hardware-based cryptographic 中文意思是什麼

hardware-based cryptographic 解釋
硬體加密技術
  • hardware : 1 五金器具;金屬製品。2 (計算機的)硬體;(電子儀器的)零件,部件;(飛彈的)構件;機器;計算機...
  • based : 基準
  • cryptographic : 關于暗號的, 用密碼寫的
  1. Then, a solution of terminal - based atm cryptographic system is proposed, the layout of the security services in such system is considered, and the hardware modules involved are designed and the architectures of them are presented. in addition, a point - to - point secure messages exchange protocol on atm user plane is presented and is integrated into the atm driver. finally, some real world issues are pointed out and some discussions are made

    本文在對atm網路的安全問題進行深入研究的基礎上,參考國外的研究思路,結合國內目前在atm設備開發方面的實際情況,提出了一種基於終端的atm網路安全保密系統解決方案;探討了該系統中各種安全業務的配置情況;設計了其中所涉及到的各種硬體模塊並給出了原理性結構圖;設計並開發了一種利用用戶面用戶通道實現的點到點安全消息交換協議;提出並解決了系統實現時應該考慮的一些問題。
  2. Based on the application of the security system in network, following modules are contained in that model : the module of the realization of intelligent cards hardware, the module of csp ( cryptographic service provider ), the module of hardware certificates, the module of administrating the certificates, the module of applications, and so on

    該系統能與微軟操作系統完全融合。根據該系統的運行環境,設計了以下一些模塊:硬體實現模塊、加密服務提供模塊、硬體證書模塊、證書管理器模塊、應用層模塊等幾個模塊。
  3. This system ' s architecture is based on the advanced pki techniques and encryptions techniques, configured with indispensable hardware for security technology to form a substantial application security platform. this integrated application security platform provides the muti - platform applications systematical uniform security services, mainly including user ' s identification, confidentiality and integrity for data transmission, access control, user ' s digital sign and verification, cryptographic key management etc, to fulfill the trans - computer - type and trans - operation system control & management system, which is independent of different business applications or business procedures

    本設計方案以信息系統安全理論與系統工程學原理為基礎,在網路環境下構建了應用安全平臺,實現了一個跨硬體機型與操作系統臺的、與具體應用部署方式無關的統一的安全策略配置,實現了包括身份認證、訪問控制、數據機密性和完整性控制、應用密鑰管理服務、抗抵賴、安全審計、數據安全等安全服務。
分享友人