加密机

  • 网络Encryptor;HSM;USB KEY;Encryption Engine;HAIPE
加密机加密机
  1. 因此,在配置SpringSocial连接库时,必须为连接库选择加密机,该加密机将在传输标识和密钥时启动。

    Therefore , when configuring a Spring Social connection repository , you must specify an encryptor that the connection repository will use when persisting the tokens and secrets .

  2. 本文主要对帧中继网络加密机的加密模块进行了安全性设计及实现。

    In this paper , encryption module of the frame relay encryptor is designed and implemented .

  3. VDHL语言在描述DES加密机中的应用

    The Application of VHDL Language in Describing DES Encrypt Machine

  4. 最后,本文采用国产USB加密机,利用PKI技术,设计并实现了一个网络安全平台。

    At the last part of this paper , a security protocol used home USB Key , based on PKI was designed , and an internet security appliance was implemented .

  5. 介绍了PKI框架下多种安全技术的应用,着重介绍了IP网络加密机、加密卡等硬件加密设备的实现原理和技术所构成的PKI结构下的公文交换系统安全体系。

    It introduces the application of many kinds of safe practices under PKI frame , and describes emphatically the safe system of official document exchanging system under PKI structure based on the IP network encrypting machine , encrypted card , etc.

  6. 双端口存储器在加密机中的应用

    The Application of Dual Port RAM in an Encryption Engine

  7. 帧中继网络加密机的研究与实现

    Research on Frame Relay Encryptor and Its Implementation

  8. 可编程移动电脑加密机的设计方法

    Design methods of programmable mobile computer cryptographic machine

  9. 本文论述一个由单片机和双端口存储器构成的加密机,阐述了加密机的工作原理和操作流程。

    This paper presents an encryption engine composed of a single chip processor and a dual port RAM .

  10. 过去数据通信功能由路由器或交换机承担,而安全功能则由专门的加密机承担。

    At past , data communication was mostly carried by router and switch , and security was carried by special cryptograph machine .

  11. 实践证明,帧中继加密机是一个安全,可靠,高效的网络安全设备。

    It is proved by practice that the frame relay encryptor is a device which has a good quality of security , credibility and efficiency .

  12. 这些“离散、静态”机器的抽象形式,就是图灵机,而物理形式则可以是加密机、解密机等等,

    The Turing machine was the abstract version of such a ' discrete controlling ' machine , and the cipher machines and decipherment machines were physical versions of them .

  13. 安全&有了本地虚拟技术组织可以仅仅锁住和加密虚拟机/虚拟硬盘的有价值的内容。

    Security – With local virtualization organizations can lock down and encrypt just the valuable contents of the virtual machine / disk .

  14. 对Linux版本的透明加密系统的机制作了简单介绍。

    This paper briefly introduces the mechanism of Transparent Cryptographic File System ( TCFS ) in Linux .

  15. 在全站仪测定一定数量的3维控制点后,利用数码像机进行近景摄影测量,加密测绘水轮机转轮叶片。

    After having measured some 3D control points by total station , the digital close range photogrammetry and surveying the vance of water wheel can be made .

  16. 在使用加密时,客户机在发送初始请求时需要用到服务器证书(因为要使用证书中的服务器公开密匙进行加密)。

    When using encryption , the client needs to have the server certificate available when sending the initial request ( because the server public key from the certificate is used for the encryption ) .

  17. 其设计包括受控和非受控端口状态、收发数据链路层帧和传输层数据包、应用加密算法、状态机的实现与融合等。

    The design includes the states of port and controlled port , the frame of link layer received and sent data , data package of transport layer , the application of encryption algorithm , realization and amalgamation of state machines etc.

  18. 它通过USB接口将要加密的数据传到加密机,在加密机中实现数据加解密,加解密过程脱离操作系统,有效地保证信息了的安全。

    After completion encryption / decryption operation , the encrypted data is returned . All encryption / decryption operations are performed in " source encryption equipment ", which assure the security of information .

  19. 所以在本文的最后,综合两种密码体制的优势,作者给出了一种基于混合加密体制的、应用AES算法硬件实现的加密机模型,给出了它的组成结构并对其作了实现可行性分析。

    Integrated the two system 's advantage , at the end of this thesis an encryption machine model base on mixed crypto system is brought forward which applied the hardware implementation of AES algorithm . And at last the feasibility of it is analyzed .