Examples of using Authentication procedures in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Utilizing client identification and authentication procedures before initiating transactions.
EAP is a general authentication protocol, supporting various authentication procedures.
Two factor authentication procedures are also essential, to ensure that attackers cannot access Cloud accounts.
(b) Strengthening end-use certification and authentication procedures at the State level;
Two-factor authentication procedures are also important to ensure that attackers cannot access accounts in the cloud.
Strengthened end-use certification and authentication procedures at State(government) level.
Encourage consistent international rules for acceptance of electronic signatures andother authentication procedures;
Cumbersome authentication procedures, costs of access, user discovery of available networks and security were listed.
Prior to this, 12 carriers, including AT&T and Verizon,had promised to implement authentication procedures.
The free ConfiBack software doesn't include any user authentication procedures and it doesn't have a patch manager module.
Previously, 12 telephone companies,including ATT and Verizon promised to implement authentication procedures.
The client-server applicationsusing the tunnel will carry out their own authentication procedures, if any, the same way they would without the encrypted tunnel.
Develop formal policies concerning all aspects of identity management andproperly document identification and authentication procedures.
Note, that it is not possible to create the certificates required for all authentication procedures within the camera itself(exception: EAP-MD5).
The report said a quarter of the incidents that led to losses resulted fromemployees not following their company's identity authentication procedures.
Very little is done to secure the internals of the organization(such as departmental firewalls,user-level access controls, and authentication procedures for internal resources).
(b) Operating and maintaining International Monitoring System facilities, including facility physical security if appropriate,and application of agreed data authentication procedures;
Very little is done to secure the internals of the organization(such as departmental firewalls,user-level access controls, authentication procedures for internal resources, and more).
In paragraph 107, the Board recommended that UNITAR develop formal policies concerning all aspects of identity management andproperly document identification and authentication procedures.
For example, keeping device firmware up-to-date, ensuring encryption for all transmitted data,and implementing standard user authentication procedures can all help to prevent cyber attacks.
The Administration agreed with the Board' s recommendation that UNITAR develop formal policies concerning all aspects of identity management andproperly document identification and authentication procedures.
Authentication procedure: Members of the adult entertainment industry must be authenticated in order to activate their domain names.
In fact, the vast majority of international written contracts- if there is" writing" at all-are not necessarily accompanied by any special formality or authentication procedure.
User certificate of the camera(only required for the EAP-TLS authentication procedure).
The EAP-MD5 authentication procedure is considered insecure and should not be used.
This is the private key of the camera(only required for the EAP-TLS authentication procedure).
For every IP address that enters your VoIP system,it must pass through a three-step authentication procedure.
A contract concluded by means of electronic communications is a digital document which meets the written form requirement, while it might additionallybe necessary to evidence its existence by means of some authentication procedure.
Defining certificate authentication policies and procedures is an instrumental part of a public key infrastructure's(PKI) design.
The authentication methods and procedures of these three products are quite different.