The prototype system realizes the key parts of the secure component: authentication center, message secure proxy and access controler.
该原型系统实现了安全构件的关键部分:认证服务器、消息安全代理和访问控制器。
Luckily, SSH supports public or private key authentication and system aliases.
幸运的是,ssh支持公钥或私钥身份验证和系统别名。
USB Disk Authentication - Configure a USB device to act as a "key" to view encrypted information (it must be plugged into the system for access).
盘认证-配置一个USB设备作为一个“钥匙”来查看加密的信息(必须作准入制度堵塞)。
The model not only realizes key management, encrypted communication, digital signature and identity authentication, but also is fit for network system with real time and large data transfer.
本模型不仅适用于实时的、大数据传输的网络系统,而且实现了密钥管理、加密管理、数字签名以及身份认证等功能。
This system realizes key management, encrypted communication, digital signature and identity authentication etc.
本系统实现了密钥管理、加密管理、数字签名以及身份认证等功能。
It presents smart card system of session key distribution for communications safety to net video conference transmission, resolves user identity authentication with security.
为网络视频会议传输提供有效的通信安全,采用一个会议密钥分配的智能卡系统,来解决使用者身份认证和通信安全问题。
The implementation of IMS access authentication mechanism, which is considered to be the first step of the whole IMS security plan, is the key to the IMS system security access.
IMS的接入认证机制的实现作为整个IMS安全方案实施的第一步,是保证IMS系统安全的关键。
This paper mainly focuses on key exchange protocol based on dynamic password authentication, which can insure the security of both authentication and transportation of VPN system.
本文主要研究基于动态口令认证的密钥交换协议,该协议既能保证VPN的认证安全,又能保证VPN的传输安全。
Building strong security and good efficiency authentication scheme is the key to ensuring the security of distribution system.
目的构造强安全性、高效率的身份认证机制,确保分布式系统安全。
Based on the research project, in this thesis the key technical points, designing and analyzing of the authentication scheme, programming and testing of the prototype system are presented.
以国防科技重点实验室的科研项目为依托,本文以身份认证技术和认证协议为研究重点,主要对关键技术点、方案的设计与分析、原型系统的程序实现与测试进行了说明。
Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.
为实现信息系统的安全目标,需要系统能够提供相关的安全服务:身份标识与认证服务、授权与访问控制服务、非否认服务、机密性服务、完整性服务。
This scheme not only supports secret key management and identity authentication of personnel and equipment, but also constructs secret key management center and manages encrypted key of the system.
方案不仅支持系统内人员和设备的密钥管理、身份认证及公钥密码运算,而且还对加密密钥进行管理。
The dynamic password status authentication system belongs to in the information security domain status recognition software, is based on the key and the time dual factor status authentication system.
动态口令身份认证体系属于信息安全范畴中的身份识别软件,是基于密钥和时光双(?)因素的身份认证体系。
This paper proposes a practical asynchronous authentication system, which aims at the questions that private key is easy to betray and reading card machine cannot be widely used.
本文针对私钥容易泄密和读卡机难以普及的问题,构建了实用的网上异步认证体系。
The current proxy blind signature are based on the identity or certificate, needing reliable third-party authentication. Public key system without the certificate has to overcome this shortcoming.
当前的代理盲签名都是基于身份或证书的,需要可靠的第三方认证,而无证书公钥系统却克服了这种缺点。
Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.
无线异构网络中的关键安全技术包括安全路由协议、接入认证技术、入侵检测技术、节点间协作通信等。
The technology of public key is applied in this system, protocol interfaces of the system which can solve the identity authentication in network effectively are implemented.
该系统使用公钥密码技术,设计和实现了一套身份认证协议和相关应用接口,可以更加安全和有效地解决网上应用中面临的网络身份认证问题。
The fourth part, also one of the key points of the thesis, analyzes the legal liability bearing system during the course of electronic signature authentication.
第四部分,本文的重点之一,分析电子签名认证过程中各方当事人法律责任的承担机制。
The fourth part, also one of the key points of the thesis, analyzes the legal liability bearing system during the course of electronic signature authentication.
第四部分,本文的重点之一,分析电子签名认证过程中各方当事人法律责任的承担机制。
应用推荐