对于大多数非法请求或者调用者的调用目的无法确定的请求,SOAP都会返回错误报告和错误代码。
SOAP fault reporting and fault codes will be returned for most invalid requests or any request where the intent of the caller cannot be determined.
模型中需要通过决策检测器对新的请求进行决策,以决定是否允许执行访问请求,这样做的目的就是来准确地区分合法请求和非法请求。
The model use the model detector decision-making the new request to decide whether to allow the access request, this goal is to accurately distinguish between legitimate requests and illegal requests.
标识符中记录了请求实体的名字,这样如果有任何非法的使用,目标资源管理器就可以立即判断出来。
The identifiers have the requesting entity's name inscribed so that any illegal use could be immediately identified by the target resource managers.
以肯尼亚为首的其它几个非洲国家试图阻止这项请求,说这将导致整个大陆的非法盗猎泛滥。
Led by Kenya, several other African nations are seeking to block the request, arguing that it could lead to a surge in illegal poaching across the continent.
该法允许警察应盗版受害者的要求,当场收缴非法乐谱,而不需要事先请求法庭核准。
It allowed the police, on the request of a piracy victim, to seize illicit sheet music without first getting a warrant.
您的客户端已发出格式不正确或非法的请求。
如检查邮件内容、附件,检查FTP传输的数据,禁止访问有害网站、判断非法HTTP请求等。
Such as check mail contents, enclosure, check the data that FTP deliver, prohibition against interview harmful website, judge illegal HTTP claim.
拿这类红利的股东有可能因债权人请求退还已到手的非法红利。
Stockholders who receive such dividends may be required to return them in order to meet the claims of creditors.
该委员会认为,任何人谁可以帮助促进了非法交易,可能会没收请求负有责任。
The board is of the opinion that anyone who helps facilitate an illegal transaction could be liable for a forfeiture claim.
除非法律要求且我们有官方与合法的请求,我们不会将您的个人资料,如姓名、地址、电子邮件地址给第三方。
We will not give your personal information such as name, address, E-mail address to third parties except if the law requires it and we have an official and lawful request for that.
仿真实验表明,该身份认证模型能够承受各种口令攻击,有效过滤非法用户的登录请求,具有较好的鲁棒性和可用性。
Simulation tests show that the identity authentication model can stand with password attacks, filtrate out invalid login requests availably, and have advantages of good robustness and reliability.
仿真实验表明,该身份认证模型能够承受各种口令攻击,有效过滤非法用户的登录请求,具有较好的鲁棒性和可用性。
Simulation tests show that the identity authentication model can stand with password attacks, filtrate out invalid login requests availably, and have advantages of good robustness and reliability.
应用推荐