该系统可能使用智能身份证或连接到特定计算机的数字证书,并在一系列在线服务中认证用户。
The system might use a smart identity card, or a digital credential linked to a specific computer and would authenticate users at a range of online services.
如果您不希望获取认证,就像是您获得了计算机科学专业的学位,然后在毕业之后不再进行任何额外的培训。
If you don't pursue certification, it's like getting a degree in computer science and then not taking any additional training after you graduate.
通过分离横向偏振和纵向偏振,将其叠加生成一幅更准确的指纹图,将此作为计算机处理认证的输入。
By separating the vertical and the horizontal polarization, the device can overlap those images to produce an accurate fingerprint, which is fed to a computer for verification.
查看返回的测试结果,确认管理控台可以使用服务器授权认证连接到企业版计算机。
In the Test Results, verify that the Management Console can connect to the enterprise edition computer with the server auth credentials.
在Build Forge环境下,使用受权创建服务器端认证,这样使用管理控制台就可以登陆到企业版计算机。
In Build Forge, create a server auth with credentials that the Management Console can use to log on to the enterprise edition computer.
文凭要求:计算机学士学位或大专学位,或信息安全认证。
Degree required: Associate's or bachelor's degree in computing or certifications in information security.
在安装完成后,启动认证服务控制台,通过选择计算机名来恢复数据库。接着,在“所有任务”下“活动”菜单中点击恢复CA。
After the installation completes, start the Certificate Authority console and restore the Database by selecting the computer name. Then, in the Action menu under all Tasks, click restore ca.
认证范围为:计算机系统集成和软件开发服务。
The certification range is computer system integration and software development services.
计算机仿真与光学扫描实验表明,该方法具有认证过程相对简单、解码图像信噪比高、成本低和防伪性能好等优点。
Computer simulations and optical scanning experiments show that the presented technique has advantages of the simple authentication process, high PSNR, inexpensive cost and good security.
此外,生物识别产品借助于计算机技术,易完成安全认证、监控、管理等功能。
Moreover, the biological recognition product aided by the computer technology is easy to implement the functions including safety certification, monitoring and management.
但是在登录前需要智能卡认证的网络计算机大规模装备之前,不要指望智能卡能有广泛应用。
But it is not expected to take off in user sites until network computers, which require smart-card authorization prior to log in, are more widely deployed.
在计算机网络应用中认证技术是信息安全中的一个重要内容。
Identification technique is a very important content of information safety in computer network application.
如果您是一个正在寻找计算机专业人才的经理,我们能够保证那些获得RHCE认证的专业人员是满足或超过您的期望的候选人。
If you are a manager that seeking computer professional, we can make sure those professional that obtain RHCE attestation are the candidate of the expectation that satisfy or exceeds you.
本文介绍计算机信息系统集成资质认证的有关事宜。
This paper introduces the matters related to the certification of computer information system integration.
毋庸质疑,远程口令认证系统是目前防止非法进入计算机网络最有效,也是最常被采用的做法。
Remote Password Authentication System (RPAS) obviously is the most effective solution and is also made the best use of.
我有计算机操作员资格认证。
I have received a Computer Operator Qualification Certificate.
步态识别作为一种较新的生物认证技术有其独特优势,在计算机视觉研究领域又是一个难题。
As a new technology of biometrics, gait recognition has its predominance among other biometric technologies while in computer vision research field it is a hard problem.
数字图书馆是当前计算机界研究的一个热点,本文以“上海市高校网络图书馆”为背景,介绍网络图书馆中所采用的系统集成技术和安全认证技术。
Digital library is research hotspot now in computer fields. This paper presents system integration and authentication technology based on Net library Among the Universities in Shanghai.
Matsuo Takashi:信息处理系统和认证介质的访问控制方法和计算机程序。
Information providing system and authentication medium access control method and computer program.
第十一条联网企业需进行身份认证,通过计算机网络办理进出口通关及报核手续。
Article 11 a networked enterprise shall have its identity certified, and go through the formalities of customs release for export and of reporting for check through computer network.
这些由软硬件构成的网守系统通过阻止未经认证的访问、限制授权访问的访问权限,保护计算机网络。
These are gatekeepers made of hardware and software that protect a computer network by shutting out unauthorized people and letting other authorized go only to the areas they have privileges to use.
它涉及到生物特征提取、计算机视觉、图像处理、模式识别和身份认证技术等诸多领域。
Ear recognition involves many domains such as feature extract, computer vision, image processing, pattern recognition and identity authentication etc.
系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
PACS技术对计算机网络系统的要求是很高的,因此在认证它对临床信息系统带来的技术提升同时,也应对它的资金需求有充分的估计。
Since PACS raise a high demand to network, it must be adequately evaluated about its financial requirement while evaluate the elevation of techique which brought to CIS.
未来的个人电脑将提供一种信任的根源,将不再是用户ID和密码依靠安全,因为所有的认证将是依靠计算机之间相互认证。
The PC of the future will provide a root of trust and will no longer rely on a user id and password for security purposes because all authentication will be done machine to machine.
强制性文件。 获认可的管理体系认证对。计算机辅助审核技术的使用。
Mandatory Document for the use of Computer Assisted Auditing Techniques ("CAAT") for …
同时,在可信计算技术中,终端计算机是通过用户身份认证来实现安全的远程访问,用户在实现远程认证的同时也要求保护自己的隐私不被泄漏。
Remote attestation which the users are used to identify themselves to connect remote communication is required in the trusted computing. As well as the users require to protect their privacy.
实验室计算机数据采集系统的认证与验证。
Parenteral Drug Association PDA, Validation and qualification of computerized laboratory data acquisition systems .
实验室计算机数据采集系统的认证与验证。
Parenteral Drug Association PDA, Validation and qualification of computerized laboratory data acquisition systems .
应用推荐