user authentication 中文意思是什麼

user authentication 解釋
用戶鑒別
  • user : n. 1. 使用者,用戶。2. 吸毒成癮者。n. 【法律】(財產等的)使用(權),行使(權),享受(權),享有(權)。
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  1. Standard guide for user authentication and authorization

    用戶鑒定和授權標準指南
  2. This paper applies ldap to email user authentication and management, which improve the efficiency and security of the email system. with linux virtual server, this paper implements load balance based on layer - 4 switch, and puts forward a new request dispatching algorithm and its implementation

    應用linux虛擬服務器實現了基於第四層交換的郵件系統的負載均衡,在此基礎上,提出並實現了最大穩定剩餘連接優先的請求分配演算法,並且進行了性能分析。
  3. With the ground of information encryption technology, this paper analyzes network security architecture and makes deep research on user authentication on network application layer, especially on otp ( one - time password )

    本論文從網路安全體系結構分析入手,以信息加密技術為基礎,對網路應用層的身份認證技術,特別是一次性口令認證( otp )技術進行了深入研究。
  4. This thesis focuses on integrated billing and accounting system design for ip service, designed for isp ( internet service provider ) and ipt ( ip telephone ) services. this system, having high real - time performance, powerful security and ras ( reliability availability and service ), can realize user authentication, billing, management, accounting, reporting, settlement, and other functionalities

    該系統定位於網路運營商網際網路接入( isp )和ip電話( ipt )業務應用,實現對用戶的接入認證、計費、用戶管理、帳務,以及面向運營商的報表、結算等應用。
  5. The proxy server often enforces policies such as forbidding access to certain web sites or even requiring user authentication before connection

    代理服務器通常強制實施安全策略,比如禁止訪問某些web站點,或者在連接之前要求用戶驗證。
  6. In addition to the basic function of user locating and call routing, the server system implement some valuable features in commercial environment that is not mentioned in the standard sip protocol, such as user management, flexible user authentication, conformability with radius accouting protocol, the ability to configure and manage system server

    該系統除了完成用戶定位、呼叫路由等基本功能之外,還增加了協議中沒有規定但實用系統必須具有的一些功能,如用戶信息維護、靈活多樣的接入認證方式,另外遵循radius計費協議,採用集中方式管理服務器。
  7. By the test, the system realizes functions of user authentication, real - time accounting, phone - bill query, etc, which are the basic demands of the voip authenticating and accounting technology

    通過測試,本系統實現了數據採集、認證授權、計費處理、話單查詢、系統管理等功能,符合voip安全認證計費的基本要求,適用於voip業務的安全認證和計費管理。
  8. Based on the three elementary business models such as e - shopping, contract signing and receipt for e - goods, the aim of this project is to design, implement and deploy the middleware components such as secure exchange component and user authentication and access control component, which accord with j2ee and corba architecture

    它以常見的交易活動如電子購物、合同簽定、電子簽收作為基本交換模型,為不同應用系統提供具有符合j2ee和corba體系規范的安全交換組件、用戶認證及入口控制組件。
  9. Local user authentication

    本區用戶認證
  10. Secure mobile user authentication mechanism

    可移動式身份認證機制
  11. Based on all above studies, the technology to implement secure authentication is described and a sample about user authentication in wcws is designed, which prove out the feasibility of authentication scheme in this paper

    在以上研究的基礎上,本文進一步分析了系統實現技術,最後針對系統的不同用戶進行認證模塊的設計,並給出了嘗試性的實現。
  12. System security and reliability for remote monitoring and control are greatly improved by an authentication module which realize user authentication, encrypt, decrypt and check, an application for the design in home monitoring and control is also introduced

    摘要通過在系統中加入一安全認證模塊來實現客戶身份認證,加密,解密和校驗,有效提高了遠程控制系統的安全性和可靠性,並介紹該設計方案在住宅監控系統中的應用。
  13. This paper first introduces the basic principal, standards protocols, and model of the email system, and probes into its distributed architecture, user authentication, load balance and storage technology

    本文首先介紹了郵件系統的基本原理、標準及模型,並探討了郵件系統的分散式結構,用戶認證、負載均衡及郵件存儲。
  14. The model controls the dynamic security of network information flow on four layers : security entrance layer requires user authentication and encapsulates security information flow ; social intelligence layer makes information flow to have the ability of self - sensing self - protecting and self - adjusting ; business layer carries out business logic in forms of transactions which can be submitted, processed and roll back, in order to provide real - time protecting and online recovering ; tcp / ip security layer ensures security communication for information flow

    該模型分4個層次控制網路信息流的動態安全;安全入口層負責用戶的身份驗證和信息流的安全封裝;社會智能層賦予信息流自我感應、自我保護、自我調控的行為能力;事務層實現商業事務的提交、處理、回滾,提供實時保護和在線恢復機制; tcp / ip安全協議層則保障網路信息流的安全傳輸。
  15. Guide for user authentication and authorization

    用戶鑒定和授權指南
  16. Wen - shenq juang, " efficient user authentication and key agreement in wireless sensor networks, " in proc. of the 7th international workshop on information security applications ( wisa 2006 ), jeju island, korea, aug. 28 - 30, 2006

    簡介:本篇論文提出了在無限感測網路上一個有效的使用者認證與金鑰交換機制,計算量與通訊成本低,金鑰產生與管理彈性高。
  17. A two - way user authentication scheme based on elgamal digital signature

    數字簽名的雙向用戶鑒別方案
  18. In the data communication design, the paper illurstrates the implementation of the communication between internal network and external network, including the implementation of arp, network address translation, ip data collection, user authentication and packets filtering

    數據通信模塊的設計中,詳細介紹了內部網與外部網數據通信的實現,包括地址解析協議的實現、網路地址轉換、流量數據採集、用戶認證及數據包的過濾。
  19. Indicates whether the framework has an inbuilt module for handling user authentication

    表示框架是否內建用戶驗證模塊。
  20. And use bna logic theories to prove the completeness and validity of the improved protocol. 4 on the base of former research, a new model of user authentication system is designed based on the improved kerberos protocol and public key encryption system

    並採用ban邏輯理論證明改進協議的完備性、有效性; 4 、提出了基於改進kerberos協議和公鑰密碼體制的身份認證服務的模型,並給出模型的實際應用。
分享友人