One-Key opening function(Passage Mode) :Press any digital key to open the lock.
可设定绿色通道功能:按任意数字键即可开门;
Its latest security initiative is a digital key fob, linked to customers' accounts, whose security code changes every 30 seconds.
其最新的安全方案为一种数码密钥卡,可同客户的帐户相连,其密码每30秒自动更换。
If that happens, then they will be less likely to use the digital key that the network has just given them to unlock their data and check out for good.
如果真的是这样的话,使用者们将不大可能使用网络给予他们的“数字钥匙”,用其来解锁他们的数据并且永远注销。
The information represented by each digital key and each number combined by the digital keys is corresponded to the controlled electric appliance.
每个数字键以及数字键组合起来的数字所代表的信息,与受控的电器相对应。
The device comprises a grille window, a small display screen, a selection digital key, a random digital shifting key, a correction key, a confirming key and an operation platform.
它是由格子窗、小显示屏、选择数字键、随机数字换位键、更正键、确认键和操作平台组成。
To work well, digital envelopes require that a public key infrastructure is in place: without the correct digital key to decrypt the wrapper, an intruder can't view the message inside.
为了很好工作,数字信封需要有一个公开的密钥基础设施:没有正确的数字密钥对包装器解密,入侵者就不能看到里面的信息。
Secondly, the US has some key advantages in a world of digital knowledge and technology.
其二,在这个讲究数字知识和技术的世界,美国拥有一些关键优势。
XML Encryption relies entirely on the XML Digital Signature specification for key exchange.
对于密钥交换XML加密完全依赖于 XML数字签名规范。
The recipient of the payload can validate the digital signature using the public key of the sender.
有效载荷的接收者可以使用发送者的公开密钥验证数字签名。
A digital certificate is more than just a cryptography key; it is an online credential.
数字证书不仅仅是一个加密密钥,它还是一个在线凭证。
Digital signatures rely on public key cryptography.
数字签名依赖于公共密钥加密学。
In Figure 8, enter the information to create the private key and the digital certificate.
在图8中,输入信息以创建私有密钥和数字证书。
The process involves the sender generating the message digest, then encrypting the digest using its private key to create the digital signature.
这个过程包括发送方生成消息摘要,然后用其私钥对摘要加密以创建数字签名。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
The sender USES the recipient's public key (available via published digital certificates) to encrypt the message. The recipient then USES his private key to decrypt the message.
发送方使用接收方的公开密钥(可以通过公开的数字证书得到)加密消息,然后接收方使用私钥解密消息。
A signed public key has a digital signature (quite analogous to a human signature) that states that the signer vouches for the public key.
签名公钥有数字签名(非常类似于人工签名)来表明签署者对公钥的担保。
In the context of digital security, a key is a piece of data which is used to encrypt or decrypt other pieces of data.
在数字安全语境中,密钥是一段数据,用于对其他数据进行加密或解密。
One of the reasons that public/private key schemes have revolutionized digital security is because the sender and receiver don't have to share a common password.
公钥与私钥方案给数字安全带来变革的原因之一是数据的发送方和接收方不必使用公共的密码。
One key aspect is security, which includes digital information security.
法规遵从性的一个关键方面是安全性,包括数字信息安全。
Instead of simply sending its public key to the receiver, the sender sends its digital certificate issued by a ca.
发送方发送由CA签发的数字证书,而不仅仅是向接收方发送其公钥。
A digital certificate is basically a wrapper around a public key, which includes identifying information for the party owning that key.
数字证书实质上就是一个包装公开密匙的包装器,其中包含了用于密匙所有方的识别信息。
So far, law has shaped (and sometimes distorted) the key features of digital life.
到目前为止,法律已经打造了(有时是扭曲了)数字化生活的主要特色。
XML encryption and digital signatures rely on Public Key Infrastructure (PKI) to help encrypt, decrypt, sign, and verify various documents.
xml加密和数字签名依赖于公共密钥基础设施(Public Key Infrastructure,PKI)来帮助加密(encrypt)、解密(decrypt)、签名(sign)和验证(verify)各种文档。
Jethro finds Ellie's public key published via a digital certificate in the directory and sends her a message.
Jethro通过目录中的数字证书发现Ellie的公开密钥并向她发送一条消息。
When Ellie receives the message from Jethro, her Lotus Notes client checks his signature via his digital certificate containing his public key that was published in a directory.
当ellie收到Jethro发出的消息时,她的LotusNotes客户程序就会使用在一个目录中发布的包含Jethro的公开密钥的数字证书检查签名。
The third command creates a 1024-bit Digital Signature Algorithm (DSA) key (-b 1024 -t dsa), turns off output (-q), and specifies the name of the key and that there is no password.
第三个命令创建了一个 1024位的DigitalSignatureAlgorithm (DSA)密钥(-b 1024-t dsa),关闭输出(-q),指定密钥的名称,在这里不指定密码。
This digital identity can then be used to exchange text securely by encryption using the key pair.
然后可以使用这个密钥对通过加密来利用数字身份安全地交换文本。
However, the roles of X.509 key pairs are reversed for digital signature and encryption.
然而,用于数字签名和加密的X . 509密钥对的角色是颠倒的。
One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).
演示安全令牌已授权应用的一种方式是,添加采用相关联密钥(来自于占有证据令牌)的数字签名。
One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).
演示安全令牌已授权应用的一种方式是,添加采用相关联密钥(来自于占有证据令牌)的数字签名。
应用推荐