authentication信息详情

authentication发音

意思翻译

n.证明真实性,鉴定;身份验证,认证

相似词语短语
双语使用场景

A troublesome area is the management of the keys used for encryption and authentication.───一个麻烦的领域是用于加密和身份验证的密钥的管理。

Our cheap, ultra-reliable wired networks made credit-card authentication over the phone frictionless.───我们的实惠、超可靠的有线网络使通过电话进行信用卡认证轻而易举。

Further down the road is biometric authentication, which could be encrypted with, say, a fingerprint.───再沿着这条路往下走就是生物认证,它可以用指纹之类的东西来加密。

At this point everything is ready to recycle the TM1 server and activate the LDAP authentication.───现在,一切就绪了,可以重新启动TM1服务器并激活LDAP身份验证。

In many cases, an authentication data alias is often used in client requests for database interaction.───在很多情况下,进行数据库交互的客户机请求中会用到一个身份验证数据别名。

This has been a great step forward for scaling identity management, but it must go further - LDAP password authentication is not enough.───这对于身份管理的可伸缩性来说是重要的一步,不过还要做的更多——LDAP密码认证还不够。

If it's possible to tamper with the authentication device, such data capture should not be all that difficult.───如果有可能篡改认证设备,则获取这样的数据并不会很困难。

Use any form of authentication that requires passwords to be encrypted. Do not encrypt data.───使用要求加密密码的任何格式的身份验证。不要加密数据。

The system could not be unlocked. The smartcard certificate used for authentication was not trusted.───系统无法解锁。用于授权的智能卡证书不被信任。

英语使用场景

For example, users can tell the authentication server with which remote computer they want to converse.

You will need to provide your own authentication code.

The message contains an authentication token that allows users to log on to network services.

Weak authentication with low maintenance overhead and without patent or export restrictions.

The merchant can choose from several challenge-response authentication methods: smart cards or third-party authentication.

She wanted tactical call signs, authentication codes, radio frequencies.

Furthermore, public-key cryptography can be used for sender authentication, known as digital signatures.

Authentication in e-commerce basically requires the user to prove his or her identity for each requested service.

In short, authentication plays an important role in the implementation of business transaction security.