| 1. | Verify a sound , robust key recovery policy 验证一个良好的、健壮的密钥恢复策略: |
| 2. | Paper on the risks of key recovery , escrow , etc 有关密钥恢复、契约等风险的文章。 |
| 3. | Key about control movement keys gold mining release paw , paw on the key recovery 左右键控制移动,下键释放爪子采金矿,上键收回爪子。 |
| 4. | Key pair in asymmetric cryptography , the public and private keys together . key recovery 在非对称密码术中,公钥和私钥组合在一起成为密钥对。 |
| 5. | Introduction : key about control movement keys gold mining release paw , paw on the key recovery 左右键控制移动,下键释放爪子采金矿,上键收回爪子。 |
| 6. | Kmc management control desk is responsible for the checkup of key recovery , the checkup of key destruct and the checkup of key trusteeship Kmc管理控制台负责密钥恢复审核、密钥销毁审核、密钥托管审核。 |
| 7. | It is used for the management of the key recovery . kmc control desk can be divided into two parts , that is , kmc management control desk and judicial key recovery Kmc控制台是kmc的一部分,用于密钥恢复的管理, kmc控制台分为kmc管理控制台和司法密钥恢复两部分。 |
| 8. | The extended trusted computing and forensic services are used in collecting and analysis activity , including forensic sealing , forensic authentication , key recovery and distributed forensic services 利用可信计算取证服务和改进的分析流程能够有效解决可信计算环境中的数字取证调查问题。 |
| 9. | Make sure that the xkms service provider has a sound and robust key recovery policy as it has a direct impact on signed document repudiation and encrypted document authenticity 确保xkms服务提供程序具有一个良好的、健壮的密钥恢复策略,因为这直接影响着签名文档的否认和加密文档的可靠性。 |
| 10. | After ra operator receives the recovery request , he is able to see it through the kmc control desk . kmc operator should startup the kmc control desk regularly and browse the requests for the key recovery , and determine whether approve them or not Ra操作员录入用户的证书恢复请求后, kmc操作员就可以在kmc控制台看到。 kmc操作员应当定期启动kmc控制台,浏览密钥恢复申请,决定批准还是拒绝用户的证书恢复申请。 |