenticity of electronic records is becoming as important as capturing and maintaining electronic content. Questions have been arising in lawsuits and criminal prosecutions about whether electronic records are reliable and trustworthy. 232 more words

Document Management

Web.py Tutorial - Facebook Authentication

This is a rehash of the old tutorial after the update in the documentation.

Facebook is one of the most widely used authentication system, used especially to reduce the hassle of signing up for a new application. 368 more words

Web Dev

Lessons from China's Counterfeit Crackdown

Authenticity begins to trump price in the nation’s online marketplaces

Please note, this article originally appeared on Bloomberg Business as written by Bruce Einhorn. To see the article in it’s original form, 664 more words

Authentication

Google reportedly launching native fingerprint authentication w/ Android 'M'

Google is set to launch Android ‘M’ at Google I/O next week, and now a new report from BuzzFeed News suggests that the company will be launching native fingerprint authentication features with the new version… 205 more words

Android

Identification as the Objective for Designers

Why do system designers insist on bugging us to logon every time we want to do anything?

In this blog, I’d like to pivot on the “IDAM/ICAM Industry” core premise that establishing the Identity of the person/non-person and Authentication are the objectives of most online systems. 315 more words

Authentication

How your next password could be your brain

It’s time to put another body part through the biometrics wringer in the ongoing quest to replace passwords.

This time, it’s your brain.

Specifically, researchers have been looking at how your brain responds to certain acronyms. 625 more words

Featured

Apple Watch lets nimble-fingered crooks use your Apple Pay

As the sleeve-tattooed among us already know, Apple Watch needs nice, clear access to skin.

As long as it’s got that contact, it won’t pester users to re-enter their passcode every time they want to use an app like, say, Apple Pay. 418 more words

Featured