identity authentication 中文意思是什麼

identity authentication 解釋
標識認證
  • identity : n. 1. 同一,一致;同一性。2. 本體;正身;個性。3. 【邏輯學】同一性。4. 【數學】恆等(式)。
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. It uses xml encryption, xml signature and ssl technology to design and implement the solution of transmission of tender and evaluation documents separately which are based on the different security requirement. the solutions guarantees the secrecy, incontestability, integrity and identity authentication in the transmission of the bidding documents

    在標書傳遞子系統中根據不同的安全需求,使用xml加密、 xml簽名和ssl技術分別為投標書和評標書設計並實現了安全傳遞的方案,確保了標書傳遞中的保密性、完整性、長期不可否認性、時間有效性和用戶身份正確性。
  3. In this paper, various kinds of identity - authentication schemes are analyzed and compared, and the individual identity - authentication scheme is designed to meet the requirement of the jarl mis, which was based on fingerprint identification technology, digital signature technology and id technology. the design is also realized in the registration management system by fingerprint

    本文通過對各種身份認證方案進行綜合的分析和比較,並結合監獄指紋點名管理系統對身份認證方案的具體要求,設計了基於指紋識別、數字簽名及智能卡技術於一體的個人身份認證方案,並將它在監獄指紋點名管理系統中予以實現。
  4. On the whole, bb84 + quantum cryptographic key distribution project is far from a termless absolute secure one in the perspective of theory, because the efficiency is enhanced on the sacrifice of security decreased. what ' s more, some works are done to strengthen the cryptograph in the field of identity authentication and other sectors, and the enhancement of efficiency strongly supports the cryptograph

    綜合來看, bb84 +量子密鑰分配方案並不是一個理論上無條件絕對安全的方案,他在安全性能上的降低得到的代價卻是效率的極大提高,並且此方案在身份認證和其他環節上對其有所降低的安全性能作了保密加強的工作。
  5. With the development of computer and network, and the rise of email, identity authentication has already haven new applied domains. for example, in the application of network and database, different users possess different warranties, and computers have no human beings " identification ability. hence, identity authentication becomes an insurmountable, but must be solved problem

    隨著計算機和網路的發展、電子郵件的興起,身份認證又有了新的應用領域,例如,在網路和數據庫等計算機應用中,不同用戶擁有不同的權力,而計算機又不具備人的辨識能力,更何況它常常不能直面用戶,所以身份認證就成為一個難以解決但又必需解決的問題。
  6. Identity authentication has been widely applied in detection of criminal cases, and other domains, which need authentication to control access such as government, custom, and financial department

    身份認證廣泛應用於刑事案件的偵破,以及其它需要人身鑒定的領域如政府機關、海關、登機、金融等要害部門的出入。
  7. Design a user identity authentication scheme based on the elliptic curve cryptosystem

    設計了一種基於該橢圓曲線密碼體制的用戶身份認證方案。
  8. In this article author combined the ’ s practice in pangang ( group ) corporation " s financial management information system, analysed old status of the financial management information, then described the specific applications in plant from a point of centralized management of the group ’ s financial, presented financial management informationization ’ s objectives of pangang ( group ) corporation and financial management model for the future, and designed and implemented the financial management information system, and studied some important technologies such as vpn technology, oracle9irac technology, epass identity authentication, the bi technology in the period of the project, expounded these technologies in the practical application of methods of the project and to summarize results of the analysis

    本文結合在攀鋼(集團)公司財務管理信息系統的工作實踐,對攀鋼的財務電算化狀況進行了比較深入的分析,就集團財務的集中統管理念在攀鋼的具體應用作了分析和闡述,提出了攀鋼財務管理信息化的目標和財務管理的未來模式,設計並實施攀鋼財務管理信息系統,並對項目實施過程中遇到的關鍵技術vpn技術、 oracle9irac技術、 epass身份認證、 bi技術等進行了一定的應用研究,闡述了這些技術在項目中的實際運用方法,並就結果進行了分析總結。
  9. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方式,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分散式模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。
  10. This dissertation analyzes detailed research about some key technology and security policy, such as secure saving and getting between agents, secure communication between agents and hosts or agent proxy servers, mobile agent self - safe, safe transfer and control and timestamp, md5, dsa, identity authentication, digital signature etc. the insecure, single problems are resolved gradually, the whole safe framework needs to synthesize the consideration and form further

    由於很多安全問題之間也有相互制約,只能根據實際情況,找到最適合實際需要的安全策略。接下來對某些關鍵技術,諸如移動agent之間, agent與主機、代理服務器之間的安全存取資源,移動agent自身保護,安全地傳輸與控制,安全的通信,時間戳技術,消息摘要,數字簽名身份認證等安全策略,進行較詳細的剖析研究。
  11. When constructing countrywide production & management decision support system of tobacco industry, there are security questions in data integrity, secrecy, irreversibility, and identity authentication authorization

    在構建全國煙草行業卷煙生產經營決策信息系統(簡稱國家煙草一號工程)中,存在數據完整性、機密性、不可否認性及身份認證授權等安全問題。
  12. On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature

    網路數據傳輸安全主要解決在網路環境下用戶之間身份驗證、數據加密傳輸以及實現數字簽名三個方面問題:用戶身份驗證保證了通信的源點和目的點的正確性;數據加密傳輸保證了數據在網路的中間節點不會泄露通信秘密;數字簽名可以保證發送信息的一方不能對自己發送過的信息進行否認。
  13. 2. keeping to isakmp / oakley protocol, has presented the secure and credible key distribution and management, supported strict identity authentication based on pki and supported x. 509 and pkcs12 certificates. 3

    遵循isakmp oakley密鑰協商和管理協議,實現安全可靠的密鑰分發與管理,支持x . 509證書和pkcs12證書格式,支持嚴格的pki身份認證。
  14. The implementation of ike automatic negotiation, supporting manual and automatic key negotiation and automatic negotiation of the tunnel ; 2. identity authentication based on pki, supporting the certificates format such as x. 509 and pkcs12 ; 3. high strength ( with 128 / 256bits ) data encryption supporting des, 3 - des, aes etc ; 4

    Ip隧道機在技術上取得了如下重大突破: 1 .實現ike自動協商,支持手動、自動密鑰協商方式,實現隧道自動協商功能; 2 .提供基於pki的身份認證技術,支持xsog 、 pkcsiz證書格式; 3 .提供128 / 256高強度數據加密功能,支持des 、 3一des 、 aes等國際通用加密演算法; 4 .實現多隧道嵌套技術,支持128路獨立的ip隧道,提供網路使用率。
  15. The identity authentication of e - commerce based on iris feature

    基於虹膜特徵的電子商務身份認證
  16. It is a set of programming interfaces that abstracts identity authentication, message origin authentication and integrity, and message confidentiality

    這是一套編程介面,抽象了身份驗證、消息源驗證和完整性。
  17. Secondly, researchs of identity authentication and access control mechanism in secure subnet

    二.安全子網雙向認證訪問控制機制的研究。
  18. The aim of the thesis is to research identity authentication and access control mechanism of secure subnet, and realizeing scheme

    本文的目的是研究安全子網的雙向身份認證和訪問控制機制,及其實現方案。
  19. An sms - based one - time password generated by the bank and sent to your mobile phone for additional identity authentication

    銀行向你的手提電話發出只用一次的密碼簡訊,作為額外核證之用。
  20. An sms - based one - time password ( otp ) generated by the bank and sent to your mobile phone for additional identity authentication

    銀行向你的手提電話發出只用一次的密碼簡訊,作為額外核證之用。
分享友人