end-to-end authentication 中文意思是什麼

end-to-end authentication 解釋
端對端身份驗證
  • end : n 1 端,尖,末端,終點。2 邊緣;極點,極限。3 結局,結果。4 目的。5 最後,死。6 【紡織;印染】經...
  • to : adv 到某種狀態;〈特指〉到停止狀態;關閉。 ★也常和動詞結合,略去其後賓語,而構成成語: The door i...
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  1. How to use of the currently in effect criminal procedure expert testimony system in the normal way, administrative control expert testimony institution and office workers, amplify necessary rules and regulations of the actuating of expert conclusion 、 implement of expert conclusion 、 argumentation of expert conclusion 、 authentication of expert conclusion ; up to protect litigation rights of parties in action, get on the stick of administration of justice 、 successfully achieve an end of administration of reasonable judgment all along is the focal point of the work and difficult point in our expert testimony system structure. in this paper, coupling our current the present situation of criminal expert testimony, to perfect the legal system, to resolve the problems of expert testimony system, the writer tried to study some problems of giving some enlightenment to the theory and practice of judicial appraisal institution, relate and analyze it and set forth the views and opinions on the settlement of some matters with six parts

    本文從分析刑事司法鑒定及其程序入手,比較兩大法系關于刑事司法鑒定的啟動、實施、質證、認證與採信等司法證明各環節的制度規定,透視我國刑事司法鑒定程序存在的基本問題,在此基礎上提出:規定鑒定期限、對無鑒定結果不能進入訴訟或準司法程序的情況,當事人可以申請公證機關公證鑒定啟動程序的真實性和合理性、建立鑒定人出庭作證制度、裁判者對鑒定結論認證通過質證程序形成心證的過程及理由應做出公開說明等有利於我國刑事司法鑒定程序改革的具體構想。
  2. Coinpe with talihonal analog tnulking system, tetra system is apter to boplemen digltal encrypon of speech and data, but system securiiy is unable to depertd sdriply on enctwon. from the point of view of the b1lbrmation system security arehithebe, the author classified and concltuled the tetra system seeurity and wuced sytw security bo the wts of thnd analysis, security requirements, security sehaces and security mangemen etc. 111e mechbosm of authentication, tem1ina enable and disabq air intn encrypion, end - bend encmption led in tewh is the key ler in this n to the security question of practical application, the re1evant wt w and m are provided too

    但是系統安全不能單純依靠加密來保證,作者從信息系統安全體系的角度,對tetra系統安全進行了分類歸納,從風險分析、安全需求、安全服務、安全管理等方面對tetra系統安全體系進行了閘述,並對tetra系統中主要應用的鑒權、終端激活禁用、空中介面加密、端到端加密等安個機制進行了重點研究,同時針對實際應用中出現的安全性問題提出了解決方法。
  3. Based on the analysis of relatively mature network security technology that can be introduced by sip, by the means of improving and applications, the article realizes tls hop - by - hop encryption, s / mime end - to - end encryption mechanism, improved http digest authentication, s / mime end - to - end signature mechanism and so on

    在分析現今可以借鑒的用來對sip通信進行保護的相對比較成熟的網路安全技術的基礎上,通過改進和應用,實現了包括tls逐跳加密, s / mime端到端加密等的加密機制以及改進的http摘要認證, s / mime端到端簽名等的身份鑒定機制。
  4. The main work of this thesis include the following aspects : ( 1 ) after deeply analyzing and probing the one - time password authentication technology, aiming for the deficiency of the extant systems of one - time password authentication, this thesis proposes an improved one - time password authentication schenism, which can efficiently resist the small - number attack and replay attack. what ' s more, during implementation the improved authentication mechanism does not require the user in the client end to install any software or to modify any configuration

    本文主要做了以下幾個方面的工作: ( 1 )對一次性口令認證技術進行了深入的分析和探討,針對現存一次性口令認證系統不能抵禦小數攻擊的安全漏洞,提出一種改進的一次性口令認證機制,這種認證機制能夠有效地抵禦小數攻擊和重放攻擊,而且使用時不需要客戶端做任何設置和安裝任何軟體。
  5. Is security in the communications infrastructure acceptable, for example, in the use of secure socket layer mutual authentication between eai middleware servers, or in the use of the https protocol ? is individual, point - to - point security acceptable between participating systems, or is an end - to - end model required

    是否可以接受通信基礎架構中的安全性,例如,是否在eai中間件服務器之間使用安全套接字層( secure socket layer , ssl )互相驗證,或者是否在使用https協議?
  6. End - to - end authentication and authorization

    端到端的身份驗證和授權
  7. This simple, single transport solution lacks the following : end to end protection, non - repudiation, selective protection securing a subset of the message, a robust and flexible authentication mechanism, and provision for message level or end to end secure context

    這個簡單的、單一的傳輸解決方案缺少下列特徵:端到端的保護、不可抵賴性、選擇性保護(保護消息的一部分) 、健壯且靈活的認證機制以及消息級(或稱端到端)安全上下文的供應。
  8. End - to - end authentication

    端對端身份驗證
  9. Notice, however, that transport security does not provide end - to - end encryption, and does not provide authentication for individual conversations

    但請注意,傳輸安全模式不提供端到端的加密,而且也不為單個會話提供身份驗證。
分享友人