認證服務器 的英文怎麼說

中文拼音 [rènzhèng]
認證服務器 英文
certificate server
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 服量詞(用於中藥; 劑) dose
  • : Ⅰ名詞1 (事情) affair; business 2 (姓氏) a surname Ⅱ動詞1 (從事; 致力) be engaged in; devote...
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • 認證 : [法律] attestation; authentication; identification認證費 certification fee; 認證條款 testimonium ...
  • 服務器 : client-server
  • 服務 : give service to; be in the service of; serve
  1. Ul do brasil is an inmetro accredited test agency for medical equipment and can provide the mandatory product certification and factory inspections required by the regulations

    Ul巴西分公司是經inmetro可的機構,可對醫療械進行並提供法規要求的強制性產品和工廠驗廠
  2. Second, we argue that the best - effort - based service model provided by many access points is not enough to satisfy the end user fairness and to maximize the wireless link utilization for a diverse user population

    但是在漫遊的環境下,用戶不能直接接入internet ,而是依靠不被信任的提供連接。這使用戶不能確定它們是否真的在跟真正的提供商身份的實體通信。
  3. I discuss the design idea, system architecture, running principle and the details of implementation of the authentication server

    文章介紹了該系統的設計思想、體系結構,和系統中認證服務器的工作原理及實現細節。
  4. Because there are no shared keys between ap and station, station can but authenticate ap with the help of authentication server

    實現了認證服務器對接入點ap的,同時可以使用戶通過認證服務器實現用戶對ap的
  5. 2. authentication server distributes encrypted temporal key to ap and station, which greatly increases security of temporal key. 3

    在臨時密鑰的分發過程中,實現了全加密的分發,即認證服務器向ap和用戶分發臨時密鑰都進行加密。
  6. And it increases the security by the identification of the authencticator and the authenticatation server. after this, puts forward a method to implement it

    在實現該方式的基礎上,增加系統對認證服務器的身份驗提高整個流程的安全性。
  7. Between the web certification server and the cpe equipment, at present only private vendor protocols may be applied, resulting in a lack of coherence in user management

    Web認證服務器和客戶端設備之間,在目前情況下只能應用廠家的私有協議,造成用戶管理統一性的欠缺。
  8. Bar code was introduced into this schema as secret image to reduce the complexity and difficulty of the server ' s auto - recognition of secret information which was hidden in images, so that made the schema more efficient

    方案中為認證服務器引入了條形碼圖像作為機密圖像,有效地降低了對圖像中機密信息自動識別的難度和復雜度,使得方案更加有效、實用。
  9. By the role number of role authorization table, certification server can use different security - class identification technologies according to diverse users dynamically, and decides responding authorization with the identification results

    通過角色授權表中的角色數字,認證服務器能夠對不同用戶動態地採用不同安全級別的技術,並能根據結果做出授權判斷。
  10. The system makes a network security access mechanism suitable for user ' s security policy, including three parts : package filtering router : offering security access control in network layer ; proxy server : used for security access on application layer ; authentication server : used for authentication of user ' s identity

    根據該模型,本文設計了一個防火墻原型系統,該系統提供了一個適合用戶安全策略的網路安全訪問機制,它由以下三個部分組成:包過濾路由,用來提供網路層一級的安全訪問機制;代理,用來提供應用層一級的訪問控制機制;認證服務器,用來提供用戶身份
  11. At last, the implementation of a wlan authentication system based on the 802. 1x, in which eap - tls certification protocol and the ellipse key algorithm are used, is given. the authentication system includes applicant system in client, authentication system and servers using radius. in the implementation, the ecc signature algorithm is used to create certification, and the ecmqv is used in key negotiation stage

    最後文章結合eap - tls協議以及橢圓曲線密鑰演算法實現了802 . 1x無線局域網系統,包括了客戶端申請者系統、者系統以及radius認證服務器系統,在實現過程中採用ecc簽名演算法來生成書,密鑰協商階段採用ecmqv密鑰協商協議。
  12. Since pc can be easily connected to the network and get all kinds of internal information, there exists information security hidden troubles in the system. aas can establish a hierarchical communication safeguard to enforce the strict authentication on those who want to connect into the network. this action insures that only those expected users will be connected into the network and avoid the illegal entry

    針對個人計算機可以很方便的接入網路而獲取各種內部資源的信息安全隱患, aas接入認證服務器可以構築一種分層次通信保護結構,對試圖接入網路的用戶進行嚴格的,保只有系統期望的用戶才能接入網路,避免非法用戶的侵入。
  13. Mapping table of user and role is established through their relevance, and authorizing table of role and table is obtained in terms of map relevance among role, database, database table. by the role ' s flag number, certification server dynamically applies different secure identification technique to give identification to users, and gives authorization decision according to result of identification. the method realizes authorization through program, and is not dependent on concrete database

    根據用戶與角色的映射關聯來獲得用戶和角色的映射表,根據角色、數據庫和數據庫表映射關聯來獲得角色和數據庫表的授權表,通過角色的標識數字,認證服務器動態採用不同安全級別的技術對用戶進行,並能根據結果作出授權判斷,這種方法使用應用程序來實現授權而不需依賴于具體數據庫。
  14. The user ' s vision is one directly presented by edge switches, while the backstage server is invisible to users. the two - vision view is helpful to appreciate the working principle and has guided the implementation described in this dissertation. another contribution to system representation involves clarification of the function of the authenticator system, i. e. as a server agent at the client side and as a client agent at the server side

    本論文對802 . 1x的工作過程採用了客戶機/的應用系統模式的觀點來進行描述,較清晰地反映出處于「運營商域」內代理系統的雙重功能:在客戶系統側扮演認證服務器代理的角色和在認證服務器側扮演客戶請求代理的角色。
  15. In this system the packet filtering rules are controlled intelligently by combining the intelligent mechanism with the package filtering mechanism ; to the proxy server, we develop a ftp proxy server decrypting witch with petri net model ; lastly, otp authentication are applied in authentication server

    其中,本文將智能機制與包過濾機制相結合,通過推理機和知識庫對包過濾規則進行智能化控制,實現了智能型包過濾路由;在代理部分,本文引入petri網模型對ftp代理功能進行形式化描述並給出其具體設計方案;最後,本文將一次性口令系統運用於認證服務器,並對其進行了詳細的設計。
  16. A generalized vision treats all the relevant components as a whole, therefore it comprises the functions necessarily been hosted in edge switches as well as those provided by the backstage authentication server

    這兩個概念對于理解802 . 1x協議的內涵和支持802 . 1x的系統有著十分重要的意義。用客戶/觀點分析了802 . 1x系統的工作模式。
  17. The system adopts cisco secure acs ( access control server ) 2. 6 of cisco company as the authentication server, iplanet directory servers. 1 as the directory server and star - s1924f switch based on 802. 1x as the authentication client namely user network access device to implement centralize management of the user account and password and so on in all the application, and the authorization access based on port

    系統採用cisco公司的安全訪問控制ciscosecureacs ( accesscontrolserver ) 2 . 6作為認證服務器, iplanetdirectoryserver5 . 1作為目錄,以及實達的基於802 . 1x的交換機star - s1924f作為用戶接入設備即客戶端,實現用戶在所有應用的賬號與密碼等相對固定的信息集中管理和基於角色的訪問控制。
  18. Authentication is provided in the form of a service ticket, issued by a trusted authentication service in the domain and encrypted with the target resource manager s secret key

    的形式提供的,這是由域中的一個可信發出的,並使用目標資源管理的密鑰進行了加密。
  19. This paper makes a disquisition on security of both the system database and the network server. completely considered the security and stability of the system and illustrating with practical application, this paper represents the design method of the system and the implementation mechanism of the vpdn authentication server and the database server

    本文主要對vpn vpdn計算機管理系統的數據庫安全性與網路的安全性兩方面進行了研究,在充分考慮了系統的安全性、穩定性的基礎上,以實際的應用為例,闡述了其應用系統中數據庫的安全性設計方法及vpdn認證服務器、數據的安全性實現機制。
  20. During terminal services licensing setup, you can select from two types of license server : domain license server ( the default ) or enterprise license server

    在終端授權安裝過程中,可以從兩種類型的許可中選擇:域許可(默方式)和企業許可
分享友人