user authentication
基本解释
- 用户认证;用户身分鉴定
英汉例句
- User Authentication Protocol: This protocol authenticates the client to the server and runs over the transport layer.
用户认证协议:该协议从服务器到客户端进行身份验证,且通过传输层运行。 - Connection Protocol: This protocol multiplexes the encrypted tunnel to numerous logical channels, running over the User Authentication Protocol.
连接协议:该协议多路传输加密隧道到多个逻辑通道,通过用户认证协议运行。 - To eliminate the variable of remote user authentication, the application servers mentioned in this article are local user repositories (that do not use LDAP).
为了估计远程用户认证的变量,在本文中提到的程序服务器是本地的用户储存库(并不使用 LDAP)。 - The banks have also been experimenting with more sophisticated forms of user authentication, including fingerprinting, iris-scans and biometrics.
ECONOMIST: Your flexible foe - The government has set rules that include encryption, access controls, and user authentication.
FORBES: Americans Want to Control Their Health Information - Liberty, now with more than 40 members, is finishing work on software standards for encryption, user authentication and other functions, which members and nonmembers will share.
FORBES: Where Everybody Knows Your Name
双语例句
权威例句
词组短语
- User identification authentication 用户身份验证
- user id authentication 用户身份鉴别
- user identity authentication 使用者身份认证
- User Access Authentication 用户接入认证
- User Multicast Authentication 用户组播认证
短语
专业释义
- 用户认证
User authentication service has become an important component of network security, especially over open network environment.
用户认证服务是确保开放式网络安全的重要组件之一。 - 身份认证
Bluetooth security will get greatly improved by introducing user authentication and enhancing access control functions.
引入用户身份认证并增强访问控制功能是提高蓝牙安全性的有效手段。 - 用户验证
This paper briefs the principle of Kerberos, and then discusses how the popular desktop operating system Windows2000 utilizes the Kerberos V5 to deal with user authentication.
在简要介绍了Kerberos协议工作的原理后,论述了在当前流行的桌面系统Win2000中利用Kerberos V5进行用户验证的技术。 - 身份鉴别
The security of the traditional DBMS is safeguarded by access control, user authentication, accredit control and so on.
传统数据库的安全是通过访问控制、身份鉴别、授权控制等方面进行保障的。 - 用户身分鉴定
- 使用者鑑定
- 用户认证
Eventually, such modules as user authentication, malfunction management, user logs and SSH are describled in details.
最后,对该系统的用户认证、故障管理、用户日志及SSH等主要功能模块的结构、实现方法和使用进行了详细的阐述。 - 用户鉴别