• A good example of this would be a user using the application, taking a lunch break, and returning to the application after the authentication key had expired.

    方面一个很好的例子用户正在运行应用程序午饭过后他返回应用程序时,认证密钥已经过期了。

    youdao

  • SPKM provides authentication, key establishment, data integrity, and data confidentiality in an online distributed application environment using a public key infrastructure.

    SPKM使用公钥基础设施一个联机分布式应用程序环境下提供身份验证密钥设立数据完整性数据机密性

    youdao

  • The secure transportation and identity authentication of EDI message are the key part of the EDI's application and development.

    EDI报文信息安全传输身份认证EDI应用推广关键

    youdao

  • It can provide high strength (with key of 256bits) encryption, integrality validation, identity authentication based on PKI, and anti-replay protection for upper layer application.

    可以提供256强度数据加密完整性验证基于PKI身份认证以及重播保护功能,最大限度地上层应用提供安全保护。

    youdao

  • Many key security technologies are involved, such as ID authentication, digital signature and transfer encryption, workflow definition, accreditation application, electronic seal and trail trace.

    系统开发涉及身份验证、数字签名传输加密工作流定义审批应用电子签章痕迹跟踪等关键安全技术

    youdao

  • Many key security technologies are involved, such as ID authentication, digital signature and transfer encryption, workflow definition, accreditation application, electronic seal and trail trace.

    系统开发涉及身份验证、数字签名传输加密工作流定义审批应用电子签章痕迹跟踪等关键安全技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定