52单词网 > 英语词典 > authentication

authentication

小编 分享 时间:
authentication是什么意思
英式音标:[ɔ:ˌθentɪ'keɪʃn]英式读音
美式音标:[ɔˌθentɪ'keɪʃn]美式读音
词汇分类:法律英语专业词汇,Google大数据2.9万高频美语词汇表,法律英语综合教程,电子商务专业英语(第二版),[学术]Academic Vocabulary List 学术20000高频词汇,经济学人词频200以下(低频词 约12000个)
概况:

n. 证明;鉴定;证实

词义:

n.

证明,鉴定;身份验证;认证;密押

英英释义

authentication[ ɔ:,θenti'keiʃən ]

n.

a mark on an article of trade to indicate its origin and authenticity

同义词:hallmarkassay-mark

validating the authenticity of something or someone

同义词:certification

用法:

词组短语

user authentication用户认证;用户身分鉴定

authentication code标识代码;鉴别代码;认证码

authentication and authorization鉴别与授权;验证和授权

authentication service认证服务;验证服务

authentication information验证信息

双语例句

用作名词(n.)

Message authentication provides two services.
消息身份验证提供两个服务。

To further enhance security, only registered users can access the MIDS with user caller ID authentication.
为进一步提高安全性,只有接受登记的用户,利用来电显示以证明身份方能提取MIDS的资料。

This chapter provides design patterns for data confidentiality and data origin authentication.
本章为数据保密性和数据来源的鉴定提供了设计模式。

Any party that fails to give cooperation and thus affects the technical authentication shall be held to be responsible.
当事人任何一方不予配合,影响医疗事故技术鉴定的,由不予配合的一方承担责任。

权威例句

Password authentication with insecure communication

A logic of authentication

A logic of authentication

R.M.: A logic of authentication

Using encryption for authentication in large networks of computers

Using Encryption for Authentication in Large Network of Computers. Communication of the ACM 21(12): 993-999

logic of authentication

Remote Authentication Dial In User Service

Remote Authentication Dial In User Service (RADIUS)

Authentication and authenticated key exchanges
同义词:warrant,substantiation,proving,proof,identification,evidence,demonstration,corroboration,confirmation,certification,attestation
同根词:authenticity,authenticator,authenticate,authentic
英语词源:

authentication (n.)

1788, noun of action from authenticate (v.).

造句:

1. The authentication code is now ready, so you will create the test client project in this section.

鉴定代码现在已经准备好了,因此您将在这个部分中创建这个测试客户端项目。

www.ibm.com

2. What you should note here is that message authentication guarantees nothing about who sent that message.

在这里您需要注意的是消息身份验证无法保证是谁发送了该消息。

www.ibm.com

3. Software shall authenticate these credentials and upon authentication shall permit the users to access sections of the software that they have access privileges for.

软件鉴别这些证书,在鉴定通过的基础上允许用户访问那些他们有权限访问软件的功能部件。

article.yeeyan.org

4. In that case, you have to provide no default authentication information on the resource.

在这种情况下,一定不能在资源上提供缺省身份验证信息。

www.ibm.com

5. However, in this mode you can only use basic authentication.

然而,在该模式下,您只能使用基础认证。

www.ibm.com

6. If so, how are you handling authentication?

如果是,如何处理身份验证?

www.ibm.com

7. The authentication mode you choose for your environment will be determined by the level of sensitivity of your data.

应该为您的环境选择什么样的身份验证模式,这是由数据的敏感级别来决定的。

www.ibm.com

8. It is possible that through authentication, a user can log in to a system but, through authorization, not be allowed to do anything.

所以,有这样的可能性:用户虽然通过了身份验证可以登录到一个系统,但是未经过授权,不准做任何事情。

www.ibm.com

9. In this step, we establish the relationship between the security roles that we defined previously and their authentication status.

在这一步里,我们建立了前面定义的安全角色和他们的身份验证状态之间的关系。

www.ibm.com

10. The introduction of this new authentication function was virtually transparent to employees.

这个新身份验证功能的引入几乎对员工是透明的。

www.ibm.com

11. To implement this requirement, you should properly configure the identification and authentication of a user identity.

为了实现这一需求,您应该正确地配置用户身份的验证和授权。

www.ibm.com

12. The advice can contain the authentication code or, as in this case, it can invoke another method.

通知可以包含认证代码,或者就像在这个示例中一样,可以调用其他方法。

www.ibm.com

13. No need to do anything if the database is not catalogued with authentication client.

如果没有用身份验证客户机编目数据库,则不需要做任何事情。

www.ibm.com

14. Does not require authentication.

不需要身份验证。

www.ibm.com

15. Authentication and Authorization security.

认证和授权安全。

www.infoq.com

16. Your automated tests will all have to access the database through some form of login or user authentication.

你的自动化测试将需要通过一些注册或者使用者身份验证的形式访问数据库。

www.ibm.com

17. The degree of simplification depends on the applications since SSO only deals with authentication.

简化的程度取决于应用程序,因为SSO只处理身份验证。

www.ibm.com

18. This module should be used by system administrators with caution as it provides no real authentication.

系统管理员应该慎用此模块,因为它并没有提供实际的验证。

www.ibm.com

19. The solution should implement some type of authentication system to understand who is asking for a resource and an authorization system to decide whether the access should be granted.

此解决方案应该实现某种类型的身份验证系统来理解谁正在请求一个资源,并实现一个授权系统来决定是否向其授予访问权。

www.ibm.com

20. If you have Authentication, then the user accessing a resource needs to be authenticated with rights and permissions to have access.

如果您具有认证,则需要对访问资源的用户进行认证以验证他们是否有访问的权利和权限。

www.ibm.com

21. This setting is on the Authentication page of the configuration tool.

这个设定在配置工具对话框的验证页中。

www.cnblogs.com

22. The interceptor must be added to the protocol processing chain before the standard authentication interceptors.

这个拦截器必须在标准认证拦截器之前添加到协议处理链。

www.ibm.com

23. But with no authentication, any user could simply pretend to be an administrator.

但是没有身份验证,任何用户都可以冒充管理员。

www.ibm.com

24. The CAMID is constructed by the authentication provider for each object read in from an external authentication provider.

对于从外部身份验证提供者读取的每个对象,由身份验证提供者构造CAMID。

www.ibm.com

25. However, this step is very similar to the authentication step, in that you first extract and then authorize.

不过,此步骤非常类似于身份验证步骤,因为您首先进行提取,然后授权。

www.ibm.com

26. This parameter might be a query, an edit or delete operation, an authentication request, or any one of the other supported actions.

该参数必须是一个查询、一个编辑或删除操作、一个认证请求、或者所支持的任何一个操作。

www.ibm.com

27. They think this is how authentication to the bus should work.

他们认为这是对总线进行身份验证应有的工作方式。

www.ibm.com

28. It is not useful for authentication, since it is so easily discovered.

它对身份验证的作用不大,因为它很容易找到。

www.ibm.com

29. For example, if no authentication or authorization of service requests is required, the choice of technology can be very broad.

例如,如果服务请求不需要提供身份验证或授权,实现技术的选择就可以非常的广泛。

www.ibm.com

30. For example, if no authentication or authorization of service requests is required, the choice of technology can be very broad.

例如,如果服务请求不需要提供身份验证或授权,实现技术的选择就可以非常的广泛。

www.ibm.com

authentication

将本文的Word文档下载到电脑,方便收藏和打印
推荐度:
点击下载文档文档为doc格式