GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||||
---|---|---|---|---|---|---|
|
13:25 Feb 7, 2018 |
English to Portuguese translations [PRO] Tech/Engineering - Internet, e-Commerce | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: Matheus Chaud Brazil Local time: 09:40 | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
4 +6 | proteção por token |
| ||
4 +1 | proteção via token |
| ||
4 | proteção token |
|
proteção via token Explanation: Sug. Explicação: https://m.tecmundo.com.br/amp/senha/3077-o-que-e-token-.htm |
| |
Login to enter a peer comment (or grade) |
token protection proteção por token Explanation: Nas vezes que pesquisei, nunca achei nenhuma tradução consagrada e o mais habitual é deixar o termo em inglês mesmo. O que é token, neste contexto: https://en.wikipedia.org/wiki/Security_token Security tokens are physical devices used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password. It acts like an electronic key to access something. Examples include a wireless keycard opening a locked door, or in the case of a customer trying to access their bank account online, the use of a bank provided token can prove that the customer is who they claim to be. Some tokens may store cryptographic keys, such as a digital signature, or biometric data, such as fingerprint details. Some may also store passwords.[1] Some designs\tamper resistant packaging, while others may include small keypads to allow entry of a PIN or a simple button to start a generating routine with some display capability to show a generated key number. Special designs include a USB connector, RFID functions or Bluetooth wireless interface to enable transfer of a generated key number sequence to a client system. |
| |
Grading comment
| ||