解密器 的英文怎麼說
中文拼音 [jiěmìqì]
解密器
英文
decipherer-
The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal
前端數據調制器完成對計算機輸出的控制信號加密處理,將指令碼載送到一指定頻率點。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。The fameg fs8101cssl is the state - of - the - art solution for low - cost, high - performance, usb1. 1 hostable with mp3 interface controller. it is designed for embedded usb mass storage class applications with ub1. 1 host specification compliance
它集成了內嵌ice功能的高速8051內核e8051d ,高兼容性高性能的usb2 . 0控制器標準的des tdes安全加解密引擎, sd卡介面以及plif介面等。To work well, digital envelopes require that a public key infrastructure is in place : without the correct digital key to decrypt the wrapper, an intruder can ' t view the message inside
為了很好工作,數字信封需要有一個公開的密鑰基礎設施:沒有正確的數字密鑰對包裝器解密,入侵者就不能看到裏面的信息。Do not enable failover decryption of a database that must remain inaccessible to
和其他特權級別高的服務器主體無法訪問的數據庫,不要啟用其故障轉移解密功能。And other highly privileged server principals to decrypt the database. credentials that are created by using
和其他特權級別高的服務器主體能夠對數據庫進行解密。Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied
本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security
對適于安全電子郵件的演算法從hash 、簽名到加密、認證進行了比較分析;二是根據s mime協議提出了安全郵件系統的體系結構,對其重要的數字簽名、加密和解密部分作進一步的分析,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶證書和通信簿管理體系,建立了ldap服務器客戶端數字認證模型,並進行了實現。It is responsible for deciphering class files and uploading into java virtual machine ; class verifier is used to the correct internal structure ; security manager is used to customize the access strategy and permission ; and ssl guarantees the data security during transmission. though modeling and testing a prototype system, experiment proved the correctness and efficiency of above design
類裝載器是java安全體系的第一道防線,它負責將類解密后裝入java虛擬機; class文件檢驗器保證裝載的class文件有正確的內部結構;安全管理器主要用於定製用戶對系統的訪問策略和訪問權限;安全套接字用來保證web傳輸安全。It discusses about the safe serial communication about long nc programs between the embedded terminal and the cnc machine tool, which is realized by adopting the way of dnc communication. after analyzing characteristics about some kinds of data encryption algorithm, the rijndael encryption is selected to realize cooperative product data ’ s storage in the server and transmission in internet on encryption manner
在分析各種數據加密演算法的特點后,選用了rijndael加密演算法,實現了外協產品數據在服務器上加密存儲、在網路上加密傳輸和在終端上被解密,並在終端與數控機床之間以dnc通訊方式實現長nc程序安全傳輸。Any cracker with a packet sniffer can grab the data off the wire and take the passwords
帶有信息包嗅探器的任何解密高手都可以從線路上抓取數據然後獲得密碼。The whole system can be used widely not only as an independent specific system module, but also in the embedded system with cpu control. finally, the interface between microprocessor and rsa, or between rsa and eeprom is implemented to realize the whole system function. the design of iic part is depicted with verilog hdl
Rsa演算法實現的軟核設計在應用上具有很大的靈活性和獨立性,在介面模塊的配合下可以作為系統中獨立的加密解密運算部件,在微處理器的控制下使用,可以作為獨立的專用系統來使用。On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange
依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。In this article, two projects - " sqy - 15 encrypt subsystem of hospitalization insurance system " and " general image compress flatform " are combined to get a resolvent scheme to realize data encrypt and image compress based on digital signal processor ( dsp ) and application specific integrated circuits ( asic ). this article includes three key technologies in designing and realizing the data encrypt card and the image compress flatform. they are : ( 1 ) design of dsp application system ; ( 2 ) epld designing technology using vhdl language ; ( 3 ) pci interface technology
本文結合「 sqy - 15醫療保險信息系統加密子系統」和「通用圖像壓縮平臺」兩項目,提出了基於數字信號處理器( dsp )和可編程專用集成電路( asic )實現數據加密卡和圖像壓縮平臺的解決方案,重點介紹了基於dsp的數據加解密卡和圖像壓縮平臺設計與實現中的三個關鍵技術: ( 1 ) dsp應用系統設計; ( 2 ) vhdl語言設計epld技術; ( 3 ) pci介面技術。Creates a symmetric decryptor object
創建對稱解密器對象。A symmetric decryptor object
對稱解密器對象。The client uses the session key to decrypt the token, and if the timestamp matches that from the authenticator, mutual authentication is considered successful
客戶機使用會話密鑰解密收到的令牌,如果時間戳與認證器中的時間戳匹配,則認為相互認證獲得成功。If the server is requested to do so, it will use the session key to decrypt the authenticator, extract the timestamp from within the authenticator, encrypt the timestamp with the session key, and send it to the client
如果受到請求,服務器將使用會話密鑰解密認證器,從認證器中提取出時間戳,再用會話密鑰加密時間戳,然後將其發送給客戶機。For the positive real function image encoded by double random - phase, the first random - phase mask placed in the blank can not serve as the key when the decrypted image is detected by intensity detector in the decrypting process
摘要正的實函數圖像通過雙隨機相位編碼加密以後,在解密過程中,用光強探測器接收解密圖像時,位於空域的第1塊相位掩模不起密匙作用。The most used technique is the encryption decipher technology, others include the identity authentication, firewall technology, router security, intrusion detection, emergency responds and restores technical, the honeypot technology and so on. while these technologies is under development, some of them is only single function, mutually independent, and difficult for the system administration. they cannot be trusted completely as the solutions to network intrusion behavior which emerges one after another increasly in the reality
目前,解決網路安全問題的主要技術手段有加密解密技術、身份認證、防火墻技術、安全路由器、入侵檢測、應急響應與恢復技術、蜜罐技術等,這些技術在發展的同時,也存在著功能單一,相互獨立,難于系統管理的不足,不能應對現實中層出不窮的網路入侵行為,所以單純依靠這些技術不可能滿足全部的安全要求。As people enjoyed the opening and sharing of network, they were also distressed about the problem of security. this paper mainly studies the security encryption technology of networks - based e - commerce systems. it analyzes the message encryption and digital signature process of client browser, and the message decryption and validation of merchant server in a integrated e - commerce system, and it also provides an application example
本文主要研究基於網路環境的電子商務系統安全加密技術,分析了一個完整的電子商務應用系統中客戶瀏覽器端和商家服務器端的信息加密、信息解密、數字簽名、身份驗證,以及pki ( publickeyinfrastructure ,公開密鑰基礎設施)機制、數字證書技術在這個過程中的功能,並給出了一個具體的實現例子。分享友人