Although the MDM Server entrusts end user authentication to the system user, it is necessary for it to know the identity of the end user in order to provision transactional and data authorization.
虽然MDMServer将终端用户认证委托给系统用户,但是它必须知道终端用户的身份,以提供事务性授权和数据授权。
The service is integrated with Sun's secure single sign-on identity system backed by a worldwide employee LDAP directory for authentication and authorization.
这一博客系统和Sun的安全单点登录认证系统集成在一起,供全球员工使用。
Identity authentication as an important means of prevention is the first security system barriers, strengthening teller control, a clear correlation responsibility is of great significance.
身份认证作为事前防范的重要手段,是安全体系的第一道屏障,对于加强柜员制约、明确相关责任具有重要意义。
With the gradual perfection of the Unified Identity Authentication system, it will play an important role in the project.
随着统一身份认证系统的逐步完善,该系统将在企业资源计划的项目应用中发挥重要的作用。
This scheme not only supports secret key management and identity authentication of personnel and equipment, but also constructs secret key management center and manages encrypted key of the system.
方案不仅支持系统内人员和设备的密钥管理、身份认证及公钥密码运算,而且还对加密密钥进行管理。
As the first defense line of secure application system, the identity authentication is the most important secure service.
身份认证作为安全应用系统的第一道防线,是最重要的安全服务。
The model not only realizes key management, encrypted communication, digital signature and identity authentication, but also is fit for network system with real time and large data transfer.
本模型不仅适用于实时的、大数据传输的网络系统,而且实现了密钥管理、加密管理、数字签名以及身份认证等功能。
The system USES AES algorithm to realize the identity authentication of vehicle and the security of the geographic information of vehicle.
该系统采用AES算法来实现对于车辆的身份认证和地理位置信息的保密。
This system realizes key management, encrypted communication, digital signature and identity authentication etc.
本系统实现了密钥管理、加密管理、数字签名以及身份认证等功能。
It presents smart card system of session key distribution for communications safety to net video conference transmission, resolves user identity authentication with security.
为网络视频会议传输提供有效的通信安全,采用一个会议密钥分配的智能卡系统,来解决使用者身份认证和通信安全问题。
Secure identity authentication scheme is the kernel of authentication system.
安全可靠的身份认证方案是认证系统的核心。
The system is implemented on J2EE platform and the secure problems such as reply-attack, identity authentication is solved effectively.
系统在J2EE平台上实现,有效的解决了重放攻击、身份认证等安全问题;
User unified identity authentication platform researches and develops identity authentication system for the enterprise, provides a integrated user unified identity authentication system.
用户统一身份认证系统要研究开发一套企业级的用户身份认证平台,提供一个完整的用户身份认证体系。
On the research of the whole access identity authentication, including protocol, client and server, the frame of authentication system in which has been put forward.
并以借此研究了整个接入用户身份认证系统,包括认证协议、认证客户端、认证服务器端,提出了园区网络认证系统的整体框架。
The system can prevent documents from being illegal modification, identity authentication and non - repudiation.
该系统实现了电子文档的防篡改功能、身份认证功能和不可否认功能。
While the identity authentication technology are network security and information system security the first barrier, it is time network information security technology a very important research field.
而身份认证技术是网络安全和信息系统安全的第一道屏障,它是网络时代信息安全技术非常重要的一个研究领域。
This two-way identity authentication scheme effectively prevents imitate attack, replay attack and decimal fraction attack. And the security of authentication system is enhanced.
此方案能够进行双向的身份验证,有效地防止了冒充攻击、重放攻击和小数攻击,从而提高了认证系统的安全性。
So it is necessary and important to design a system of identity authentication with high security.
因此,设计并实现安全的身份认证系统具有重要的现实意义。
It offers a viable mode and a new idea for the identity authentication system of multi-applications.
该方案为多应用服务身份认证系统的构建提供了一种行之有效的模式和思路。
The current proxy blind signature are based on the identity or certificate, needing reliable third-party authentication. Public key system without the certificate has to overcome this shortcoming.
当前的代理盲签名都是基于身份或证书的,需要可靠的第三方认证,而无证书公钥系统却克服了这种缺点。
The identity authentication technology that can authenticate the identity of the sender and the receiver is very important in the security system.
身份认证技术是能够对信息收发方进行真实身份鉴别的技术,是保护网络信息资源安全的第一道大门。
Finally, the authentication system based on CFCA PKI is studied, and it is applied to the study of the identity authentication of system client and the safety transmission of defraying data from WEB.
研究了基于CFCAPKI的认证体系,并将它应用于系统的客户身份认证及网上支付数掘的安全传输。
This paper introduces the principles of dynamic identity authentication and develops a counter synchronization authentication system using mobile as the carrier with J2ME and ASP. NET.
本文提出了动态身份认证的概念,并在基于手机为载体的系统上用j2me及asp.net设计并实现了一个基于计数器同步的动态身份认证系统。
Identity authentication is an important part of a perfect secure system, the first defense, and the foundation of secure communication and access control.
身份认证是一个完善的安全系统的重要组成部分,是第一道安全屏障,它是安全通信和访问控制的基础。
In this thesis, these problems are explored in depth, and an identity authentication system based on computer keystroke dynamics is designed and implemented.
本论文针对这些问题进行了深入研究,并完成了一个计算机击键动力学身份鉴别系统。
According to the requirement of the multi-applications with single authentication, this paper puts forward a new kind of identity authentication system which is independent of applications.
本文以多应用单认证的需求为切入点,提出了一种满足上述需求的、与应用服务无关的身份认证系统方案。
Single sign-on (SSO) protocol of the Liberty alliance has resolved the uniform identity authentication problem of the Internet with more than one application system inside the alliance.
自由联盟的单点登录协议解决了如何在网络联盟内部多个应用系统统一身份认证的问题。
Based on the characteristics of real estate evaluation system, system security solution from identity authentication, access control and data backup are discussed.
从房地产评估系统的特点出发,从身份认证、访问控制和数据库备份三个角度来考虑评估系统安全问题。
Finally, some initial works of identity authentication based on mouse trajectories are explored, including the construction of dynamic model, system architecture, data acquisition and analysis, etc.
最后,论文对基于鼠标轨迹的身份鉴别方法进行了初步探讨,在建立动态模型、系统设计、数据采集与分析等方面做了一些初步工作。
Finally, some initial works of identity authentication based on mouse trajectories are explored, including the construction of dynamic model, system architecture, data acquisition and analysis, etc.
最后,论文对基于鼠标轨迹的身份鉴别方法进行了初步探讨,在建立动态模型、系统设计、数据采集与分析等方面做了一些初步工作。
应用推荐