Abstract : discussion is made on identification authentication of information security . several identification authentication technologies are discussed and some applications of identification authentication are given 文摘:认证技术是信息安全中的一个重要内容,本文针对身份认证技术,这里作了总结分类,并对每一种认证技术进行了分析,最后剖析了一些应用
2 . the authentication technology of image is analyzed in detail, and the advantages and disadvantages between the authentication of digital signature based on traditional cryptography theory and the authentication watermark technology have been compared 2.详细分析了图像认证技术,比较了基于传统密码学理论的数字签名认证与认证水印技术的优缺点。
Here in part 2, john and gary take a look at the pitfalls of choosing an operating system, and the security challenges of authentication technologies, including host-based authentication, physical tokens, and biometric authentication 在第二部分中,john和gary研究了选择操作系统的缺陷以及认证技术的安全性难题,包括基于主机的认证、物理标记和生物认证。
Firstly, it introduces an authentication technology of digital certificate based on the authenticated structure of 802.1x . this method can solve the problems of the hidden trouble of secret key share and ap's bidirectional authenticated trouble 首先引入了基于802.1x认证框架的数字证书认证技术,它解决了wep机制中密钥共享的隐患及客户端和ap的双向认证问题。
Information security is one enabler of wcws and authentication technology is an important part of information security . the purpose of this paper is to discuss the authentication technology in wcws . authentication is the first problem to be resolved in wcws 信息安全技术是网络化协同工作系统的使能技术,认证技术又是信息安全技术的重要组成部分,本文主要对网络化协同工作系统的安全认证技术进行了研究。
Information security is one enabler of wcws and authentication technology is an important part of information security . the purpose of this paper is to discuss the authentication technology in wcws . authentication is the first problem to be resolved in wcws 信息安全技术是网络化协同工作系统的使能技术,认证技术又是信息安全技术的重要组成部分,本文主要对网络化协同工作系统的安全认证技术进行了研究。
In the end, a kind of identity authentication technology fitted for the platform is brought forward, which is expatiated in the user identity authentication strategy . and function modules of the foregoing are implemented which is supported for the platform identity authentication strategy 最后详细阐述了用户身份验证策略中提出一种适用于平台的身份验证技术,并给予编程实现,为平台身份验证策略的实现提供支持。
Different kinds of wide-band ethernet access authentication technologies has emerged including pppoe, vlan + mac / ip, web portal etc . as a new method of ethernet access authentication and control, 802.1x has been more and more widely accepted due to its absence of faults in the other methods 最近802.1x作为一种新的以太网接入认证标准正在渐渐被广泛接受。由于802.1x解决了以上各种技术的缺点,802.1x将成为以太网接入认证技术的主要方向。
In recent years, as the rapidly development of informatic technologies and the bloom of internet, a large number of transactions appeared in the internet . fingerprint verification technology, as the most efficient, reliable, and low-cost authentication technology, has been more and more widely used in banking, stock exchange and e-business fields besides traditional police applications 近年来,随着信息技术和网络技术的飞速发展以及大量internet事务与交易的出现,指纹自动识别这种最快速、开销最低并且效果良好的认证技术除了在传统的刑事侦缉领域之外,在银行、股市和电子商务等行业作为身份鉴别得到更广泛的应用。