1·Our cheap, ultra-reliable wired networks made credit-card authentication over the phone frictionless.
我们实惠的、非常可靠的有线网络使通过电话进行信用卡认证变得轻而易举。
2·Further down the road is biometric authentication, which could be encrypted with, say, a fingerprint.
下一步是生物识别认证,可以用指纹等进行加密。
3·One submits the method of ID authentication based on proxy ARP.
有人提出了基于代理 ARP 的 ID 认证方法。
4·However, in this mode you can only use basic authentication.
然而,在该模式下,您只能使用基础认证。
5·The advice can contain the authentication code or, as in this case, it can invoke another method.
通知可以包含认证代码,或者就像在这个示例中一样,可以调用其他方法。
1·A troublesome area is the management of the keys used for encryption and authentication.
一个麻烦的领域是用于加密和身份验证的密钥的管理。
2·What you should note here is that message authentication guarantees nothing about who sent that message.
在这里您需要注意的是消息身份验证无法保证是谁发送了该消息。
3·In that case, you have to provide no default authentication information on the resource.
在这种情况下,一定不能在资源上提供缺省身份验证信息。
4·If so, how are you handling authentication?
如果是,如何处理身份验证?
5·The authentication mode you choose for your environment will be determined by the level of sensitivity of your data.
应该为您的环境选择什么样的身份验证模式,这是由数据的敏感级别来决定的。
1·You do not need to create the authentication component described previously.
您不需要创建先前所描述的鉴定组件。
2·He envisages an authentication system that could be used to restrict access to some online content to those who subscribe to multi-channel television.
为此,他推出了一个新的鉴定系统以限制多频道用户在线收看某些节目。
3·Enabling security for user authentication and group permissions for access to requirements and documents
要访问需求和文档,就要为用户的鉴定和组权限激活其安全性
4·In addition, give the authentication alias the same name as the alias that you created when you defined the datasource in WebSphere (as shown in Figure 9).
此外,给这个鉴定别名一个与您在WebSphere中的定义这个数据源相同的别名(如图9所示)。
5·Western scholars believed that the judiciary. Commencement is the key processes of authentication identification.
因此,西方有学者认为鉴定启动程序是司法鉴定的关键程序。
1·Under this condition, the MT short message shall be sent from the SMSC local to the paying party, and the billing center local to the paying party shall complete the authentication operations.
这种情况下,该MT短消息应该从付费方归属地的短消息中心发送,并且由付费方归属地的计费中心完成鉴权操作。
2·The authentication process for CDMA mobile communication is to confirm the identity of mobile Station, which is by exchanging information between mobile Station and Base Station.
CD MA移动通信的鉴权过程是通过交换移动台和基站之间的信息达到确认移动台身份的目的。
3·Considering the characteristics of EPON, we introduce a "churning" policy and modify the process of register and OAM frames, thus to achieve an efficient authentication and encryption scheme.
重点结合EPON系统自身的特点,通过对注册过程以及OAM帧的修改,结合“搅动”策略实现了一种有效的鉴权与加密方案。
4·It is difficult to store and maintain large amount of authentication keys when the network is large.
网络规模较大时,在网络端难于保存和维护大量的鉴权密钥。
5·Authentication management is a very important technique in mobility management of mobile network which has a great effect on signaling overhead among different network elements.
鉴权管理是移动通信移动管理中非常重要的技术,其策略的选择将直接影响网络中各网元的信令负荷。
1·Matching an artist's DNA on a painting, Biro told me, would finally remove any doubt from the authentication process.
比罗告诉我匹配一位绘画艺术家的DNA,最终可以消除鉴证过程的任何疑虑。
2·The company's strength to be your authentication.
公司的实力有待您的鉴证。
3·Electronic evidence has brought challenges to traditional evidence rule such as Best evidence, Authentication rule and Hearsay rule.
电子证据对传统英美证据规则的挑战主要涉及最佳证据规则、鉴证规则和传闻规则。
4·Article 2. The authentication of an economic contract shall be conducted on a voluntary basis, except where the State stipulates otherwise.
经济合同的鉴证实行自愿原则,国家另有规定者除外。
5·Authentication shall generally be executed by the local Administration for Industry and Commerce in the area where the contract is signed or implemented.
鉴证一般由合同签订地或履行地的工商行政管理局办理。
1·The store application demonstrates basic online shopping tasks which includes a product catalog, user authentication and personalization, shopping baskets, and order checkout.
它的应用程序表达了网上购物的基本任务,包括一套产品目录,用户证明和个性化,购物篮,以及订单结账。
2·The trendiest model is authentication: prove that you subscribe to pay-television and you can watch all the channels that you have paid for on any device.
这一最为时髦的模式证明:如果你订购了付费电视,你就可以在任何设备上观看所有的频道。
3·Talking TOKENS in support of federal regulations regarding disabilities, RSA Security provides a talking token that with the press of a button audibly announces the authentication code.
为支持关于无力的联邦规则讲话表征,RSA安全提供一个说话的表征以由于一个按钮的新闻媒体可听见地宣布证明密码。
4·With the integrated fingerprint reader, users encrypt files using fingerprint authentication, combining convenience with strong notebook security.
与整合的指纹读者在一起,使用者编加密码使用指纹证明,用强烈的笔记本安全联合方便的文件。
5·To require a password if your site is hosted on IIS, you can deselect Allow Anonymous Access and select Basic Authentication.
如果你的站点是由IIS托管,需要一个密码,你可以取消选定允许匿名访问并且选定基本证明。
1·The LIPKEY mechanism can be used when the initiator (client) does not have a certificate and instead USES a user ID and password for authentication.
当发起者(客户机)没有证书而是使用用户ID和口令进行验证身份时,就可以使用LIPKEY机制。
2·Authentication to the LDAP server can happen two ways.
向LDAP服务器验证身份可以采用两种方式。
3·You are using client certificate authentication to the Web server as discussed in the previous section.
像前一小节讨论的一样,使用客户机证书向Web服务器验证身份。