核實密碼 的英文怎麼說
中文拼音 [héshímìmǎ]
核實密碼
英文
retype password-
A service charge of 130 is payable for each subscriber application, where the applicant has requested to complete the identity verification process for the purpose of handing over the pin mailer at a special location nominated by the subscriber and this location is outside the digi - sign offices
若申請人另外申請加密證書,則需額外支付每一張加密證書港幣30若申請人要求在電證服務辦事處以外地方完成身份核實程序,及送交密碼封函,需就每次申請繳交港幣130 。Therefore, blys, its receptor or related antagonists may find medical utility in the treatment of b cell disorders associated with autoimmunity, neoplasia, or immunodeficiency syndromes. in this study, epo signal peptide sequence and hsblys gene were linked by soe method. the fusion product was cloned into eukaryotic plasmids. pcdna3, pcdna3. 1, pefneo, respectively. meanwhile, the epo signal peptide sequence was mutated so as to form a restriction enzyme cut site : bin i. thus the recombinant plasmid can be used as secreting plasmid expressing other gene
本實驗通過3 』端互補,進行引物延伸合成epo信號肽序列:信號肽和hsblys基因採用重疊延伸拼接法形成融合基因;融合基因分別插入pcdna3 . 0 、 pcdna3 . 1 、 pefneo真核載體:引物延伸合成信號肽時,利用亮氨酸同義密碼,將信號肽基因的倒數第二個密碼突變,在重組載體上的信號肽序列之後,形成bln酶切位點,使三種載體成為分泌表達載體。We discuss the theory and technology of coding and cryptology in the study of information security and information reliability in the disseration. some valuable theoretic results are presented, most of these results are published on the important journey of china, parts of these results are used in some application system. in the design and analysis of error - correcting codes, we obtain the following results
本文探討了信息安全和信息可靠性研究中的編碼密碼理論與技術,在糾錯碼的設計與分析、序列密碼的設計與分析以及分組密碼的設計與分析等方面,得到了一些有價值的理論結果,大多數結果已在國內核心刊物上發表,有些結果已用於實際的應用系統。Given that passwords are commonly used as the basic factor of authentication, we recommend that banks adopt a second factor, which cannot be easily stolen by fraudsters, for customer authentication. examples of second - factor authentication include digital certificates, one - time passwords generated by a security device and sms - based one - time passwords
現時銀行一般都要求用戶輸入密碼,作為核實身份的一項基本要求,而根據我們的建議,銀行應採用多一重不容易被騙徒破解的核實方法,以加強確定客戶身分真偽的能力。Can be used to verify that this block of data was really created by that private key
才可用以核實這組數據確實由該私人密碼匙產生。Operation layer is the basic core part in elliptic curve encryption system including how to calculate elliptic curve ' s stairs is a large prime or including a large prime gene to ensure elliptic curve to be safe elliptic curve ; in this article safe elliptic curve is chosen by p1363 sae algorithm. besides, how to achieve fast point multiplication will influence the performance efficiency of the whole encryption system ; in this article, for different situations, signed binary method and rolling window method are respectively applied to perform quick operation of elliptic curve ' s point multiplication
運算層是橢圓曲線密碼體制實現的最基礎、最核心的部分,包括如何來計算橢圓曲線的階為大素數或含有一個大的素因子,以保證所選取的橢圓曲線為安全橢圓曲線,本文根據ieeep1363協議的sea演算法實現了安全橢圓曲線的選取;另外如何實現標量乘的快速運算,將會影響整個密碼系統的實現效率,本文根據不同情況對橢圓曲線的標量乘法分別採用了帶符號的二進製法和滑動窗口法進行快速運算。Examples of second - factor authentication include digital certificates, one - time passwords generated by a security device, and sms - based one - time passwords
第二重身份核實的例子包括:數碼證書由保安裝置提供只用一次的密碼,及只用一次的簡訊式密碼。To use the telefiling, you need a touch - tone telephone. you will be required to input your taxpayer identification number and teletax password for identification purpose
使用電話報稅服務,須用音頻電話,並利用電話稅務通的稅務編號和通行密碼以核實身分。Furthermore, boom uses two levels of password for client authentication : a login password for browsing boom s trading pages, and a separate trading key code for placing orders
另外, boom以雙重密碼方式核實會員身份,其一是登入密碼,供會員瀏覽交易平臺;其後的個人識別號碼則用作交易確認之用。In the dissertation, the system of xmlengine which involved in xml and soap criterion, encrypt theory and xml security standard of w3c, pki background were introduced simplely, and also, a feasible xml engine model was brought forward on this basis, and this model was carried out on linux platform, the article list some testing data of core module, including function testing and capability testing. at last
本文首先對xml引擎( xmlengine )系統所涉及到的xml及soap規范、應用密碼學知識和w3c有關xml安全的標準進行簡要介紹,對pki的基本知識進行概要說明,並在此基礎上提出一個完整可行的xmlengine模型。並在linux平臺上實現這一模型,對具體的實現步驟和細節進行詳細描述。給出了核心模塊的功能和性能測試數據。To construct eukaryotic expression vector of mbl gene with codon 54 point mutation, the target sequence in pgem - mbld plasmid, which conains mbl cdna with codon 54 mutant allele, was amplified by pcr. after the cdna fragement and plasmids pci - neo were prepared by digestion with sma i and sal i, the fragment was inserted into sma i and sal i site in pci - neo eukaryotic expression vector, and the recombinant vector, named pci - mbl54, was obtained. the pci - mbl54, digested with restriction enzymes, was found to contain the point mutation mbl cdna by agarose gel electrophoresis analysis
本實驗以ggc54gacmbl突變為研究對象,選用真核表達質粒pci - neo ,根據已構建好的含54位密碼子突變型mbl基因t載體的結構,設計合成新的引物, pcr擴增54位密碼突變型mbl基因,凝膠回收,雙酶切pcr產物和pci - neo質粒, t4連接酶連接,將前者克隆至後者的sma和sal位點,轉化大腸桿菌xl - 1blue ,氨芐選擇培養。You need to input your pin number to verify your identity
你需要輸入你的密碼,以核實你的身份。Requires double authentication. you have to pass the authentication procedures by inputting two pieces of information i. e. the taxpayer identification number and password
雙重核實使用者的身分,你須輸入稅務編號及通行密碼,通過系統的確認身分檢查,才可使用服務;Requires double authentication. you have to pass the authentication procedures by inputting two pieces of information i. e. the taxpayer identification number and e - tax password
雙重核實使用者的身分,你須輸入稅務編號及稅務易通行密碼,通過系統的確認身分檢查,才可使用服務The system may prompt for the e - cert password during the authentication process
您有需要于核實過程中輸入證書密碼。The e - mail requests customers to use an embedded hyperlink for example, " http : 202. 109. 79. 93. z hgk hk. html " to connect to a fraudulent website and verify their account information by entering their internet banking account s user name and password. the fraudulent website looks very similar to hsbc s personal internet banking logon webpage
這個電子郵件載有一個可連接至欺詐網站的超連結例如, http : 202 . 109 . 79 . 93 . z hgk hk . html ,並要求客戶經此超連結輸入網上理財戶口的用戶名稱及密碼,以核實其戶口資料。The operating process of network cipher computer and kdmc are discoursed firstly, then the tcp / ip stack of linux is introduced, and an ipsec realization method with using a cipher card is put forward. triplex key system is adopted for internet key exchange ( ike ). the database and other modules are also designed and implemented
論文論述了網路密碼機和密鑰管理中心的工作流程,接著介紹了linux下tcp / ip內核協議棧,提出了加密卡方案,採用了三重密鑰管理體系實現了internet密鑰自動交換,進行了中心數據庫設計與實現,最後對其它模塊進行了實現。With the same tin and password, a taxpayer can enquire about his personal tax information on the internet through the interactive tax enquiry service under the electronic service delivery scheme too. such a service was formerly available to those with digital certificates
市民亦可利用同一稅務編號和通行密碼,替代數碼證書在網上核實身分,使用公共服務電子化計劃下的互動稅務查詢服務查詢自己的稅務資料。? linux pci encryption card driver is designed and realized based on the study of the linux kernel
?研究了linux的基本內核結構,在此基礎上設計並實現了linux上pci密碼卡的驅動程序。66 msec for one 192 - bit ecdsa verification in gf ( p ) in the same system. in addition, ecc is widely adopted in the smart cards. therefore, we have proposed and accomplished a fast algorithm of ecdsa in gf ( 2m ) on a single chip based on the mcs51 kernel
另外,針對橢圓曲線密碼( ecc )在智能卡等領域的廣闊應用,本文還提出了一種特徵為2的ecdsa體制的快速演算法,並在基於mcs51內核的單片機系統中實現了該演算法。分享友人