控制密碼 的英文怎麼說

中文拼音 [kòngzhì]
控制密碼 英文
allow iis to control password
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加技術以及各國立法對技術的進出口及使用的,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. Control parameter is locked by cipher code ensure the safety

    參數鎖定確保安全
  3. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限、用戶身份驗證、和日誌管理等諸多問題;信息傳輸安全主要研究信息加傳輸方案的選擇和實施。
  4. Main control introduce 4 - digital numeral display and 4 - digital clavier, operation is convenience and terse 、 password egis is on the safe side

    板採用4位數顯示, 4位鍵盤操作,操作方便簡潔;保護,安全可靠。
  5. The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the

    第一種是基於「 s -盒由」的變結構分組,該演算法區別于其它大部分分組最大的特點是它的s -盒不是固定不變的而是由產生;第二種是基於smn ( d )陣列編的變結構分組,該演算法充分利用了smn ( d )陣列編具有距大的特點;文中對這兩個演算法的可逆性、安全性及其性能等進行了探討和分析,分析結果認為這兩個變結構演算法正確、有效且安全。
  6. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取、標識和認證、完整性技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  7. Stamper and signature is very important in the affair of tradition work in government and enterprise. this article according to the characteristic of traditional signature and stamper, combinic the demands of signature and seal in e - government - affair work information system, inosculates the technology of middleware and e - government - affair security, makes use of object oriented and component technology, integrates correlation knowledge of compositive cryptogram, pki, seal digital image, activex etc, studies and achieves digital e - signature - seal middleware based on web which is used in internet / intranet environment

    印章和簽名在傳統的政府辦公和企業事務處理中起著十分重要的作用。本文根據傳統簽名、蓋章的特點,結合電子政務辦公信息系統中的蓋章簽名需求,把電子政務安全技術和中間件技術相融合,利用面向對象和組件技術,集成學、 pki 、印章數字圖像、 activex項等相關知識,研究並實現了一個應用於internet intranet環境中的基於web的電子簽章中間件。
  8. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調器完成對計算機輸出的信號加處理,將指令載送到一指定頻率點。終端收費器解調出信號,送至單片機尋址部分。單片機尋址部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到用戶通道的管理。
  9. 2. press set key at five sec is unlash after display p - s, here display s number is code, if function is going to recompose, please number was 18 first, again press set key is come into function set. it can automatism backing out up to snuff work, if it is dont press set key or code is error

    2按set鍵5s直至顯示p - s後放開,此時顯示的數值為,若要修改儀表功能,請把數字修改成88 ,再按set鍵,即進入功能設置,如果不按set鍵或錯誤,則自動返回正常測量。
  10. High stability of ptr102 - derived marking plasmids indicated that novel vector systems based on ptr102 could be constructed for the study on molecular biology and ecology of m. huakuii. 1kb gfp cdna fragment amplified by pcr was cloned into e. coli expression plasmid pet - hc, which was under the control of rna polymerase gene promoter from phage t7 with its own translation initiation codon

    將pcr擴增的1kbgfpcdna片段克隆到大腸桿菌表達載體pet - 11c上,使gfpcdna在帶有lac操縱基因的t7噬菌體rna聚合酶基因啟動子的下、以自身的atg作為翻譯起始進行翻譯。
  11. If you change the connectionfactory jms sendcf using the websphere application server admin console to no longer include an ssl cipher suite or a different one, then after restarting your application server you will get a jms connection error because the handshake between the client and the queue manager will fail

    如果您通過websphere application server管理臺更改connectionfactory jms / sendcf ,而不再包含ssl套件(或使用另外的套件) ,則在重新啟動您的應用服務器后,將得到一個jms連接錯誤,這是因為客戶端和隊列管理器之間的握手會失敗。
  12. Two unique sets of self - work controling circuit are the unlocked circuits of both password keyset and electronic key

    獨特的兩套獨立工作的電路,即鍵盤開鎖電路及電子鑰匙開鎖電路。
  13. " although the simplest model for a cn affecting gene actiity is where the ariant is a deletion of a gene or part of a gene, we found examples where actiity is affected from a distance, " commented barbara stranger, first author and post - doctoral fellow at the wellcome trust sanger institute. " this may occur when the cn reduces the effectieness of a region that works to switch the genes on or off

    變異拷貝數機能通過改變特定基因的「劑量」 (即復后的拷貝數量) ,藉助于裂解某個包含后續可翻譯成蛋白質的基因的活性片斷或藉助于降解基因活性即類似開/關及在我們基因組中的調整開關的基因組中具有調作用的基因片斷來影響基因活性。
  14. The multilevel password key of control screen ensures the consistent of important system parameters and stability of water quality

    屏的多級鑰匙保證了系統重要參數的一致和水質的穩定。
  15. The code hopping technique for encoding in remote control system

    系統中的跳防盜技術
  16. Passing the detached id file password as a parameter, use seckfmopen to extract the id file handle

    以取出來的id檔和作為參數,透過seckfmopen方法來獲取該id檔的
  17. 13th, has the long - distance cloth to withdraw from a defended position the function, the master after the input correct password, can long - distance carry on the cloth through the telephone to the system to withdraw from a defended position to control

    13有遠程布撤防功能,主人在輸入正確后,能遠程通過電話對系統進行布撤防
  18. Button allows you to control password expiration rules, and you can use the

    按鈕允許您控制密碼到期規則,並且您可以使用
  19. Hwpc have two modes cipher generated system to create random password, this part is a at89c2051 ocm, that is made of the atmel company, such some function as opening / closing door, modifying cipher, locking the control system, and so on all through operating the keyboard

    有線器的兩種控制密碼設計成由用戶自己來設定,其主要器件是atmel公司製造的at89c2051 。通過鍵盤的操作,來實現系統的開關門、修改、鎖定等功能。
  20. Ieice trans. fundamentals, 2003, e86 - a : 2844 - 2852

    尤其是訊號處理錯誤等系統的設計。
分享友人