首页 / 词典 / good

USB Key

美 [ˌjuː es ˈbiː kiː]英 [ˌjuː es ˈbiː kiː]
  • 网络USB密钥;USB钥匙
USB KeyUSB Key
  1. Realization of Elliptic Curve Cryptography on USB Key

    椭圆曲线密码算法在智能密码钥匙中的实现

  2. Research of Key Management for Portable TPM Based on USB Key

    基于USBKEY的移动TPM密钥管理研究

  3. A Dual Key Authentication and Key Exchange Protocol Based on USB Key

    一种基于USBKEY的双因子身份认证与密钥交换协议

  4. Dual Factor J2EE Authentication System Based on USB Key

    基于USBKEY的J2EE双因素认证系统

  5. USB KEY is for software encryption to protect the software from illegal use .

    USB加密狗的作用是用于软件保护,使得未经授权的程序无法正常运行。

  6. Using this interface , USB KEY do not need driver during enumeration .

    通过该接口USBKEY在接入系统后不需要驱动程序即可正常使用。

  7. The external hard drive can work without the docking station or the USB key .

    外部硬盘驱动器可以工作,但无扩展坞或USB的关键。

  8. When user runs the protected application , it must pass the USB KEY authentication .

    用户在使用软件的时候,必须通过USB加密狗的验证。

  9. USB Key Security Program Basing On Fingerprint Encryption

    基于指纹加密保护的USBKEY安全方案

  10. The encryption security chip applied to the USB Key is a good carrier of digital certificate .

    应用于USBKEY的加密安全芯片是解决证书载体的关键。

  11. The latter was stored on a USB key which women could take away and upload later .

    照片被保存在usb储存器里,女士们可以带走并上传到网络上。

  12. This paper introduces the design , implementation and application of CSP , which is based on Smart Card and USB Key .

    本文基于智能卡和USB电子加密钥匙开发了一套CSP,详细介绍了其设计方案、实现流程和典型应用案例。

  13. The research achievement of this thesis supports a chip level solution for USB Key and makes a contribution to domestic information security technology .

    本文的研究成果,为USBKEY提供了芯片级解决方案,同时也为信息安全技术的发展做出重要贡献。

  14. Authentication protocols based on traditional USB Key are unable to process complex encryption / decryption data and lead to many disadvantages .

    传统的USBKEY只能存储数据而无法进行复杂的加/解密运算,导致基于USBKEY的认证协议存在诸多不足。

  15. USB KEY includes a password series code , which makes the USB KEY not be able to be duplicated .

    USB加密狗内部包含有一个密码序列串,该密码序列串保证了USB加密狗的无可复制性。

  16. The USB key works just like any other USB thumb drive and has4GB of storage .

    重点工程的USB就像任何其他的USB拇指驱动器,拥有4GB的存储。

  17. This paper introduces the theory of CSP , also the function of USB KEY , discuss the CSP implement base on USB KEY .

    本文从CSP的技术原理出发,结合USBKEY的功能特点,深入讨论了如何使用USBKEY实现CSP的功能。

  18. The external hard drive comes into three parts : the docking station , the drive , and an interpreted USB key .

    外部硬盘驱动器配分为三个部分:底座,驱动器和一个USB密钥解释。

  19. The plan is based on the CA system , and it attaches an address filter function and USB key to the digital satellite receiver .

    该方案讨论了在原有的以条件接收为安全策略的基础上如何利用地址过滤函数和USB密钥,实现平台的安全功能。

  20. This paper introduces the system structure of USB KEY : the hardware layer 、 the core driver layer 、 the standard middle-ware layer and the application layer .

    本文介绍了USBKEY的体系结构,由硬件层、核心驱动层、标准中间件层和应用层构成。

  21. The boot drive is usually the first hard drive on the system , but may also be a diskette , CD , or USB key .

    引动驱动器通常是系统上的第一个硬盘驱动器,但也可以是一个磁盘、CD或USB密匙。

  22. The USB Key is a new generation identity attestation product that combines the modern password technique , the intelligence card technique and the USB technique .

    USBKEY是结合了现代密码学技术、智能卡技术和USB技术的新一代身份认证产品。

  23. This paper emphasizes on hardware form of USB KEY , the modular function and working flow of Chip Operating System , USB firmware on COS .

    本文着重讨论了USBKEY的硬件构成,芯片操作系统COS(ChipOperatingSystem)的各模块的功能和工作流程,COS端的USB固件程序。

  24. Finally , it implemented the integrated engineering electronic documents ' security system oriented to manufacturing enterprises based on study on USB Key identity authentication and electronic documents technique .

    最后在对基于USBKEY的身份认证技术和数字文件安全管理技术的研究基础上,实现了面向制造企业集成化工程数字文件安全系统的开发。

  25. An authentication system based on USB key is also designed , which realizes bilateral authentication between user and server through 3 message interchange between client and server .

    设计了基于USBKEY的身份认证系统,该系统通过客户端和认证服务器之间的三次消息交互,实现了客户和服务器之间的双向身份认证。

  26. At the last part of this paper , a security protocol used home USB Key , based on PKI was designed , and an internet security appliance was implemented .

    最后,本文采用国产USB加密机,利用PKI技术,设计并实现了一个网络安全平台。

  27. Compared with the traditional password attestation , the attestation of USB Key has the higher safety and credibility , and it is easy to be extended for more functions .

    该系统满足了用户使用方便、安全的需求,与传统的口令认证方式相比,USBKEY认证具有更高的安全性与可靠性,并且有利于功能扩展,获取多种服务。

  28. Software appliances come in the form of a file which can be a virtual machine image , an ISO , a USB key image , or an Amazon EC2 AMI .

    软件设备以文件的形式出现,该文件可以是虚拟机映像、ISO、USBkey映像或是AmazonEC2AMI。

  29. In the long run you can expect a slimmed-down version of PHLAK that will fit on a128-MB or256-MB USB key .

    在长期运行过程中,您可能期望使用一个精简版本的PHLAK,它可以安装在一个128MB或256MB的USB闪存上。

  30. The core point is that the control word ( CW ), service key ( SK ) and personal distribute key ( PDK ) can work on the link layer while USB key on the application layer .

    方案的关键是让解扰密钥、业务密钥和个人分配密钥从链路层保证安全,而USB密钥则从报文层保证安全。