Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
The third field is the user identifier, the number that the operating system uses for internal purposes.
The user identifier has become a necessary component of Unix file systems and processes.
In Unix systems, the username is correlated with a user identifier or user id.
In this example, a user identifier (userid) is the key for the associated user information object.
This involves the storage of terminal identifiers, network user identifiers, addresses and passwords.
For example, a type modelling user identifiers for a log-in management system might be defined as follows:
User identifier (Unix)
In particular, identicons are now being used as default visual user identifiers (avatars) for several widely used systems.
ORCID launched its registry services and started issuing user identifiers from 16 October 2012.
Sets the user identifier, uid, and group identifier, gid, for all files on the filesystem.
It's as easy to steal a network user identifier as it is to steal a telephone credit card number-just watch over someone's shoulder as she makes a call.
Still, she could see the basic elements in a patent that Lucent Technologies filed just a few months before Amazon, describing "user identifiers" sent back and forth on a network.
Typically, the user is required to provide a non-confidential user identifier or token (the user ID) and a confidential PIN to gain access to the system.
For example a requirement that user identifiers must be no greater than 9999 would be expressed as follows (where is the "less than or equal to" Boolean operator on natural numbers):
Unix-like operating systems identify users within the kernel by an unsigned integer value called a user identifier, often abbreviated to UID or User ID.
As you know, a Network User Identifier (NUI) is required for access to both the Classified and Unclassified SDINET.
NAIs are commonly found as user identifiers in the RADIUS and Diameter network access protocols and the EAP authentication protocol.
Having a low Slashdot user identifier (user ID) is highly valued since they are assigned sequentially; having one is a sign that someone has an older account and has contributed to the site longer.
Process identification data always include a unique identifier for the process (almost invariably an integer number) and, in a multiuser-multitasking system, data like the identifier of the parent process, user identifier, user group identifier, etc.
Multiple user identifiers - Employees can be recorded in an ECRS so that they may have an unlimited number of identifiers that are used with third-party systems to associate them with transactions and/or types of transactions.
In order to ensure at least k keys must be compromised before every shared key can be computed by an attacker, identifiers must be k-linearly independent: all sets of k randomly selected user identifiers must be linearly independent.
In POSIX-compliant environments the command-line command Id gives the user's user identifier number as well as more information on the user account like the user name, primary user group and group identifier (GID).
XCAP User Identifier: The XUI is a string, valid as a path element in an HTTP URI, that is associated with each user served by the XCAP server.