Through serialization, track and trace codes and mobile phone technology, they have come up with a highly scalable, easy to implement and deploy technology to authenticate drugs to help stop the flow of counterfeit drugs and ensure consumers are taking the real thing.
FORBES: PharmaSecure Uses Mobile Device And ID Codes To Take On Counterfeit Drug Problem
Set top boxes for satellite and cable also use a hardware module to authenticate devices and bind them to subscribers.
They can then use a VeriSign certificate to authenticate themselves for the purpose of exchanging encryption keys used to secure Internet connections.
Census also will team with a certificate authority to authenticate the Census Web site so that citizens know they are connected to the legitimate Census site and not another site designed to mimic it, he said.
CNN: Census Bureau will allow millions of citizens to file census forms online
"We have to find a way to not only have better control over who we receive e-mail from, but also to authenticate or trace the e-mail, " says an executive for a major brokerage firm, who asked not to be named.
We allow users to authenticate their profiles, via Facebook or Twitter or their mobile phones.
If you try using a different device, a special procedure kicks in to authenticate you.
FORBES: An European In New York - A Story Of Convenience Versus Security
He cannot use Facebook as a defacto web passport to authenticate his identity on other sites.
FORBES: Related Stories Made One Writer Quit Facebook And Why Many More May Unbundle Soon
Attempts to admit such evidence raise a number of questions, including how to authenticate ESI as admissible.
More important, however, the court provided useful guidance for practitioners who need to authenticate social media-based ESI.
No one worried about a way to authenticate where a message had begun or who had sent it.
Certificate attacks will be with us as long as MD5 based certificates are used to authenticate critical systems.
FORBES: Flame's MD5 collision is the most worrisome security discovery of 2012
Today, Cerf lamented, the Internet does little to authenticate either servers, like those that host Web sites, or users themselves.
In order to successfully discipline players based on the records, witnesses would be needed to authenticate them, the official said.
"Operators have been focusing on how to authenticate the user, and on securing the transfer of information through encryption, " he says.
Unlike some other mail encryption utilities such as SigabaSecure, introduced last week, Disappearing Email doesn't attempt to authenticate the recipient's identity.
Vetted art fairs, where art works on sale have to go through strict vetting procedures to authenticate them, are another good bet.
FORBES: Jackson Pollock or Not? Avoiding Fakes in the Art World
After suspicions were raised about his credibility, skeptical investigative South African journalists set out to authenticate his claims and dig deep into his story.
FORBES: Fake South African Billionaire Arrested For Fraud, Homicide Charges
"We urgently need to start reinforcing the system that is currently used to authenticate and identify secure websites and e-mail systems, " said Mr Eckersley.
To file over the Internet, users will need 128-bit encryption software as well as a legitimate identification number located on the census form itself to authenticate the user.
The pontiff described the cloth as an "icon" or an image but was careful not to authenticate as a genuine relic, the BBC's David Willey in Rome reports.
However, he did say that the bureau will rely on browser-based encryption and a user identification number found on each of the census short forms to authenticate users.
CNN: Census Bureau will allow millions of citizens to file census forms online
He said if the engines are able to be brought to the surface and a serial number can be found, it would be easy to authenticate the find.
CNN: Amazon chief plans to recover Apollo engines from seafloor
At the time, efforts to authenticate the e-mails were unsuccessful.
FORBES: South Carolina newspaper waited six months to take Mark & Maria love e-mails public
For example, security of an endpoint device becomes less of a risk management factor if data is protected and authorized users must authenticate their identities to gain access to it.
Finding his glove is a long shot: Vintage gloves, according to David Kohler, have been historically hard to authenticate, because they were rarely made for specific players in those days.
With the recent discovery of Richard III in a Leicester parking lot and the epic investigation to authenticate the deposed king, we are reminded of the importance of personal identity.
FORBES: King Richard III: Villain, Hero, Or Tragic Victim Of Identity Theft?
To authenticate a key, it is placed in the USB slot at the front of the device and the "Copy" button is held in until the MyDitto emits a beep to start the process.
Wells Fargo looks at multiple factors to authenticate users including name and password, a token in some cases, behavior such as the IP address the user comes in from and what he wants to do.
FORBES: Wells Fargo Goes DIY In Building Business Banking Services
The patent application also explains that the streaming playback could be adjusted based on the type of communications network, and that there would naturally be various means to authenticate your device and ensure that you actually own the music you're streaming.
ENGADGET: Apple patent application suggests partial storage of music to speed up streaming
应用推荐