軟體保密性 的英文怎麼說
中文拼音 [ruǎntǐbǎomìxìng]
軟體保密性
英文
software privacy- 軟 : Ⅰ形容詞1 (質地不硬) soft; flexible; supple; pliable 2 (柔和) soft; mild; gentle 3 (軟弱) we...
- 體 : 體構詞成分。
- 保 : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 軟體 : [計算機] software軟體包 (程序包) software package; 軟體程序 software program; 軟體跟蹤方式 soft...
-
Operating system is the only basic software anear the hardware. its security is the base of other software. if there is no the security base, the security of application system or security system building on operating system, such as pki, encryption techniques, is not ensured
操作系統是唯一緊靠硬體的基本軟體,其安全職能是其他軟體安全職能的根基,缺乏這個安全的根基,構築在其上的應用系統以及安全系統,如pki 、加密解密技術的安全性是得不到根本保障的。The author wish this study win be used in the development of numerical control dividing lathe that can divide into groups of the size for precise measure of thickness of ompressor carboy hatch soft shim the system of pneumatic measure applied widely for component measurement in produce process in factory. the author 100kup a large number related documents over about one and half year for research and went to factory and related research institute for investigating
並希望將這一研究結果應用於對「壓縮機缸蓋軟體墊片」厚度尺寸精密測量分組的數控分選機的研製。氣動測量系統以其測量倍率高、測量精度高、測量力小( 0 . 05 1n ) 、對被測工件有自潔作用、測量精度保持性好、抗干擾能力強等優點而被廣泛應用於工廠生產過程中的零件檢測。" the apparent paradox that openness about your methods leads to better security is not unique to computer software - military and diplomatic cryptographers have known for a century that it is folly to depend on the secrecy of your encoding method rather than the secrecy of your keys, " says raymond
Raymond說: 「公開您的方法將導致更好的安全性這個明顯矛盾的觀點並非計算機軟體所獨有,軍事和外交上的解密者知道這個觀點已有一百年了:依賴編碼方法的保密性而不依賴密鑰的保密性是非常愚蠢的。 」So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security
但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的攻擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。Refractory fiber and product is manufactured by means of dry method and wet method. as an excellent insulation material, it has comparatively low volume density, good softness and very low thermal conductivity coefficient. sticking method, ancjoring method and folding method can be selected respectively. this product can be used in various industrial kilns & furmaces for lowering heat consumption
耐火纖維及製品是採用干法、濕法生產的具有較低體積密度、較好柔軟性、極低的導熱系數的優質絕熱保溫材料,施工時可分別採用粘貼法、錨固法、折疊塊形式施工,適用於各種工業窯爐降低熱耗之用。In the second part of this paper, it makes a detailed analysis among fluid - model - based, smith - principle - based and two - pd - controllers - based by comparing to the method and application of control theory. then it gets the laws to keep the control loop stable. in order to analyze the dynamic and transient characters, three congestion control algorithms mentioned above have been carried out in the nist atm network simulator and the successful outcomes are brought out
本論文對atm網路abr業務擁塞控制的控制理論演算法進行了總結,簡要分析了其優點和缺點;運用控制理論的分析方法和觀點對基於流體控制模型、史密斯預估控制模型和雙重比例微分控制模型三種擁塞控制演算法加以具體的分析,從而分析了怎樣確保控制環的穩定性;在nistatm網路模擬軟體中嵌入以上三種擁塞控制演算法,從而對演算法的動態和瞬態特性進行模擬分析,以此證明控制演算法的有效性;最後提出了今後atm網路abr業務擁塞控制演算法的發展趨勢。The meijiayi mjy channels therapeutic apparatus developed by our company, combines the advanced microcomputer technics with the profound traditional chinese medicine methods as well s the human channelss science, magically takes advantages of modern electronic technics and the outer treatment of chinese medicine, realistically simulated the effects like acupuncture, aprapathy, essage, eating, kin scraping and cupping, etc. which improve the comprehensive effects, especially for the common ailments and geriatric diseases in digest digestive system, respiratory system and nervous system
旋翼式多流束濕式基表,雙脈沖采樣方式進行數據採集,採用計算機技術進行數據處理顯示控制閥門動作。它採用獨特的卡口安全及保護措施動態安全可靠的ic卡加密機制先進的硬體及軟體的容錯處理性能安全可靠,具有精度高自身功耗低體積小壽命長便於安裝等特點。能準確實現用水計量及實現預付費功能。The aim of this research project is to supply the technical preparation for the nuclear power station domestalization and autonomous design, to improve the design quality and level, to ensure the reliability of the sealing system in the advanced pressurized water reactor vessel, to ensure the nuclear safety, and to raise the design software level of the nuclear vessel sealing system to the advanced world class
本課題研究的目的是為核電站國產化及自主設計提供技術準備,提高設計質量和設計水平,確保先進壓水堆核容器密封系統設計的可靠性,確保核安全,使核容器密封設計軟體達到世界先進水平。The software of the buoy system is complicated, the controlled object amount to five bouys, diversification of control mode in every bouy, and the software joint with multi - hardware. for the sake of reliability, a series of hand signals are required
浮標監測系統軟體繁雜,被控對象多達5個浮標,每一枚浮標內部的控制方式復雜,各軟體與硬體結合緊密,需要一系列握手信號保證系統的可靠性。This paper used complex encrypting algorithm, and used the method of software encryption at the mobile terminal to certificate the security of data delivering, at the same time, by setting the rule of data delivering between the wap gateway and the server, it solved the problem efficiently
摘要使用混合加密演算法,同時在移動終端使用軟體加密方法來保證數據傳輸的安全性,並且在wap網關和服務器間設置數據傳輸規則,從而有效地解決了此問題。This paper, giving an example of society security smart ic card, mainly tells of the design and realization of smart card core - operation system ( cos ). in the first chapter general design idea of smart card operation system is brought forward, it including theory, principle of system. in the second chapter, the characters and qualities of smart card chip - gk1207 adopted in this system is introduced
本論文以社會保障智能ic卡為例,著重講述了智能卡的核心?操作系統( cos )的設計與實現,其中第一章提出了智能卡操作系統的總體設計思想,包括系統工作原理、設計和實現原則;第二章對本系統採用的智能卡晶元? gk1207的性能特點進行了介紹;第三、第四章主要講述了智能卡cos開發的兩項關鍵技術? ?加密演算法和通信協議;第五章具體討論了社保卡cos的軟體設計與實現。Now, the legislation protection of computer software is still an important problem in spite of so many years " discussion. and this problem has n ' t been solved thoroughly up till now. this article begins with detailed analysis of the history, main problem, advantages and disadvantages of the protection to computer software by copyright law, patent law and trade secret law
本文擬首先逐一詳細分析:計算機軟體版權法保護的歷史發展、主要問題、優勢及存在的問題;專利法保護的曲折發展、軟體的可專利性、採用專利法保護的必然性、主要障礙和出路;商業秘密的構成、商業秘密法保護軟體的可行性和不足之處,從而對計算機軟體取得更全面和深入的了解。The following four conditions are allowed us to publish your information : in order to observe the relevant laws and regulations, obey the legal service procedures of jinjiang sansheng shoes material co., ltd in order to preserve the trademark property of jinjiang sansheng shoes material co., ltd in order to preserve user and social masses privacy security on our behalf in urgent case in order to conform to other relevant requirements members population analyse consultation rights are reserved by jinjiang sansheng shoes material co., ltd6
D用戶同意遵守中華人民共和國保守國家秘密法中華人民共和國計算機信息系統安全保護條例計算機軟體保護條例等有關計算機及網際網路規定的法律和法規實施辦法。在任何情況下,百絲達服裝材料有限公司合理地認為用戶的行為可能違反上述法律法規,金勵工藝網可以在任何時候,不經事先通知終止向該用戶提供服務。用戶應了解國際網際網路的無國界性,應特別注意遵守當地所有有關的法律和法規。Abstract : technology dimensions of work parts always exceed the determined technology dimension limits. but when the work parts are big enough, it is still possible and valuable to modify the work parts " following technology process and technology dimensions, which are respectively called as dynamic technology process ( dtp ) and dynamic technology dimension ( dtd ), to ensure them to be qualified. a mathematical model is proposed which is about how to plan the dtd once the dtp is determined. a software has been written to testify the correctness of the above model. this model will be very useful in the capp and online quality assurance in the manufacturing of precise machine parts
文摘:工件的工藝尺寸在工藝過程中經常會超出許可的范圍,但當這些超差工件仍有足夠的加工余量時,通過修改其後續工藝路線(稱為動態工藝路線)及工藝尺寸(稱為動態工藝尺寸)仍有可能將其加工成成品.本文提出了一種在後續工藝路線確定后如何確定后續工藝尺寸的數學模型,並利用該模型成功地編制出了動態工藝尺寸設計的軟體,且用很多事例驗證了該模型的正確性.該方法可以應用於精密機械零件製造時的計算機輔助工藝過程設計及在線質量保證It particularly analyzes the encryption algorithms to choose a perfect frame, and makes good use of the advantages of rsa algorithm and des algorithm, so that the whole system obtains a credible guarantee of its security
進行了詳細的演算法研究及選型,合理運用了rsa和des演算法的優勢互補,從而為整個應用系統提供了可靠的安全性保障。論文完成了信息加密系統的軟體演算法的詳細設計和硬體電路的搭建。Using standards - based ipsec technology, vpn client extends the integrity and confidentiality of data traveling outside of enterprise networks by providing encryption, compression, and authentication
本軟體基於ipsec標準,通過加密,壓縮和認證來保護傳輸數據的完整性和機密性。Compare dbs aes with permutation code, we found use encryption and decryption technology based on permutation code, can ensure the encrypted software ca n ' t be pirated
對比des 、 aes ,說明使用排列碼加密演算法,是可以保證被加密的軟體安全性的。This paper introduces some practicable ways to realize the design of background signal simulator console software, database exploitation and the data processing for the gps receiver ( gn - 79 ). to meet the needs of these superiorities such as simple maneuverability, modularization and high secrete security, we considerably think of those requirements in the aspects of the signal - producing, hardware - setting, timing and orientation, user setting and so on, during the period when we design the software, make the database accessing down to the bottom layer, and obligate full space for its improvements of software modification and function expansion
由於工程的操控部分即軟體實現部分需要體現簡便、易控、模塊化以及保密性好等優勢,因此,在設計實現操控界面的同時,充分考慮了信號產生、硬體設置、定時定位以及用戶設置等各方面的要求,實現了數據庫訪問技術到底層的管理,為將來的軟體修改、功能擴容留下了充分的空間。Malware is malicious code or software secretly inserted into a system to compromise the confidentiality, integrity, or availability of the data or applications residing on the network
惡意軟體是秘密地插入系統、危及網路中的數據或應用程序的保密性,完整性或可用性的惡意代碼或軟體。These information properties include a company s financial data, human resource data, customer information, product sales data etc. because the confidentiality of information properties is getting more and more valuable, software development companies could use the complex designs of software protection lock to enable encode and decode data files, therefore software protection locks have an additional function
這些信息資產包括公司的財務數據人事數據客戶數據銷售數據等。信息資產的保密性愈來愈受重視,而軟體開發公司可利用軟體保護鎖的復雜設計來達到將數據文件做編碼與譯碼的功能,所以軟體保護鎖便又多了一項可利用的價值。分享友人