ID |
原文 |
译文 |
44296 |
并对不同批次、不同工艺参数条件下的封装样品进行电学测试表征、可靠性测试和失效样品分析。 |
The package samples with different batches and different process parameters were characterized by the electrical test, reliability test and failure sample analysis. |
44297 |
通过菊花链设计结构及超声波扫描显微镜 ( SAM) 等工具,对失效样品进行失效定位分析,并通过扫描电子显微镜 ( SEM) 和能量色散 X 射线光谱仪( EDX) 等失效分析工具进行失效分析。 |
Failure location analysis was carried out by the daisychain design structure and scanning acoustic microscope (SAM) , and the failure analysis was carried outby the scanning electron microscope (SEM) and energy dispersive X-ray spectrometer (EDX) and otherfailure analysis tools. |
44298 |
通过对不同批次的样品进行通断电测试、可靠性预处理、可靠性试验和失效分析,总结不同工艺方法对封装整体结构翘曲、芯片偏移、金属层分层等失效模式的影响。 |
Through the open / short test, reliability precondition, reliability test and failureanalysis of different batches of samples, the effects of different process methods on the failure modes ofthe package such as warpage, chip offset and metal layer delamination were summarized. |
44299 |
为晶圆扇出型封装的整体封装结构设计、工艺流程搭建、封装材料选择等工作提供了指导意见。 |
It provides aguidance for the package design, process development and material selection on wafer level fanout package |
44300 |
openstack 作为开源云平台的行业标准,其身份认证机制采用的是 keystone 组件提供的基于用户名/口令的单因素认证方式,不适用于对安全等级需求较高的应用场景。 |
As the industry standard for open source cloud platforms, openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism, while it is not suitable for application scenarios with high security level requirements. |
44301 |
因此,设计出一种基于数字证书的身份认证协议,该协议包括云用户身份标识协议和云用户身份鉴别协议,来满足高安全性应用场景的安全需求。 |
A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements. |
44302 |
通过对 keystone组件进行扩展实现了基于数字证书的身份认证系统,该系统综合运用了密码认证服务器、UKey、加密、完善的密钥管理等技术。 |
With expending the keystone component to achieve a digital certificate-based identity authentication system, a combination of authentication server, UKey technology, encryption technology and well-established key management and so on was used. |
44303 |
经分析,该系统能够有效抵抗多种网络攻击,提高了云用户在登录云平台时的安全性。 |
According to the research, the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform. |
44304 |
加掩是在加密算法的实现中使用随机掩码使敏感信息的泄露能耗随机化,从而防止差分能量攻击的技术手段。 |
Masking is a countermeasure against differential power analysis (DPA) attacks on cryptographic devices by using random masks to randomize the leaked power of sensitive information. |
44305 |
目前,对加掩防护加密算法的模板攻击的方法均要求攻击者在学习阶段了解使用的掩码。 |
Template attacks (TA) against cryptographic devices with masking countermeasure by far require attackers have knowledge of masks at the profiling phase. |