例如,可在第1层执行基域覆盖策略、用户鉴别策略以及基站配置策略等。
For instance, the policies for basic field coverage, users' authentication and base station configurations can be enforced at Layer 1.
鉴别并捕捉非法用户。
软件鉴别这些证书,在鉴定通过的基础上允许用户访问那些他们有权限访问软件的功能部件。
Software shall authenticate these credentials and upon authentication shall permit the users to access sections of the software that they have access privileges for.
应用推荐