identification protocol 中文意思是什麼

identification protocol 解釋
識別規約
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Protocol of isolation and identification for pathogen of tularemia

    野兔熱病原分離鑒定操作規程
  3. In a word, by integrating the user " s fingerprint identification with the cryptological authentication protocol, a secure, reliable and effective approach to identifying the users in the network environment can be provided

    把以指紋特徵為代表的生物識別技術與基於密碼體制的身份認證協議有機結合,向最終用戶提供一種更加安全、可靠、便捷的身份認證手段,將是成功地實現網路安全和信息系統安全的有效途徑。
  4. In order to select male nucleo - sterile new genotype, a tentative idea was put forward for the nucleo - male sterility to attach a tps ( thermo - photoperiod sensitivity ) and a selection strategy of combination of selection and identification, at the same time, the spring and summer sowing method were used to provide different environment conditions of appraising sterility and tps. the results indicated that ( 1 ) sterility could be appraised under the spring sowing environment and tps could be appraised under summer sowing environment. ( 2 ) under spring sowing environment, sterility could be selected, but not maintained. thereby, lines selected could only be selected as recorded selection method in the experiment. ( 3 ) and then, selection was carried out from spring sowing line selected into summer sowing in same line with tps to select plants. these plants through the intercrossing selection had been combined with sterility and tps. in this way, a new selection protocol for selection sterile line with tps was formed. it mainly involves the spring and summer sowing method, recorded selection method and the intercrossing selection method

    為了選育新類型玉米雄性核不育系,提出了為玉米核不育性添加溫光敏感性的設想和選擇與鑒定相結合的策略,同時應用分期播種的方法為作物提供不同的生長和發育的環境條件,以鑒定玉米雄穗的育性變化和對不同環境條件溫光的反應.研究結果表明,春播環境下可鑒定和選擇玉米的不育性,夏播環境下可鑒定和選擇其溫光敏感性.針對玉米核不育性難以找到保持系的特性,結合兩種播期選擇兩種性狀.但春播環境下選擇的不育性群體難以通過選擇單株來保持其不育性,為記錄性群體選擇.通過從春播入選的雜合不育性優良株系群體轉移到其對應的夏播溫光敏感性入選的同一優良群體中進行優良單株選擇,能逐漸使不育性和溫光敏感性相結合而選育出純合溫光敏不育系.這種新的選擇程序主要包括應用分期播種法、記錄性選擇法和春夏兩季交叉式選擇法,使含有不育基因的可育株系逐步累積不育基因並增加了溫光敏感性而育成玉米溫光敏不育系
  5. The five main sections of this thesis are as follows : 1 ) component parts and working flow of intelligent community 2 ) hit communicating protocol 3 ) technical points of hardware design single chip micro - controller touch screen rf data transmitting identification confirmation flash memory 4 ) software design under avr studio3. 53 ide 5 ) method and result of system test

    論文包括以下幾個主要部分: 1 )智能小區系統組成及系統運行流程2 ) hit通信協議3 ) hit - 5終端硬體電路設計單片機技術觸摸屏輸入技術無線數據收發技術身份識別技術flash存儲技術4 ) avrstudio3 . 53程序設計5 )系統測試方法及調試結果
  6. Real time communication protocol of identification based on zero - knowledge proof

    保密通訊中基於零知識證明的身份認證協議
  7. The thesis emphasize further research on both identity identification and authorization access based on role access control. a new identity identification protocol and a new method of access authorization are presented

    論文著重對身份認證和基於角色的存取控制授權訪問進行了深入研究,並提出新的身份認證協議和訪問授權方法。
  8. On the basis of it, i design and implement ipsec in the network protocol stack of linux kernel, which can verify the encryption, integrity and authenticity of data at the ip level. it solves the problem of identification deceit, malicious modification and interception when datum is transmitted on the network, and the security of network transmission is improved greatly

    在此基礎上,在linux內核ip協議棧中設計並實現了ipsec ,在ip層提供數據傳輸的機密性、完整性和真實性,解決ip數據報在網路中傳輸時的身份偽造、被人篡改以及被竊聽的問題,使網路傳輸安全性得到很大提高。
  9. Identification cards - contactless integrated circuit cards - proximity cards - transmission protocol

    識別卡.非接觸式集成電路卡.鄰近卡.傳輸協議
  10. Research on ids - faced general - purpose application - level protocol identification technology

    面向入侵檢測系統的通用應用層協議識別技術研究
  11. Identity identification protocol, which is union of confidential information and fingerprint characteristic, is a kind of new identity identification protocol used to request sensitive information to database. extending the protocol can achieve the security of communication data

    秘密信息和指紋特徵相結合的身份認證協議是一種適用於向數據庫請求敏感信息所採用的新型身份認證協議,擴展這個協議能夠實現通信數據的安全。
  12. In cryptology technology, which can be used to create digital evidence, we addressed three problems : a encryption scheme integrated fault tolerance and digital signature, a identification protocol based on zero - knowledge interactive proof, digital signature included single digital signature, multiple digital signature and ( n, t ) threshold digital signature. 5. the sk protocol was improved and s

    4 .在適合生成數字證據的密碼學技術研究中提出了:一個集成數據簽名和容錯技術並能在加密、傳送、解密和認證三個過程中實現容錯的rsa加密方案;一個基於零知識證明的身份認證協議;基於零知識證明的數字簽名方案。
  13. Private integrated services network - inter - exchange signalling protocol - name identification supplementary service iso iec 13868, modified endorsement of the english version din 300238 v1. 3. 1 2004 - 01 as german standard

    專用綜合業務網.局間信令協議.名稱標識補充業務
  14. Rtf provides end - to - end network transport functions suitable for applications transmitting real - time data, such as audio, video or simulation data, over multicast or unicast network services. rtcp monitors the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. h. 323 and sip use the real - time transport protocol to transmit real - time data. at the end of this section, we provide the guidelines for writting of rtf payload format specifications

    這兩個協議的內容是非常重要的,實現原理都是採用組播方式,我們在互連網上傳輸視頻音頻將使用這兩個協議,而對于更高層次的協議框架h 323 , sip ,在其底層傳輸視頻音頻通常也是採用rtp rtcp協議。 rtp靈活地支持對眾多視音頻編解碼的負載格式,這一部分的最後給出了就如何將視頻音頻數據進行rtp包封裝的一般原則。
  15. After that paper expatiates on multi - object cooperative tracking algorithm based on three layers dynamic interaction system including coherence differentiate algorithm, two object identification, and protocol used for multi - video combine intra - agency layer and inter - agency layer, introduces dynamic memory between two levels, resolve the resource distribution problem of multi - object tracking. at last paper carries out single active object detection and tracking experiment, object coherence judgment experiment and multi - video communication and cooperative experiment

    接著,重點闡述了基於三層動態交互體系的多目標協調跟蹤演算法,其中包括目標一致性判別演算法,兩種物體標識,以及用於多攝像機協調的agency內部層和agency互連層的相關協議,並簡單介紹了在這兩層中動態存儲器的作用,解決了多個ava對多目標進行協調跟蹤時的資源合理分配問題。
  16. Identification cards - contactless integrated circuit cards - vicinity cards - anticollision and transmission protocol

    識別卡.無觸點集成電路卡.鄰近卡.抗碰撞和傳輸協議
  17. The definition of standard service interfaces and the identification of the protocol are addressed in current ogsa specifications

    Ogsa中解決了兩個重要的問題,即標準服務介面的定義和協議的識別。
分享友人