數據令牌 的英文怎麼說

中文拼音 [shǔlìngpái]
數據令牌 英文
data token
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 名詞1 (牌子,用做提示、獎勵、憑證等的東西) plate; tablet; board; placard 2 (牌子 商品的專用名...
  • 數據 : data; record; information
  1. A service of the data link level ( logical link control ) in ibm ' s token - passing ring

    一種ibm環介質訪問控製法中鏈路級(邏輯鏈路控制)業務。
  2. Plc, robot and cad / cam are called the three major pillars in the modem factory automation. plc, as the head of the three, has become the leading basic automatic equipment in the field of the industry control in the early 1980s " but as a matter of fact, plc being with the lack of friendly man machine interface, rnakes no close relationship between human and machineometimes it even can not be promoted and applied in some fields aiming at the situation mat those imported products are too expensive while domestic products are of rare famous brands, a plc man - machine interface - plc monitor is developedthis paper systemically introduces the developing procedure for the whole system, including how to design hardware and software system. especially emphasizing plc communication protocol. real time message accessing, lcd controller instruction set, definition of data construction for message & tag screens and how to display thern, assignment of internal resource of cpuealization in software among plc & manitor, file format defining a nd download of user data, etcplc monitor will compensate some weakpoints of plc, and extend the application rangeimultanneously enhance the performance of plc and increase the attached value of mechanical machines, undoubtedly it will see hight market prospect

    針對人機界面進口產品的高昂價格和國產品稀少的這一現狀,研製開發了一種plc人機界面? plc監控器。本文系統地介紹了整個系統的開發過程,包括硬體系統、軟體系統的設計及實現,重點介紹了plc通信協議,監控器的基本工作原理以及期望實現的功能,監控器電源電路、 sram存儲器掉電保護電路、 cpu監控器電路、按鍵輸入電路的設計及按鍵狀態的讀入,時鐘信息的設定與讀取, cpu液晶顯示器指系統,信息畫面及標簽結構的定義及顯示方法, cpu內部資源的分配,監控器與plc通信的軟體實現,文件格式的定義以及畫面的下載等。 plc監控器彌補了plc一些方面的不足,可以擴大plc的應用范圍,提升機械設備的檔次,增加設備的附加價值,具有一定的市場前景。
  3. An industrial networking system that uses token - passing peer - to - peer communications at data transfer rates of one megabit per second ( mbps ). the network media is shielded twisted - pair cable

    一種工業網路,它使用環點對點通訊模式傳輸,可達一百萬位每秒。網路介質使用屏蔽雙絞線。
  4. Modbus plus an industrial networking system that uses token - passing peer - to - peer communications at data transfer rates of one megabit per second ( mbps ). the network media is shielded twisted - pair cable

    一種工業網路,它使用環點對點通訊模式傳輸,可達一百萬位每秒。網路介質使用屏蔽雙絞線。
  5. The structure of the system can be adjusted dynamically. the more important is that it makes full use of network bandwidth. it controls the use of network resource through token - control, decreases resource waste causing by access conflict in ethernet communication and achieves high - speed real - time data transmission

    基於虛擬和以太網的實時網路協議一方面為上層調用軟體提供了一個透明的可動態調整系統結構的傳輸體系,更重要的是它充分利用了網路帶寬,以方式控制網路資源的使用,降低了以太網通信中訪問沖突引發的資源浪費,從而實現了實時高速的網路傳輸。
  6. Also in this model, authorization data has been separated from the authentication information so authorization data should not be embedded in authentication tickets

    而且,在這個模型中,授權已經與認證分隔開了,這樣,授權就應該不用嵌入認證中了。
  7. Information processing systems - fibre distributed data interface - part 3 : physical layer medium dependent

    信息處理系統光纖分散式介面fddi第3部分:環物理層媒體相關部分pmd
  8. Information processing systems - fibre distributed data interface - part 1 : token ring physical layer protocol

    信息處理系統光纖分散式介面fddi第1部分:環物理層協議phy
  9. Sql server 2005 provides the new tracer token feature : a token a small amount of data is inserted into the publisher and replicated to subscribers

    Sql server 2005提供了新的跟蹤功能:將(少量)插入到發布服務器並復制到訂閱服務器。
  10. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準交換協議相互驗證身份后,通過查詢庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;訪問控制實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合本地的安全策略做出最終決策。
  11. The use of integrated security to access external data sources poses a special concern for report users who may not know that their security token is being passed to an external data source users are not warned in advance of running a report that the report is configured to use integrated security

    對于那些可能不知道其安全將傳遞到外部源的用戶,使用集成安全性訪問外部源會為其帶來一個特殊問題(在運行報表之前不會事先通知用戶報表配置為使用集成安全性) 。
  12. Option, the report server passes the security token of the user accessing the report to the server hosting the external data source

    選項時,報表服務器會將訪問報表的用戶的安全傳遞給外部源所在的服務器。
分享友人