Authentication (from Greek : αὐθεντικός authentikos , "real, genuine", from αὐθέντης authentes , "author") is the act of proving an assertion , such as the identity of a computer system user. In contrast with identification , the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents , verifying the authenticity of a website with a digital certificate , determining the age of an artifact by carbon dating , or ensuring that a product or document is not counterfeit .
133-427: Authentication is relevant to multiple fields. In art , antiques , and anthropology , a common problem is verifying that a given artifact was produced by a certain person or in a certain place or period of history. In computer science , verifying a user's identity is often required to allow access to confidential data or systems. Authentication can be considered to be of three types: The first type of authentication
266-528: A social elite , though other forms of art may have been. Reproductive methods such as moulds made mass-production easier, and were used to bring high-quality Ancient Roman pottery and Greek Tanagra figurines to a very wide market. Cylinder seals were both artistic and practical, and very widely used by what can be loosely called the middle class in the Ancient Near East . Once coins were widely used, these also became an art form that reached
399-592: A "first-to-file" system, which grants rights to the first entity to register the mark. However, well-known trademarks are an exception, as they may receive protection even without registration. In contrast, a few countries, like the United States, Canada, and Australia, follow a "first-to-use" or hybrid system, where using the mark in commerce can establish certain rights, even without registration. However, registration in these countries still provides stronger legal protection and enforcement. For example, in
532-437: A PIN (something the user knows) provides two-factor authentication. Business networks may require users to provide a password (knowledge factor) and a pseudorandom number from a security token (ownership factor). Access to a very-high-security system might require a mantrap screening of height, weight, facial, and fingerprint checks (several inherence factor elements) plus a PIN and a day code (knowledge factor elements), but this
665-607: A South African cave. Containers that may have been used to hold paints have been found dating as far back as 100,000 years. The oldest piece of art found in Europe is the Riesenhirschknochen der Einhornhöhle , dating back 51,000 years and made by Neanderthals. Sculptures, cave paintings , rock paintings and petroglyphs from the Upper Paleolithic dating to roughly 40,000 years ago have been found, but
798-462: A branch of philosophy known as aesthetics . The resulting artworks are studied in the professional fields of art criticism and the history of art . In the perspective of the history of art, artistic works have existed for almost as long as humankind: from early prehistoric art to contemporary art ; however, some theorists think that the typical concept of "artistic works" does not fit well outside modern Western societies. One early sense of
931-468: A broader definition of " the arts ". Until the 17th century, art referred to any skill or mastery and was not differentiated from crafts or sciences . In modern usage after the 17th century, where aesthetic considerations are paramount, the fine arts are separated and distinguished from acquired skills in general, such as the decorative or applied arts . The nature of art and related concepts, such as creativity and interpretation , are explored in
1064-444: A company or product. A trademark, by contrast, offers legal protection for a brand with enforceable rights over the brand's identity and distinguishing elements. Trademark law is designed to fulfill the public policy objective of consumer protection , by preventing the public from being misled as to the origin or quality of a product or service. By identifying the commercial source of products and services, trademarks facilitate
1197-544: A compelling solution, such as private keys encrypted by fingerprint inside of a USB device. In a computer data context, cryptographic methods have been developed which are not spoofable if the originator's key has not been compromised. That the originator (or anyone other than an attacker ) knows (or doesn't know) about a compromise is irrelevant. However, it is not known whether these cryptographically based authentication methods are provably secure, since unanticipated mathematical developments may make them vulnerable to attack in
1330-467: A competitor uses the same or a confusingly similar trademark for the same or similar products in a jurisdiction where the trademark is protected. This concept is recognized in many jurisdictions, including the United States, the European Union, and other countries, though specific legal standards may vary. To establish trademark infringement in court, the plaintiff generally must show: Trademark
1463-529: A concept determined by words. They furnish an aesthetic idea, which serves the above rational idea as a substitute for logical presentation, but with the proper function, however, of animating the mind by opening out for it a prospect into a field of kindred representations stretching beyond its ken. – Immanuel Kant Most scholars who deal with rock paintings or objects recovered from prehistoric contexts that cannot be explained in utilitarian terms and are thus categorized as decorative, ritual or symbolic, are aware of
SECTION 10
#17327718058721596-461: A decisive role in the meaning of a work of art, conveying the content or essential main idea, while all other interpretations can be discarded. It defines the subject as the persons or idea represented, and the content as the artist's experience of that subject. For example, the composition of Napoleon I on his Imperial Throne is partly borrowed from the Statue of Zeus at Olympia . As evidenced by
1729-630: A distinctive label or ticket'. In the United States , Congress first attempted to establish a federal trademark regime in 1870. This statute purported to be an exercise of Congress' Copyright Clause powers. However, the Supreme Court struck down the 1870 statute in the Trade-Mark Cases later on in the decade. In 1881, Congress passed a new trademark act, this time according to its Commerce Clause powers. Congress revised
1862-437: A generic product or service name. They should stand out from the surrounding text using capital letters, bold type, italics, color, underlining, quotation marks, or a unique stylized format. For example, say “LEGO® toy blocks” instead of “Lego’s.” A trademark may be designated by the following symbols: While ™ and ℠ apply to unregistered marks (™ for goods and ℠ for services), the ® symbol indicates official registration with
1995-427: A group of processes where the confidence for user identities is established and presented via electronic methods to an information system. The digital authentication process creates technical challenges because of the need to authenticate individuals or entities remotely over a network. The American National Institute of Standards and Technology (NIST) has created a generic model for digital authentication that describes
2128-609: A loss of rights in the trademark. It is still possible to make significant changes to the underlying goods or services during a sale without jeopardizing the trademark, but companies will often contract with the sellers to help transition the mark and goods or services to the new owners to ensure continuity of the trademark. Trademarks are often confused with patents and copyrights . Although all three laws protect forms of intangible property, collectively known as intellectual property (IP), they each have different purposes and objectives: Among these types of IP, only trademark law offers
2261-470: A means for readers to reliably authenticate that a given message originated from or was relayed by them. These involve authentication factors like: The opposite problem is the detection of plagiarism , where information from a different author is passed off as a person's own work. A common technique for proving plagiarism is the discovery of another copy of the same or very similar text, which has different attribution. In some cases, excessively high quality or
2394-407: A message, mood, or symbolism for the perceiver to interpret (art as experience). Art is something that stimulates an individual's thoughts, emotions, beliefs, or ideas through the senses. Works of art can be explicitly made for this purpose or interpreted on the basis of images or objects. For some scholars, such as Kant, the sciences and the arts could be distinguished by taking science as representing
2527-410: A popular brand's reputation. As mentioned above, having an item for sale in a reputable store implicitly attests to it being genuine, the first type of authentication. The second type of authentication might involve comparing the quality and craftsmanship of an item, such as an expensive handbag, to genuine articles. The third type of authentication could be the presence of a trademark on the item, which
2660-463: A positive authentication, elements from at least two, and preferably all three, factors should be verified. The three factors (classes) and some of the elements of each factor are: As the weakest level of authentication, only a single component from one of the three categories of factors is used to authenticate an individual's identity. The use of only one factor does not offer much protection from misuse or malicious intrusion. This type of authentication
2793-402: A sense of trained ability or mastery of a medium . Art can also refer to the developed and efficient use of a language to convey meaning with immediacy or depth. Art can be defined as an act of expressing feelings, thoughts, and observations. There is an understanding that is reached with the material as a result of handling it, which facilitates one's thought processes. A common view is that
SECTION 20
#17327718058722926-603: A solution that can be much more difficult to counterfeit than most other options while at the same time being more easily verified. Packaging and labeling can be engineered to help reduce the risks of counterfeit consumer goods or the theft and resale of products. Some package constructions are more difficult to copy and some have pilfer indicating seals. Counterfeit goods, unauthorized sales (diversion), material substitution and tampering can all be reduced with these anti-counterfeiting technologies. Packages may include authentication seals and use security printing to help indicate that
3059-405: A style mismatch may raise suspicion of plagiarism. In literacy, authentication is a readers’ process of questioning the veracity of an aspect of literature and then verifying those questions via research. The fundamental question for authentication of literature is – Does one believe it? Related to that, an authentication project is therefore a reading and writing activity in which students document
3192-526: A unique and characteristic style in its art. Because of the size and duration of these civilizations, more of their art works have survived and more of their influence has been transmitted to other cultures and later times. Some also have provided the first records of how artists worked. For example, this period of Greek art saw a veneration of the human physical form and the development of equivalent skills to show musculature, poise, beauty, and anatomically correct proportions. In Byzantine and Medieval art of
3325-464: A unique identity. For example, Pepsi® is a registered trademark associated with soft drinks, and the distinctive shape of the Coca-Cola® bottle is a registered trademark protecting Coca-Cola's packaging design. The primary function of a trademark is to identify the source of goods or services and prevent consumers from confusing them with those from other sources. Legal protection for trademarks
3458-635: A variable QR Code . A QR Code alone is easy to verify but offers a weak level of authentication as it offers no protection against counterfeits unless scan data is analyzed at the system level to detect anomalies. To increase the security level, the QR Code can be combined with a digital watermark or copy detection pattern that are robust to copy attempts and can be authenticated with a smartphone. A secure key storage device can be used for authentication in consumer electronics, network authentication, license management, supply chain management, etc. Generally,
3591-701: A whole. Trademark protection does not apply to utilitarian features of a product such as the plastic interlocking studs on Lego bricks. The earliest examples of use of markings date back to around 15,000 years ago in Prehistory . Similar to branding practices, the Lascaux cave paintings in France, for instance, depict bulls with marks, which experts believe may have served as personal marks to indicate livestock ownership. Around 6,000 years ago, Egyptian masonry featured quarry marks and stonecutters' signs to identify
3724-427: A wide spectrum of emotion due to beauty . Some art is meant to be practical, with its analysis studious, meant to stimulate discourse. Since ancient times, much of the finest art has represented a deliberate display of wealth or power, often achieved by using massive scale and expensive materials. Much art has been commissioned by political rulers or religious establishments, with more modest versions only available to
3857-624: A worthwhile experience, generally through the expression of emotional power, conceptual ideas , beauty , and/or technical proficiency. There is no generally agreed definition of what constitutes art , and its interpretation has varied greatly throughout history and across cultures. In the Western tradition, the three classical branches of visual art are painting , sculpture , and architecture . Theatre , dance , and other performing arts , as well as literature , music , film and other media such as interactive media , are included in
3990-493: Is "escalator," which was once a trademark. In contrast, patents have a fixed term, typically lasting 20 years from the filing date, after which the invention enters the public domain. Copyrights generally last for the life of the author plus an additional 50 to 70 years (depending on the jurisdiction), after which the protected work enters the public domain. Although intellectual property laws such as these are theoretically distinct, more than one type may afford protection to
4123-404: Is a legally protected marking, or any other identifying feature which aids consumers in the identification of genuine brand-name goods. With software, companies have taken great steps to protect from counterfeiters, including adding holograms, security rings, security threads and color shifting ink. The ways in which someone may be authenticated fall into three categories, based on what is known as
Authentication - Misplaced Pages Continue
4256-527: Is a matter of assembly of found objects. However, there are many modernist and contemporary artists who continue to excel in the skills of drawing and painting and in creating hands-on works of art. Art has had a great number of different functions throughout its history, making its purpose difficult to abstract or quantify to any single concept. This does not imply that the purpose of art is "vague", but that it has had many unique, different reasons for being created. Some of these functions of art are provided in
4389-496: Is a set of] artefacts or images with symbolic meanings as a means of communication. – Steve Mithen By contrast, the realistic attitude, inspired by positivism, from Saint Thomas Aquinas to Anatole France, clearly seems to me to be hostile to any intellectual or moral advancement. I loathe it, for it is made up of mediocrity, hate, and dull conceit. It is this attitude which today gives birth to these ridiculous books, these insulting plays. It constantly feeds on and derives strength from
4522-429: Is accepting proof of identity given by a credible person who has first-hand evidence that the identity is genuine. When authentication is required of art or physical objects, this proof could be a friend, family member, or colleague attesting to the item's provenance, perhaps by having witnessed the item in its creator's possession. With autographed sports memorabilia, this could involve someone attesting that they witnessed
4655-474: Is an essential step of the art process. According to education journals, the reflection of art is considered an essential part of the experience. However an important aspect of art is that others may view and appreciate it as well. While many focus on whether those viewing/listening/etc. believe the art to be good/successful or not, art has profound value beyond its commercial success as a provider of information and health in society. Art enjoyment can bring about
4788-414: Is established by known individuals signing each other's cryptographic key for instance. The second type of authentication is comparing the attributes of the object itself to what is known about objects of that origin. For example, an art expert might look for similarities in the style of painting, check the location and form of a signature, or compare the object to an old photograph. An archaeologist , on
4921-435: Is inherently distinctive (able to identify and distinguish a single source of goods or services), often falling into categories such as suggestive, fanciful, or arbitrary, and is therefore registerable. In contrast, weak trademarks tend to be either descriptive or generic and may not be registerable. The registration process typically begins with a trademark clearance search to identify potential conflicts that could prevent
5054-459: Is natural to mankind and constitutes one of mankind's advantages over animals. The more recent and specific sense of the word art as an abbreviation for creative art or fine art emerged in the early 17th century. Fine art refers to a skill used to express the artist's creativity, or to engage the audience's aesthetic sensibilities, or to draw the audience towards consideration of more refined or finer works of art. Within this latter sense,
5187-422: Is not recommended for financial or personally relevant transactions that warrant a higher level of security. Multi-factor authentication involves two or more authentication factors (something you know, something you have, or something you are). Two-factor authentication is a special case of multi-factor authentication involving exactly two factors. For example, using a bank card (something the user has) along with
5320-609: Is now more appropriate to think in terms of a global culture, rather than of regional ones. In The Origin of the Work of Art , Martin Heidegger, a German philosopher and seminal thinker, describes the essence of art in terms of the concepts of being and truth. He argues that art is not only a way of expressing the element of truth in a culture, but the means of creating it and providing a springboard from which "that which is" can be revealed. Works of art are not merely representations of
5453-562: Is one of the most vivid examples of this interaction. The meeting of different cultures and worldviews also influenced artistic creation. An example of this is the multicultural port metropolis of Trieste at the beginning of the 20th century, where James Joyce met writers from Central Europe and the artistic development of New York City as a cultural melting pot. The creative arts are often divided into more specific categories, typically along perceptually distinguishable categories such as media , genre, styles , and form. Art form refers to
Authentication - Misplaced Pages Continue
5586-503: Is required to act as the "basic mark." In the international application, the trademark owner can designate one or more Madrid System Member countries for protection. Each designated country’s trademark office will review the Madrid application under its local laws to grant or refuse protection. In the United States, for example, a trademark must first be registered or pending with the U.S. Patent and Trademark Office (USPTO) to serve as
5719-565: Is still a two-factor authentication. The United States government's National Information Assurance Glossary defines strong authentication as a layered authentication approach relying on two or more authenticators to establish the identity of an originator or receiver of information. The European Central Bank (ECB) has defined strong authentication as "a procedure based on two or more of the three authentication factors". The factors that are used must be mutually independent and at least one factor must be "non-reusable and non-replicable", except in
5852-466: Is subject to various defenses, such as abandonment, limitations on geographic scope , and fair use. In the United States, the fair use defense protects many of the interests in free expression related to those protected by the First Amendment . Fair use may be asserted on two grounds, either that the alleged infringer is using the mark to describe accurately an aspect of its products, or that
5985-470: Is supposed to be used only by those authorized must attempt to detect and exclude the unauthorized. Access to it is therefore usually controlled by insisting on an authentication procedure to establish with some degree of confidence the identity of the user, granting privileges established for that identity. Art Art is a diverse range of cultural activity centered around works by creative or imaginative talents, which are expected to induce
6118-421: Is the process of verifying that "you are permitted to do what you are trying to do". While authorization often happens immediately after authentication (e.g., when logging into a computer system), this does not mean authorization presupposes authentication: an anonymous agent could be authorized to a limited action set. One familiar use of authentication and authorization is access control . A computer system that
6251-463: Is the source of all true art and science. – Albert Einstein Jupiter's eagle [as an example of art] is not, like logical (aesthetic) attributes of an object, the concept of the sublimity and majesty of creation, but rather something else—something that gives the imagination an incentive to spread its flight over a whole host of kindred representations that provoke more thought than admits of expression in
6384-536: Is the view that all aesthetic properties of art are formal (that is, part of the art form). Philosophers almost universally reject this view and hold that the properties and aesthetics of art extend beyond materials, techniques, and form. Unfortunately, there is little consensus on terminology for these informal properties. Some authors refer to subject matter and content—i.e., denotations and connotations —while others prefer terms like meaning and significance. Extreme Intentionalism holds that authorial intent plays
6517-407: Is therefore beyond utility. Imitation, then, is one instinct of our nature. Next, there is the instinct for 'harmony' and rhythm, meters being manifestly sections of rhythm. Persons, therefore, starting with this natural gift developed by degrees their special aptitudes, till their rude improvisations gave birth to Poetry. – Aristotle The most beautiful thing we can experience is the mysterious. It
6650-670: Is typically secured through registration with governmental agencies, such as the United States Patent and Trademark Office (USPTO) or the European Union Intellectual Property Office (EUIPO). Registration provides the owner certain exclusive rights and provides legal remedies against unauthorized use by others. Trademark laws vary by jurisdiction but generally allow owners to enforce their rights against infringement, dilution, or unfair competition. International agreements, such as
6783-606: Is used to refer to both trademarks and service marks. Similarly, the World Intellectual Property Organization (WIPO) defines a trademark as a sign capable of distinguishing the goods or services of one enterprise from those of other enterprises. WIPO administers the Madrid Protocol , which allows trademark owners worldwide to file one application to register their trademark in multiple countries. Almost anything that identifies
SECTION 50
#17327718058726916-647: The Paris Convention and the Madrid Protocol , simplify the registration and protection of trademarks across multiple countries. Additionally, the TRIPS Agreement sets minimum standards for trademark protection and enforcement that all member countries must follow. The term trademark can also be spelled trade mark in regions such as the EU, UK, and Australia, and as trade-mark in Canada. Despite
7049-530: The Romantic period , art came to be seen as "a special faculty of the human mind to be classified with religion and science". A shell engraved by Homo erectus was determined to be between 430,000 and 540,000 years old. A set of eight 130,000 years old white-tailed eagle talons bear cut marks and abrasion that indicate manipulation by neanderthals, possibly for using it as jewelry. A series of tiny, drilled snail shells about 75,000 years old—were discovered in
7182-618: The elements of art that are independent of its interpretation or significance. It covers the methods adopted by the artist and the physical composition of the artwork, primarily non-semantic aspects of the work (i.e., figurae ), such as color , contour , dimension , medium , melody , space , texture , and value . Form may also include Design principles , such as arrangement, balance , contrast , emphasis , harmony , proportion , proximity , and rhythm. In general there are three schools of philosophy regarding art, focusing respectively on form, content, and context. Extreme Formalism
7315-431: The epithet art , particular in its elevated sense, requires a certain level of creative expertise by the artist, whether this be a demonstration of technical ability, an originality in stylistic approach, or a combination of these two. Traditionally skill of execution was viewed as a quality inseparable from art and thus necessary for its success; for Leonardo da Vinci , art, neither more nor less than his other endeavors,
7448-515: The rules of evidence often require establishing the chain of custody of evidence presented. This can be accomplished through a written evidence log, or by testimony from the police detectives and forensics staff that handled it. Some antiques are accompanied by certificates attesting to their authenticity. Signed sports memorabilia is usually accompanied by a certificate of authenticity. These external records have their own problems of forgery and perjury and are also vulnerable to being separated from
7581-624: The supply chain and educate consumers help ensure that authentic products are sold and used. Even security printing on packages, labels, and nameplates, however, is subject to counterfeiting. In their anti-counterfeiting technology guide, the EUIPO Observatory on Infringements of Intellectual Property Rights categorizes the main anti-counterfeiting technologies on the market currently into five main categories: electronic, marking, chemical and physical, mechanical, and technologies for digital media. Products or their packaging can include
7714-646: The "basic mark" necessary for Madrid filings. The trademark registration process with the USPTO generally follows these steps: Trademark owners seeking protection in multiple jurisdictions have two options: the Paris route, under the Paris Convention , or the Madrid System , which is administered by WIPO . The Paris route, covering 180 countries and also known as the "direct route," requires filing separate applications with each country’s IP office. In contrast,
7847-537: The 19th and 20th centuries the West has had huge impacts on Eastern art with originally western ideas like Communism and Post-Modernism exerting a powerful influence. Modernism , the idealistic search for truth, gave way in the latter half of the 20th century to a realization of its unattainability. Theodor W. Adorno said in 1970, "It is now taken for granted that nothing which concerns art can be taken for granted any more: neither art itself, nor art in relationship to
7980-429: The European Union requires "genuine use" of the mark within a continuous five-year period following registration to maintain the trademark, with non-use potentially resulting in revocation. The trademark owner must enforce their rights to preserve the trademark's distinctiveness , prevent trademark infringement, and avoid dilution. Enforcement after registration generally involves: Trademark infringement occurs when
8113-468: The Madrid System streamlines the process by allowing a single Madrid application, built on an existing or applied-for national or regional registration (the "basic mark"), to extend protection to up to 131 countries. Unlike patents and copyrights , which have fixed expiration dates, trademark registrations typically have an initial term of 10 years and can be renewed indefinitely, as long as
SECTION 60
#17327718058728246-502: The Mind of Someone Living follow this example. Emin slept (and engaged in other activities) in her bed before placing the result in a gallery as work of art. Hirst came up with the conceptual design for the artwork but has left most of the eventual creation of many works to employed artisans. Hirst's celebrity is founded entirely on his ability to produce shocking concepts. The actual production in many conceptual and contemporary works of art
8379-577: The Roman Empire. Other notable trademarks that have been used for a long time include Stella Artois , which claims use of its mark since 1366, and Löwenbräu , which claims use of its lion mark since 1383. The first trademark legislation was passed by the Parliament of England under the reign of King Henry III in 1266, which required all bakers to use a distinctive mark for the bread they sold. The first modern trademark laws emerged in
8512-528: The Trademark Act in 1905. The Lanham Act of 1946 updated the law and has served, with several amendments, as the primary federal law on trademarks. The Trade Marks Act 1938 in the United Kingdom set up the first registration system based on the "intent-to-use" principle. The Act also established an application publishing procedure and expanded the rights of the trademark holder to include
8645-492: The Trademark Electronic Search System (TESS) in 2023. A comprehensive clearance search involves checking the USPTO database for federally registered and applied-for trademarks, state trademark databases, and the internet to see if someone else has already registered that trademark or a similar one. The search should also include looking at both words and designs. To search for similar designs in
8778-486: The UK Patent Office for the first time. Registration was considered to comprise prima facie evidence of ownership of a trademark and registration of marks began on 1 January 1876. The 1875 Act defined a registrable trade mark as a device or mark, or name of an individual or firm printed in some particular and distinctive manner; or a written signature or copy of a written signature of an individual or firm; or
8911-400: The USPTO database, design search codes must be used. WIPO ’s Global Brand Database provides international access to trademarks and emblems. Trademark owners can either maintain protection at the national level or expand internationally through the Madrid System by building on their national registration. To pursue international protection, a national registration or pending application
9044-584: The United States, trademark rights are established either (1) through first use of the mark in commerce, creating common law rights limited to the geographic areas of use, or (2) through federal registration with the U.S. Patent and Trademark Office (USPTO), with use in commerce required to maintain the registration. Federal registration with the USPTO provides additional benefits, such as: Trademark law grants legal protection to "distinctive" trademarks, which are marks that allow consumers to easily associate them with specific products or services. A strong trademark
9177-608: The Upper Rhine region between 1400 and 1600, and on the art of the 19th to 21st centuries. Trademark A trademark (also written trade mark or trade-mark ) is a form of intellectual property that consists of a word, phrase, symbol, design, or a combination that identifies a product or service from a particular source and distinguishes it from others. Trademarks can also extend to non-traditional marks like drawings, symbols, 3D shapes like product designs or packaging, sounds, scents, or specific colors used to create
9310-510: The Western Middle Ages, much art focused on the expression of subjects about biblical and religious culture, and used styles that showed the higher glory of a heavenly world, such as the use of gold in the background of paintings, or glass in mosaics or windows, which also presented figures in idealized, patterned (flat) forms. Nevertheless, a classical realist tradition persisted in small Byzantine works, and realism steadily grew in
9443-459: The alleged infringer is using the mark to identify the mark owner. One of the most visible proofs that trademarks provide a limited right in the U.S. comes from the comparative advertising that is seen throughout U.S. media. An example of the first type is that although Maytag owns the trademark "Whisper Quiet" for its dishwashers, makers of other products may describe their goods as being "whisper quiet" so long as these products do not fall under
9576-742: The art of Catholic Europe . Renaissance art had a greatly increased emphasis on the realistic depiction of the material world, and the place of humans in it, reflected in the corporeality of the human body, and development of a systematic method of graphical perspective to depict recession in a three-dimensional picture space. In the east, Islamic art 's rejection of iconography led to emphasis on geometric patterns , calligraphy , and architecture . Further east, religion dominated artistic styles and forms too. India and Tibet saw emphasis on painted sculptures and dance, while religious painting borrowed many conventions from sculpture and tended to bright contrasting colors with emphasis on outlines. China saw
9709-491: The artifact and lost. In computer science, a user can be given access to secure systems based on user credentials that imply authenticity. A network administrator can give a user a password, or provide the user with a key card or other access devices to allow system access. In this case, authenticity is implied but not guaranteed. Consumer goods such as pharmaceuticals, perfume, and clothing can use all forms of authentication to prevent counterfeit goods from taking advantage of
9842-786: The authentication of these poses a problem. For instance, the son of Han van Meegeren , the well-known art-forger, forged the work of his father and provided a certificate for its provenance as well. Criminal and civil penalties for fraud , forgery , and counterfeiting can reduce the incentive for falsification, depending on the risk of getting caught. Currency and other financial instruments commonly use this second type of authentication method. Bills, coins, and cheques incorporate hard-to-duplicate physical features, such as fine printing or engraving, distinctive feel, watermarks, and holographic imagery, which are easy for trained receivers to verify. The third type of authentication relies on documentation or other external affirmations. In criminal courts,
9975-438: The barring of trademark use even in cases where confusion remained unlikely. This Act served as a model for similar legislation elsewhere. The oldest registered trademark has various claimants, enumerated below: Trademark protection can be acquired through registration and/or, in certain countries, through use. Globally, the most common method for establishing trademark rights is registration. Most countries operate under
10108-620: The case of an inherence factor and must also be incapable of being stolen off the Internet. In the European, as well as in the US-American understanding, strong authentication is very similar to multi-factor authentication or 2FA, but exceeding those with more rigorous requirements. The FIDO Alliance has been striving to establish technical specifications for strong authentication. Conventional computer systems authenticate users only at
10241-550: The city of Basel , in Switzerland , opened the first public museum of art in the world, the Kunstmuseum Basel . Today, its collection is distinguished by an impressively wide historic span, from the early 15th century up to the immediate present. Its various areas of emphasis give it international standing as one of the most significant museums of its kind. These encompass: paintings and drawings by artists active in
10374-482: The creative process into broad three steps, but there is no consensus on an exact number. In the first step, the artist envisions the art in their mind. By imagining what their art would look like, the artist begins the process of bringing the art into existence. Preparation of art may involve approaching and researching the subject matter. Artistic inspiration is one of the main drivers of art, and may be considered to stem from instinct, impressions, and feelings. In
10507-623: The culture portrayed (e.g., the language, clothing, food, gender roles), are believable for the period. Historically, fingerprints have been used as the most authoritative method of authentication, but court cases in the US and elsewhere have raised fundamental doubts about fingerprint reliability. Outside of the legal system as well, fingerprints are easily spoofable , with British Telecom 's top computer security official noting that "few" fingerprint readers have not already been tricked by one spoof or another. Hybrid or two-tiered authentication methods offer
10640-497: The definition of art is closely related to the older Latin meaning, which roughly translates to "skill" or "craft", as associated with words such as "artisan". English words derived from this meaning include artifact , artificial , artifice , medical arts , and military arts . However, there are many other colloquial uses of the word, all with some relation to its etymology . Over time, philosophers like Plato , Aristotle , Socrates and Immanuel Kant , among others, questioned
10773-598: The developing theory of post-structuralism studies art's significance in a cultural context, such as the ideas, emotions, and reactions prompted by a work. The cultural context often reduces to the artist's techniques and intentions, in which case analysis proceeds along lines similar to formalism and intentionalism. However, in other cases historical and material conditions may predominate, such as religious and philosophical convictions, sociopolitical and economic structures, or even climate and geography. Art criticism continues to grow and develop alongside art. Art can connote
10906-446: The device to be authenticated needs some sort of wireless or wired digital connection to either a host system or a network. Nonetheless, the component being authenticated need not be electronic in nature as an authentication chip can be mechanically attached and read through a connector to the host e.g. an authenticated ink tank for use with a printer. For products and services that these secure coprocessors can be applied to, they can offer
11039-413: The difference between fine art and applied art has more to do with value judgments made about the art than any clear definitional difference. However, even fine art often has goals beyond pure creativity and self-expression. The purpose of works of art may be to communicate ideas, such as in politically, spiritually, or philosophically motivated art; to create a sense of beauty (see aesthetics ); to explore
11172-595: The different spellings, all three terms denote the same concept. In the United States, the Lanham Act defines a trademark as any word, phrase, symbol, design, or combination of these things used to identify goods or services. Trademarks help consumers recognize a brand in the marketplace and distinguish it from competitors. A service mark , also covered under the Lanham Act, is a type of trademark used to identify services rather than goods. The term trademark
11305-686: The disapproval of Homer that he expresses in the Republic . The dialogue Ion suggests that Homer's Iliad functioned in the ancient Greek world as the Bible does today in the modern Christian world: as divinely inspired literary art that can provide moral guidance, if only it can be properly interpreted. With regards to the literary art and the musical arts, Aristotle considered epic poetry , tragedy, comedy, Dithyrambic poetry and music to be mimetic or imitative art, each varying in imitation by medium, object, and manner. For example, music imitates with
11438-461: The domain of knowledge and the arts as representing the domain of the freedom of artistic expression. Often, if the skill is being used in a common or practical way, people will consider it a craft instead of art. Likewise, if the skill is being used in a commercial or industrial way, it may be considered commercial art instead of fine art. On the other hand, crafts and design are sometimes considered applied art . Some art followers have argued that
11571-402: The early 20th century by Roger Fry and Clive Bell . More recently, thinkers influenced by Martin Heidegger have interpreted art as the means by which a community develops for itself a medium for self-expression and interpretation. George Dickie has offered an institutional theory of art that defines a work of art as any artifact upon which a qualified person or persons acting on behalf of
11704-534: The emotional side and individuality of humans, exemplified in the novels of Goethe . The late 19th century then saw a host of artistic movements , such as academic art , Symbolism , impressionism and fauvism among others. The history of 20th-century art is a narrative of endless possibilities and the search for new standards, each being torn down in succession by the next. Thus the parameters of Impressionism , Expressionism , Fauvism , Cubism , Dadaism , Surrealism , etc. cannot be maintained very much beyond
11837-429: The factors of authentication: something the user knows, something the user has, and something the user is. Each authentication factor covers a range of elements used to authenticate or verify a person's identity before being granted access, approving a transaction request, signing a document or other work product, granting authority to others, and establishing a chain of authority. Security research has determined that for
11970-601: The flourishing of many art forms: jade carving, bronzework, pottery (including the stunning Terracotta Army of Emperor Qin ), poetry, calligraphy, music, painting, drama, fiction, etc. Chinese styles vary greatly from era to era and each one is traditionally named after the ruling dynasty. So, for example, Tang dynasty paintings are monochromatic and sparse, emphasizing idealized landscapes, but Ming dynasty paintings are busy and colorful, and focus on telling stories via setting and composition. Japan names its styles after imperial dynasties too, and also saw much interplay between
12103-442: The following outline. The different purposes of art may be grouped according to those that are non-motivated, and those that are motivated ( Lévi-Strauss ). The non-motivated purposes of art are those that are integral to being human, transcend the individual, or do not fulfill a specific external purpose. In this sense, Art, as creativity, is something humans must do by their very nature (i.e., no other species creates art), and
12236-418: The future. If that were to occur, it may call into question much of the authentication in the past. In particular, a digitally signed contract may be questioned when a new attack on the cryptography underlying the signature is discovered. The process of authorization is distinct from that of authentication. Whereas authentication is the process of verifying that "you are who you say you are", authorization
12369-409: The identification of products and services which meet the expectations of consumers as to the quality and other characteristics. Trademarks may also serve as an incentive for manufacturers, providers, or suppliers to consistently provide quality products or services to maintain their business reputation. Furthermore, if a trademark owner does not maintain quality control and adequate supervision about
12502-933: The initial log-in session, which can be the cause of a critical security flaw. To resolve this problem, systems need continuous user authentication methods that continuously monitor and authenticate users based on some biometric trait(s). A study used behavioural biometrics based on writing styles as a continuous authentication method. Recent research has shown the possibility of using smartphones sensors and accessories to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait recognition . These attributes are known as behavioral biometrics and could be used to verify or identify users implicitly and continuously on smartphones. The authentication systems that have been built based on these behavioral biometric traits are known as active or continuous authentication systems. The term digital authentication, also known as electronic authentication or e-authentication, refers to
12635-574: The late 19th century. In France, the first comprehensive trademark system in the world was passed into law in 1857 with the "Manufacture and Goods Mark Act". In Britain, the Merchandise Marks Act 1862 made it a criminal offense to imitate another's trade mark 'with intent to defraud or to enable another to defraud'. The passing of the Trade Marks Registration Act 1875 allowed formal registration of trademarks at
12768-532: The manufacture and provision of products or services supplied by a licensee, such "naked licensing" will eventually adversely affect the owner's rights in the trademark. For US law see, ex. Eva's Bridal Ltd. v. Halanick Enterprises, Inc. 639 F.3d 788 (7th Cor. 2011). This proposition has, however, been watered down by the judgment of the House of Lords in the case of Scandecor Development AB v. Scandecor Marketing AB et al. [2001] UKHL 21; wherein it has been held that
12901-415: The mark remains in continuous use in commerce. If the trademark owner stops using the mark for too long (typically three to five years, depending on the jurisdiction), the trademark rights may be lost. For example, in the United States, trademark rights are based on use in commerce. If a mark is not used for three consecutive years, it is presumed abandoned and becomes vulnerable to challenges. Similarly,
13034-582: The meaning of art. Several dialogues in Plato tackle questions about art, while Socrates says that poetry is inspired by the muses and is not rational. He speaks approvingly of this, and other forms of divine madness (drunkenness, eroticism, and dreaming) in the Phaedrus (265a–c), and yet in the Republic wants to outlaw Homer 's great poetic art, and laughter as well. In Ion , Socrates gives no hint of
13167-465: The media of rhythm and harmony, whereas dance imitates with rhythm alone, and poetry with language. The forms also differ in their object of imitation. Comedy, for instance, is a dramatic imitation of men worse than average; whereas tragedy imitates men slightly better than average. Lastly, the forms differ in their manner of imitation—through narrative or character, through change or no change, and through drama or no drama. Aristotle believed that imitation
13300-476: The mere fact that a bare license (the equivalent of the United States concept of a naked license) has been granted did not automatically mean that a trademark was liable to mislead. By the same token, trademark holders must be cautious in the sale of their mark for similar reasons as apply to licensing. When assigning an interest in a trademark, if the associated product or service is not transferred with it, then this may be an "assignment-in-gross" and could lead to
13433-513: The most wealthy in society. Nevertheless, there have been many periods where art of very high quality was available, in terms of ownership, across large parts of society, above all in cheap media such as pottery, which persists in the ground, and perishable media such as textiles and wood. In many different cultures, the ceramics of indigenous peoples of the Americas are found in such a wide range of graves that they were clearly not restricted to
13566-510: The nature of perception; for pleasure; or to generate strong emotions . The purpose may also be seemingly nonexistent. The nature of art has been described by philosopher Richard Wollheim as "one of the most elusive of the traditional problems of human culture". Art has been defined as a vehicle for the expression or communication of emotions and ideas, a means for exploring and appreciating formal elements for their own sake, and as mimesis or representation . Art as mimesis has deep roots in
13699-478: The newspapers and stultifies both science and art by assiduously flattering the lowest of tastes; clarity bordering on stupidity, a dog's life. – André Breton (Surrealism) The functions of art described above are not mutually exclusive, as many of them may overlap. For example, art for the purpose of entertainment may also seek to sell a product, i.e. the movie or video game. Art can be divided into any number of steps one can make an argument for. This section divides
13832-426: The object being signed. A vendor selling branded items implies authenticity, while they may not have evidence that every step in the supply chain was authenticated. Centralized authority-based trust relationships back most secure internet communication through known public certificate authorities; decentralized peer-based trust, also known as a web of trust , is used for personal services such as email or files and trust
13965-423: The oldest musical instruments unearthed so far, with the artifacts dating between 43,000 and 35,000 BC, so being the first centre of human art. Many great traditions in art have a foundation in the art of one of the great ancient civilizations: Ancient Egypt , Mesopotamia , Persia , India, China, Ancient Greece, Rome, as well as Inca , Maya , and Olmec . Each of these centers of early civilization developed
14098-475: The other hand, might use carbon dating to verify the age of an artifact, do a chemical and spectroscopic analysis of the materials used, or compare the style of construction or decoration to other artifacts of similar origin. The physics of sound and light, and comparison with a known physical environment, can be used to examine the authenticity of audio recordings, photographs, or videos. Documents can be verified as being created on ink or paper readily available at
14231-428: The package and contents are not counterfeit; these too are subject to counterfeiting. Packages also can include anti-theft devices, such as dye-packs, RFID tags, or electronic article surveillance tags that can be activated or detected by devices at exit points and require specialized tools to deactivate. Anti-counterfeiting technologies that can be used with packaging include: Literary forgery can involve imitating
14364-401: The philosophy of Aristotle. Leo Tolstoy identified art as a use of indirect means to communicate from one person to another. Benedetto Croce and R. G. Collingwood advanced the idealist view that art expresses emotions, and that the work of art therefore essentially exists in the mind of the creator. The theory of art as form has its roots in the philosophy of Kant, and was developed in
14497-421: The possibility of perpetual rights, provided the trademark is continuously used and renewed. However, if a trademark is no longer in use, its registration may be subject to cancellation. Trademarks can also lose protection through genericide , a process where a trademark becomes so widely used to refer to a category of goods or services that it loses its distinctiveness and legal protection. A well-known example
14630-662: The precise meaning of such art is often disputed because so little is known about the cultures that produced them. The first undisputed sculptures and similar art pieces, like the Venus of Hohle Fels , are the numerous objects found at the Caves and Ice Age Art in the Swabian Jura UNESCO World Heritage Site , where the oldest non-stationary works of human art yet discovered were found, in the form of carved animal and humanoid figurines, in addition to
14763-677: The processes that are used to accomplish secure authentication: The authentication of information can pose special problems with electronic communication, such as vulnerability to man-in-the-middle attacks , whereby a third party taps into the communication stream, and poses as each of the two other communicating parties, in order to intercept information from each. Extra identity factors can be required to authenticate each party's identity. Counterfeit products are often offered to consumers as being authentic. Counterfeit consumer goods , such as electronics, music, apparel, and counterfeit medications , have been sold as being legitimate. Efforts to control
14896-527: The registration of the trademark. A comprehensive clearance search can help avoid costly and time-consuming issues, such as refusal to register, opposition or cancellation proceedings, or a trademark infringement lawsuit. In the United States, the USPTO maintains a publicly accessible database of registered trademarks. This database can be searched using the Trademark Search system, which replaced
15029-425: The relevant national authority. Using the ® symbol for unregistered trademarks is misleading and can be treated as unfair business practice. It may also result in civil or criminal penalties. A brand is a marketing concept that reflects how consumers perceive a product or service. It has a much wider meaning and refers to the proprietary visual, emotional, rational, and cultural image that customers associate with
15162-417: The relevant research process (). It builds students' critical literacy. The documentation materials for literature go beyond narrative texts and likely include informational texts, primary sources, and multimedia. The process typically involves both internet and hands-on library research. When authenticating historical fiction in particular, readers consider the extent that the major historical events, as well as
15295-426: The same article. For example, the particular design of a bottle may qualify for copyright protection as a non-utilitarian [sculpture], or trademark protection based on its shape, or the ' trade dress ' appearance of the bottle as a whole may be protectable. Titles and character names from books or movies may also be protectable as trademarks while the works from which they are drawn may qualify for copyright protection as
15428-405: The same category of goods the trademark is protected under. An example of the second type is that Audi can run advertisements saying that a trade publication has rated an Audi model higher than a BMW model since they are only using "BMW" to identify the competitor. In a related sense, an auto mechanic can truthfully advertise that he services Volkswagens , and a former Playboy Playmate of
15561-404: The second step, the artist executes the creation of their work. The creation of a piece can be affected by factors such as the artist's mood , surroundings , and mental state . For example, The Black Paintings by Francisco de Goya , created in the elder years of his life, are thought to be so bleak because he was in isolation and because of his experience with war. He painted them directly on
15694-482: The social institution commonly referred to as "the art world " has conferred "the status of candidate for appreciation". Larry Shiner has described fine art as "not an essence or a fate but something we have made. Art as we have generally understood it is a European invention barely two hundred years old." Art may be characterized in terms of mimesis (its representation of reality), narrative (storytelling), expression, communication of emotion, or other qualities. During
15827-486: The source of goods or services can serve as a trademark. In addition to words, slogans, designs, or combinations of these, trademarks can also include non-traditional marks like sounds, scents, or colors. Under the broad heading of trademarks, there are several specific types commonly encountered, such as trade dress, collective marks, and certification marks: To maintain distinctiveness , trademarks should function as adjectives, not as nouns or verbs, and be paired with
15960-488: The stone's origin and the workers responsible. Wine amphorae marked with seals were also found in the tomb of Pharaoh Tutankhamun , who ruled ancient Egypt more than 3,000 years ago. Over 2,000 years ago, Chinese manufacturers sold goods marked with identifying symbols in the Mediterranean region. Trademarks have also been discovered on pottery, porcelain, and swords produced by merchants in ancient Greece and
16093-454: The style of a famous author. If an original manuscript , typewritten text, or recording is available, then the medium itself (or its packaging – anything from a box to e-mail headers ) can help prove or disprove the authenticity of the document. However, text, audio, and video can be copied into new media, possibly leaving only the informational content itself to use in authentication. Various systems have been invented to allow authors to provide
16226-549: The styles of calligraphy and painting. Woodblock printing became important in Japan after the 17th century. The western Age of Enlightenment in the 18th century saw artistic depictions of physical and rational certainties of the clockwork universe , as well as politically revolutionary visions of a post-monarchist world, such as Blake 's portrayal of Newton as a divine geometer, or David 's propagandistic paintings. This led to Romantic rejections of this in favor of pictures of
16359-546: The time of the item's implied creation. Attribute comparison may be vulnerable to forgery. In general, it relies on the facts that creating a forgery indistinguishable from a genuine artifact requires expert knowledge, that mistakes are easily made, and that the amount of effort required to do so is considerably greater than the amount of profit that can be gained from the forgery. In art and antiques, certificates are of great importance for authenticating an object of interest and value. Certificates can, however, also be forged, and
16492-406: The time of their invention. Increasing global interaction during this time saw an equivalent influence of other cultures into Western art. Thus, Japanese woodblock prints (themselves influenced by Western Renaissance draftsmanship) had an immense influence on impressionism and subsequent development. Later, African sculptures were taken up by Picasso and to some extent by Matisse . Similarly, in
16625-446: The title, the subject is Napoleon , and the content is Ingres 's representation of Napoleon as "Emperor-God beyond time and space". Similarly to extreme formalism, philosophers typically reject extreme intentionalism, because art may have multiple ambiguous meanings and authorial intent may be unknowable and thus irrelevant. Its restrictive interpretation is "socially unhealthy, philosophically unreal, and politically unwise". Finally,
16758-431: The trap posed by the term 'art'. – Silva Tomaskova Motivated purposes of art refer to intentional, conscious actions on the part of the artists or creator. These may be to bring about political change, to comment on an aspect of society, to convey a specific emotion or mood, to address personal psychology, to illustrate another discipline, to (with commercial arts) sell a product, or used as a form of communication. [Art
16891-483: The walls of his apartment in Spain, and most likely never discussed them with anyone. The Beatles stated drugs such as LSD and cannabis influenced some of their greatest hits, such as Revolver . Trial and error are considered an integral part of the creation process. The last step is art appreciation , which has the sub-topic of critique. In one study, over half of visual arts students agreed that reflection
17024-455: The way things are, but actually produce a community's shared understanding. Each time a new artwork is added to any culture, the meaning of what it is to exist is inherently changed. Historically, art and artistic skills and ideas have often been spread through trade. An example of this is the Silk Road , where Hellenistic, Iranian, Indian and Chinese influences could mix. Greco Buddhist art
17157-400: The whole, nor even the right of art to exist." Relativism was accepted as an unavoidable truth, which led to the period of contemporary art and postmodern criticism , where cultures of the world and of history are seen as changing forms, which can be appreciated and drawn from only with skepticism and irony. Furthermore, the separation of cultures is increasingly blurred and some argue it
17290-553: The widest range of society. Another important innovation came in the 15th century in Europe, when printmaking began with small woodcuts , mostly religious, that were often very small and hand-colored, and affordable even by peasants who glued them to the walls of their homes. Printed books were initially very expensive, but fell steadily in price until by the 19th century even the poorest could afford some with printed illustrations. Popular prints of many different sorts have decorated homes and other places for centuries. In 1661,
17423-402: The word art may refer to several things: (i) a study of a creative skill, (ii) a process of using the creative skill, (iii) a product of the creative skill, or (iv) the audience's experience with the creative skill. The creative arts ( art as discipline) are a collection of disciplines which produce artworks ( art as objects) that are compelled by a personal drive (art as activity) and convey
17556-437: Was a manifestation of skill. Rembrandt 's work, now praised for its ephemeral virtues, was most admired by his contemporaries for its virtuosity. At the turn of the 20th century, the adroit performances of John Singer Sargent were alternately admired and viewed with skepticism for their manual fluency, yet at nearly the same time the artist who would become the era's most recognized and peripatetic iconoclast, Pablo Picasso ,
17689-542: Was completing a traditional academic training at which he excelled. A common contemporary criticism of some modern art occurs along the lines of objecting to the apparent lack of skill or ability required in the production of the artistic object. In conceptual art, Marcel Duchamp 's Fountain is among the first examples of pieces wherein the artist used found objects ("ready-made") and exercised no traditionally recognised set of skills. Tracey Emin 's My Bed , or Damien Hirst 's The Physical Impossibility of Death in
#871128