證書使用系統 的英文怎麼說

中文拼音 [zhèngshūshǐyòngtǒng]
證書使用系統 英文
certificate-using system
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ動詞(寫字; 記錄; 書寫) write Ⅱ名詞1 (字體) style of calligraphy; script:楷書 regular script2...
  • 使 : Ⅰ動詞1 (派遣; 支使) send; tell sb to do sth : 使人去打聽消息 send sb to make inquiries2 (用; ...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 證書 : certificate; credentials
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採嵌入式pki完成基於網卡設備的安全認,認過程與主機無關,有效的防範了身份和密鑰被盜取的威脅;使基於角色的pmi實現中的訪問控制,保了策略傳輸的機密性,完整性。
  2. When copying a certificate to another system, use a secure copy method

    在將復制到其他時,請使安全復制方法。
  3. Using any secure copy method, copy c : host _ b _ cert. cer to host _ a

    使您選擇的任何安全方法將復制到其他。必須格外小心地保所有的安全。
  4. The stability of electric power system has been being focused for a long time toprevent a power system from losing synchronism after sudden fault , researchers have done much work and got many accomplishments this paper applied the direct feedback linearization ( dfl ) technique on the power system , a strong nonlinear system simulation results by matlab proved this method efficiency main works and results are as follows : this paper compared some existing methods in excitation control , fast valve control and coordinated control respectively, analyzed the developments and actuality of nonlinear control research in brief, illustrated why ransient stability could be greatly improved by using the fast valve control in chapter 3 , indicated the importance of coordinated control farther this paper introduced the inverse system theory, based on which , discussed the dfl theory, pointed out which had consistency with the inverse theory, expanded the dfl theory combined the idiographic model equations , made which adapt to the model of a single machine - infinite bus power system this paper referenced abundance articles and educed a set of equations , which could describe the dynamical process of excitation and fast valve control for synchronous generators in the equations , there were several very important parameters of power system - - rotor angle ( ) , rotor speed ( ) , generator q axis voltage ( eq ) , transient voltage ( e ' q ) , active power ( pe ) , mechanical input power ( pm ) , valve opening ( ) , generator terminal voltage ( vt ) , based on the model , nonlinear coordinated controller and terminal voltage optimal controller have been designed by using the expanded dfl theory and lq optimal control theory the simulation results showed that the controller could keep power system transiently stable under the effects of a symmetrical 3 - phase short circuit fault , which achieved better postfault regulation compared with another two routine methods , one is the proportion excitation controller and proportion fast valve controller, the other is the proportion excitation controller and the optimal fast valve controller, which could exert good performance when met 1ittle disturbance either

    在介紹逆理論的基礎上,詳細介紹了dfl理論,通過比較闡明了dfl理論其本質是逆方法的一類,並結合具體課題推導出的模型方程將dfl理論進行了擴展,使之適應于電力這個強非線性對象。通過參考大量的籍文獻推導出一套實的可將大型汽輪發電機勵磁與汽門綜合起來進行控制的模型方程,此模型方程涵蓋了電力中特別引人注目的幾個量- -轉子角、轉子轉速、發電機q軸電勢eq 、暫態電勢e ' q 、有功功率pe 、機械功率pm 、汽門開度、機端電壓vt ,在此基礎上建立了實的電力簡化的數學模型,並將擴展的dfl理論應於此模型,結合線性二次型最優控制理論設計出大型汽輪發電機的非線性綜合控制器及機端電壓最優控制器,通過模擬實驗與採常規的按電壓偏差進行調節的比例式勵磁控制器+汽門比例控制及採常規的按電壓偏差進行調節的比例式勵磁調節器和基於二次型性能指標設計的最優快控汽門(考慮發電機的飽和因素)進行了對比,實了採此種控制器可以有效地提高電力的暫態穩定性,並且在電力遭受小干擾時同樣具有良好的調節性能。
  5. National authoritative organization, get software product register the certificate, system this can u - sed in the building are controlled, the computer lab concentrate on being controlled, industrial cont - rol, long - distance data picture sound are controlled, have already used in a large amount in every p - rofession and trade, such as customs, electric power, insurance, bank, government bodies, factory, etc.

    公司研發部自主開發的zlt - monitor遠程監控組態平臺可將數據流視頻流音頻流共一個平臺集中監控, c s b s結構,同時採rs485技術和lonworks技術,國內屬于首創,該經國家權威機構測試登記,獲得軟體產品登記和版權登記,該於數據流視頻流音頻流的遠程集成監控管理,已在機房集中監控智能樓宇監控電力遠程監控物流遠程監控工業控制遠程監控等領域上千個項目中大量使
  6. This paper has analyzed the pkix ( public key infrastructure based on x. 509 standard ) digital certificate authority mechanism, and has discussed the espkix, a platform independent and java implemented essential pkix, and its implementation. it covers the design thought in the phases of certificate request, issuance and revocation

    本文分析了基於x . 509標準的公鑰基礎設施( pkix )數字授權機制,對使java語言設計和實現跨平臺的簡化版pkix ? espkix ( essentialpkix )進行了深入的討論,涉及espkix的請求、頒發和撤消等各個階段。
  7. The paper has discussed the technique of ldap directory used in dcms, with which the certificates, generated by the certification authority supported by dcms, are published. the paper has also made a detailed analysis on the principle and implementation of certificate decoding

    論文探討了dcms使的ldapv3目錄服務技術,利它完成對dcms支持的認中心生成的各種的頒布,對解碼方案的原理和實現進行了深入的分析。
  8. The design of pmi system we done and its major modules, such as policy, log and certificate are conforming to xml formats. thus we can combine it to network service framework and guarantee the efficiency of network service security and trust

    本文探討了安全xml技術在pmi中的應,所設計的pmi完全基於xml格式,包括策略、日誌以及等,使之可以與網路服務框架有機地結合起來,從而保安全可信網路服務的效率。
  9. The paper through to analyse the background, meaning and necessity for implement bidding & tender of online architectural design, through to discript and compare with different mode of domestic and international of application for bidding & tender in network, to propose a unique opinion of solution system which is ndbs mode for bidding & tender of online architectural design, the mode is to submit the whole course of bidding & tender of online architectural design from planning for bid, information issue, pre - qualification, call for bid meeting, tender submit, tender evaluation and confirm the solution to sign the contract in internet. the paper through to structure a bidding platform ( bdb. cn ), to analyse the funcation procedure of bidding and tender system of online architectural design, from the sight of bid invitor, bidder and tender evaluated angle, to link them closely. the paper carry on system design to ndbs mode, input and outut, the information and keep them, safety and data stored, the paper combine with online architectural desigh wenzhou huameng building ( railway station road 1 - 2 massif ) as an example of ndbs mode finally, the result of study indicate, bidding and tender of online architectural design is not only feasible technically, the procedure of bidding and tender accord wigh the law, but also it is unanimous in traditional bidding way, this implement the scheme can improve working efficiency greatly, reduce the cost of bidding effictives, make it standard science further, to realize a pualitative leap in the building management level

    論文通過對實施網上建築設計招標投標的背景、意義及必要性進行分析,通過對國內外不同模式招標投標網路應的綜合敘述與比較,提出了具有獨特見解的的網上建築設計招標投標解決方案? ? ndbs模式,該模式是對建築設計招標投標全過程從招標準備、信息發布、資格預審、招標會議、標遞交、評標決標到合同簽訂的網上解決方案,論文從構建網上招標平臺( bdb . cn )開始,對建築設計招標投標的功能流程進行分析,從招標人、投標人和評標人的角度出發,通過對其在整個招標投標活動流程在網際網路中的無縫連接,使得通過bdb . cn招標平臺,能夠達到建築設計招標投標各參與方的一網打盡。論文還對ndbs模式進行了設計,對輸入輸出、安全與數據加密和招標投標資料儲存進行設計,從技術的層面對該提出了解決的方案。論文最後還結合溫州華盟大廈工程(車站大道1 - 2 #地塊)的網上建築設計招標投標的實例,對ndbs模式進行了實,研究結果表明,實施網上建築設計招標投標,不僅在技術上是成熟可行的,在工作流程上是符合法律法規的,與傳的招標投標方式也是一致的,而且能夠大大提高工作效率,有效降低招標投標成本,使得招標投標能夠更加規范、科學,實現建設管理水平的一個質的飛躍。
  10. By submitting a web page to sinobal, or any other web page hosting service on sinobal, you grant sinobal a world - wide, royalty - free, nonexclusive, worldwide, unrestricted license to use, copy, transmit, publicly display, publicly perform, create compilations including, and distribute such web page, and any associated content, for the limited purposes of publishing and promoting the user s web page in connection with the particular service with which the user has chosen to have the web page hosted and for publishing and promoting such web page elsewhere within sinobal

    通過使「服務」而下載或以其他形式獲取任何材料是由您自行全權決定進行的,且與此有關的風險由您自行承擔,對于因您下載任何該等材料而發生的您的電腦的任何損毀或任何數據損失,您將自行承擔責任。您從或通過或從「服務」獲取的任何口頭或面意見或資料,均不產生未在本協議內明確載明的任何保
  11. Certificate management subsystem, communicating with key management subsystem safely through spkm agreement and ca, can be used to manage and use ca to complete issuing and filing of the ca and to issue a blacklist for rescissory ca

    管理子可以對ca密鑰進行管理和使,通過spkm協議和數字安全地與密鑰管理子通訊,完成戶密鑰的處理,簽發數字,並進行發布與歸檔,對已經廢除的,簽發黑名單。
  12. Guandont changjiang electric cable ltd. is a large and specialized electric cable joint - venture manufactory which posses beautiful srrrounding, well organized factory, advaanced facility, tremendous strength and enormous manufactory capability. by absorbing the management method from the advanced countries, our company systematically appraises the quality of all products with well management, completed equipment and specialized technicians. therefore, we gained the approval of government and acquired the iso 9002 certificate, the " nanguang " electric cable manufactured by our company is insured by the china people slnsurance company. therefore, it is very popular

    本公司吸取先進國家的管理方法,以完善的管理手段,配套全的檢驗設施和專業的技術人才,對每批產品進行全面,的鑒定,從而得到國家相關部門的肯定,並先後取得iso9002國際認,全國工業產品生產許可,電工委長城認,全面質量管理達標,且產品質量由中國人民保險公司承保,使本公司生產的「南光牌」電線電纜得到廣大戶的好評。
  13. And design a mini certificate award system by using the information security system as example

    並通過設計一個小型頒發( ca ),來實例使所設計的信息安全
  14. The model is applied in ca / ra, it creates and manage storage and issues of pki key data. pki system is a common, safe and foundational institute. unsymmetrical code arithmetic principle and technology is applied into pki system and provided safety service

    Pki是一個非對稱密碼演算法原理和技術來實現並提供安全服務的具有通性的安全基礎設施,它通過使公開密鑰技術和數字來確保信息安全並負責驗數字持有者身份的一種體
  15. However, the electronic filing process requires the taxpayer to sign the tax return personally by using his digital certificate or his registered e - tax password

    不過,電子報稅要求納稅人使他的數碼或他已登記的稅務易通行密碼親自簽署。
  16. However, the electronic filing process requires the taxpayer to sign the tax return personally by using his digital certificate or his password as registered in the department s teletax system

    不過,電子報稅要求納稅人使他的數碼或他在電話稅務通登記的通行密碼親自簽署。
  17. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子接受它所管轄的虛擬域內戶的請求,利gss ( genericsecurityservice )標準令牌交換協議相互驗身份后,通過查詢數據庫得到戶相關的授權策略,並把授權策略寫入到代理中,返回給請求戶; ldap目錄服務器儲存了ca、資源策略和位置信息等;訪問控制實施子通過對應程序授權部分進行擴展,使其支持嵌入在代理中的授權策略,並結合本地的安全策略做出最終決策。
  18. It mainly behaves as follows : firstly, with the rapid development of the application of card, every department of campus gradually sets up its own application system of card. but techniques and criterions introduced into these systems are not identical with each other. as a result, various application systems of card are not harmony with each other and resources ca n ' t be reasonably configured and shared ; next, each student has many cards, for example student certificate, the card for restaurants and telephone and so on

    目前各大學在校園卡應管理上存在諸多問題,主要表現在以下幾個方面:由於卡應的快速發展,校內各單位逐步建立起自己的卡應,而這些的技術與規范不一,造成了各種卡應無法兼容,資源不能合理配置和共享;學生手中的學生卡、食堂飯卡、圖館借閱卡、銀行消費卡以及電話卡等等,少則三、四張,多則六、七張,給學生卡帶來了不便;校園網建立較晚,使學校各單位管理不能一。
  19. This chapter describes how a certain pki / ca system is implemented, including the requirement analysis, the safety scheme design, the using of the certificates, the client safety, the server safety and the security at the time of unsealing the bidding files

    描述了一個具體的pki ca是如何實施的,其中包括安全的需求分析、安全方案的設計、使、客戶端、服務器端及開標時安全的實現。
分享友人