標識權標 的英文怎麼說

中文拼音 [biāozhìquánbiāo]
標識權標 英文
identity token
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
  • 權標 : warder
  1. Judicial adjudication on conflict of commercial mark right

    商業利沖突的司法裁量
  2. The company might not be willing to part with the motorola brand, its batwing logo or the patents that underlie the devices ' operations, design and manufacturing, some of which are used by other divisions at motorola

    該公司可能不願放棄摩托羅拉品牌,蝙蝠翼形狀的以及作為設備運作、設計和製造基礎的專利,而摩托羅拉的其它一些部門也在使用這些。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建立備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. Involuntarily, questions of these engineering datas " management appear, datas " persistance only depending relational model and rdbms is greatly insufficient, so this paper carefully studies object - relational mapping based on rdbms based on the analyse of home & overseas actualities, correlative theories and realizing methods of object - relational mapping, we find opl based on rdbms is the most suitable for object relatinoal mapping of clera. based on the engineering application analyse of opl in clera, function requirements, database modes, interface criterions and functions, running modes of opl have being detailedly described. with the framework of microsoft dna, a kind of realizing method of opl based on com / dcom / activex component technology has being brought forward, and this paper describes realizing keys from base tables " definition, object id and class hx class and inheritance of class, object storage, parallel control and affair, object query, object nesting, relations between objects, support of complex data types, right control of object and buffer management of object

    本文在分析對象?關系映射技術的國內外現狀、相關理論及實現方法的基礎上,研究發現基於rdbms的opl是目前最適合clera的對象?關系映射方法;在clera的opl應用分析的基礎上,詳細描述了opl的功能要求、數據庫模式、介面規范與功能、運行方式等內容;結合microsoftdna開發框架,提出了一種基於com dcom activex組件技術的opl實現思路,並從基本表定義、對象與類、類與類繼承、對象存儲、並發控制與事務、對象查詢、對象嵌套、對象間聯系、復雜數據類型的支持、對象級限控制及對象緩沖管理等幾方面概述了實現要點。
  5. 11 partly erected / dismantled scaffold must have suitable warning signs posted in prominent locations, be barricaded off, or policed to prevent unauthorized entry. the use of scaffold tags is strongly recommended

    必須在部分安裝或拆卸的腳手架的顯眼位置上懸掛合適的警告語,或者加以警戒,以防未經授的人員進入。強烈建議使用腳手架
  6. Information technology - digital compression and coding of continuous - tone still images - registration of jpeg profiles, spiff profiles, spiff tags, spiff colour spaces, appn markers, spiff compression types, and registration authorities regaut

    信息技術.連續色調靜態圖象的數字壓縮和編碼. jpeg提問文件, spiff提問文件, spiff符, spiff顏色空間, appn記, spiff壓縮型和注冊威機構
  7. An atm term. authority and format identifier : this identifier is part of the network level address header

    Atm術語。限和符:該符是網路級地址報頭的一部分。
  8. That is, the messaging engine authorizes access to the queue based on the connection identity as we discussed earlier

    即,消息傳遞引擎將根據我們前面討論的連接對此隊列進行訪問授
  9. 100th canton fair attached great importance to ipr protection

    鱷魚商案上榜上海2006年保護知十大案件
  10. The pledge right of intellectual property is one kind of pledge rights, it thus has the characteristics of property right, mortgage, subordinacy, and priority of payment, which are held by normal pledge right. because the subject - matter of intellectual property is a kind of chose in action, it therefore has some features different from other rights and duties in its object, way of establishing, and way of realization

    利質的一種,因而具有物性、擔保性、從屬性、優先受償性等一般質的特徵,但由於知的物為一種無體財產,因而其在客體、設定方式、實現方式上有著不同於其他利質的特徵。
  11. 7 the property of the land development corporation owned by it immediately before the commencement of parts ii to viii is transferred to and is owned by the authority subject to any existing claim or liability, and the authority may sue on, recover or enforce a chose in action transferred by this subsection without having to give notice of the transfer to a person bound by the chose in action, and without limitation it is provided that the insurance policies and any benefit of trade marks, copyright and other intellectual property rights held by the land development corporation are transferred to the authority

    7土發公司在緊接第ii至viii部生效日期之前所擁有的財產,連同所附帶的任何既有申索或法律責任一併轉歸市建局任何據法產如是憑藉本款轉歸市建局的,則市建局可就該等據法產提起訴訟進行追討或採取法律行動,而無須將該等據法產已轉歸市建局一事通知受該等據法產約束的人而且在沒有限制下,現規定土發公司所持有的保險單以及商及其他知利的利益,均轉歸市建局。
  12. The identity of the asp. net application that will use the imported rsa key container must be granted authority to read the contents of the rsa key container

    必須向將使用所導入rsa密鑰容器的asp . net應用程序的授予對該rsa密鑰容器內容的讀取限。
  13. To be ecific, the types of intellectual property are copyright and related right trademarks ( including service marks ) ; geographical indicatio industrial desig patent layout - desig of integrated circuit undisclosed information ( including trade secrets )

    具體而言,知類型包括:版極其相關利;商(包括服務商) ;地理;工業設計;專利;集成電路布圖設計;未披露信息(包括商業秘密) 。
  14. According to the article 22. 1 of the tri agreement, the term of " geographical indicatio " refers to the indicatio which identify a good as originating in the territory of a member, or a region or locality in that territory, where a given quality, reputation or other characteristic of the good is e entially attributable to its geographical origin

    根據《與貿易有關的知協定》第22 . 1條, "地理"指的是能表明一貨物來源於一成員領土或該領土內一地區或地方,該貨物的某種特徵、名聲或其它特徵本質上歸因於其地理來源。
  15. A weighted data fusion on target recognition based on evidential theory

    一種基於證據理論的目別加數據融合
  16. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全控制,通過對系統工作人員授分散化、建立用戶與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等準對保護電子文件、電子檔案信息原始性、真實性有著重要意義。
  17. Using copyright notice to strengthen copyright protection consciousness

    加註版記提高版保護意
  18. Table, and then resets his or her own identity

    表的限,然後重置自己的
  19. Class with the specified identity, rights, flags, inheritance type, and inherited object type

    使用指定的限、志、繼承類型和繼承對象類型來初始化
  20. Class with the specified identity, rights, flags, object type, inheritance type, and inherited object type

    使用指定的限、志、對象類型、繼承類型和繼承對象類型來初始化
分享友人