電子保密系統 的英文怎麼說
中文拼音 [diànzibǎomìxìtǒng]
電子保密系統
英文
electronic security system- 電 : Ⅰ名詞1 (有電荷存在和電荷變化的現象) electricity 2 (電報) telegram; cable Ⅱ動詞1 (觸電) give...
- 子 : 子Ⅰ名詞1 (兒子) son 2 (人的通稱) person 3 (古代特指有學問的男人) ancient title of respect f...
- 保 : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 系 : 系動詞(打結; 扣) tie; fasten; do up; button up
- 統 : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
- 電子 : [物理學] [電學] electron
- 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。The paper mainly designs the electronic official document transport system, analyzes the framework, key technologies and securities. this paper put forward to the scheme about these key technologies, such as the user ' s certificate exchange, secret key management, red - header document and seal processing, files " inputting, and datum compressing. the paper introduces the detailed implement of the project with a demonstration
對電子公文傳輸系統的功能需求、關鍵技術以及安全性進行了深入研究和分析,本文重點對電子公文系統中的傳輸子系統作了詳細的需求分析和系統結構設計,該設計全面考慮了電子公文在傳輸過程以及收發文過程的機密性、完整性、真實性以及不可否認性等特性,提出保障系統的機密性、完整性、真實性及不可否認性的解決方案。The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives
「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始性、真實性有著重要意義。We provide a secured system to store your chop image and signature with a password. this allows you to handle all signatures and stamping without printing out the document or leaving your desk
電子簽名蓋章可以利用易傳通特有的簽字蓋章系統,有密碼保護,用以確認,審批記錄。In addition to the standard security features to protect against unauthorised access, the most advanced encryption technology is used to ensure that only authorised tenderers could submit bids, that their bids once submitted cannot be altered and that they remain encrypted and inaccessible by all parties until the electronic tender box is opened under the same kind of procedures as apply with our existing manual system
除具有標準的保密特點以防止擅自進入外,電子投標系統採用最先進的加密科技,以確保只有獲授權的投標者才可遞交標書,而且他們的標書一經遞交便不能更改,並會保持加密,任何人士均無法取得,直至本處按現有人手方法的同類程序把電子投標箱打開為止。Solid materials handling and pneumatic conveying system packaged machinery and its equipment and valves are mainly used for conveying, material unloading, dedusting, metering, mixing, packing units in the processing units of the solid materials including powder, particles, powder mixtures and flakes of abs, ps, pe, pp, pom, san, pet, pc, pta, pvc, bpa, sap, as and pmma in the trades of petroleum, chemical industries, chemical fiber, dye, pharmacy, food, electronic, paper making, natural gas, power, environmental protection, metallurgy and etc. it is applicable for various pneumatic conveying systems and gravity flow conveying systems under the conditions of diluted - phase, densed - phase, high pressure, low pressure and vacuum pressure
固體物料處理和輸送系統成套機械及其專用設備、閥門主要應用於石油、化工、化纖、染料、醫藥、食品、電子、造紙、天然氣、電力、環保、冶金等領域中固體物料(含abs 、 ps 、 pe 、 pp 、 pom 、 san 、 pet 、 pc 、 pta 、 pvc 、 bpa 、 sap等粉沫、顆粒物料、粉粒混合物、片狀)生產加工過程中輸送、卸料、除塵、計量、混合、包裝等工段使用,能適用於稀相、密相、高壓、低壓、負壓各種氣力輸送系統和重力流輸送系統。These products are widely applied to air purification system and liquid purification system for the fields such as electronics, optics, chemical industry, precision machine, food, medicine, bio - engineering, hardware and plastic, printing, electric power and environment protection
產品廣泛應用於電子、光學、化工、精密機械、食品、醫藥、生物工程、五金塑膠、印刷、電力、環保等行業的空氣凈化系統和液體凈化系統。To address the basic concerns of authenticity, integrity, confidentiality and non - repudiation in electronic transactions through the internet, a person must authenticate himself when using the service
系統的安全措施透過網際網路以電子方式交易是否可辨認確保完整保密和不容推翻等均是備受關注的問題。How secured is the ets as an electronic business application
電子投標系統在電子商業應用上的保密程度怎樣?It is a promising technology and applied in a wide range of applications such as electronic street nameplate, ticketing system, automobile management, assembly line automation, due to its capability of dealing large scale data, high security, good anti - emi ( electro magnetic interference ) capability, fast response and low cost
它具有數據量大,保密性高,抗干擾能力強,識別時間短,費用較低等優點,有很好的應用前景,如:電子路牌、票務系統、車輛管理、自動化生產線管理等。In this article, two projects - " sqy - 15 encrypt subsystem of hospitalization insurance system " and " general image compress flatform " are combined to get a resolvent scheme to realize data encrypt and image compress based on digital signal processor ( dsp ) and application specific integrated circuits ( asic ). this article includes three key technologies in designing and realizing the data encrypt card and the image compress flatform. they are : ( 1 ) design of dsp application system ; ( 2 ) epld designing technology using vhdl language ; ( 3 ) pci interface technology
本文結合「 sqy - 15醫療保險信息系統加密子系統」和「通用圖像壓縮平臺」兩項目,提出了基於數字信號處理器( dsp )和可編程專用集成電路( asic )實現數據加密卡和圖像壓縮平臺的解決方案,重點介紹了基於dsp的數據加解密卡和圖像壓縮平臺設計與實現中的三個關鍵技術: ( 1 ) dsp應用系統設計; ( 2 ) vhdl語言設計epld技術; ( 3 ) pci介面技術。From e - business consultation, application development, website and portal design, to system integration and operation of various it e - commerce projects, we work closely with our clients to provide quality system solutions to achieve their business goals efficiently and intelligently. apart from the hksar government, our reputable clients also include public agencies as well as business enterprises
為確保客戶能享用最貼合其業務發展的解決方案,我們無論是提供電子商務顧問服務應用程式開發網站設計系統整合或協助不同類型資訊科技和電子商貿計劃的運作,過程中均會跟客戶保持緊密聯系,了解其營運需要。E - business software interacts with a wide variety of existing back office systems, including database, accounting, and erp systems
企業級電子商務解決方案應該能夠與erp或現有會計系統密切整合,保持商務活動與資金流的同步。Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities
首先對電子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從物理安全、訪問控制、通信加密、數據保護、安全審計、病毒防護、安全備份和安全管理等方面對電子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,通過對綿陽市電子政務信息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system
該系統包括證書管理中心和用戶端軍用電子郵件傳輸組件兩個子系統,提出了「兩級加密」和「證書攜帶」兩種方式,以確保系統的機密性及離線方式下的身份認證、密鑰分發,利用雜湊函數實現郵件傳輸的完整性,採用數字簽名技術實現了郵件傳輸的不可否認性,形成了一個完整的軍用電子郵件傳輸系統。The basic applications of the aforementioned systems are : identification of confidential papers ( bank notes, checks, passports etc. ) and plastic cards ; copyright protection ; access control ; electronic article / personnel or customs surveillance ( anti - theft systems for retailers, remote detection of labeled explosives etc. )
基本應用:識別機密文件(鈔票,支票,護照等)和信用卡;保護版權;進入操作系統;電子文檔;顧客監督(零售商的防賊系統,爆炸物的遠程探查等。 )In this system, there are strong key is used for triple - des algorithm that up to 168 bits, it is used for rsa algorithm that up to 1024 bits, it is used for digital signature that 160 bits number that produces by sha - 1 algorithm. these algorithms have strong security against attack. so the email security can be ensured by them
該系統採用的三重des演算法的有效密鑰為168bit , sha - 1散列演算法產生的散列值為160bit , rsa演算法密鑰可以達到1024bit以上,這些都對強行攻擊具有足夠的強度,從而保證了電子郵件信息的安全。The major recommendations of the working group include enhancing enterprise awareness of business benefits, capabilities ( including the security aspects ) and service offerings of wireless solutions ; encouraging continuous development of information security technologies solutions, generic products based on open standards, and seamless end - to - end chinese language - supported it systems with wireless extensions ; continuing to promote wider use of wireless services within the government, a key it user, in line with established e - government policy ; and fostering closer co - operation between various ict sectors
工作小組的主要建議包括:加強企業用戶對無線技術的好處、能力(包括保安能力) 、和產品種類的認識;鼓勵持續發展資訊保安技術方案、採用開放標準的通用產品、和支援中文並具備無線功能的資訊科技系統;繼續按既定的電子政府政策,推動作為主要資訊科技使用者的政府更廣泛採用無線服務;以及促進各資訊及通訊科技界別的更緊密合作。The safety refers to four layers : the physical layer, the network layer, the system layer and the application layer, which includes many contents such as network insulation, encryption, safety detection and monitoring, safety audit, virus protection, access control, identity certification, data copy and recovery, security management, etc. starting with the application layer of safety system, this article, based on j2ee, researches the privacy protection, completeness, facticity, availability and controllability of information in e - government
其安全性涉及到物理級、網路級、系統級和應用級四個層次,具體包括網路隔離、加密、安全檢測與監控、安全審計、防病毒、訪問控制、身份認證、數據備份與恢復、安全管理等幾十項內容。此課題從安全體系的應用層出發,基於j2ee技術,對電子政務系統中信息的保密性、完整性、真實性、可用性和可控性等方面進行研究。Takes security matters very seriously and treats all personal information obtained from users of our websites confidential. we also provide and maintain the following measures to protect our system " esd system ", and the information and data contained in them from accidental or malicious disruption or destruction
審慎對待安全問題,嚴格保密從本網站用戶獲得的所有個人資料,以及保護本公司的公共服務電子化esd系統資訊以及數據,使其免遭意外或惡意破壞。分享友人