密鑰組件 的英文怎麼說

中文拼音 [yàojiàn]
密鑰組件 英文
key module
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ名詞1 (由不多的人員組成的單位) group 2 (姓氏) a surname Ⅱ動詞(組織) organize; form Ⅲ量詞(...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • 組件 : assembler
  1. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個成部分,如認證報頭ah協議、封裝安全載荷esp協議、管理ike協議、加認證演算法、安全聯盟和安全策略等,以及這些之間如何協作,來共同實現對網路層ip數據包的安全保護。
  2. The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient

    數字包裝器最被認可的形式是數字信封,這些代碼主要完成電子郵的加,把想打開信封而沒有正確數字的入侵者擋在外面,數字信封主要由通過碼加或軟體演算法加的代碼成,運載著能正確讓接收方識別發送方身份的數字簽名。
  3. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com技術實現一個安全電子交易的二次加解系統。在對系統的設計中提出了安全模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公數字證書對握手連接信息進行數字簽名驗證。
  4. This paper detailedly describe my work in the research of pki, mainly include to independently develope a certificate function library that suitable for multi - platform and to establish a fundamental pki framework based on this library. the innovation of this paper is to implement multiform certificate process functions in the certificate function library, support the process of multiform certificate format including x. 509v3 certificate using in internet and wtls certificate using in wireless, and meanwhile provide multiform apis that can make this library used in different applications as a functional component

    本文的創新點是在證書功能庫中實現了多種的證書處理功能,如產生和驗證證書請求、產生和驗證證書、對私進行加存儲和證書撤消等功能,支持多種證書格式的處理包括適用於因特網的x . 509v3證書格式和適用於無線領域的wtls證書格式,提供了多種api介面,使該功能庫可以作為一個功能嵌入到不同的應用中。
  5. Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system

    該系統包括證書管理中心和用戶端軍用電子郵傳輸兩個子系統,提出了「兩級加」和「證書攜帶」兩種方式,以確保系統的機性及離線方式下的身份認證、分發,利用雜湊函數實現郵傳輸的完整性,採用數字簽名技術實現了郵傳輸的不可否認性,形成了一個完整的軍用電子郵傳輸系統。
  6. On the base of " pki assessment guidelines " and the pp of certificate issuing and management components ( cimc ), the key and certificate life cycle checklist is given for security function tests

    2在參考《 pki評估指南》和證書頒發管理( cimc )保護輪廓的基礎上,給出和證書生命期各階段的核查表( checklist ) 。
  7. A license key granted to this component

    授予該的許可證
  8. This system provides support for group sending of military emails belonging to the same security domain as well as point to point transfer. it also supports functions such as distribution, refreshment and recovery of keys

    系統支持同一安全域內軍用郵間群發及點對點互發,支持分級的分發及更新和恢復等功能。
分享友人