核實密碼 的英文怎麼說

中文拼音 [shí]
核實密碼 英文
retype password
  • : 核構詞成分。
  • : Ⅰ形容詞1 (內部完全填滿 沒有空隙) solid 2 (真實; 實在) true; real; honest Ⅱ名詞1 (實際; 事實...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 核實 : verify; check
  1. A service charge of 130 is payable for each subscriber application, where the applicant has requested to complete the identity verification process for the purpose of handing over the pin mailer at a special location nominated by the subscriber and this location is outside the digi - sign offices

    若申請人另外申請加證書,則需額外支付每一張加證書港幣30若申請人要求在電證服務辦事處以外地方完成身份程序,及送交封函,需就每次申請繳交港幣130 。
  2. Therefore, blys, its receptor or related antagonists may find medical utility in the treatment of b cell disorders associated with autoimmunity, neoplasia, or immunodeficiency syndromes. in this study, epo signal peptide sequence and hsblys gene were linked by soe method. the fusion product was cloned into eukaryotic plasmids. pcdna3, pcdna3. 1, pefneo, respectively. meanwhile, the epo signal peptide sequence was mutated so as to form a restriction enzyme cut site : bin i. thus the recombinant plasmid can be used as secreting plasmid expressing other gene

    驗通過3 』端互補,進行引物延伸合成epo信號肽序列:信號肽和hsblys基因採用重疊延伸拼接法形成融合基因;融合基因分別插入pcdna3 . 0 、 pcdna3 . 1 、 pefneo真載體:引物延伸合成信號肽時,利用亮氨酸同義,將信號肽基因的倒數第二個突變,在重組載體上的信號肽序列之後,形成bln酶切位點,使三種載體成為分泌表達載體。
  3. We discuss the theory and technology of coding and cryptology in the study of information security and information reliability in the disseration. some valuable theoretic results are presented, most of these results are published on the important journey of china, parts of these results are used in some application system. in the design and analysis of error - correcting codes, we obtain the following results

    本文探討了信息安全和信息可靠性研究中的編理論與技術,在糾錯的設計與分析、序列的設計與分析以及分組的設計與分析等方面,得到了一些有價值的理論結果,大多數結果已在國內心刊物上發表,有些結果已用於際的應用系統。
  4. Given that passwords are commonly used as the basic factor of authentication, we recommend that banks adopt a second factor, which cannot be easily stolen by fraudsters, for customer authentication. examples of second - factor authentication include digital certificates, one - time passwords generated by a security device and sms - based one - time passwords

    現時銀行一般都要求用戶輸入,作為身份的一項基本要求,而根據我們的建議,銀行應採用多一重不容易被騙徒破解的方法,以加強確定客戶身分真偽的能力。
  5. Can be used to verify that this block of data was really created by that private key

    才可用以這組數據確由該私人匙產生。
  6. Operation layer is the basic core part in elliptic curve encryption system including how to calculate elliptic curve ' s stairs is a large prime or including a large prime gene to ensure elliptic curve to be safe elliptic curve ; in this article safe elliptic curve is chosen by p1363 sae algorithm. besides, how to achieve fast point multiplication will influence the performance efficiency of the whole encryption system ; in this article, for different situations, signed binary method and rolling window method are respectively applied to perform quick operation of elliptic curve ' s point multiplication

    運算層是橢圓曲線體制現的最基礎、最心的部分,包括如何來計算橢圓曲線的階為大素數或含有一個大的素因子,以保證所選取的橢圓曲線為安全橢圓曲線,本文根據ieeep1363協議的sea演算法現了安全橢圓曲線的選取;另外如何現標量乘的快速運算,將會影響整個系統的現效率,本文根據不同情況對橢圓曲線的標量乘法分別採用了帶符號的二進製法和滑動窗口法進行快速運算。
  7. Examples of second - factor authentication include digital certificates, one - time passwords generated by a security device, and sms - based one - time passwords

    第二重身份的例子包括:數證書由保安裝置提供只用一次的,及只用一次的簡訊式
  8. To use the telefiling, you need a touch - tone telephone. you will be required to input your taxpayer identification number and teletax password for identification purpose

    使用電話報稅服務,須用音頻電話,並利用電話稅務通的稅務編號和通行身分。
  9. Furthermore, boom uses two levels of password for client authentication : a login password for browsing boom s trading pages, and a separate trading key code for placing orders

    另外, boom以雙重方式會員身份,其一是登入,供會員瀏覽交易平臺;其後的個人識別號則用作交易確認之用。
  10. In the dissertation, the system of xmlengine which involved in xml and soap criterion, encrypt theory and xml security standard of w3c, pki background were introduced simplely, and also, a feasible xml engine model was brought forward on this basis, and this model was carried out on linux platform, the article list some testing data of core module, including function testing and capability testing. at last

    本文首先對xml引擎( xmlengine )系統所涉及到的xml及soap規范、應用學知識和w3c有關xml安全的標準進行簡要介紹,對pki的基本知識進行概要說明,並在此基礎上提出一個完整可行的xmlengine模型。並在linux平臺上現這一模型,對具體的現步驟和細節進行詳細描述。給出了心模塊的功能和性能測試數據。
  11. To construct eukaryotic expression vector of mbl gene with codon 54 point mutation, the target sequence in pgem - mbld plasmid, which conains mbl cdna with codon 54 mutant allele, was amplified by pcr. after the cdna fragement and plasmids pci - neo were prepared by digestion with sma i and sal i, the fragment was inserted into sma i and sal i site in pci - neo eukaryotic expression vector, and the recombinant vector, named pci - mbl54, was obtained. the pci - mbl54, digested with restriction enzymes, was found to contain the point mutation mbl cdna by agarose gel electrophoresis analysis

    驗以ggc54gacmbl突變為研究對象,選用真表達質粒pci - neo ,根據已構建好的含54位子突變型mbl基因t載體的結構,設計合成新的引物, pcr擴增54位突變型mbl基因,凝膠回收,雙酶切pcr產物和pci - neo質粒, t4連接酶連接,將前者克隆至後者的sma和sal位點,轉化大腸桿菌xl - 1blue ,氨芐選擇培養。
  12. You need to input your pin number to verify your identity

    你需要輸入你的,以你的身份。
  13. Requires double authentication. you have to pass the authentication procedures by inputting two pieces of information i. e. the taxpayer identification number and password

    雙重使用者的身分,你須輸入稅務編號及通行,通過系統的確認身分檢查,才可使用服務;
  14. Requires double authentication. you have to pass the authentication procedures by inputting two pieces of information i. e. the taxpayer identification number and e - tax password

    雙重使用者的身分,你須輸入稅務編號及稅務易通行,通過系統的確認身分檢查,才可使用服務
  15. The system may prompt for the e - cert password during the authentication process

    您有需要于過程中輸入證書
  16. The e - mail requests customers to use an embedded hyperlink for example, " http : 202. 109. 79. 93. z hgk hk. html " to connect to a fraudulent website and verify their account information by entering their internet banking account s user name and password. the fraudulent website looks very similar to hsbc s personal internet banking logon webpage

    這個電子郵件載有一個可連接至欺詐網站的超連結例如, http : 202 . 109 . 79 . 93 . z hgk hk . html ,並要求客戶經此超連結輸入網上理財戶口的用戶名稱及,以其戶口資料。
  17. The operating process of network cipher computer and kdmc are discoursed firstly, then the tcp / ip stack of linux is introduced, and an ipsec realization method with using a cipher card is put forward. triplex key system is adopted for internet key exchange ( ike ). the database and other modules are also designed and implemented

    論文論述了網路機和鑰管理中心的工作流程,接著介紹了linux下tcp / ip內協議棧,提出了加卡方案,採用了三重鑰管理體系現了internet鑰自動交換,進行了中心數據庫設計與現,最後對其它模塊進行了現。
  18. With the same tin and password, a taxpayer can enquire about his personal tax information on the internet through the interactive tax enquiry service under the electronic service delivery scheme too. such a service was formerly available to those with digital certificates

    市民亦可利用同一稅務編號和通行,替代數證書在網上身分,使用公共服務電子化計劃下的互動稅務查詢服務查詢自己的稅務資料。
  19. ? linux pci encryption card driver is designed and realized based on the study of the linux kernel

    ?研究了linux的基本內結構,在此基礎上設計並現了linux上pci卡的驅動程序。
  20. 66 msec for one 192 - bit ecdsa verification in gf ( p ) in the same system. in addition, ecc is widely adopted in the smart cards. therefore, we have proposed and accomplished a fast algorithm of ecdsa in gf ( 2m ) on a single chip based on the mcs51 kernel

    另外,針對橢圓曲線( ecc )在智能卡等領域的廣闊應用,本文還提出了一種特徵為2的ecdsa體制的快速演算法,並在基於mcs51內的單片機系統中現了該演算法。
分享友人