Examples of using Tamper detection in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Tamper detection, neutral missing.
Zeroization of data on tamper detection.
Tamper detection for opening cover, reverse connection, outage.
Zeroization of data on tamper detection.
Enhanced tamper detection for magnetic field, reverse connection, cover open, etc.
These include GPG encryption, tamper detection, and the kill switches.
Tamper detection and event record such as opening cover, reverse connection, black-out.
Maxim's secure microcontroller delivers advanced cryptography,secure key storage and tamper detection in a 50 percent smaller package.
The BSP isadded with various security features such as Tamper detection, High assurance boot(HAB) and Crypto engine Differential Power Analysis- DPA with DES algorithm.
It integrates several security features into a small package, including secure key storage, a secure bootloader,active tamper detection and secure cryptographic engines.
August 1, 2018- Manufacturers of security-sensitive industrial, consumer, computing and internet of things(IoT) devices now have a fast, efficient way to build in secure cryptographic operations,integrate key storage and enable active tamper detection with the MAX32558.
The meter has all standard function features of STS prepaid meters, such as keypad,20 digits' encryption, tamper detection, power limit setting and class 1 metrology accuracy.
Because the gateway manages information moving in both directions, it can protect data moving to the cloud from leaks and IoT devices from being compromised bymalicious outside attacks with features such as tamper detection, encryption, hardware random number generators and crypto engines.
Detection and record tamper event such as cover open, reversal, black-out, etc.
Satisfied that nobody could tamper with the scene without detection, they left the kitchen alone for three months.
After the occurrence of an event(motion detection, camera tampering etc), the NVR automatically switches to the event-recording mode(usually with higher parameters).
Every access point, either hardware or software related,is protected by secured firewalls and virus detection systems which eliminate tampering and hacking.
The built-in video analytics software platform performs different tasks included butnot limited to face detection, tampering alarm, unattended object detection, missing object detection, smart search, single PTZ object tracking, people counting, and crowd detection. .
Satisfied that nobody could tamper with the scene without detection, they left the kitchen alone for three months.
Each such block is connected to those before and behind it, making tampering difficult because a hacker would need to change the block containing that record and all those linked to it to avoid detection.
Among the camera's advanced features are intelligent video analytics,including advanced motion, tampering, virtual line, enter/exit, appear/disappear and face detection.