A procedure in which a transmitting station , i.e., a calling station, establishes its own validity without the participation of the receiving station, i.e., the called station. Note: The calling station establishes its own authenticity and the called station is not required to challenge the calling station. Self- authentication is usually used only when one- time authentication systems are used to derive the authentication. [From Weik ’89] 2. Implicit authentication, to a predetermined level, of all transmissions on a secure communications system. [INFOSEC-99]