身份确认

  • 网络identification;authentication
身份确认身份确认
  1. VoIP安全可以分为业务的正常提供、业务内容的保密、呼叫者身份确认和系统安全等。

    The security of VoIP involves normal offering of services , service confidentiality , authentication of the caller and system security , etc.

  2. 对于信息系统的安全性一般包括:数据完整性、数据保密性、身份确认和认证、访问控制、不可否认性等几个方面。

    The security of the information system generally included Data Integrity 、 Data Confidentiality 、 Authentication 、 Access Control 、 Non-repudiation and so on .

  3. 警方已经采集了指纹,并对尸体作了身份确认。

    The police have already taken fingerprints and identified the body .

  4. 在实践中,这经常通过使用XML模式并结合服务身份确认、寻址以及业务数据来实现。

    In practice , this is often implemented using an XML schema combining service identification , addressing , and business data .

  5. 基于关键数字和HMM的数字串说话人身份确认系统

    A Speaker Verification System of Digit Strings Based on Key Digits and HMM

  6. 探讨了BOT特许协议的定位、东道国作为BOT主体的身份确认等法律问题。

    An inquiry is made about the BOT special-Permit-Agreement and the adjustment of its subject capacity .

  7. 用户通过手工颁发的CA认证后,实现身份确认,建立电子证书,然后采用流程控制组件进行数据分发收集。

    After the user passed manual issued CA certification , and confirmed the identity , established e-Cert , and then issued and collected data through the process control components .

  8. 为了建立一个数字串说话人身份确认系统,采用了基于数字HMM的与文本有关的身份确认方式;

    In this paper , a speaker verification system of digit strings is proposed and the text dependent speaker verification based on digit HMM is adopted .

  9. 在你加入PartnerWorld并收到了你的ISV成员身份确认信后,你就可以注册参加PartnerWorld行业网络了。

    After you join PartnerWorld and receive e-mail confirmation of your ISV membership , you can register to participate in the PartnerWorld Industry Networks .

  10. 基于仿生模式识别的人脸身份确认研究本文提出了一套完整的电子签章系统方案,方案借助PKI技术、数字证书、数字签名算法实现对发送方的身份确认;

    Human-Face Personal Identification System Based on the Biomimetic Pattern Recognition By dint of the technologies of PKI 、 digital certificate and the arithmetic of digital signature , the scheme can make sure the identity of the sender .

  11. 基于HMM-UBM和短语音的说话人身份确认

    Research on the HMM-UBM and Short Text Based Speaker Verification

  12. 实践上,他们的身份确认和社区具体化是unimane的特权。

    In practice , the determination of their identification and the embodiment with the community is the prerogative of the unimane who will accord the appropriate sanctions .

  13. 他父亲从泽西来做身份确认了。

    His father came up from Jersey to do the I.D.

  14. 建构主义视角下的师生身份确认与角色转换

    Identity Confirmation and Role Change of Teachers and Students from Constructivist Perspective

  15. 中国油画的语式转换与文化身份确认

    The Expressions of Chinese Oil Painting and the Search for Cultural Identification

  16. 论体内异质授精子女的身份确认

    Status Recognition about the Children by Artificial Insemination by Donor

  17. 通过节点证书,就可以在分布式系统中实现基于角色的访问控制,从而解决分布式系统中,节点的身份确认以及节点权限控制等问题。

    And can implement role based access control model by the certificate .

  18. 声码器半解码参数用于说话人身份确认

    Research on Speaker Verification With Half-Decoded Parameters of Vocoder

  19. 文学批评在大众传媒中的身份确认

    Culture Identity of Literary Criticism in Mass Media

  20. 申请D字签证,须持有定居身份确认表。

    A permanent residence confirmation form shall be required for the application of Visa D.

  21. 当要求提供身份确认资料以便调查时,拒绝配合;

    Refusal to cooperate in an investigation or provide confirmation of identity when requested ;

  22. 死者身份确认了吗

    Have you IDed the dead guy ?

  23. 精致的谎言,犀利的批判&W.H.奥登诗歌《不知名的公民》身份确认

    An Exquisite Lie , a Sharp Criticism-The Identity Verification of The Unknown Citizen by W.H.Auden

  24. 基于步态序列图像的身份确认

    Human Identification Based on Gait Sequences

  25. 未经身份确认,不要让诸如修理工之类的任何人进门。

    Never allow anyone ( e.g.repairmen ) to enter your home without first checking their identity .

  26. 从没进行过公民身份确认程序。

    Never began the citizenship process .

  27. 请填写身份确认表单。

    Fill in the identification form .

  28. 身份确认失败的悲剧形象&汪文宣论

    The Tragedy of Identity Confirmation Failure

  29. 通过权限管理进行用户的身份确认并进行权限验证;

    Identify the identity of user by means of authority management and carry out authority authentication ;

  30. 身份确认有多种方式:视网膜、虹膜扫描,指纹或面孔识别。

    Identification can be made by retinal or iris scanning , fingerprints , or face recognition .