密鑰公證系統 的英文怎麼說

中文拼音 [yàogōngzhèngtǒng]
密鑰公證系統 英文
key notarization system
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ形容詞1 (屬于國家或集體的) state owned; collective; public 2 (共同的;大家承認的) common; gen...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. The system structure of certificate authority and the function modules of the system are introduced in the system structure part. therefore the article introduces the detailed methods of establishing certificate authority and the establishment of data certificate. meanwhile, the article discusses the actual functions of digital certificate in office automatic system on web, and the key management security of the digital certificate

    總體結構中,主要討論了ca認的體結構和的主要功能模塊;在的具體實現中,討論了ca認中心的建立的技術以及ca認中心生成數字書的方法;在的實際應用中,結合mthsca的特點,討論了數字書在某摩托化步兵師網上自動化辦中的具體應用;在安全性方面,討論了數字書的安全管理。
  2. First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system

    論文首先簡單介紹了秘碼體制、碼體制、 hash函數以及基於x . 509的書等基礎碼學理論;其次,論文描述了幾種典型的書體和鑒別機制;最後給出了一個電子政務書管理的具體實現例子。
  3. Signature and verification systems, such as ecdsa etc, the discuss about key exchange systems such as deffie - hellman systeme, etc. this thesis also discussed several applications and information safety products of the elliptic curve cryptosystems at the finite field too, such as digital signature, the group signature, the application in the smart card

    Ecdsa等簽名驗體制的選取, deffie - hellman等交換體制的研究。論文也討論了基於有限域上橢圓曲線的若干應用和信息安全產品,如數字簽名,組簽名,在智能卡中的應用。
  4. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi中的四層網路安全結構模型;最後給出了各種加技術的基本理論,包括對稱加體制如des和blowfish 、非對稱加體制( rsa演算法、數字簽名和身份明等)以及新一代的高級加標準( advancedencryptionstandard , aes )等。
  5. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解組件。在對的設計中提出了安全組件模型( scm ) ,該模型提供兩層認機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗;第二利用雙方的數字書對握手連接信息進行數字簽名驗
  6. In a typical web - enabled infrastructure, software running leading - edge enterprise systems needs to handle browser redirects between authorization servers ; http post commands between server domains, public key infrastructure encryption, and digital certificates ; and a mutually agreed - upon mechanism that states the trust level for any given user or group

    在典型的支持web的基礎結構中,運行業界領先的企業的軟體需要處理權限服務器之間的瀏覽器重定向、服務器域之間的http post命令、基礎結構( public key infrastructure , pki )加和數字書,以及聲明任何給定用戶或組的信任級別的相互同意( mutually agreed - upon )機制。
  7. On the base of researching in several application security systems, this paper did much work on researching in symmetrical cryptographic system, public key cryptographic system, digital signature system and the digital certificate application technology in the contemporary cryptography, and issued a suitable security application framework taking account of the characteristics of the rfmdms, several key technologies in constructing were discussed also

    本文在對國內外各種安全應用調查研究的基礎上,圍繞現代碼學中對稱式、數字簽名、數字書應用技術等進行了深入研究,並結合rfmdms體結構方面的特點,提出了適合rfmdms的安全應用框架,而且對實現中的關鍵技術進行了研究。
  8. Using the pki as the basic tools considering the security requirements in tobacco industry ’ s information work, the ctca system in no. 1 project in tobacco fields developed and the security questions solved when studying the security framework in internet environment in this paper. the main work as follows : through studied the principle of pki / ca and the technology used in pki / ca and studied the theory of private key saving and identity authentication, the paper point out a new method saving private key saving and identity authentication in usb key disk, extends internet service to wireless fields using the development to wireless telecom technology solve the safety in wireless network efficiently with wireless application protocol pki

    本文切結合我國煙草行業信息化發展的安全需要,提出以基礎設施( pki )為基本工具,研究在internet環境下該的安全框架結構,研發了國家煙草一號工程安全認( ctca ) ,解決了存在的安全問題,具體研究工作如下:通過對pki / ca的原理和技術的分析,和對私保存和身份認技術的研究,本文採取了usbkey盤保存私與身份認的方法。
  9. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據加,該將對稱加演算法3des與非對稱加演算法rsa相結合對數據加,用演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信中的信息加、數字簽名、身份認等功能,保了發送方所發送信息的秘性、鑒別性、完整性及不可否認性。
  10. In order to get high quality voice in spite of low - bandwidth, our system uses several kinds of voice compression algorithms, and it realizes the functions of voice activation and jitter compensation. on the other hand, we use some methods to make voice communication safe. the methods includes : filling traffic, encrypting voice datagram with conventional encryption algorithms ; encrypting session key with asymmetric encryption, multiple authentication

    為了保通信鏈路不被分析,實現了一個通信量填充器;為了對傳輸中的語音數據包進行加提供了des 、 idea 、 blowfish和keyfile等各種常規加方法;為了利用對稱加的快速性和的方便性,只對會話進行
  11. The paper aims at solve the problem that comes from development and application internet bank of a commercial bank. it figures out the hidden trouble and bad dependability existed in key data ' s storage and issue. the key data include data certificate, certificate recall list and secret key etc. on the basis of analysis of present international internet system basic framework, it presents a optimized plan for a commercial bank ' s internet bank

    本文針對某商業銀行在開發應用網上銀行中,在解決基礎設施pki關鍵數據? ?數字書、書撤消列表crl 、資料等的存儲和發布中存在的安全隱患和可靠性差的問題,在分析了目前國內、外建立網上銀行基本架構的基礎上,對該銀行網上銀行的原有架構提出了優化方案,並在此基礎上,著重提出了本文研究的核心技術方案? ?採用分層模型對pki關鍵數據的存儲和發布進行構建和管理,並在該銀行認機構ca ra中進行了應用。
  12. As people enjoyed the opening and sharing of network, they were also distressed about the problem of security. this paper mainly studies the security encryption technology of networks - based e - commerce systems. it analyzes the message encryption and digital signature process of client browser, and the message decryption and validation of merchant server in a integrated e - commerce system, and it also provides an application example

    本文主要研究基於網路環境的電子商務安全加技術,分析了一個完整的電子商務應用中客戶瀏覽器端和商家服務器端的信息加、信息解、數字簽名、身份驗,以及pki ( publickeyinfrastructure ,基礎設施)機制、數字書技術在這個過程中的功能,並給出了一個具體的實現例子。
  13. The model is applied in ca / ra, it creates and manage storage and issues of pki key data. pki system is a common, safe and foundational institute. unsymmetrical code arithmetic principle and technology is applied into pki system and provided safety service

    Pki是一個用非對稱碼演算法原理和技術來實現並提供安全服務的具有通用性的安全基礎設施,它通過使用技術和數字書來確保信息安全並負責驗數字書持有者身份的一種體
  14. ( 2 ) this thesis analyzes the deficiency of status authentication based on symmetric cryptography, analyzes the technologies of status authentication based on public - key cryptography, and especially analyzes the algorithms based on different difficult problems

    ( 2 )對各種身份認技術進行分析,找出基於對稱演算法的身份認技術的不足,並對基於不同難題的演算法的性能進行深入的分析和比較,找出綜合性能比較好的演算法以應用於電子商務身份認中。
分享友人