密鑰管理技術 的英文怎麼說
中文拼音 [mìyàoguǎnlǐjìshù]
密鑰管理技術
英文
key management- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 鑰 : 鑰名詞(鑰匙) key
- 管 : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
- 理 : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
- 技 : 名詞(技能; 本領) skill; ability; trick; technique
- 術 : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
- 管理 : manage; run; administer; supervise; rule; administration; management; regulation
-
After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages
在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。This article describes the situation of information security theory and technology, and discusses the theories of ca, information encryption, and public key system
本文介紹了目前信息安全理論和技術發展狀況,對ca認證理論、信息加密以及公共密鑰管理等方面的技術進行了分析和論述。The system structure of certificate authority and the function modules of the system are introduced in the system structure part. therefore the article introduces the detailed methods of establishing certificate authority and the establishment of data certificate. meanwhile, the article discusses the actual functions of digital certificate in office automatic system on web, and the key management security of the digital certificate
在系統總體結構中,主要討論了ca認證體系的體系結構和系統的主要功能模塊;在系統的具體實現中,討論了ca認證中心的建立的技術以及ca認證中心生成數字證書的方法;在系統的實際應用中,結合mthsca的特點,討論了數字證書在某摩托化步兵師網上自動化辦公系統中的具體應用;在系統安全性方面,討論了數字證書的密鑰安全管理。Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively
混合加密系統主要包括以下模塊:本地密鑰管理模塊、密鑰服務器模塊、加密和認證模塊、網路socket模塊、其它輔助模塊等。本系統有效解決了基於voip技術的分散式網路多媒體會議系統中信息安全傳輸的問題。At the same time, for administating proposal, we must outsource the key management service afforded by pki when use the gap
同時為管理目的,物理隔離技術需要pki提供密鑰管理服務。This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation
本文首先系統地介紹了gsm移動通信保密專網的原理知識及關鍵技術,詳細介紹了安全管理中心的功能- -密鑰自動產生和分配、被動式和主動式密鑰遙控銷毀、專用數據空中加載、以及失控專用手機追蹤等,並且對國內外同類研究的內容和成果進行分析;重點對安全通信網關進行了深入研究,確定了一種系統模型並進行了總體設計,然後對其中專用信息傳輸的設計實現進行重點介紹;本文還對安全管理中心的短消息安全通信網關與專用手機進行性能測試,測試結果表明該系統符合課題的各項技術指標,實現了安全通信網關的各項功能需求;最後,總結課題工作,對下一步系統進行完善和發展的內容提出了具體建議。The paper aims at solve the problem that comes from development and application internet bank of a commercial bank. it figures out the hidden trouble and bad dependability existed in key data ' s storage and issue. the key data include data certificate, certificate recall list and secret key etc. on the basis of analysis of present international internet system basic framework, it presents a optimized plan for a commercial bank ' s internet bank
本文針對某商業銀行在開發應用網上銀行系統中,在解決公鑰基礎設施pki關鍵數據? ?數字證書、證書撤消列表crl 、密鑰資料等的存儲和發布中存在的安全隱患和可靠性差的問題,在分析了目前國內、外建立網上銀行基本架構的基礎上,對該銀行網上銀行的原有架構提出了優化方案,並在此基礎上,著重提出了本文研究的核心技術方案? ?採用分層模型對pki關鍵數據的存儲和發布進行構建和管理,並在該銀行認證機構ca ra中進行了應用。Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system
該系統包括證書管理中心和用戶端軍用電子郵件傳輸組件兩個子系統,提出了「兩級加密」和「證書攜帶」兩種方式,以確保系統的機密性及離線方式下的身份認證、密鑰分發,利用雜湊函數實現郵件傳輸的完整性,採用數字簽名技術實現了郵件傳輸的不可否認性,形成了一個完整的軍用電子郵件傳輸系統。In chapter 2, the security measures and mechanism are introduced and studied. it mainly includes authentication, encryption, pairing / bonding, key management defined by bluetooth core protocol, three security modes defined by bluetooth profile and bluetooth security architecture defined by bluetooth white paper. in chapter 3, the implementation of secure services in bluetooth environment is studied deeply according to different scenarios
在第二部分,本文闡述了藍牙技術中的安全機制和各種具體措施,主要包括藍牙標準對直接鏈路層的安全標準定義如鑒權、加密、配對/ bonding 、密鑰管理等,藍牙應用規范中給出的三種安全模式以及藍牙安全標準白皮書的安全體系結構。Based on the threshold secret sharing mechanism, a new efficient distributed group key management scheme named edgk was proposed
摘要基於門限秘密分享技術,提出一種高效的分散式組密鑰管理方案edgk 。With the support for these forthcoming gss - api mechanisms spkm3 and lipkey, the use of gss - api plug - ins will avail db2 udb administrators to have db2 udb authentication based on either the public key technology or the traditional symmetric - key mechanism without much code change
有了對這些未來的gss - api機制( spkm3和lipkey )的支持,使用gss - api插件將有利於db2 udb管理員基於公鑰技術或傳統對稱密鑰機制進行db2 udb身份驗證,而不需要做太多的代碼修改。After analyzed the research of the status quo, the current of development and the application of the future in information security system in home and abroad, and researched the principle and technology of information security mechanism both in the network with open internet protocol and in the network with tcp / ip internet protocol, according to the microsoft information security structure and the application in network, and, the information security system should be established based on the pki structure, the security system can totally integrated with microsoft operation system
這些功能的獲得,就要通過pki密鑰管理技術來實現。本文通過對國內外信息安全研究現狀、發展趨勢及應用前景進行分析,研究開放系統互聯標準網路和tcp ip協議網路中的信息安全機制的基本原理和基本實現方法,根據微軟操作系統的安全體系結構以及實際網路中的運行需求,建立基於pki機制的信息安全系統。In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric - key cryptography, public - key cryptography, hash functions and key management protocols
第二章介紹基本的應用密碼學演算法和密碼協議,包括對稱加密演算法、非對稱加密演算法、散列函數、數字簽名技術和密鑰管理協議。To the issues that ipsec ca n ' t work with nat and multicast very smoothly and ipsec could n ' t also solve qos problem, combined with the national high - tech project of 863, the author has put forward the following viewpoints in the research of the security architecture model of ip layer : as to ipsec ' s working with nat, the author has proposed a scheme of using udp encapsulation along with configuring ipsec tunnel by dhcp and substituting ah with esp null encapsulation ; as to ipsec ' s working with the multicast, the author has proposed that combined with key management using complete binary tree, ipsec security process using espv3 and ahv2 can cooperate with multicast smoothly in multicast environments ; as to solving qos, the author has proposed a scheme of using two - level classifying and two - level scheduling with encryption scheduler and forwarding scheduler. the author has pointed out that combining ipsec with pki can make ipsec more flexible and more practical. based on the previous researches, the author has made an analysis of security risks of ip layer
在ip層安全體系結構模型研究中,針對ipsec在與組播、 nat協同工作等方面存在的問題以及ipsec不能很好解決qos等方面的問題,作者結合國家863高技術項目的研究提出了解決方案:在nat協同工作方面作者提出了採用udp封裝、配合使用dhcp配置ipsec隧道並用espnull封裝代替ah的方案;在與組播協同工作方面作者提出了基於espv3和ahv2的ipsec組播安全處理以及基於完全二又樹的組播密鑰管理的方案;在解決qos問題方面作者提出了採用分類器1和分類器2的兩級分類以及具有加密調度器和轉發調度器的兩級調度的技術方案;同時作者提出了ipsec與pki技術緊密結合,能使ipsec安全通信更加靈活和方便實用。The fundamental principles in the design of a wlan security protocols are summed up from the experience and lessons of the protocols in existence, and a new systemic structure is presented to provide security in wlan, which is based on the fundamental topological structure of infrastructure. the design includes three main modules, i. e. encryption and data integrality, key management, and identification authentication
本文總結已有協議的設計經驗和教訓以及國內外的先進技術,歸納了設計無線局域網安全協議的基本要求和原則,並提出了一種新的無線局域網安全系統體系結構,該體系結構基於有中心的無線局域網拓撲結構,包含了數據加密和完整性認證、密鑰管理和身份認證三個基本模塊。In this way, we can manage private keys securely and effectively. having deeply studied the private key management, the author designs a private key management system in this paper. the, author also analyses the risks of the process of private key management from the point of view of system and puts forward the method of decreasing the risk to the extreme extent
本文從用戶使用私鑰的角度分析了kea對用戶私鑰管理的不足和現有的純粹本地化管理私鑰的不足,並由此出發,借鑒密鑰託管的思想,同時考慮到私鑰本地化存儲的要求,提出了一種新的私鑰管理技術,它不僅能融入到現有的pki體系中,且能安全、有效地對用戶的私鑰進行管理。Next, this paper studies the pki technology, ssl protocol and smart card technology, and then put forward a security email solution, which solves some problems as follows : ( 1 ) protect email subject secret ( 2 ) realize email header safe transmission ( 3 ) security keys management then, this paper uses existing products ( wallgreat kmc ) to build a pki platform, and realize a model for this solution, which includes a secure email server and an email client
本文研究了pki技術、安全套接層ssl協議和智能卡技術,並在此基礎上提出了一種安全郵件解決方案,旨在解決以下問題: ( 1 )郵件主題的保密性問題( 2 )郵件頭的安全傳輸問題( 3 )密鑰的安全管理問題接著,本文利用公司己有產品(華翔騰密鑰管理中心)搭建pki平臺,設計並實現了該解決方案的一個系統模型,該模型包括安全電子郵件服務器和客戶端。This thesis, motivated by the practical requirements and based on extensive exploration and deep analysis in various literatures, focuses on the research of group - oriented key management techniques in distributed open networks
本論文基於實際問題的需要和對已有文獻的檢索和分析,重點研究分散式網路中面向群的密鑰管理技術。At present four kinds of technologies have mainly been adopted to realization of vpn, including tunneling technology, encryption & decryption technology, key management technology and user & facility identity authentication technology
目前vpn的實現主要採用四項技術:隧道技術、加解密技術、密鑰管理技術和使用者與設備身份認證技術。And also some analysis and comparison of the technologies will be provided. the mainly research results are list as follows. 1 ) some protocols have been analyzed deeply, including ieee802. 1h draft and some other protocols related to authentication and key management
在本文中,我們主要對無線局域網中的安全關鍵技術進行了深入的研究分析和比較,主要的成果如下: 1 )對國際上流行的標準進行了深入的分析比較,包括ieee802 . 11i標準草案以及相關的認證技術,密鑰管理技術等方面的協議。分享友人