中英
HTTPS
  • 简明
  • abbr.超文本传输协议安全(Hyper Text Transfer Protocol)
  • 网络释义
  • 专业释义
  • 1

     安全超文本传输协议(Hypertext Transfer Protocol Secure)

    由于互联网的不安全性和ERP系统的高安全性相悖,所以基于B/S结构的ERP系统应该采用安全超文本传输协议(HTTPS)。实际上,HTTPS就是应用了Netscape的完全套接字层(SSL)作为HTTP应用层的子层。

  • 2

     网站

    对于那些必须要使用HTTPS加密的网站如电商网站、银行网站不得不采取制作两个版本网站(https和http)和重要页面实现https的措施。不过,截止2015年5月25日,百度开.

  • 3

     平台

    1、网上报名:3月23日至4月5日考生使用本人的姓名、身份证号、手机号登录特殊类型招生报名平台(https:/zzbm/)进行报名,根据系统提示,完整填写基本情况及志愿管理信息。确认志愿后打印申请表,签字盖章后扫描上传。

  • 4

     协议

    在HTTP层之上,直接使用SSL协议HTTPS)即可实现关键信息的加密传输。

短语
查看更多
  • 原声例句
  • 权威例句
  • 1

    Right. Because all of us have probably bought something facebook on Amazon.com or the like, all of us have probably logged into Facebook.com, passing your credit card information over the Internet, passing your username and password over the Internet, and as you probably know, as a casual user, https denotes secure.

    对的,因为我们都可能在亚马逊之类的网站上买过东西,我们都可能上过,在网络上传送你的信用卡信息,在网络上传送你的用户名和密码,你可能知道,作为一个非正式的用户,https保护安全。

    计算机科学课程节选 : 哈佛公开课

查看更多
  • 百科
  • HTTPs

    Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. Technically, it is not a protocol in and of itself; rather, it is the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications. The main motivation for HTTPS is to prevent wiretapping and man-in-the-middle attacks.The security of HTTPS is therefore that of the underlying TLS, which uses long-term public and secret keys to exchange a short term session key to encrypt the data flow between client and server. An important property in this context is perfect forward secrecy (PFS), so the short-term session key cannot be derived from the long-term asymmetric secret key; however, PFS is not widely adopted.X.509 certificates are used to guarantee one is talking to the partner with whom one wants to talk. As a consequence, certificate authorities and a public key infrastructure are necessary to verify the relation between the owner of a certificate and the certificate, as well as to generate, sign, and administer the validity of certificates. While this can be more beneficial than verifying the identities via a web of trust, the 2013 mass surveillance disclosures made it more widely known that certificate authorities are a weak point from a security standpoint, allowing man-in-the-middle attacks.In its popular deployment on the internet, HTTPS provides authentication of the website and associated web server that one is communicating with, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication. In practice, this provides a reasonable guarantee that one is communicating with precisely the website that one intended to communicate with (as opposed to an imposter), as well as ensuring that the contents of communications between the user and site cannot be read or forged by any third party.Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and web browsing private.A site must be completely hosted over HTTPS, without having some of its contents loaded over HTTP, or the user will be vulnerable to some attacks and surveillance. For example, having scripts etc. loaded insecurely on an HTTPS page makes the user vulnerable to attacks. Also having only a certain page that contains sensitive information (such as a log-in page) of a website loaded over HTTPS, while having the rest of the website loaded over plain HTTP, will expose the user to attacks. On a site that has sensitive information somewhere on it, every time that site is accessed with HTTP instead of HTTPS, the user and the session will get exposed. Similarly, cookies on a site served through HTTPS have to have the secure attribute enabled.

查看更多