- voice print authentication
- Вычислительная техника: идентификация по образцу голоса
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Electronic authentication — (E authentication) is the process of establishing confidence in user identities electronically presented to an information system. E authentication presents a technical challenge when this process involves the remote authentication of individual… … Wikipedia
Interactive voice response — IVR redirects here. For other uses, see IVR (disambiguation). Interactive voice response (IVR) is a technology that allows a computer to interact with humans through the use of voice and DTMF keypad inputs. In telecommunications, IVR allows… … Wikipedia
Speaker recognition — Voice recognition redirects here. For software that converts speech to text, see Speech recognition. Speaker recognition is the computing task of validating a user s claimed identity using characteristics extracted from their voices. There is a… … Wikipedia
Technical features new to Windows Vista — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Biometrics — For the academic journal of statistics in biology, see Biometrics (journal). For the application of statistics to topics in biology, see Biostatistics. At Walt Disney World, biometric measurements are taken from the fingers of guests to ensure… … Wikipedia
Liste der standardisierten Ports — Die folgende Liste enthält die Zuordnung von Ports zu Protokollen, die von der IANA standardisiert wurden. Eine vollständige Liste kann unter Unixoiden Betriebssystemen in der Datei /etc/services eingesehen werden. Inhaltsverzeichnis 1 Legende 2… … Deutsch Wikipedia
Список портов TCP и UDP — Эта статья содержит незавершённый перевод с английского языка. Вы можете помочь проекту, переведя её до конца. В данной статье приведён список портов TCP и UDP, ко … Википедия
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Features removed from Windows Vista — While Windows Vista contains many new features, a number of capabilities and certain programs that were a part of Windows XP are no longer present or changed, resulting in the removal of certain functionality. The following is a list of features… … Wikipedia
List of computing and IT abbreviations — This is a list of computing and IT acronyms and abbreviations. Contents: 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y … Wikipedia
Internet — This article is about the public worldwide computer network system. For other uses, see Internet (disambiguation). Tree of routing paths through a portion of the Internet as visualized by the … Wikipedia