authenticate

authenticate

1. "Incoming: Users in this domain can authenticate in the other domain.

"传入: 此域中的用户可以在其它域中身份验证。

2. "Outgoing: Users in the other domain can authenticate in this domain.

"传出: 其它域中的用户可以在此域中身份验证。

3. "Bi-directional: Users in this domain can authenticate in the other domain and users in the other domain can authenticate in this domain.

"双向: 此域中的用户可以在其它域中身份验证,其它域中的用户也可以在此域中身份验证。

4. "The Security Support Provider is unable to authenticate the supplied user credentials. Please verify that this node is a member of or has a valid trust relationship with the account's domain.

"安全支持提供程序无法验证提供的用户凭据。请确认该节点是帐户域的成员或与帐户的域有有效的信任关系。

5. "Property that specifies the digital signature used to authenticate the message. The type is an array of bytes.

"指定用来验证消息的数字签名的属性。类型是一个字节数列。

6. "This trust is not transitive. Only users from the directly trusted domain may authenticate in the trusting domain.

"这个信任是不可传递的。只有直接受信任的域的用户可以在信任域中进行身份验证。

7. "This trust is transitive. Users from indirectly trusted domains within the enterprise may authenticate in the trusting domain.

"这个信任是可传递的。企业内部间接的受信任的域用户可以在信任域中做身份验证。

8. Could not authenticate to server. (Password incorrect?

18无法登入伺服器。(密码不正确吗?

9. No databases available. It is possible that you need to authenticate with a valid username/password combination to gain access to any databases.

19没有可用的数据库。您可能需要使用有效的用户名和口令组合进行验证以获得对数据库的访问。

10. It was not possible to authenticate some packages. This may be a transient network problem. You may want to try again later. See below for a list of unauthenticated packages.

20无法认证一些软件包。这可能是暂时的网络问题。你可以在稍后再试。以下是未认证软件包的列表。

11. Certificate is used to authenticate the user ID in Internet t.

509公钥证书,用以在Internet网上验证用户的身份。

12. The DS cannot derive a service principal name (SPN) with which to mutually authenticate the target server because the corresponding server object in the local DS database has no serverReference attribute.

ds 不能派生用之以相互给目标服务器验证身份的服务主要名称(SPN),这是因为在本地 ds 数据库中与之相对应的服务器对象没有 serverRefernce 属性。

13. EAP uses different types of security devices to authenticate remote access users.

EAP用不同的安全设备来验证远程访问用户的身份。

14. Kerberos's fundamental approach is to create a service whose sole purpose is to authenticate.

Kerberos的基本方法是创建一个服务,这个服务的唯一目的就是身份验证。

15. LDAP provides a mechanism for a client to authenticate, or prove its identity to a directory server, paving the way for rich access control to protect the information the server contains.

LDAP提供了一种机制,让客户端进行认证,或者向目录服务器证实它的身份,这为保护服务器中的信息提供丰富的访问控制方式。

16. When Outlook Voice Access users dial in to a subscriber access number, they are prompted to enter their PIN so that the Unified Messaging system can authenticate them.

Outlook Voice Access用户拨打订阅者访问号码时,系统会提示他们输入其PIN,以便统一消息系统能够对其进行身份验证。

17. PKI technology is based on the modern cryptology, which authenticate user through issue digital certificate for them.

PKI技术依赖于现代密码学的公开密钥算法,通过颁发数字证书认证用户,是目前国内外流行的主流安全技术之一。

18. SOCKS servers also have the ability to authenticate the source address of connection requests and can block unauthorized clients from connecting out onto the Internet.

SOCKS服务器还具有证实连接请求的源地址的能力,并能阻断未经批准的客户机外接到Internet上。

19. How does a Web service authenticate users?

Web服务如何认证用户?

20. The Windows 2000 License Logging Service maintains a list (on disk and in memory) of all users who authenticate against a server using the per-seat licensing model.

Windows 2000许可证记录服务维护着所有使用每客户许可证模型在服务器上进行身份验证的用户列表(在磁盘和内存中)。

21. "The parents and children authenticate" say for us, not only is a society progress of performance, is also our mankind's graveness to the our do-it-yourself break.

“亲子鉴定”对于我们来说,不但是社会进步的表现,也是我们人类对我们自己做出的重大突破。

22. "Signed" includes any symbol executed or adopted by a party with present with present intention to authenticate a writing.

“签署”包括一当事人为证实一份笔迹而书写或采用的任何符号。

23. Much like authentication with physical tokens, biometric authentication has the limitation that you need to have access to a physical input device in order to be able to authenticate.

与使用物理标记的认证很相似,生物认证也存在限制,您需要访问物理输入设备以便能够进行认证。

24. The World Bank wants to make clear that it disavows theseschemes and does not authenticate, authorize, or support these types ofinstruments.

世界银行在此澄清:世界银行与这些投资计划无关,对其亦未有任何形式的认证、授权或支持。

25. Both routers authenticate and are authenticated, so the PAP authentication commands mirror each other.

两台路由器都验证与被验证,所以密码验证协定的验证指令反映在每台路由器上。

26. Besides using digital certificates, individuals can also use their Taxpayer Identification Number and e-Tax Password to authenticate their identity.

个别人士除使用数码证书更可使用税务编号和税务易通行密码核实身分。

27. In order for authorization to work, the underlying network security must be able to authenticate the users and groups who access the report server.

为了进行授权,基础的网络安全性必须能够对访问报表服务器的用户和组进行身份验证。

28. To set up the execution environment, create an API call context object, authenticate the requesting user, and specify the URL for the eBay Web services.

为建立执行环境,创建一个API请求上下文对象,认证请求用户,并确定Web服务的URL。

29. When putting to the proof and inquiring about the proof, the litigant sh ould foll ow the legal procedure, and judges must authenticate the evidence by the rule of evidence presentation.

举证和质证应按照法律规定的程序进行,并由法官运用证据规则对证据作出正确认证。

30. Institutions from banks to pawnshops are fingerprinting to authenticate transactions.

从银行到当铺,都在使用指纹识别对交易进行验证。

31. He dismissed security concerns, claiming the system "is the most secure way to authenticate digital signatures.

他排除了相关安全忧虑,声称该系统“是验证数字签名的最为安全的方式。”

32. Value has shifted away from a copy toward the many ways to recall, annotate, personalize, edit, authenticate, display, mark, transfer and engage a work.

价值已经从拷贝转移到再现、注释、编辑、个性化、证实、展示、记号、传输和展现一件作品上。

33. Incoming: Users in the local domain can authenticate in the specified domain.

传入: 本地域中的用户可以在指定域中进行身份验证。

34. Incoming: Users in the local domain can authenticate in the specified domain, but users in the specified domain cannot authenticate in the local domain.

传入: 本地域中的用户可以在指定域中进行身份验证,但是指定域中的用户不能在本地域中进行身份验证。

35. Incoming: Users in this domain can authenticate in the other domain, but users in the other domain cannot authenticate in this domain.

传入: 此域中的用户可以在其它域中身份验证,但是其它域中的用户不能在此域中身份验证。

36. Outgoing: Users in the other domain can authenticate in this domain, but users in this domain cannot authenticate in the other domain.

传出: 其它域中的用户可以在此域中身份验证,但是此域中的用户不能在其它域中身份验证。

37. Outgoing: Users in the specified domain can authenticate in the local domain.

传出: 指定域中的用户可以在本地域中进行身份验证。

38. Outgoing: Users in the specified domain can authenticate in the local domain, but users in the local domain cannot authenticate in the specified domain.

传出: 指定域中的用户可以在本地域中进行身份验证,但是本地域中的用户不能在指定域中进行身份验证。

39. The tradition safety technique such as authenticate, accredit, encrypt, fire-wall and the control of accessing can not protect the information of network well. The safety of network faces great challenge and imperil.

传统的安全保护技术如认证、授权、访问控制、防火墙和加密等外围防卫机制已力不从心,计算机网络信息安全正面临着极大的威胁和挑战。

40. Traditional digital signature technology extracts one kind of abstract, which is undeniable and encrypted, and uses it to authenticate.

传统的数字签名是从原始信息中提取一种不可否认、加密的信息摘要来进行信息的认证;

41. However, the server doesn't authenticate the session with the client.

但是,服务器不对与客户端的会话进行身份验证。

42. Where do you want to authenticate connection requests that meet the criteria specified in this policy?

你想在哪里对满足此策略中指定的条件的连接请求作身份验证?

43. Do you want to authenticate requests on this server, or do you want to forward them?

你想在此服务器上身份验证请求,或者转送请求吗?

44. Do you want to authenticate connection requests on this server, or do you want to forward them?

你想在此服务器上身份验证连接请求,或者转送请求吗?

45. The use of unique physical characteristics, such as fingerprints, voice patterns, or retinal scan, to authenticate a user; providing security for workstations or information stored in hard drive.

使用独特的物理特征,例如指纹、声音模式,或视网膜扫描来鉴别一个用户,为工作站或存储子硬盘的信息提供安全保证。

46. For example, an implementer of GAMA may want to authenticate using the existing LDAP infrastructure.

例如,GAMA的一个实现可能会希望使用现有的LDAP基础设施来进行身份验证。

47. For example, consider using a cryptographic hash to authenticate users logging into a machine from the console.

例如,考虑使用密码杂凑来认证从控制台登入到机器的使用者。

48. The differences of rDNA ITS sequences can be used to authenticate accurately the populations of Zanthexylum bungeanum and their adulterants.

依据花椒ITS区的序列特征可以准确鉴别各居群的花椒及其混淆品;

49. Trust managers manage the certificates that are used to authenticate the peer sitting on the other side of the secure socket.

信任管理器管理证书,这些证书用于对位于安全套接字另一端的对等机进行认证。

50. Lets suppose you set up a Web site, and you force all users to authenticate.

假设您要设置一个Web站点,并强制所有用户都进行身份验证。

51. Allow all computers which successfully authenticate to relay, regardless of the list above.

允许所有通过身份验证的计算机进行中继而忽略上表。

52. Networks that use IPsec to secure data traffic can automatically authenticate devices by using digital certificates, which verify the identities of the two users who are sending information back and forth.

利用IPsec来确保数据流的网络,能通过使用数字证明,自动认证设备,这种证明验证两个来回发送信息的用户的身份。

53. Single sign-on allows users to authenticate once and have their credentials delegated to the resource or resources which are needed to perform the task.

单点登录使用户只需进行一次身份验证即可,并且用户可以将自己的证书委托给执行任务所需的资源。

54. Seller's Bank shall send to the Buyer's Bank, verifiable full set of agreed documents for the First Tranche of AU Metal for the Buyer's Bank to verify, authenticate and accept.

卖方银行须发出一整套能查证的、于黄金贵金属初额的文件至买方银行,供买方银行核实、定与接受。

55. Two-way: Users in the local domain can authenticate in the specified domain and users in the specified domain can authenticate in the local domain.

双向: 本地域中的用户可以在指定域中进行身份验证,指定域中的用户也可以在本地域中进行身份验证。

56. Two-way: Users in this domain can authenticate in the other domain and users in the other domain can authenticate in this domain.

双向: 此域中的用户可以在其它域中身份验证,其它域中的用户也可以在此域中身份验证。

57. Send connector %1 has failed to authenticate with %2.

发送连接器%1使用%2进行身份验证失败。

58. These non-volatile documents can be accessed electronically to authenticate current activities, such as an online transaction, or to support audit activities triggered by regulatory activities and legal actions.

可以利用电子方式,存取这些状态稳定的文档,以便鉴别当前的活动,如在线交易,或支持由规范活动和法律行动所引起的审查活动。

59. Thus,Fine Gains Method is found to be the best applicable method to be sued to authenticate the age of China primitive porcelain.

因此 ,采用热释光细粒混合矿物法测定这类样品的年代 ,只要解决了制样问题 ,还是目前较好的测年方法。

60. There are so many flaws in these photographs.? Someone ought to give them to the Shaanxi provincial Forestry Department and let them find some authoritative organization to authenticate them.

图片有太多的破绽。应该把它们交给陕西省林业厅,让他们找权威的组织鉴定一下。

61. In EAP-TLS, a TLS handshake is usually mutually authenticate between client and server.

在EAP-TLS协议中,一个TLS握手通常是客户端和服务器之间的双向认证。

62. Multiple security realms can be defined in Gluecode Standard Edition to authenticate and authorize users by providing a set of principals for access control.

在Gluecode标准版中可以定义多个安全域,然后透过提供一套存取控制主体,对使用者进行身份验证和授权。

63. The public key is used to encrypt the credentials that are used to authenticate the server during LDAP and Simple Mail Transfer Protocol (SMTP) communication.

在LDAP和简单邮件传输协议(SMTP)通信期间,使用公钥为用于验证服务器的凭据进行加密。

64. In communications based on SSL,in order to prevent others personate,require both sides authenticate each other.

在基于SSL协议的通信中,为了防止他人假冒,需要对通信双方进行认证。

65. In this case, the user must have an account on the target resource with the same user ID and credentials used to authenticate with the meta-scheduler.

在这种情况下,用户必须在目标资源上具有一个相同用户ID和在元调度器中用来进行身份验证的证书。

66. Most K4000RC Server configurations should at least be protected by a password required in order to authenticate the remote user to the server.

大多数K4000RC服务器应至少设置一个密码来认证远程用户,以确保安全。

67. She cannot authenticate her address, because she lives in an illegal slum.

她也不能告诉他们自己的住址,因为她住在一个非法贫民窟中。

68. How do I authenticate users with sessions?

如何使用会话来证实用户?

69. If a session doesn't authenticate, the permission groups in the access token remain the same.

如果会话不进行身份验证,访问令牌中的权限组保持不变。

70. If your Nokia Battery features a hologram label, the checks below can help you authenticate the hologram and the code printed on it.

如果你的诺基亚电池采用全息标签,在下面检查,可以帮助你认证全息和编码印上。

71. Message Queuing returns this error if the sending application attempts to use security context information to authenticate a message, and the security context does not include a certificate.

如果发送应用程序试图使用安全上下文信息对消息进行身份验证,但安全上下文不包含证书,则消息队列返回此错误。

72. Tu Pan reminds, determined by all means must is going to choose whether the Communiversity did pass our country Ministry of Education to authenticate.

如果学生想继续深造进修,也可以转读四年制大学,直接申请报读大三的课程,继续后两年的大学课程,取得学士学位。

73. Select "Use for authentication" if this directory contains users accounts that someone will use for login or to authenticate for services.

如果此目录包含某人将用于登录或鉴定服务的用户帐户,请选择“用于鉴定”。

74. If you make this change, a remote user can authenticate with your local user account rather than Guest.

如果进行此更改,则远程用户可以使用您的本地用户帐户(而不是“来宾”)进行身份验证。

75. There are more devices requiring authentication. Click Next to authenticate the next device.

存在其他需要验证的设备。请单击“下一步”以验证下一个设备。

76. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction.

实际上,PKI是一个由数字证书、证书颁发机构以及其他对电子事务中所涉及到的每一方的合法性进行检验和身份验证的注册授权机构所组成的系统。

77. Experiments show this algorithm can authenticate watermarked JPEG image tempered or not effectively.

实验表明该算法可有效的判别含水印的JPEG图像文件是否经过篡改。

78. From the keystore. Key managers manage the keys that are used to authenticate the application to its peer across a secure socket.

密钥管理器管理密钥,这些密钥用于在安全套接字对面相对应用程序的对等机来认证它。

79. For a Receive connector, the authentication setting determines the set of authentication mechanisms that are enabled by the server to authenticate sessions that submit messages to the server.

对于接收连接器,身份验证设置确定服务器对将邮件提交到服务器的会话进行身份验证所用的身份验证机制集。

80. While peer authentication is clearly important, it is often just as important to authenticate shared resources - content in particular.

对等认证无疑是重要的,但通常同样重要的是对共享资源的认证特别是内容。

英语宝典
考试词汇表