Double key secure authentication is one of the protection methods used to verify access across different systems.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
Such registries are used to delegate key partitions so that other registries can rely upon the root registry to verify and maintain the uniqueness of such key partitions.
这样的注册中心用来对键分区进行授权,这样其他注册中心就能够依靠根注册中心来验证和维护这样的键分区的唯一性。
The remaining task is to verify the proper functioning of the key generator and range producer functions.
剩下的任务是验证键生成器和范围生成器函数是否能正常地运行。
Another one is that the target flight module designed as required for follow-on space LABS can test and verify the key skill while completing the task of rendezvous and docking.
二是目标飞行器按后续空间实验室的要求设计,可在完成交会对接任务的同时,验证部分关键技术;三是还可同时开展科学实验和技术试验。
When the form is posted, the value of this field is compared to the value of the authentication key in session, to verify that the form submission was valid.
当表单被提交时,系统将把此字段的值与会话中的认证密钥值相比较,以检验表单提交是否有效。
To verify a client certificate, the provider-side handler must have access to the issuers' public key.
要验证客户端证书,提供者一方的处理程序必须访问发行者的公共密匙。
Foreign officials who watch Venezuela closely say that Cuban agents occupy key posts in Venezuela's military intelligence agency, but these claims are impossible to verify.
近距离观察委内瑞拉的外国官员表示古巴军官在委国军情局担任要职,但这些说法未能得到证实。
The receiver USES the ca's certificate to verify the sender's certificate, ascertaining that the public key contained in the certificate truly belongs to the owner.
接收方用CA的证书来验证发送方的证书,确定证书中所包含的公钥确实属于所有者。
To verify, your application server key file should contain the jmsclient certificate, and the application server trust file should contain two signer certificates, as shown in Figure 13.
为了确认,您的应用服务器密钥文件中应包含jmsclient证书,同时应用服务器信任文件中应包含两个签名者证书,如图13所示。
Without a saved host key, SSH and Capistrano prompt to verify the key, which breaks the automated deployment.
如果不保存主机密钥,SSH和Capistran o会提示验证密钥,这会中断自动化部署过程。
The steps described in this article are the key ones that need to be executed in order to verify the health status of your CloudBurst software stack.
本文中所描述的步骤为验证CloudBurst软件集健康状态所必须执行的重要步骤。
Also verify that HOLDINGTYPE is displayed as a key column.
另外确认HOLDINGTYPE显示为关键列。
XML encryption and digital signatures rely on Public Key Infrastructure (PKI) to help encrypt, decrypt, sign, and verify various documents.
xml加密和数字签名依赖于公共密钥基础设施(Public Key Infrastructure,PKI)来帮助加密(encrypt)、解密(decrypt)、签名(sign)和验证(verify)各种文档。
To verify, apply power to your BeagleBoard-xM, and type a key to stop the boot countdown.
想要验证,接通BeagleBoard - xM电源,然后按一个键停止引导倒计时。
Type GPG — verify samba-version.tar.asc to verify the key. The program should respond with a message similar to.
输入gpg——verifysamba - version. tar . asc验证这个密钥。
In the SSL properties, verify that the location of the key repository matches your key database name and location.
在ssl属性中,确认密钥存储库的位置是否与您的密钥数据库名称和位置相符。
You will use the private key to digitally sign the content, and send the public key along with the digitally signed message for the recipient to verify the digital signatures.
您将用私钥对内容进行数字签名,然后将公钥随着经过数字签名的消息一起发送到接收方,以便用来验证其中的数字签名。
Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.
数字签名用于验证消息是否真正由发送方发送;数字签名结合了消息摘要和公钥密码术的使用。
It USES the public key in a certificate generated by the ca and stored on the client to verify that the certificate presented by the LDAP server is valid.
它使用ca所生成的证书中的公钥,这个公钥保存到客户机中以验证这个ldap所产生的证书是有效的。
Public key: Can be used to encrypt or verify a message.
公钥:可用于对消息进行加密或验证。
The receiver uses the sender's corresponding public key to verify the digital signature.
接收方使用发送方的对应公钥验证数字签名。
In order to verify that a public key certificate is legitimate, I need to verify the signature of the signer that issued it.
为了验证公钥证书是合法的,我需要检验发出该签名的签名者。
Verify the file name for the Configure Crypto Certificate for the public key just uploaded is selected.
验证选择了刚刚上载的公钥的配置加密认证的文件名称。
Of course, you'll need to provide your public key to verify that.
当然,您需要提供公钥来进行验证。
Layered process Control (LPC) are a system of audits performed by multiple levels of management. Key process characteristics are audited frequently to verify process conformance.
逐层过程管理(LPC)是由多个管理层进行的系统审核。对关键过程特性进行频繁的审核以验证过程符合性。
Next, verify that this user has a valid Kerberos segment and a key.
接下来,验证此用户具有对应的有效kerberos段和密钥。
Then verify that your newly created key was generated using GPG -list-secret-keys.
然后使用gpg—list - secret - keys验证您新创建的密钥已生成。
Then verify that your newly created key was generated by using GPG -list-secret-keys.
使用gpg—list - secret - keys验证您新创建的密钥已生成。
Verifying the signature of the message using the public key of sender to authenticate the sender and to verify integrity of the message.
使用发送方的公钥来检验消息的签名,以便验证发送方并确认消息的完整性。
Verifying the signature of the message using the public key of sender to authenticate the sender and to verify integrity of the message.
使用发送方的公钥来检验消息的签名,以便验证发送方并确认消息的完整性。
应用推荐