All this information needs to be stored in a secure and tamper-resistant manner with the capability to report on it for audit purposes. 所有这些信息都需要按照可靠且不可篡改的方式存储起来,支持根据这些数据生成审计报告。
The firewall is tamper-resistant because it is independent of the host's operating system. 因为防火墙独立于主机的操作系统,所以它是防篡改的。
The present invention provides a flexible, tamper-resistant authentication system, or personal authentication device ( PAD), which can support applications in authentication, authorization and accounting. 本发明系关于一兼具弹性及反窜改特性之个人身份确认装置,其可支援身份确认、权、稽核等应用。
Web Page Tamper-resistant Mechanism Based on File-filtering Driver and Event-triggering 基于文件过滤驱动和事件触发的网页防篡改机制
The system works with the79 contactless RFID electronic lock, which offers multiple locking options and is tamper-resistant. 系统可对79个免接触RFID电子锁起到控制作用,从而支持多种所选项也能防止被篡改。
Website tamper-resistant mechanism based on E-Key and Web page monitor 一种基于E-Key及Web页面监控的网站防篡改机制研究
This way is based on how to prevent the attacks to extract the secret information from smart card, tamper-resistant and/ or from symmetric key algorithms implemented in these Integrated Receiver Devices ( IRD). 这个问题关键在于如何防止从对称密钥算法中解析加密信息的攻击,而这些对称密钥算法通常在智能卡、存储器或集成接收设备(IntegratedReceiverDevices,IRD)七实现。
This architecture improved system performance greatly. At the same time being different from the existing Web page tamper-resistant products, the system put the backup server and publishing server in parallel configuration making backup server hidden in the site located within the network management staff. 同时区别于已有的网页防篡改产品,本系统将备份服务器与发布服务器并行配置,进一步提高了系统安全性能。
Today, with the popularity of software applications, tamper-resistant requirements have become increasingly important. 而如今,随着软件应用的迅速普及,软硬件防篡改的要求越加重要。
The simulation results show that: The above algorithm should be a good tamper-resistant capability, and can navigate to the text lines, or block of characters. 试验表明:上述算法都要很好防篡改能力,并能定位到文本行,或者字符块。
Lastly, in consideration of the shortcomings that the verifiable secret sharing schemes protect public parameters from being falsified, a novel verifiable dynamic secret sharing scheme with tamper-resistant public parameters is proposed. 最后,针对可验证动态秘密共享方案在防范公开参数篡改方面的不足,提出了一种可防公开参数被篡改的可验证动态秘密共享方案,该方案中,公开参数均能被参与者所验证。
Trusted computing is one of the hottest issues in information security field, providing security solution based on a small tamper-resistant hardware TPM. 可信计算是目前信息安全领域研究的热点问题之一,通过嵌入主板的小型防篡改硬件TPM,提供安全解决方案。