multiple authentication 中文意思是什麼

multiple authentication 解釋
多重鑒別
  • multiple : adj 1 多重的;復合的 復式的 多數的 多樣的。2 倍數的 倍。3 【電學】並聯的;多路的 復接的。4 【植物...
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  1. Any individual can use his or her e - cert on smart id card to enjoy the e - banking services of multiple banks. there is no need to carry different authentication tools for using e - banking services of different banks

    研習班是專為曾參加高階課程的學員而設,主要是教授及改良學員在高階課程所學到的操控技巧。
  2. The system performs the following basic functions in order to meet the requirements : provide security methods for interbank payments through internet, atm, telephone banking service etc. for customers ; provide mechanisms to enable the secure authentication of parties in the transaction ; provide access to multiple bank payment processing systems with one protocol ; transform a payment request into a bank payment transaction ; provide information for audit and control

    該系統的主要功能是為用戶提供網上支付、 atm 、電話銀行等安全支付方式;在交易中提供對交易雙方的安全認證方式;支持多種銀行支付處理系統;把支付請求轉化為銀行內部支付交易;提供審計和控制信息。
  3. Pooling together over 150 experts in the faculties of medicine, science and engineering, icm has set up six sections serving multiple functions including clinical trial, authentication, quality control, standardization, safety assurance, drug development as well as information center and public education

    研究所匯聚逾150位醫學科學及工程專才,共設有6個小組,專責臨床研究鑒證品質管制標準與安全研究中藥開發資訊及普及教育。
  4. Based on certification and authentication software development for integration of electronic commerce, with guidance from the multiple methodologies of object - oriented programming, aspect - oriented programming and component - oriented programming together, this paper discussed the security resolution in set authentication from multiple point with j2ee framework and spring framework, then, multiple - level optimizations were operated on its software architecture

    本文以集成電子商務系統的ca認證軟體開發為背景,結合j2ee和spring等開發框架,以面向對象/面向方面/面向構件的多方法論為指導,從多個角度探討了set認證安全問題的解決方案,並對其軟體架構進行多級優化。
  5. The group passed iso9001 and iso14001 authentication. ruyi worsted woolen cloth that is its main products has more than 1000 varieties, nearly ten thousand kinds of designs, multiple products fill the domestic gaps, reach the international most advanced level

    集團通過iso9001和iso14001認證,其主導產品「如意」牌精紡呢絨有1000多個品種,近萬種花色,多項產品填補國內空白,達到國際先進水平。
  6. The trust relationship of entities and security issues involved in the integration operation are also detailed. finally, the authentication framework of integration of code division multiple access 2000 and wireless local area network is furthered. some security vulnerabilities of the framework are identified and a novel solution is proposed to enhance the security

    本論文在這一方面討論了互通的基本框架和標準的現狀,考察了其中存在的安全問題和參與實體的信任關系,並就碼分多址接入技術和無線局域網接入技術的互通認證框架進行了深入分析,指出其不安全的因素,並提出了解決方法。
  7. Gemini centralised authentication services provides a single logon system that is scaleable over multiple platforms and multiple sites to provide one set of authentication user information to multiple applications and services

    該軟體是個簡單的登陸系統,可用於多種平臺和多個站點,為多個應用和服務提供一組驗證用戶信息。
  8. Allow multiple authentication mechanisms to be configured and leveraged within the linux operating system

    允許在linux操作系統中配置並權衡使用多個認證機制。
  9. The requirement of supporting multiple authentication in single sign - on scheme often complicates the realization of authentication protocol and cross - realm authentication

    支持多認證方式的單點登錄是目前的一個新需求,通常這又使認證協議的實現和跨域的認證更加復雜。
  10. Well - defined interfaces within the framework allow for the inclusion of multiple authentication technologies and authentication mechanisms without changing or interfering with any of the existing login services

    這個框架中定義良好的介面使得無需改變或者干擾任何現有的登錄服務就可以加入多種認證技術和授權機制。
  11. Active directory supports multiple authentication protocols - such as the kerberos v5 protocol, secure sockets layer v3, and transport layer security using x. 509 v3 certificates - and security groups that span domains efficiently

    Activedirectory支持多種身份驗證協議(例如kerberosv5協議、安全套接字層協議v3和使用了x . 509v3證書的傳輸層安全保護) ,並支持有效跨越域的安全組。
  12. In order to get high quality voice in spite of low - bandwidth, our system uses several kinds of voice compression algorithms, and it realizes the functions of voice activation and jitter compensation. on the other hand, we use some methods to make voice communication safe. the methods includes : filling traffic, encrypting voice datagram with conventional encryption algorithms ; encrypting session key with asymmetric encryption, multiple authentication

    為了保證通信鏈路不被分析,系統實現了一個通信量填充器;為了對傳輸中的語音數據包進行加密,系統提供了des 、 idea 、 blowfish和keyfile等各種常規加密方法;為了利用對稱加密的快速性和公開密鑰加密的方便性,系統只對會話密鑰進行公開密鑰加密。
  13. The way that use double watermark technique, and use asymmetric secret key system and a different secret key during watermark checking gives a novel idea to people : different information can be embedded into the image according to different requirement and provided for multiple utilization, because fragile watermark only require the trusted third part to extract and the user is transparent. the robust watermark required the authentication centre to extract the watermark. at the same time, the zero knowledge proof for the author id can be done by the authentication centre, which is the idea of the cryptology authentication and can solve problem of the copyright ownership more effectively

    雖然本文對該模型提出的演算法並沒有具體實現,但是,在同一幅圖像中嵌入魯棒水印與易損水印的雙水印技術,以及採用的非對稱密鑰體制即在水印嵌入過程與水印檢測過程中使用了一對不同的密鑰,可為人們提供一個新的思路:由於易損水印只需通過可信任第三方提取,對用戶是「可見」的,因此可根據需要嵌入不同的信息,多方利用;魯棒水印的提取需要認證中心提取,同時可由認證中心對商家身份進行的零知識驗證,體現了密碼學的認證思想,更能解決版權糾紛的所有權問題。
  14. Besides, our company takes the lead in passing the authentication of document of iso9001 in the same trade in our country. and multiple productions and design are combined. all of these form strong market competitive advantage

    並且,公司率先在國內同行業中首家通過iso9001國際質量體系認證及ce認證,綜合產品及設計相結合,形成強有力的市場競爭優勢。
  15. Canonicalization in xml signatures is necessary to allow authentication between multiple services

    Xml簽名中的規范化是允許在多個服務之間進行認證所必需的。
  16. Windows authentication has certain benefits that make it superior to sql server authentication in most applications, such as secure authentication, password encryption, auditing, password expiration, minimum password length, and account lockout after multiple invalid login requests

    在大多數應用程序中, windows身份驗證因其某些優點而優先於sql server身份驗證,如安全的身份驗證、密碼加密、審核、密碼過期、最小密碼長度和多次無效登錄請求后的帳戶鎖定。
  17. For example, if the kerberos version 5 protocol is enabled, you can use the delegation and impersonation features available in windows authentication to support connections across multiple servers

    例如,如果啟用了kerberos版本5協議,則可以使用windows身份驗證中的委託功能和模擬功能來支持跨多個服務器的連接。
分享友人