单词 | authenticate |
释义 | authenticating是authenticate的现在分词
第三人称单数:authenticates 现在分词:authenticating 过去式:authenticated 例句释义: 认证,鉴定,为…出立证据,正在验证,权限认证中,认证状态 1. If the result for authenticating is unworthy how much , that I really must seek a place a head of to bump to die. 要是鉴定的结果不值多少钱,那我真得找个地方一头撞死了。 blog.sina.com.cn 2. He said that the logistics of authenticating and consummating transactions on mobile need to be improved. 他说对于交易验证和完善的保障还需要改进。 www.bing.com 3. Use the LoggingIn event to perform any processing that you need before authenticating a user or to perform custom validation. 使用LoggingIn事件在对用户进行身份验证前执行所需的处理或执行自定义验证。 msdn2.microsoft.com 4. The general approach to security considerations starts with authenticating the user, commonly with username and password. 一般的安全措施首先会验证用户,通常使用用户名和密码进行验证。 www.ibm.com 5. Think of these articles as a proof-of-concept for authenticating a user independently of other credentials. 请将这些文章视为独立于其他凭证的用户验证方法的概念证明。 www.ibm.com 6. At this point, client has the session key that client can use for authenticating itself to the authentication service. 现在,客户端拥有了会话密钥,它可以使用该密钥向身份验证服务验证自身。 www.ibm.com 7. All smart hosts with which this Send connector is authenticating must accept the same user name and password. 对此发送连接器进行身份验证的所有智能主机必须接受相同的用户名和密码。 technet.microsoft.com 8. Signature A signature key pair used for authenticating digitally signed messages or files. 一个签名密钥对,用于对数字签名的消息或文件进行身份验证。 msdn2.microsoft.com 9. Take a look at various ways of authenticating to a CM system and various levels of authorization. 查看对CM系统进行身份验证的不同方法以及各种级别的授权。 www.ibm.com 10. This includes properly authenticating the connection with a username and password recognized by the server. 这包括适当地使用服务器认识的用户名和口令来对连接进行身份认证。 www-128.ibm.com 1. The inventive remote authenticating system for a biologic sample can realize quick and remote authentication fro the biologic sample. 本发明的生物标本远程鉴定系统可实现生物标本的快速、远程鉴定。 ip.com 2. Consider the issues surrounding access control: You are authenticating the actor to operate within the program in a given role. 设想关于访问控制的问题:假设您正在鉴定一个以给定角色在程序中进行操作的参与者。 www-128.ibm.com 3. Authenticating a user before granting access to a network is a basic security requirement that wireless networks typically lack. 在授权用户访问网络之前先认证用户是一项基本的安全性要求,而无线网络通常不具备。 www-128.ibm.com 4. Sometimes, people will instead authenticate against a set of DNS names, and will thus do a lookup on the IP address before authenticating. 有时,人们会对一组DNS名称而不是IP地址进行认证,因而要在认证之前查询IP地址。 www.ibm.com 5. For e. g it can be used for authenticating Linux users with a simple approach. 例如,可以使用它简便地对Linux用户进行身份验证。 www.ibm.com 6. Enhanced authentication support that provides stronger processes for establishing secure remote sessions and authenticating users. 增强认证支持,对建立安全的远程会话和用户认证提供了更强大的处理能力。 www.ebigear.com 7. Simply put, a brand is a promise. By identifying and authenticating a product or service it delivers a pledge of satisfaction and quality. 简单说来,一个品牌就是一个承诺。通过识别和鉴定一个产品或服务,它表达一种对品质和满意度的保证。 cnc.china-brand.net 8. Gets or sets the hashing algorithm that Message Queuing uses when authenticating a message or creating a digital signature for a message. 获取或设置消息队列在验证消息或为消息创建数字签名时使用的哈希算法。 msdn2.microsoft.com 9. Information Protection is an important thing while authenticating the identity or exchanging the messages on the Internet. 在网路上进行身份认证或讯息交换时,资讯的保密是最重要的一件事。 www.etop.org.tw 10. However, as the Twitter API wiki states: "All responses are relative to the context of the authenticating user. " 但是,如TwitterAPI的wiki所述:所有响应都与进行身份验证的用户的上下文有关。 www.ibm.com 1. The whole system is composed of local sub-systems and a global communicating and authenticating a-gent. 系统的总框架由区域审计子系统和全局通信认证代理组成; www.ceps.com.tw 2. If you choose to use form-based login, once the form completes authenticating, the user then redirects back to the originally requested URL. 如果选择使用表单架构登录,一旦表单完成验证,用户会重定向回最初请求的URL。 www.ibm.com 3. The testification and authenticating requirement for foreign documents used in the PRC is generally accepted international practice. 外国的公证文书在内国使用时需要办理认证手续,是国际上的习惯做法; dictsearch.appspot.com 4. Gets or sets the hashing algorithm used when authenticating messages or creating a digital signature for a message . 有关对访问报表服务器的用户进行身份验证的信息将在其他主题中介绍。 www.bing.com 5. Authenticating the client to the server is optional and is controlled from the server side settings (see Resources). 认证到服务器的客户端是可选择的并且由服务器端的设置来控制(请见参考资料)。 www.ibm.com 6. Client module acts as the authentication sponsor, and manages the user's token after authenticating successfully. 客户端模块负责发起认证请求,并在认证通过之后保存用户认证凭证——用户令牌。 www.juhe8.com 7. Authenticating the upgrade failed. There may be a problem with the network or with the server. 认证升级信息失败。可能是网络或服务器的问题。 dictsearch.appspot.com 8. Step 3: Specify the method to be used for authenticating the user. 第3步:指定验证用户所使用的方法。 www.ibm.com 9. JAAS provides a flexible, declarative mechanism for authenticating users and verifying their ability to access secure resources. JAAS提供了一种灵活的、说明性的机制,用于对用户进行认证并验证他们访问安全资源的能力。 www-128.ibm.com 10. If no Twitter username is specified, the API assumes that you want to retrieve the authenticating user's timeline. 如果没有指定Twitter用户名,API就假定您想检索验证用户的时间线。 www.ibm.com 1. Securing an application against improper use involves authenticating and authorizing callers. 防止应用程序受到不正当使用涉及对调用方进行身份验证和授权。 msdn2.microsoft.com 2. Moreover, the useful information for authenticating the presence of reconstituted milk in raw milk or pasteurized milk was provided. 除此之外,本研究可为鉴定生鲜乳中是否添加复原乳提供依据。 www.fabiao.net 3. This includes the need for security in a non-authenticating environment (e. g. , a stateless Web service). 这包括对非验证环境(例如,无状态的Web服务)中的安全的需求。 www.ibm.com 4. Both IIS and ASP. NET provide support for authenticating Web applications, including Web services, using security built in to Windows. IIS和ASP.NET都支持利用Windows的内置安全性对Web应用程序(包括Web服务)进行身份验证。 msdn2.microsoft.com 5. To create a complete system for authenticating users of a Web application or site. 一起使用以创建一个完整的Web应用程序或网站的用户身份验证系统。 msdn2.microsoft.com 6. One often-cited example is user authentication - taking a username and password combo and authenticating it against some back-end store. 一个常常被引用的例子就是用户验证——将用户名和密码对提交给后端系统验证。 www.infoq.com 7. Authenticating a user at the server without first invalidating existing sessions can lead to what is termed session fixation. 在服务器上验证一个用户之前,如果没有首先使现有会话失效,可能会导致所谓的会话固定。 www.ibm.com 8. Eugenio: Many applications today take the responsibility of authenticating its users. Eugenio:今天的很多应用都需要自己进行用户认证。 www.infoq.com 9. Class is responsible for authenticating requests and providing an authentication token. 类负责对请求进行身份验证并提供身份验证令牌。 msdn2.microsoft.com 10. Gaining access involves the first of two security issues (see the following section, Security): authenticating permitted users. 获得访问权限涉及到两个安全问题中的第一个问题(请参阅安全性部分):对许可用户进行身份验证。 www.ibm.com 1. Authenticating via SSL client certificates, where a properties file maps certificate names to users and groups. 通过SSL客户机证书进行身份验证,其中属性文件将证书名称映射到用户与组。 www-128.ibm.com 2. The default is 0, which is O. K. For a server that has other means of authenticating clients. 缺省值为0,适用于使用其它方法验证客户机的服务器,也是如此。 www-128.ibm.com 3. JAAS provides a modular mechanism for authenticating users and controlling access to resources. JAAS提供了对用户进行认证和控制访问资源的模块化机制。 www-128.ibm.com 4. Begins an asynchronous operation to handle the server side of authenticating a client-server connection. 开始非同步作业以处理验证用户端与伺服器连接的伺服器端。 technet.microsoft.com 5. Usage of Kerberos as the authenticating protocol in the first-factor authentication. 在第一因素身份验证中,Kerberos作为身份验证协议。 www.ibm.com 6. Most auction houses have their own rules and policies for authenticating a piece, placing a piece on auction and making a sale. 大多数拍卖行有自己的规则和策略来鉴定、拍卖艺术品。 dictsearch.appspot.com 7. The process of authenticating and establishing a TLS session can be expensive operations. 进行身份验证并建立一个TLS会话的过程可能是大量消耗资源的操作。 technet.microsoft.com 8. Select the desired certificate when prompted to select a certificate for authenticating. 在提示选择用于身份验证的证书时请选择所需的证书。 www.ibm.com 9. Authenticating your site's users is one such critical security requirement. 对站点的用户进行身份验证是一项非常重要的安全需求。 www.ibm.com 10. Specifies the hash algorithm used by Message Queuing when authenticating messages. 指定消息队列在对消息进行身份验证时所使用的哈希算法。 msdn2.microsoft.com 1. And if he is dead, they have to explain why they are claiming that he's alive and authenticating his videos. 如果本拉登死了,领导们就得说明说明为什麽他们曾宣称本拉登还活著并且认为相关录像是真货了。 blog.sina.com.cn 2. Authenticating using information from the credential vault. 使用来自凭据库的信息进行身份验证。 www.ibm.com 3. Feel free to download the source code from this article and use it to assist in authenticating your applications with OpenID. 请随意下载本文的源代码,用它帮助实现应用程序的OpenID身份验证。 www.ibm.com 4. This option is not necessary if you are authenticating using Windows credentials (-E). 如果要使用Windows凭据(-E)进行身份验证,则此选项不是必需的。 msdn2.microsoft.com 5. Identity theft is the misuse of private authenticating information to steal money. 盗用身份是滥用私人认证信息,以盗取金钱为目的。 dictsearch.appspot.com 6. The photo can be used as an additional method of authenticating the key. 该相片可以用来做为验证该金钥的另一种方式。然而,它不该被作为唯一的验证方式。 translations.launchpad.net 7. Note Users behind some authenticating proxy servers may experience sign-in issues. 注意:位于某些身份验证代理服务器之后的用户可能会遇到登录问题。 support.microsoft.com 8. Passwords are also very important when authenticating users. 在验证用户时口令也很重要。 www-128.ibm.com 9. Numerous parties are looking at how to avoid re-usable passwords when authenticating users to services. 很多组织都在寻找在验证用户身份时,如何避免可重复使用的密码。 www.infoq.com 10. Table 3 shows a number of alternative methods of authenticating with the Subversion server. 表3显示了Subversion服务器上的多种认证方法。 www.ibm.com 1. What support does it offer for authenticating users and encrypting its traffic? 它在认证用户和加密传输方面提供了怎样的支持? www.ibm.com 2. The examples in this article introduce Shiro and focus on the basic task of authenticating a user. 本文中的这些例子旨在介绍Shiro并着重展示对用户进行身份验证的基本任务。 www.ibm.com 3. Authenticating pieces helps prevent counterfeits and fraud, and helps ensure that a returned artifact is the same one that a museum loaned. 认证行为帮助防止赝品和假冒行为,并且帮助确认归还的工艺品是博物馆借出的原品。 money.zhishi.sohu.com 4. Use the TCP channel for better performance and if you don't care about authenticating the client. 如果您不担心客户端身份验证问题,请使用TCP通道,它可以提供更高的性能。 zxianf.blog.163.com 5. This means you need a way of authenticating users. 这意味着您需要验证用户的方法。 www-128.ibm.com 6. If the UID of the authenticating user is zero, then only pam_allowroot module returns PAM_SUCCESS. 如果验证中的用户的UID为零,那么只有pam_allowroot模块会返回PAM_SUCCESS。 www.ibm.com 7. Authenticating against a database holding the users and groups. 根据存放用户与组的数据库进行身份验证。 www-128.ibm.com 8. NET login controls to create a complete system for authenticating users. NET成员资格,建立验证使用者的完整系统。 technet.microsoft.com 9. After authenticating, the feed should now load correctly. 身份验证之后,提要就应该正确加载了。 www.ibm.com 10. By entering the correct PIN, you are authenticating your use of the ATM card and your access to your account. 通过进入正确PIN,您证实对ATM卡片的您的用途和您的对您的帐户的通入。 blog.tianya.cn 1. Start as root, either by authenticating as root or executing a setuid root binary. 通过根用户身份或者执行setuidroot二进制文件,作为根进程启动。 www.ibm.com 2. If you store hashed passwords, which is a really good idea, you need to prepare an alternate way of authenticating the user. 如果你保存散列后的密码,这确实很好,你需要准备另一套方法来验证用户。 www.cnblogs.com 3. Authenticating to a site on the same domain. 对相同域上的站点进行身份验证。 www.ibm.com 4. Authenticating against a list of users and groups stored in files on disk. 根据存储在磁盘文件中的用户与组列表进行身份验证。 www-128.ibm.com 5. Authenticating user is a core part of system security. 对用户的认讧是系统安全的核心组成部分之一。 dictsearch.appspot.com 6. There are two methods of authenticating with the API: HTTP Basic, or an authenticated session. 这个API有两种验证方法:HTTP基础验证或一个验证对话。 www.ibm.com 7. After connecting and authenticating, link state communication begins using the X-LINK2STATE command. 连接和身份验证过程后,链路状态通信开始使用X-LINK2STATE命令。 technet.microsoft.com 8. Sets the password to use when authenticating the client. 设置客户端身份验证所使用的密码。 msdn2.microsoft.com 9. Contains a text string which identifies the port of the NAS which is authenticating the user. 包含识别正在验证用户身份的NAS端口的文字字符串。 www.fan6.net 10. Various modules inside Samba related to authenticating users. Samba内与用户身份验证相关的各个模块。 www.ibm.com 1. After authenticating, you will be presented with options in the left navigation. 验证通过后,左导航将出现一些选项。 www.ibm.com 2. Thus there are three GBeans that work together when authenticating a user's login credentials. 因此,在认证用户的登录凭证时,有三个GBean协同工作。 www.ibm.com 3. Message Queuing uses the digital signature when authenticating messages that were sent by Message Queuing version 1. 0. 消息队列在对由消息队列1.0版发送的消息进行身份验证时使用数字签名。 msdn2.microsoft.com 4. Authenticating users who visit your site. 对访问站点的用户进行身份验证。 msdn2.microsoft.com 5. The service ticket, which is authenticating with server, contains two parts illustrated below in Figure 3. 服务票证对服务器进行身份验证,包含两部分,如图3所示。 www.ibm.com 6. Figure 2 shows a screen shot of the myOpenID server authenticating a request. 图2显示了处理身份验证请求的myOpenID服务器截图。 www.ibm.com 7. This is a technology for mutually authenticating the identities of HTTP servers and clients based on their public key certificates. 这是一种基于HTTP服务器和客户机的公用密钥证书对它们的身份进行双向验证的技术。 www-128.ibm.com 8. There are many protocols for authenticating remote users, such as certificates or security tokens from trusted sources. 存在许多对远程用户进行身份验证的协议,例如来自受信任来源的证书或安全令牌。 www.ibm.com 9. What authenticating object is Ailisi fond of? 爱丽丝喜欢什么信物? wenwen.soso.com 10. Management System Design for Occupation Training and Technical Abilities Authenticating 职业培训与技能鉴定管理系统的设计 www.ilib.cn 1. Management System Design for Occupation Training and Technical Abilities Authenticating 职业培训与技能鉴定管理系统的设计 www.ilib.cn 2. The Measure for The Administration of Inspection And Authenticating Institutions on Import And Export Goods 进出口商品检验鉴定机构管理办法 www.tjciq.gov.cn 3. Analysis of the Problems of Producing Evidence, Confronting and Authenticating in the Objection System of Civil Jurisdiction 民事管辖异议制度中举证、质证和认证问题探析 www.ilib.cn 4. About Legal Problems of Authenticating and Recovering Illicit Money and Booty in Investigating Economic Criminal Cases 试论在经济犯罪案件侦查中赃款赃物认定和追缴的法律问题 scholar.ilib.cn 5. Analysis and Improvement of a Multisecret Sharing Authenticating Scheme 对一种多重密钥共享认证方案的分析和改进 www.ilib.cn 6. authenticating by the third party payment system according to a user request, and delivering the credit in a merchant account; 第三方支付系统根据用户的请求进行鉴权,将充值金额划入商户帐户; ip.com 7. Authenticating of Vocational Skill and Higher Vocational Education 谈职业技能鉴定与高职教育的有效衔接 www.ilib.cn 8. Roles of Teaching Practice and its Lacuna in the Process of Authenticating Teacher's Qualification 教育实习的作用及其在教师资格认证过程中的缺失 www.ilib.cn 9. A new robust digital watermark algorithm for authenticating the visual content of digital images 一种用于图像认证的鲁棒水印算法 ilib.cn 10. There are two options for authenticating the remote rendering portlet to the remote Workplace Web Content Management server 有两种选项用于验证远程呈现portlet与远程WorkplaceWebContentManagement服务器的连接 www-128.ibm.com 1. Application of GC-MS Fingerprint in Authenticating Cigarettes 气相色谱-质谱指纹图谱在甄别真假卷烟上的应用 www.ilib.cn 2. On Regulating Justice's Authenticating in Interest Gambling 论利益博弈中法官认证行为的规制 www.ilib.cn 3. Authenticating Against a Database Table 不使用数据库表格进行验证 blog.csdn.net 4. On the Foundation of Authenticating Legal Facts 认定法律事实的基础 scholar.ilib.cn 5. Identity authenticating by using SOAP header SOAP头部在身份验证中的应用 www.ilib.cn |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。