身份認證機構 的英文怎麼說

中文拼音 [shēnbīnrènzhènggòu]
身份認證機構 英文
certificate authority
  • : Ⅰ名詞1 (身體) body 2 (生命) life 3 (自己; 本身) oneself; personally 4 (人的品格和修養) on...
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : machineengine
  • : Ⅰ動詞1 (構造; 組合) construct; form; compose 2 (結成) fabricate; make up 3 (建造; 架屋) bui...
  • 身份 : 1. (人的社會、法律地位) status; capacity; identity 2. (受人尊敬的地位) dignity
  • 認證 : [法律] attestation; authentication; identification認證費 certification fee; 認證條款 testimonium ...
  • 機構 : 1 [機械工程] (機械的內部構造或一個單元) mechanism 2 (機關; 團體) organ; organization; institu...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者的真實性、數據電訊的密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論了數據電訊制度產生的必然性;第八章通過對各國立法對電子據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. Too much traditional aid is in the form of so - called technical assistance that often benefits the donor countries more than the recipients. ( south korea ' s help in providing “ smart ” national identity cards is an egregious example. ) besides, the time spent dealing with so many do - good western agencies, each with an aid agenda that almost certainly conflicts or overlaps with others, sorely tests the government of a poor country short of institutional resources

    而其他以所謂技術援助名義的傳統援助項目,實際受益者往往是援助國自,而不是被援助的國家(例如,韓國幫助建立的「智能卡」的國家系統就是一個很壞的例子) ,此外,數量繁多的所謂國家慈善,每一個都是繁雜且功能有所重復,對本來就是貧困國家的政府來說,光是接待和應付他們所花費的精力就是不堪重負。
  3. The emphasis is, however, put upon the analysis of the solution and the objectives of the design, the techniques of general and detailed design of the system. the terminal server supporting to three - layer c / s structure of the microsoft is applied in the construction of the system. the terminal server can make the numerous customer to register the server togather, and just like working on the server at the same time

    該系統運用microsoft的terminalserver系統支持,實現了三層c s結,使眾多的客戶端可以同時登錄到服務器上,彷彿同時在服務器上工作一樣;並解決了一些實際問題,如工程文件間傳參問題,讀取遠程客戶軟驅數據文件問題;設計了四層安全模式,實現以個人的進行系統權限的分配;進行了與企業運營相關的優化,包括倉儲操作優化、裝配車優化等
  4. When constructing countrywide production & management decision support system of tobacco industry, there are security questions in data integrity, secrecy, irreversibility, and identity authentication authorization

    建全國煙草行業卷煙生產經營決策信息系統(簡稱國家煙草一號工程)中,存在數據完整性、密性、不可否性及授權等安全問題。
  5. The trusted third party is called certification authority ( ca ). the ca identifies the user s identity by issuing a id certificate which contains a number of checked identity information about the person to whom it refers, the information include : serial number, identity of ca issuer, starting and ending dates for the certificate, identity of holder, public key of holder etc. however, the provision of identity services raises a number of legal issues which are only being considered by legislators, for instance, the establishment of the ca, the scope of the ca s liability, the limitation of the ca s liability, the reciprocal recognition of certificate issued by different ca which locates different countries

    制度的核心問題,就在於尋找一個可信賴第三方( tustedthirdpap )來解決數字簽名書的分發問題。目前,通行的做法是設立一個身份認證機構( certificationauthorityca ) 。數字書是載有數字簽名人即數字書持有人基本信息(包括姓名名稱、經營場所、資信狀況、
  6. Under the present mode of operation, taxpayers need to apply to a recognized certificate authority for a digital certificate and use the certificate for authentication and signing of the tax returns by affixing digital signatures

    納稅人在網上提交報稅表時,必須使用向可核申請的數碼書,以確及作出數碼簽署。
  7. In order to demonstrate the functions of a ca, verisign int., one of the most important the verification agencies for digital signatures in the world is described and analyzed, thus the requirements to operate a ca are concluded in the second part

    為了示例一個中心的功能和運行要求,在第二部分描述、整理和分析了一個全球性的身份認證機構的實踐操作要求, verisign全球中心。
  8. Photocopy of certificate of status for honorary consuls and officially recognised representative issued by the govt

    香港特區政府簽發的名譽領事及官方代表明書的影印本6
  9. Guideline sets out in detail the standards and procedures expected of authorised institutions in their customer identification, record keeping and reporting procedures so as to prevent the use of the banking system for the purposes money laundering

    指引詳細列明預期在查客戶分保存記錄及舉報可疑交易時應採用的標準及程序,以防止利用銀行體系進行
  10. This system ' s architecture is based on the advanced pki techniques and encryptions techniques, configured with indispensable hardware for security technology to form a substantial application security platform. this integrated application security platform provides the muti - platform applications systematical uniform security services, mainly including user ' s identification, confidentiality and integrity for data transmission, access control, user ' s digital sign and verification, cryptographic key management etc, to fulfill the trans - computer - type and trans - operation system control & management system, which is independent of different business applications or business procedures

    本設計方案以信息系統安全理論與系統工程學原理為基礎,在網路環境下建了應用安全平臺,實現了一個跨硬體型與操作系統臺的、與具體應用部署方式無關的統一的安全策略配置,實現了包括、訪問控制、數據密性和完整性控制、應用密鑰管理服務、抗抵賴、安全審計、數據安全等安全服務。
  11. Under the open internet environment, three security mechanisms, including data confidentiality, identity authentication, and access control mechanism, must be realize when constructing logic secure subnet

    在開放的網際網路絡中,建邏輯安全子網必須要實現三種安全制:數據保密性制、制和訪問控制制。
分享友人