在 英语 中使用 User's identity 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
But at the moment, there's no way to verify the user's identity.
A user's identity can be determined by what he knows, what he has, or what he is.
We do not use cookies to determine the User's identity.
After the user's identity is verified, the Local Security Authority will authorize or deny resource access.
This type of access uses browser cookies to verify a user's identity.
The user's identity is linked across multiple security domains, each with its own identity management system.
Although the Kerberos protocol authenticates the user's identity, it does not authorize access.
The company operates on an open-sourcedsoftware designs that aim to help protect its user's identity.
CUPay differs from modern payment rail systems in that a user's identity is attached to every transaction they make.
We will review the issues as soon as possible andrespond within 15 days of verifying your user's identity.
NET Identity supports claims-based authentication, where the user's identity is represented as a set of claims.
We will use the User's registered e-mail address and password in order to confirm the User's identity.
Authentication means verifying the user's identity and connecting that identity with the user's Creative Cloud membership.
Both frameworks also provide fine-grained authorization based on the user's identity and/or roles.
Because user verification on the Internet is very difficult we cannot confirm each user's identity.
The other Blockchain platformis responsible for receiving the codes to confirm a user's identity when they try to conduct a transaction through the platform.
But in China, that new system raises the question of how carriers andregulators can track the device user's identity.
It uses a natural(biometrics) or familiar(PIN) means to validate a user's identity using the devices they already have.
Third-party identity providers enable you torely on a trusted external service to authenticate a user's identity.
Current systems, such as SWIFT's settlement rail,do not send the user's identity with a wire transfer;
Broken authentication andsession management include a number of security issues dealing with maintaining a user's identity.
Malboard evades several detectionproducts that are intended to continuously verify the user's identity based on personalized keystroke characteristics.
Those systems, which resemble the ones seen in airports,use a person's face rather than a PIN or a fingerprint to validate user's identity.
Dark web networks route user data through a large number of intermediate servers to protect the user's identity and provide anonymity.
Authentication and session management cover a number of security issues,all of which relate to maintaining a user's identity.
Malboard evades several detectionproducts that are intended to continuously verify the user's identity based….
If authentication and session identifiers are not always protected,an attacker can hijack an active session and assume a user's identity.
Those systems, which resemble the ones seen in airports,use a person's face rather than a PIN or a fingerprint to validate user's identity.
Many access control systems also include multifactor authentication,a method that requires multiple authentication methods to verify a user's identity.