For example, you need to controlaccess to EJBs using a network-safe encrypted token.
例如,您需要使用网络安全加密令牌控制对ejb的访问。
2
This protocol is based on current hardware foundation of Ethernet and solves access conflict through token-control by creating virtual token on application layer.
该协议基于现有的以太网硬件基础,在应用层构造虚拟令牌,利用令牌控制来解决网络的访问冲突问题。
3
The management mechanism regulates that a node can access the channel only when it holds a token, by which the protective mechanism with media accesscontrol can be realized.