密鑰管理器 的英文怎麼說

中文拼音 [yàoguǎn]
密鑰管理器 英文
key management unit
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. These appliances, available from companies such as decru, neoscale, and vormetric, implement very fast encryption - they typically claim to operate at or close to " wire speed. " they also usually include sophisticated key management facilities for controlling the creation and distribution of cipher keys, cycling of keys, and disposition of keys, besides handling general data encryption

    Decru 、 neoscale和vormetric等公司都能提供這些件,它們實現了非常快的加通常被聲稱速度達到或接近「線速」 。它們還常常包括高級的設施,除了用於處一般的數據加外,還可用於控制的創建和分發、的循環和的銷毀。
  2. The key management server of key management subsystem assumes the core function of key management. it offers the retraction and filing etc. the server cipher machine ensures the safety generation and safety issuing of the keys

    子系統中的服務承擔了的核心功能,同時提供了撤消、歸檔等功能,服務碼機保證了用戶的安全產生和安全分發。
  3. Koal card - issuing management server provides key management functions. it is responsible for security management in the process of card - issuing such as the card key accessing, card key - issuing, card key s backup and retrieve and the key destruct etc

    格爾發卡服務提供功能,它負責所有卡的接入、發卡服務、卡備份和恢復以及的銷毀等整個發卡過程的安全
  4. Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively

    混合加系統主要包括以下模塊:本地模塊、服務模塊、加和認證模塊、網路socket模塊、其它輔助模塊等。本系統有效解決了基於voip技術的分散式網路多媒體會議系統中信息安全傳輸的問題。
  5. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加機制的研究,首先介紹了數字集群通信系統的安全保機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加過程及其的選用和,特別介紹了端到端加;然後介紹了幾種常用的加演算法,通過分析其優劣,提出了端到端加的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加方案的設計,其具體過程為將經過數字信號送入加里,和以idea加演算法為基礎設計的碼流發生( ksg )產生的碼序列進行加解運算,並且研究了此加過程的碼同步問題。
  6. The security environment of the router with ipsec is provided by the cooperation of access control system, key management system, audit system, security service strategy system, intelligent diagnosis system and ipsec implementation

    基於ipsec協議的路由的安全保障由路由中的訪問控制系統、系統、審計系統、安全服務策略系統、智能診斷系統以及ipsec實現共同提供。
  7. Used to manage encryption keys on a report server

    用於報表服務上的加
  8. This program is available on a processor chip called the clipper chip and is also known as the key escrow chip

    這種程序可在一種處晶元上得到,該晶元稱為加晶元,通常也稱為晶元。
  9. Implicit localization, wherein asp. net fills property values from the resource manager based on matching the resource key to the properties of the control

    隱式本地化,其中asp . net通過將資源與控制項屬性相匹配來填充資源中的屬性值。
  10. Analysis of key management in wireless sensor networks

    無線傳感網路問題分析
  11. Authentication is provided in the form of a service ticket, issued by a trusted authentication service in the domain and encrypted with the target resource manager s secret key

    的形式提供的,這是由域中的一個可信認證服務發出的,並使用目標資源進行了加
  12. Ic card issuing management system uses cimsm, with the help of the custom key introducing program, realizes the function of issuing ic card

    Ic卡發卡系統使用了高速發卡服務( cims ) ,利用定製開發的導入程序,實現ic卡發卡功能。
  13. To the issues that ipsec ca n ' t work with nat and multicast very smoothly and ipsec could n ' t also solve qos problem, combined with the national high - tech project of 863, the author has put forward the following viewpoints in the research of the security architecture model of ip layer : as to ipsec ' s working with nat, the author has proposed a scheme of using udp encapsulation along with configuring ipsec tunnel by dhcp and substituting ah with esp null encapsulation ; as to ipsec ' s working with the multicast, the author has proposed that combined with key management using complete binary tree, ipsec security process using espv3 and ahv2 can cooperate with multicast smoothly in multicast environments ; as to solving qos, the author has proposed a scheme of using two - level classifying and two - level scheduling with encryption scheduler and forwarding scheduler. the author has pointed out that combining ipsec with pki can make ipsec more flexible and more practical. based on the previous researches, the author has made an analysis of security risks of ip layer

    在ip層安全體系結構模型研究中,針對ipsec在與組播、 nat協同工作等方面存在的問題以及ipsec不能很好解決qos等方面的問題,作者結合國家863高技術項目的研究提出了解決方案:在nat協同工作方面作者提出了採用udp封裝、配合使用dhcp配置ipsec隧道並用espnull封裝代替ah的方案;在與組播協同工作方面作者提出了基於espv3和ahv2的ipsec組播安全處以及基於完全二又樹的組播的方案;在解決qos問題方面作者提出了採用分類1和分類2的兩級分類以及具有加調度和轉發調度的兩級調度的技術方案;同時作者提出了ipsec與pki技術緊結合,能使ipsec安全通信更加靈活和方便實用。
  14. The rskeymgmt utility works with the local report server windows instance the utility cannot connect to remote instances of the report server windows service so it cannot be used to manage the encryption keys of a remote report server instance

    Rskeymgmt實用工具用於本地報表服務windows實例。該實用工具不能連接到遠程報表服務windows服務實例,因此無法用於遠程報表服務實例的加
  15. Nowadays, the main wsn key distribution protocol is considered as one type of pre - distribution key management protocols

    當前主要的傳感分配協議都可認為屬于預分配協議。
  16. Next, this paper studies the pki technology, ssl protocol and smart card technology, and then put forward a security email solution, which solves some problems as follows : ( 1 ) protect email subject secret ( 2 ) realize email header safe transmission ( 3 ) security keys management then, this paper uses existing products ( wallgreat kmc ) to build a pki platform, and realize a model for this solution, which includes a secure email server and an email client

    本文研究了pki技術、安全套接層ssl協議和智能卡技術,並在此基礎上提出了一種安全郵件解決方案,旨在解決以下問題: ( 1 )郵件主題的保性問題( 2 )郵件頭的安全傳輸問題( 3 )的安全問題接著,本文利用公司己有產品(華翔騰中心)搭建pki平臺,設計並實現了該解決方案的一個系統模型,該模型包括安全電子郵件服務和客戶端。
  17. From the keystore. key managers manage the keys that are used to authenticate the application to its peer across a secure socket

    密鑰管理器,這些用於在安全套接字對面相對應用程序的對等機來認證它。
  18. Koal ca server integrates key management service, certificate authentication service, user registration service, web service, databsase service, ldap service and log audit service. it is small but complete product which is easy to use and convenient to maintain. it is also a specialized enterprise - level e - authentication product

    格爾ca服務集成了服務、證書認證服務、用戶注冊服務、 web服務、數據庫服務、 ldap服務、日誌審計服務等功能,使用方便、維護簡單,是小型而完整的專門化企業級電子認證中心產品。
分享友人