可以通过查询这个对象来获得密钥名和其他密钥信息。
This object can be queried to get the key name and other key information.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
客户机通过将相应的密钥信息传递给服务提供程序来认证经过加密或签名的数据。
The client authenticates the encrypted/signed data by passing the corresponding key information to the service provider.
要手动生成私有、公共密钥信息,可以从命令行使用keytool,如清单1所示。
To generate the private and public key information manually, use the keytool from the command line, as in Listing 1.
图17显示了如何为密钥信息配置DN和别名的示例,其中每个方向分别标记为a和b。
Figure 17 shows an example of how this is configured for the key information, with each direction labelled as a and b.
当您单击ReviewKeyData按钮时,将显示您输入的密钥信息(图14)。
When you click on the Review Key Data button, the information you entered for the key (Figure 14) displays.
结果表明,该方法在穷举量约为241时,能恢复出输入输出变换的子密钥信息以及密文对应的明文信息。
Result shows that this method can obtain the sub-keys and the corresponding plaintexts when the computing complexity of the improving attack is about 241.
提供一种基于XML的简单协议,以便通过XKMS服务处理密钥信息,使应用程序不必理解复杂的PK i语法和语义。
Eliminate the need for the application to understand complex PKI syntax and semantics by providing a simple XML-based protocol for processing key information through the XKMS service.
步骤4:利用一个数据加密密钥、一个密钥加密密钥、与这两个密钥相关联的算法、以及将来包含在输出信息中的密钥信息,根据它们来创建一个Encryptor对象。
Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.
防止服务的抵赖攻击(denial of service attack):使用XKMS来获取密钥信息比较有用,前提是XKMS在需要的时候可用,并且这一过程能在合理的时间内完成。
Prevent denial of service attacks: Using XKMS to get key information is useful if it is available when needed and within a reasonable amount of time.
如果这些信息正确,那么您需要选择一个密钥和密码。
If the information is correct, you need to select a key and a password.
身份验证服务向客户端发出一条响应消息,其中包含TGT、TGT会话密钥的一个副本和其他信息。
The authentication service make a response message to the client containing the TGT, a copy of TGT session key and other information.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.
为了让SSO正常工作,所有服务器必须同意密钥、用户信息和各种其他配置数据。
For SSO to function properly, all servers must agree on cryptographic keys, user information, and miscellaneous other configuration data.
虽然XKMS使用的密钥绑定信息没有寿命,但是底层pki颁发的凭证偶尔也会有这么一段时间,过了这段时间之后就要周期性地更新。
While there is no lifespan for the key binding information used by XKMS, the credentials issued by the underlying PKI occasionally do have a time span that must be renewed periodically.
和任何访问信息一样,都必须保管好您的秘密密钥。
As with any access information, it is imperative that you keep your secret key... secret.
他们说,这会使通信网络中高速、高保真、大容量的信息传输,如量子密钥技术,成为可能。
They say it will make possible high-speed, high-fidelity transmission of large volumes of information, such as quantum encryption keys, via communications networks.
在图8中,输入信息以创建私有密钥和数字证书。
In Figure 8, enter the information to create the private key and the digital certificate.
加密密钥是信息安全的关键环节,保障军事人员的通信传递。
Encryption keys are a crucial aspect of information security in the delivery of assured communications to military personnel.
XML加密只关于加密和解密结构化信息,而不规定密钥交换的任何特定方法。
Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.
在为用户主体获取tgt时或是为服务主体创建一个密钥时需要此信息。
This information is needed to acquire a TGT for a user principal or to create a secret key for a service principal.
另外,还要求管理员角色用传统的方式访问安全信息(密码、密钥文件等等)以更好地保护敏感数据。
In addition, the administrator role is required to access traditionally secure information (passwords, key files, etc.) to provide better protection to sensitive data.
所有RIM公司的说法都是建立在加密的信息是没有密钥来破解的基础上,那如果是在任意一个加密过程结束前?
All that RIM is saying is that while the message is encrypted it is not possible to provide a key to decrypt it. What about at either end of the encryption process?
密钥存储库是包含EFS安全信息的密钥库。
Keystore is a key repository that contains EFS security information.
例如,您可以使用消息中包含的密钥向消息添加信息;该密钥可以是一个帐号。
For example, you can add information to a message using a key that is contained in a message; the key could be an account number.
网络部分包含获取票证和其他服务所需的信息(比如,它包含主体秘密密钥)。
Network part contains the information required to acquire tickets and other services (e.g. it includes the principals secret key).
如果你音乐存储在硬盘里,能在家中的每个地方播放,那你可要当心了,你的某些私人敏感信息,像密钥或者识别码之类的,都会出现在家中的每个地方,这都是潜在的危险。
If music is saved on a hard drive so that it can be played around the house, make sure that sensitive information, such as passwords or identifying Numbers, are saved elsewhere.
请咨询提供商有关专用密钥管理的相关信息。
步骤1:为了定位一个密钥,您可以使用以下任何信息进行查询。
Step 1: To locate a key, you can use any of the following information for querying.
事实上,对于SOAP消息头中提供的与密钥相关的信息,该信息将在消息转换为jms格式时丢失。
In fact, being the key related information provided in the SOAP message's header, this piece of information will get lost as soon as the message is converted to a JMS format.
应用推荐