The application server will also compare the registered device ID to the user ID for additional security verification.
应用程序服务器还会将已注册的设备标识与用户标识进行比较,以进行附加的安全性验证。
In order to achieve security of audio applications, a security verification system is required to ensure the security of speech content.
为了得到安全的音频应用,需要一个安全的认证系统来保证语音内容的安全性。
The sample plug-ins (unsigned, signed, and expired) introduced by this article could be moved to another Eclipsed-based product that requires security verification.
本文介绍的样例插件(未签名的、签名的和过期的)适用于其他需要安全验证的基于Eclipse的产品。
The difficulty problem of image deform in multi-speed security verification system is discussed in the paper, and a real-time correction algorithm is provided.
目的:文中针对多速度安检系统中存在的图像形变问题进行了研究。
The interface of ca and DSMS integrating with various hospital information systems (such as RIS, HIS and PACS) was realized and the security verification of system information was completed.
同时实现了与现有各种医院信息系统(如ris,HIS和PACS)的接口与集成,并完成了对其系统信息的安全验证。
An intelligent software system has been set up to analyze the overloading data to achieve numerical management for the operation of security verification and the graphics display of the results.
建立分析超限数据的智能化软件系统,实现对安检操作的数字管理和结果的图形化显示。
Even with these security measures in place, not all code that passes bytecode verification should be allowed to run.
即使适当地采取了这些安全性措施,也并非所有通过字节码验证的代码都被允许运行。
When discussing the cloud, there are many characteristics that should be discussed, including: multi-tenancy, security, data integrity verification, retrieval expectations, and exit strategies.
在讨论云时,有许多特性应该加以讨论,其中包括:多租户、安全性、数据完整性验证、恢复期望值以及退出策略。
He is also concerned with the verification of security protocols through semantic formalisms and type checking.
他关注的领域还有通过语义形式和类型检查对安全性协议进行验证。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
One piece of information RFID does not transmit is the CVV (Credit Verification Value) security codes on each credit card, according to Snopes.
据Snopes网站介绍,RFID 有一项信息没有传输,那就是信用卡上的CVV (信用卡验证值)安全码,。
The DataPower MPGW uses DataPower security capabilities, such as AAA, CRL verification, traffic shaping, and XML threat protection.
DataPowerMPGW使用 DataPower安全功能,例如AAA、CRL验证、流量控制和XML威胁保护。
No matter the result of the verification, continuing under potentially unsafe security parameters is entirely up to the developer.
不管验证结果如何,是否继续使用一些可能不安全的参数也完全取决于开发者。
Whether or not the connection should be used is dependent upon the verification result and security considerations.
是否应该使用连接取决于验证结果和安全方面的考虑。
This is used by a Web service for additional challenges to a requester to ensure message freshness and verification that the use of a security token is authorized.
这种机制由Web服务用来对请求者进行更多质询,以确保消息不过时,以及验证安全令牌的使用是否已经授权。
The callback technique lets you use any verification technique you want as an extension of the Rampart security handling.
回调技术可以让您使用任何检查技巧来扩展Rampart安全处理。
In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.
哈希算法在信息安全领域主要应用于验证数据完整性和签名认证。
Any requests for information by unknown persons need to be sent to a central network security location for verification and fulfillment.
对于身份不明的人的任何要求,需要的信息被发送到中央网络核查和执行安全的位置。
Each center is guarded by multiple security procedures, including biometric identification, key card access, elevator lock outs and human verification.
每个中心采用多种安全手段以保证安全,包括生物识别、门禁卡、电梯锁和人工检查。
Finally, through the attempt and research on verification logic in the field of information security, we point that formal logic method is sure playing a main role in it.
最后想指出的是,我们通过对验证逻辑在信息安全方面的一些尝试和研究,说明了形式化逻辑方法确实可以在这个领域上发挥重要作用。
The security of mobile agent systems lies in the protection of confidential data, the verification of mobile agents and mobile agent platforms.
移动代理安全性体现在移动代理机密数据的保护、移动代理和移动代理执行平台的验证等。
The administrative departments of labor security may entrust the accountant firms to make examination and verification on payer entities' payment of social insurance premiums.
劳动保障行政部门可以委托会计师事务所对缴费单位缴纳社会保险费的情况进行审核。
Although verification of type safety is not mandatory to run managed code, type safety plays a crucial role in assembly isolation and security enforcement.
尽管类型安全验证对于运行托管代码不是强制的,但类型安全在程序集隔离和安全性强制中起着至关重要的作用。
In order to guarantee the security of OSPF protocol and to reduce its cost as much as possible, a new verification mechanism was proposed.
为了保障OSPF协议的安全,同时尽可能降低其安全方面的开销,提出了一种全新的验证机制。
This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.
文章提供了。NET框架安全性方面的概述,具体讲述基于角色的安全性、代码访问安全性、验证、堆栈审核、隔离存储、加密等方面的核心安全技术。
In order to have the best security measures we also went through the scrupulous process of our company verification and received an EV SSLcertificate.
为了有最佳的安全保障措施,我们也经历了我们公司的严格核查过程中,得到了EV SSL证书。
Fingerprint verification has been widely used in security area for its uniqueness and reliability.
指纹识别具有唯一性、可靠性,在安全领域得到了广泛的应用。
In order to advance the security of Aeronautical Communication System, a simple and effective identity verification scheme was proposed, and the encryption was introduced in logging-on process.
为了提高航空通信系统的安全性,论文提出了一个简洁有效的身份认证方案,并在注册过程中引入加密技术。
In order to advance the security of Aeronautical Communication System, a simple and effective identity verification scheme was proposed, and the encryption was introduced in logging-on process.
为了提高航空通信系统的安全性,论文提出了一个简洁有效的身份认证方案,并在注册过程中引入加密技术。
应用推荐