authenticate 中文意思是什麼

authenticate 解釋
vt. 及物動詞 為…出立證據,證實;鑒定;認證。
The document was authenticated by a seal. 文件有印鑒為憑。

  1. A new molecular method to authenticate radix trichosanthis as well as its adulterants and substitutes

    雷公藤藥材中雷公藤甲素變異規律
  2. We would have to authenticate your relationship with the boy.

    我們必須證實一下您和那個孩子的關系。
  3. An expert was needed to authenticate the original van gogh painting from his imitation.

    這幅畫是梵谷的真跡還是贗品,需由專家來鑒定。
  4. The certificate used to authenticate the server

    用於對服務器進行身份驗證的證書。
  5. A certificate file used to authenticate a web site

    用於驗證網站的證書文件。
  6. Exorcists have used tape recorders to authenticate the ritual

    驅魔儀式就開始使用錄音磁帶來鑒別儀式
  7. . . exorcists have used tape recorders to authenticate the ritual.

    …驅魔儀式就開始使用錄音磁帶來鑒別儀式…
  8. In addition, in conjunction with biometrics, use should be made where appropriate of so - called privacy enhancing technology. the use of such technology minimises the collection of personally - identifying data without compromising the power of biometrics to authenticate an individual s claim as an authorised user of a system or service

    此外,生物統計學亦應與稱之為加強私隱保障科技( " privacy - enhancingtechnology " )同時使用;應用此類科技,可減少收集可識辨個人身分的資料,但同時亦可發揮利用生物統計學精確辨別個人身分的功能的優點。
  9. Company auditors are required to authenticate the audited financial statements attached with the corporation tax returns by signing on the relevant part of the e - form with their digital signatures

    公司的核數師亦須在電子表格的有關部分以數碼證書簽署確認所夾附的核數師報告書和帳目。
  10. When putting to the proof and inquiring about the proof, the litigant sh ould foll ow the legal procedure, and judges must authenticate the evidence by the rule of evidence presentation

    舉證和質證應按照法律規定的程序進行,並由法官運用證據規則對證據作出正確認證。
  11. For example, an implementer of gama may want to authenticate using the existing ldap infrastructure

    例如, gama的一個實現可能會希望使用現有的ldap基礎設施來進行身份驗證。
  12. For example, if the procedure were to create a login, which is a server - level action that requires a server - wide permission, the authenticate server permission would have to be granted to the authenticator of the context

    例如,如果此過程要創建一個登錄帳戶且此服務器級操作需要服務器范圍權限,則必須對上下文的身份驗證者授予authenticate server權限。
  13. To authenticate the hash, it must first be decrypted

    要認證雜湊,必須首先對它解密。
  14. In short, we need a way to authenticate the hash

    簡而言之,我們需要一種認證雜湊的方法。
  15. With the development of automobile industry and road transportation , the traffic accidents happen every day in the world and become a serious society problem the vehicle collision accidents are over 2 / 3 times as much as all traffic accidents they cause a large amount of social infuence and serious economic loss therefore , it is urgent to study vehicle collision accidents comprehensively and systematically , and the research also is the academic foundation to analyze and deal with traffic accident it is difficult to authenticate car velocity after traffic accident to dig over locate witness is right way mechanics is avaid tool in this field it is important to establish math model and this is precondition to calculate vehicle velocity firstly on the basis of summarizing the research results , this paper deeply discusses the calculating model to analyze the instantaneous motion state in the vehicle collision, the interrelation among the every moving mechanics parameters in the every phase of the collision secondly , according to the collinear collision and two - dimension collision and the restitution coefficient , the paper estabishesthe post collision movement models it proves that these models are correct and valid thirdly , this paper try to research reconstruction of road traffic accident and put forward the method on it

    對交通事故的科學分析應是建立在正確的數學模型與計算機模擬技術基礎上的定量分析,其基本條件就是要有能正確描述事故過程中汽車狀態的數學模型,只有建立正確的數學模型,才能較準確地推定事故車輛的碰撞速度。所以建立正確地車輛碰撞模型和運動模型正是汽車事故再現的關鍵問題。本文首先在總結前人研究的基礎上,深入地研究汽車碰撞理論,分析了車對車碰撞作用瞬間狀態的計算模型及碰撞恢復系數與碰撞前、后速度的關系;其次,根據交通事故中最普遍的一維和二維碰撞的不同情況,採用恢復系數和滑動摩擦系數等概念,分別建立了碰撞后車輛動力學模型;第三,對汽車碰撞事故再現進行了初步研究,確定了車對車碰撞事故模擬計算和反推計算方法,並給出相應的模擬程序流程圖。
  16. Much like authentication with physical tokens, biometric authentication has the limitation that you need to have access to a physical input device in order to be able to authenticate

    與使用物理標記的認證很相似,生物認證也存在限制,您需要訪問物理輸入設備以便能夠進行認證。
  17. You are required to authenticate your identity by one of the means below

    你需使用以下其中一種方式確認身份
  18. Website with your registered visa credit card, you will be asked to input your password to authenticate your identity

    網站進行網上付款時,須先輸入該密碼以確認身份。
  19. The e - tax password formerly known as " multi - purpose password " is a password to authenticate an individual s identity in using the inland revenue department s electronic services

    稅務易通行密碼前稱多用途通行密碼是當個別人士使用稅務局的電子服務時,用作認證他她身分的個人密碼。
  20. To address the basic concerns of authenticity, integrity, confidentiality and non - repudiation in electronic transactions through the internet, a person must authenticate himself when using the service

    系統的安全措施透過網際網路以電子方式交易是否可辨認確保完整保密和不容推翻等均是備受關注的問題。
分享友人