密鑰管理技術 的英文怎麼說

中文拼音 [yàoguǎnshù]
密鑰管理技術 英文
key management
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全及實現的關鍵隧道協議,通過對實現的分析比較,選用了安全性強大的ipsec隧道,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、ike協議、加認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  2. This article describes the situation of information security theory and technology, and discusses the theories of ca, information encryption, and public key system

    本文介紹了目前信息安全論和發展狀況,對ca認證論、信息加以及公共等方面的進行了分析和論述。
  3. The system structure of certificate authority and the function modules of the system are introduced in the system structure part. therefore the article introduces the detailed methods of establishing certificate authority and the establishment of data certificate. meanwhile, the article discusses the actual functions of digital certificate in office automatic system on web, and the key management security of the digital certificate

    在系統總體結構中,主要討論了ca認證體系的體系結構和系統的主要功能模塊;在系統的具體實現中,討論了ca認證中心的建立的以及ca認證中心生成數字證書的方法;在系統的實際應用中,結合mthsca的特點,討論了數字證書在某摩托化步兵師網上自動化辦公系統中的具體應用;在系統安全性方面,討論了數字證書的安全
  4. Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively

    混合加系統主要包括以下模塊:本地模塊、服務器模塊、加和認證模塊、網路socket模塊、其它輔助模塊等。本系統有效解決了基於voip的分散式網路多媒體會議系統中信息安全傳輸的問題。
  5. At the same time, for administating proposal, we must outsource the key management service afforded by pki when use the gap

    同時為目的,物隔離需要pki提供服務。
  6. This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation

    本文首先系統地介紹了gsm移動通信保專網的原知識及關鍵,詳細介紹了安全中心的功能- -自動產生和分配、被動式和主動式遙控銷毀、專用數據空中加載、以及失控專用手機追蹤等,並且對國內外同類研究的內容和成果進行分析;重點對安全通信網關進行了深入研究,確定了一種系統模型並進行了總體設計,然後對其中專用信息傳輸的設計實現進行重點介紹;本文還對安全中心的短消息安全通信網關與專用手機進行性能測試,測試結果表明該系統符合課題的各項指標,實現了安全通信網關的各項功能需求;最後,總結課題工作,對下一步系統進行完善和發展的內容提出了具體建議。
  7. The paper aims at solve the problem that comes from development and application internet bank of a commercial bank. it figures out the hidden trouble and bad dependability existed in key data ' s storage and issue. the key data include data certificate, certificate recall list and secret key etc. on the basis of analysis of present international internet system basic framework, it presents a optimized plan for a commercial bank ' s internet bank

    本文針對某商業銀行在開發應用網上銀行系統中,在解決公基礎設施pki關鍵數據? ?數字證書、證書撤消列表crl 、資料等的存儲和發布中存在的安全隱患和可靠性差的問題,在分析了目前國內、外建立網上銀行基本架構的基礎上,對該銀行網上銀行的原有架構提出了優化方案,並在此基礎上,著重提出了本文研究的核心方案? ?採用分層模型對pki關鍵數據的存儲和發布進行構建和,並在該銀行認證機構ca ra中進行了應用。
  8. Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system

    該系統包括證書中心和用戶端軍用電子郵件傳輸組件兩個子系統,提出了「兩級加」和「證書攜帶」兩種方式,以確保系統的機性及離線方式下的身份認證、分發,利用雜湊函數實現郵件傳輸的完整性,採用數字簽名實現了郵件傳輸的不可否認性,形成了一個完整的軍用電子郵件傳輸系統。
  9. In chapter 2, the security measures and mechanism are introduced and studied. it mainly includes authentication, encryption, pairing / bonding, key management defined by bluetooth core protocol, three security modes defined by bluetooth profile and bluetooth security architecture defined by bluetooth white paper. in chapter 3, the implementation of secure services in bluetooth environment is studied deeply according to different scenarios

    在第二部分,本文闡述了藍牙中的安全機制和各種具體措施,主要包括藍牙標準對直接鏈路層的安全標準定義如鑒權、加、配對/ bonding 、等,藍牙應用規范中給出的三種安全模式以及藍牙安全標準白皮書的安全體系結構。
  10. Based on the threshold secret sharing mechanism, a new efficient distributed group key management scheme named edgk was proposed

    摘要基於門限秘分享,提出一種高效的分散式組方案edgk 。
  11. With the support for these forthcoming gss - api mechanisms spkm3 and lipkey, the use of gss - api plug - ins will avail db2 udb administrators to have db2 udb authentication based on either the public key technology or the traditional symmetric - key mechanism without much code change

    有了對這些未來的gss - api機制( spkm3和lipkey )的支持,使用gss - api插件將有利於db2 udb員基於公或傳統對稱機制進行db2 udb身份驗證,而不需要做太多的代碼修改。
  12. After analyzed the research of the status quo, the current of development and the application of the future in information security system in home and abroad, and researched the principle and technology of information security mechanism both in the network with open internet protocol and in the network with tcp / ip internet protocol, according to the microsoft information security structure and the application in network, and, the information security system should be established based on the pki structure, the security system can totally integrated with microsoft operation system

    這些功能的獲得,就要通過pki密鑰管理技術來實現。本文通過對國內外信息安全研究現狀、發展趨勢及應用前景進行分析,研究開放系統互聯標準網路和tcp ip協議網路中的信息安全機制的基本原和基本實現方法,根據微軟操作系統的安全體系結構以及實際網路中的運行需求,建立基於pki機制的信息安全系統。
  13. In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric - key cryptography, public - key cryptography, hash functions and key management protocols

    第二章介紹基本的應用碼學演算法和碼協議,包括對稱加演算法、非對稱加演算法、散列函數、數字簽名協議。
  14. To the issues that ipsec ca n ' t work with nat and multicast very smoothly and ipsec could n ' t also solve qos problem, combined with the national high - tech project of 863, the author has put forward the following viewpoints in the research of the security architecture model of ip layer : as to ipsec ' s working with nat, the author has proposed a scheme of using udp encapsulation along with configuring ipsec tunnel by dhcp and substituting ah with esp null encapsulation ; as to ipsec ' s working with the multicast, the author has proposed that combined with key management using complete binary tree, ipsec security process using espv3 and ahv2 can cooperate with multicast smoothly in multicast environments ; as to solving qos, the author has proposed a scheme of using two - level classifying and two - level scheduling with encryption scheduler and forwarding scheduler. the author has pointed out that combining ipsec with pki can make ipsec more flexible and more practical. based on the previous researches, the author has made an analysis of security risks of ip layer

    在ip層安全體系結構模型研究中,針對ipsec在與組播、 nat協同工作等方面存在的問題以及ipsec不能很好解決qos等方面的問題,作者結合國家863高項目的研究提出了解決方案:在nat協同工作方面作者提出了採用udp封裝、配合使用dhcp配置ipsec隧道並用espnull封裝代替ah的方案;在與組播協同工作方面作者提出了基於espv3和ahv2的ipsec組播安全處以及基於完全二又樹的組播的方案;在解決qos問題方面作者提出了採用分類器1和分類器2的兩級分類以及具有加調度器和轉發調度器的兩級調度的方案;同時作者提出了ipsec與pki結合,能使ipsec安全通信更加靈活和方便實用。
  15. The fundamental principles in the design of a wlan security protocols are summed up from the experience and lessons of the protocols in existence, and a new systemic structure is presented to provide security in wlan, which is based on the fundamental topological structure of infrastructure. the design includes three main modules, i. e. encryption and data integrality, key management, and identification authentication

    本文總結已有協議的設計經驗和教訓以及國內外的先進,歸納了設計無線局域網安全協議的基本要求和原則,並提出了一種新的無線局域網安全系統體系結構,該體系結構基於有中心的無線局域網拓撲結構,包含了數據加和完整性認證、和身份認證三個基本模塊。
  16. In this way, we can manage private keys securely and effectively. having deeply studied the private key management, the author designs a private key management system in this paper. the, author also analyses the risks of the process of private key management from the point of view of system and puts forward the method of decreasing the risk to the extreme extent

    本文從用戶使用私的角度分析了kea對用戶私的不足和現有的純粹本地化的不足,並由此出發,借鑒的思想,同時考慮到私本地化存儲的要求,提出了一種新的私,它不僅能融入到現有的pki體系中,且能安全、有效地對用戶的私進行
  17. Next, this paper studies the pki technology, ssl protocol and smart card technology, and then put forward a security email solution, which solves some problems as follows : ( 1 ) protect email subject secret ( 2 ) realize email header safe transmission ( 3 ) security keys management then, this paper uses existing products ( wallgreat kmc ) to build a pki platform, and realize a model for this solution, which includes a secure email server and an email client

    本文研究了pki、安全套接層ssl協議和智能卡,並在此基礎上提出了一種安全郵件解決方案,旨在解決以下問題: ( 1 )郵件主題的保性問題( 2 )郵件頭的安全傳輸問題( 3 )的安全問題接著,本文利用公司己有產品(華翔騰中心)搭建pki平臺,設計並實現了該解決方案的一個系統模型,該模型包括安全電子郵件服務器和客戶端。
  18. This thesis, motivated by the practical requirements and based on extensive exploration and deep analysis in various literatures, focuses on the research of group - oriented key management techniques in distributed open networks

    本論文基於實際問題的需要和對已有文獻的檢索和分析,重點研究分散式網路中面向群的密鑰管理技術
  19. At present four kinds of technologies have mainly been adopted to realization of vpn, including tunneling technology, encryption & decryption technology, key management technology and user & facility identity authentication technology

    目前vpn的實現主要採用四項:隧道、加解密鑰管理技術和使用者與設備身份認證
  20. And also some analysis and comparison of the technologies will be provided. the mainly research results are list as follows. 1 ) some protocols have been analyzed deeply, including ieee802. 1h draft and some other protocols related to authentication and key management

    在本文中,我們主要對無線局域網中的安全關鍵進行了深入的研究分析和比較,主要的成果如下: 1 )對國際上流行的標準進行了深入的分析比較,包括ieee802 . 11i標準草案以及相關的認證密鑰管理技術等方面的協議。
分享友人