Examples of using Authenticating in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
RADIUS servers are responsible for receiving user connection requests, authenticating the user, and returning all configuration information necessary for the client to deliver service.
The cookies may transmit information via your browser with a purpose of authenticating or identifying the computer(via e.g. the IP address) or the user.
Artefacts sometimes spend years in transit or in hiding which contributes to the difficulty of tracking, authenticating and restituting them.
For most projects that is only an application key, but authenticating can be tricky when done manually.
A cookie may transmit information via Your browser with a purpose of authenticating or identifying the Device(via, e.g., the IP address) or the user.
Identifying and authenticating the devices connected to the network, especially for industrial consumers and business networks.
For the first time in my career at the Literary Detectives I actually missed authenticating Milton.
In the second century B.C., the Chinese emperor Ts'In She was already authenticating certain seals with a fingerprint.
It is responsible for negotiating the secure connection, authenticating the connecting party, and spawning the correct environment if the credentials are accepted.
The“Systems, Devices and Methods for In-Field Authenticating of Autonomous Robots” patent describes a process of authentication using data stored on a distributed ledger.
Face ID is faster, instantly authenticating without the need for explicit user action.
The original system was based on the establishment of 10 regional offices, which will serve as centres for receiving, evaluating, and authenticating diamonds produced in Liberia.
This is a simple method for authenticating standalone computers or any computers that are not using the Kerberos V5 authentication protocol.
More importantly, blockchain holds amazing potential for authenticating transitions without the need of a central authority.
The request authentication discussed in this section is based on AWS Signature Version 2, a protocol for authenticating inbound API requests to AWS services.
After installing this update, Windows no longer recognizes the Personal Information exchange(PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection.
Draft guidelines 2.2.1 and 2.2.2 dealt with reservations formulated when signing the treaty or when negotiating, adopting or authenticating the treaty.
Second, the experience or the knowledge imparted by it is felt to be self- authenticating, without need of further evidence or justification.
The Office for Judicial Affairs will be responsible for the organization and oversight of the judicial system, authenticating legal documentation and related activities.
Kerberos is the method, developed at the Massachusetts Institute of Technology, that Microsoft uses for authenticating requests for services.