電子保密系統 的英文怎麼說

中文拼音 [diànzibǎotǒng]
電子保密系統 英文
electronic security system
  • : Ⅰ名詞1 (有電荷存在和電荷變化的現象) electricity 2 (電報) telegram; cable Ⅱ動詞1 (觸電) give...
  • : 子Ⅰ名詞1 (兒子) son 2 (人的通稱) person 3 (古代特指有學問的男人) ancient title of respect f...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 電子 : [物理學] [電學] electron
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即的可靠性、交易者身份的真實性、數據訊的機性和完整性、數據訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了提單網路安全體的建立以及安全護法規,第四章則介紹了提單的安全認證機構,第五章介紹了信息加技術以及各國立法對碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據訊制度產生的必然性;第八章通過對各國立法對證據的法律效力的規定,論述了對交易至關重要的數據訊的不可抵賴性。
  2. The paper mainly designs the electronic official document transport system, analyzes the framework, key technologies and securities. this paper put forward to the scheme about these key technologies, such as the user ' s certificate exchange, secret key management, red - header document and seal processing, files " inputting, and datum compressing. the paper introduces the detailed implement of the project with a demonstration

    公文傳輸的功能需求、關鍵技術以及安全性進行了深入研究和分析,本文重點對公文中的傳輸作了詳細的需求分析和結構設計,該設計全面考慮了公文在傳輸過程以及收發文過程的機性、完整性、真實性以及不可否認性等特性,提出的機性、完整性、真實性及不可否認性的解決方案。
  3. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為文件歸檔時檢驗原始性、真實性的唯一依據;文件歸檔管理層中的主要任務是要建立起嚴的歸檔制度,同時結合「文件生命同期表」建立檢驗措施文件在歸檔過程中信息內容的原始性、真實性;檔案管層中主要任務是建立檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對檔案載體的維護、建立檔案維護管理的信息文檔等工作,確管期限中的檔案持其可用性、可存取性、可理解性:建立文件與檔案原始性、真實性護體安全控制,通過對工作人員授權分散化、建立用戶標識與認證技術等措施確護體」安全運行;加強「護體」涉及的標準與規范的制定工作,如建立一的歸檔于文件、檔案基本結構等標準對文件、檔案信息原始性、真實性有著重要意義。
  4. We provide a secured system to store your chop image and signature with a password. this allows you to handle all signatures and stamping without printing out the document or leaving your desk

    簽名蓋章可以利用易傳通特有的簽字蓋章,有護,用以確認,審批記錄。
  5. In addition to the standard security features to protect against unauthorised access, the most advanced encryption technology is used to ensure that only authorised tenderers could submit bids, that their bids once submitted cannot be altered and that they remain encrypted and inaccessible by all parties until the electronic tender box is opened under the same kind of procedures as apply with our existing manual system

    除具有標準的特點以防止擅自進入外,投標採用最先進的加科技,以確只有獲授權的投標者才可遞交標書,而且他們的標書一經遞交便不能更改,並會持加,任何人士均無法取得,直至本處按現有人手方法的同類程序把投標箱打開為止。
  6. Solid materials handling and pneumatic conveying system packaged machinery and its equipment and valves are mainly used for conveying, material unloading, dedusting, metering, mixing, packing units in the processing units of the solid materials including powder, particles, powder mixtures and flakes of abs, ps, pe, pp, pom, san, pet, pc, pta, pvc, bpa, sap, as and pmma in the trades of petroleum, chemical industries, chemical fiber, dye, pharmacy, food, electronic, paper making, natural gas, power, environmental protection, metallurgy and etc. it is applicable for various pneumatic conveying systems and gravity flow conveying systems under the conditions of diluted - phase, densed - phase, high pressure, low pressure and vacuum pressure

    固體物料處理和輸送成套機械及其專用設備、閥門主要應用於石油、化工、化纖、染料、醫藥、食品、、造紙、天然氣、力、環、冶金等領域中固體物料(含abs 、 ps 、 pe 、 pp 、 pom 、 san 、 pet 、 pc 、 pta 、 pvc 、 bpa 、 sap等粉沫、顆粒物料、粉粒混合物、片狀)生產加工過程中輸送、卸料、除塵、計量、混合、包裝等工段使用,能適用於稀相、相、高壓、低壓、負壓各種氣力輸送和重力流輸送
  7. These products are widely applied to air purification system and liquid purification system for the fields such as electronics, optics, chemical industry, precision machine, food, medicine, bio - engineering, hardware and plastic, printing, electric power and environment protection

    產品廣泛應用於、光學、化工、精機械、食品、醫藥、生物工程、五金塑膠、印刷、力、環等行業的空氣凈化和液體凈化
  8. To address the basic concerns of authenticity, integrity, confidentiality and non - repudiation in electronic transactions through the internet, a person must authenticate himself when using the service

    的安全措施透過網際網路以方式交易是否可辨認確完整和不容推翻等均是備受關注的問題。
  9. How secured is the ets as an electronic business application

    投標商業應用上的程度怎樣?
  10. It is a promising technology and applied in a wide range of applications such as electronic street nameplate, ticketing system, automobile management, assembly line automation, due to its capability of dealing large scale data, high security, good anti - emi ( electro magnetic interference ) capability, fast response and low cost

    它具有數據量大,性高,抗干擾能力強,識別時間短,費用較低等優點,有很好的應用前景,如:路牌、票務、車輛管理、自動化生產線管理等。
  11. In this article, two projects - " sqy - 15 encrypt subsystem of hospitalization insurance system " and " general image compress flatform " are combined to get a resolvent scheme to realize data encrypt and image compress based on digital signal processor ( dsp ) and application specific integrated circuits ( asic ). this article includes three key technologies in designing and realizing the data encrypt card and the image compress flatform. they are : ( 1 ) design of dsp application system ; ( 2 ) epld designing technology using vhdl language ; ( 3 ) pci interface technology

    本文結合「 sqy - 15醫療險信息」和「通用圖像壓縮平臺」兩項目,提出了基於數字信號處理器( dsp )和可編程專用集成路( asic )實現數據加卡和圖像壓縮平臺的解決方案,重點介紹了基於dsp的數據加解卡和圖像壓縮平臺設計與實現中的三個關鍵技術: ( 1 ) dsp應用設計; ( 2 ) vhdl語言設計epld技術; ( 3 ) pci介面技術。
  12. From e - business consultation, application development, website and portal design, to system integration and operation of various it e - commerce projects, we work closely with our clients to provide quality system solutions to achieve their business goals efficiently and intelligently. apart from the hksar government, our reputable clients also include public agencies as well as business enterprises

    為確客戶能享用最貼合其業務發展的解決方案,我們無論是提供商務顧問服務應用程式開發網站設計整合或協助不同類型資訊科技和商貿計劃的運作,過程中均會跟客戶持緊,了解其營運需要。
  13. E - business software interacts with a wide variety of existing back office systems, including database, accounting, and erp systems

    企業級商務解決方案應該能夠與erp或現有會計切整合,持商務活動與資金流的同步。
  14. Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities

    首先對政務網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及政務的安全策略分析;然後,從物理安全、訪問控制、通信加、數據護、安全審計、病毒防護、安全備份和安全管理等方面對政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,通過對綿陽市政務信息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。
  15. Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system

    包括證書管理中心和用戶端軍用郵件傳輸組件兩個,提出了「兩級加」和「證書攜帶」兩種方式,以確的機性及離線方式下的身份認證、鑰分發,利用雜湊函數實現郵件傳輸的完整性,採用數字簽名技術實現了郵件傳輸的不可否認性,形成了一個完整的軍用郵件傳輸
  16. The basic applications of the aforementioned systems are : identification of confidential papers ( bank notes, checks, passports etc. ) and plastic cards ; copyright protection ; access control ; electronic article / personnel or customs surveillance ( anti - theft systems for retailers, remote detection of labeled explosives etc. )

    基本應用:識別機文件(鈔票,支票,護照等)和信用卡;護版權;進入操作文檔;顧客監督(零售商的防賊,爆炸物的遠程探查等。 )
  17. In this system, there are strong key is used for triple - des algorithm that up to 168 bits, it is used for rsa algorithm that up to 1024 bits, it is used for digital signature that 160 bits number that produces by sha - 1 algorithm. these algorithms have strong security against attack. so the email security can be ensured by them

    採用的三重des演算法的有效鑰為168bit , sha - 1散列演算法產生的散列值為160bit , rsa演算法鑰可以達到1024bit以上,這些都對強行攻擊具有足夠的強度,從而證了郵件信息的安全。
  18. The major recommendations of the working group include enhancing enterprise awareness of business benefits, capabilities ( including the security aspects ) and service offerings of wireless solutions ; encouraging continuous development of information security technologies solutions, generic products based on open standards, and seamless end - to - end chinese language - supported it systems with wireless extensions ; continuing to promote wider use of wireless services within the government, a key it user, in line with established e - government policy ; and fostering closer co - operation between various ict sectors

    工作小組的主要建議包括:加強企業用戶對無線技術的好處、能力(包括安能力) 、和產品種類的認識;鼓勵持續發展資訊安技術方案、採用開放標準的通用產品、和支援中文並具備無線功能的資訊科技;繼續按既定的政府政策,推動作為主要資訊科技使用者的政府更廣泛採用無線服務;以及促進各資訊及通訊科技界別的更緊合作。
  19. The safety refers to four layers : the physical layer, the network layer, the system layer and the application layer, which includes many contents such as network insulation, encryption, safety detection and monitoring, safety audit, virus protection, access control, identity certification, data copy and recovery, security management, etc. starting with the application layer of safety system, this article, based on j2ee, researches the privacy protection, completeness, facticity, availability and controllability of information in e - government

    其安全性涉及到物理級、網路級、級和應用級四個層次,具體包括網路隔離、加、安全檢測與監控、安全審計、防病毒、訪問控制、身份認證、數據備份與恢復、安全管理等幾十項內容。此課題從安全體的應用層出發,基於j2ee技術,對政務中信息的性、完整性、真實性、可用性和可控性等方面進行研究。
  20. Takes security matters very seriously and treats all personal information obtained from users of our websites confidential. we also provide and maintain the following measures to protect our system " esd system ", and the information and data contained in them from accidental or malicious disruption or destruction

    審慎對待安全問題,嚴格從本網站用戶獲得的所有個人資料,以及護本公司的公共服務化esd資訊以及數據,使其免遭意外或惡意破壞。
分享友人