As a result, StrongPoint provides impenetrable authentication using Uniloc's Physical Device Recognition (PDR) technology to grant access to authorized systems and communications networks.
结果,StrongPoint利用Uniloc公司的物理硬件识别(PDR)为授权系统和通信网络提供了严密的认证。
As a result StrongPoint provides impenetrable authentication using Uniloc's Physical Device Recognition (PDR) technology to grant access to authorized systems and communications networks.
结果,StrongPoint利用Uniloc公司的物理硬件识别(PDR)为授权系统和通信网络提供了严密的认证。
In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.
在安全模块中,使用了用户认证、通讯加密、审计追踪、访问控制等安全技术,并且引入了模糊控制与专家系统。
Access control technology is an important research project, it is very significant for guarantee the integrality and authentication of information.
存取控制技术的研究是信息安全领域一项重要的研究课题,它的研究对于保证信息的完整性和认证性有着重要的意义。
Traditional cryptography technology focused on the access control and confidentiality communications of digital products, but for authentication and copyright piracy tracing it is insufficient.
传统的密码学技术侧重于对数字产品的访问控制和保密通信,但是对版权认证和盗版追踪问题显得力不从心。
Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.
本文通过对SSL及其关键技术的研究,提出了在网络数据库系统的用户访问控制中使用基于SSL和证书的双向身份认证。
The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.
可采用单点登陆、PKI认证、授权、基于角色的权限分配策略、利用应用网关访问资源,开发适合本系统的工作流访问机制等措施确保信息平台的安全。
The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.
可采用单点登陆、PKI认证、授权、基于角色的权限分配策略、利用应用网关访问资源,开发适合本系统的工作流访问机制等措施确保信息平台的安全。
应用推荐