版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、<p><b> 門禁管理系統(tǒng)原理</b></p><p> 門禁系統(tǒng)是最近幾年才在國(guó)內(nèi)廣泛應(yīng)用的又一高科技安全設(shè)施之一,現(xiàn)已成為現(xiàn)代建筑的智能化標(biāo)志之一。門禁,即出入口控制系統(tǒng),是對(duì)出入口通道進(jìn)行管制的系統(tǒng),門禁系統(tǒng)是在傳統(tǒng)的門鎖基礎(chǔ)上發(fā)展而來(lái)的(英文 Entrance Guard / Access Control)。</p><p> 在現(xiàn)實(shí)中訪問(wèn)
2、控制是,我們的日常生活中的現(xiàn)象。一車門上的鎖,本質(zhì)上是一種形式的訪問(wèn)控制。在一家銀行的ATM系統(tǒng)是一個(gè)PIN訪問(wèn)控制的另一種方式。站在一家夜總會(huì)門前的安保人員是缺乏涉及信息技術(shù),也許是更原始的訪問(wèn)控制模式。擁有訪問(wèn)控制是當(dāng)人尋求安全,機(jī)密或敏感的信息和設(shè)施時(shí)非常重要的.項(xiàng)目控制或電子鑰匙管理的區(qū)域內(nèi)(和有可能集成) ,一個(gè)訪問(wèn)控制系統(tǒng),它涉及到管理小資產(chǎn)或物理(機(jī)械)鍵的位置。一個(gè)人可以被允許物理訪問(wèn),根據(jù)支付,授權(quán)等。</p&g
3、t;<p> 有可能是單向交通的人,這些都可以執(zhí)行人員,如邊防衛(wèi)兵,一個(gè)看門人,檢票機(jī)等,或與設(shè)備??,如旋轉(zhuǎn)門。有可能會(huì)有圍欄,以避免規(guī)避此訪問(wèn)控制。在嚴(yán)格意義上的訪問(wèn)控制(實(shí)際控制訪問(wèn)本身)的另一種方法是一個(gè)系統(tǒng)的檢查授權(quán)的存在, 例如,車票控制器(運(yùn)輸)。一個(gè)變種是出口控制,例如的店(結(jié)帳)或一個(gè)國(guó)家。在物理安全方面上的訪問(wèn)控制是指屬性,建筑,或授權(quán)人一個(gè)房間,限制入口的做法。</p><p&g
4、t; 在這些環(huán)境中,物理密鑰管理還可以進(jìn)一步管理和監(jiān)控機(jī)械鍵區(qū)或某些小資產(chǎn)。 物理訪問(wèn)控制訪問(wèn)的一種手段,是誰(shuí),地點(diǎn)和時(shí)間的問(wèn)題。訪問(wèn)控制系統(tǒng)決定誰(shuí)可以進(jìn)入或退出,在那里他們被允許離開或進(jìn)入,而當(dāng)他們被允許進(jìn)入或退出。從歷史上看,這已經(jīng)部分實(shí)現(xiàn)通過(guò)鑰匙和鎖。當(dāng)門被鎖定只有有人用一把鑰匙可以通過(guò)門禁,這時(shí)取決于鎖定如何配置。機(jī)械鎖和鑰匙的鑰匙持有人在特定的時(shí)間或日期內(nèi)允許訪問(wèn)。機(jī)械鎖和鑰匙不提供任何特定的門上使用的密鑰記錄,可以很容易地
5、復(fù)制或轉(zhuǎn)移到未經(jīng)授權(quán)的人。當(dāng)機(jī)械鑰匙丟失或鑰匙持有人不再授權(quán)使用受保護(hù)的區(qū)域,鎖必須重新鍵入。電子訪問(wèn)控制使用計(jì)算機(jī)來(lái)解決機(jī)械鎖和鑰匙的限制</p><p> 廣泛的憑證可以用來(lái)取代傳統(tǒng)的機(jī)械按鍵。電子門禁系統(tǒng)授予訪問(wèn)權(quán)限是根據(jù)憑據(jù)基礎(chǔ)上提出的。授予訪問(wèn)權(quán)限時(shí),在一個(gè)預(yù)定的時(shí)間里門被解鎖,并記錄交易。當(dāng)訪問(wèn)被拒絕,門保持鎖定狀態(tài),并嘗試訪問(wèn)記錄。如果門被強(qiáng)行打開或被解鎖后保持打開時(shí)間過(guò)長(zhǎng),該系統(tǒng)還將監(jiān)控門和報(bào)警
6、。</p><p> 訪問(wèn)控制系統(tǒng)決定誰(shuí)可以進(jìn)入或退出,在那里他們被允許離開或進(jìn)入,而當(dāng)他們被允許進(jìn)入或退出。從歷史上看,這已經(jīng)部分實(shí)現(xiàn)通過(guò)鑰匙和鎖。當(dāng)門被鎖定只有有人用一把鑰匙可以通過(guò)門禁,這時(shí)取決于鎖定如何配置。機(jī)械鎖和鑰匙的鑰匙持有人在特定的時(shí)間或日期內(nèi)允許訪問(wèn)。機(jī)械鎖和鑰匙不提供任何特定的門上使用的密鑰記錄,可以很容易地復(fù)制或轉(zhuǎn)移到未經(jīng)授權(quán)的人。當(dāng)機(jī)械鑰匙丟失或鑰匙持有人不再授權(quán)使用受保護(hù)的區(qū)域,鎖必須
7、重新鍵入。電子訪問(wèn)控制使用計(jì)算機(jī)來(lái)解決機(jī)械鎖和鑰匙的限制。授予訪問(wèn)權(quán)限時(shí),在一個(gè)預(yù)定的時(shí)間里門被解鎖,并記錄交易。當(dāng)訪問(wèn)被拒絕,門保持鎖定狀態(tài),并嘗試訪問(wèn)記錄。如果門被強(qiáng)行打開或被解鎖后保持打開時(shí)間過(guò)長(zhǎng),該系統(tǒng)還將監(jiān)控門和報(bào)警。</p><p> 當(dāng)憑據(jù)提交到讀取器,讀取器發(fā)送的憑證的信息通常是一個(gè)數(shù)字,一個(gè)控制面板,一個(gè)高度可靠的處理器??刂泼姘灞容^憑證的號(hào)碼,訪問(wèn)控制列表,允許或拒絕所提出的請(qǐng)求,并發(fā)送到數(shù)
8、據(jù)庫(kù)的事務(wù)日志。當(dāng)訪問(wèn)被拒絕的訪問(wèn)控制列表的基礎(chǔ)上,門保持鎖定狀態(tài)。 如果有一個(gè)認(rèn)證和訪問(wèn)控制之間的匹配列表,控制面板操作的繼電器,反過(guò)來(lái)門解鎖??刂泼姘暹€忽略了一個(gè)開門信號(hào),以防止報(bào)警。通常情況下,閱讀器提供反饋,比如一個(gè)閃爍的紅色LED的訪問(wèn)被拒絕和授予訪問(wèn)權(quán)限的LED指示燈呈綠色閃爍。憑證可以傳來(lái)傳去,從而顛覆訪問(wèn)控制列表。例如,Alice擁有訪問(wèn)權(quán)限的服務(wù)器機(jī)房,但鮑勃沒(méi)有。愛麗絲,要么給出一個(gè)鮑勃她的憑據(jù)或Bob需要; 他現(xiàn)在
9、已經(jīng)進(jìn)入機(jī)房的服務(wù)器。為了防止這種情況,兩個(gè)因素交易被使用。在兩個(gè)因素的交易,憑證和第二個(gè)因素是必要的授予訪問(wèn)權(quán)限; 另一個(gè)因素可以是一個(gè)PIN ,一個(gè)第二的憑證,操作員的干預(yù),或生物統(tǒng)計(jì)輸入。</p><p> 有三種類型的認(rèn)證信息(因素) :</p><p> 用戶知道的東西,EGA密碼,密碼短語(yǔ)或PIN</p><p> 用戶的東西,如智能卡</
10、p><p> 用戶的東西,如指紋識(shí)別,生物特征測(cè)量驗(yàn)證</p><p> 密碼是驗(yàn)證用戶的身份訪問(wèn)之前,是考慮到信息系統(tǒng)的常用手段。此外,第四個(gè)因素認(rèn)證是目前公認(rèn)的:你認(rèn)識(shí)的人,其他人誰(shuí)知道的情況下,系統(tǒng)已設(shè)置為允許這樣的情況下,你可以提供一個(gè)人的因素身份驗(yàn)證。例如,一個(gè)用戶可能有自己的密碼,但忘記了自己的智能卡。在這樣的場(chǎng)景中,如果用戶是已知道指定的隊(duì)列,隊(duì)列可以提供他們的智能卡和密碼的
11、組合,與現(xiàn)存的因素,有問(wèn)題的用戶從而為用戶提供兩個(gè)因素缺少憑據(jù),和三個(gè)因素整體以允許訪問(wèn)?,F(xiàn)在,隨著人們生活水平的提高和技術(shù)的進(jìn)步,越來(lái)越多的本地需求,如小區(qū)出入口,車庫(kù)入口,和其他公共場(chǎng)所的門禁控制系統(tǒng)需求越來(lái)越大。許多不同類型的門禁控制系統(tǒng),因?yàn)樗胁煌奶攸c(diǎn),所以不使用的地方,由于其較高的安全性,更好的便利性和成本效益的訪問(wèn)控制系統(tǒng), IC卡門禁系統(tǒng)成為主流。IC卡技術(shù),目前被廣泛應(yīng)用在各個(gè)行業(yè),特別是公共交通,無(wú)線通信,識(shí)別,金
12、融交易安全和國(guó)防等行業(yè)。訪問(wèn)控制系統(tǒng)通過(guò)進(jìn)口和出口管制,限制人員和車輛進(jìn)入控制區(qū),以確保控制區(qū)域的安全。CCESS數(shù)據(jù)庫(kù)軟件用于實(shí)現(xiàn)對(duì)軟件系統(tǒng)數(shù)據(jù)庫(kù)的服務(wù); 門禁控制系統(tǒng)軟件易于使用,簡(jiǎn)單的特點(diǎn),運(yùn)營(yíng)商并不需要一個(gè)專業(yè)的電腦操作水平。本研究</p><p><b> 憑據(jù)</b></p><p> 憑據(jù)是一個(gè)物理/有形物體,一塊知識(shí),或一個(gè)人的身體的存在,給定物
13、理設(shè)備或計(jì)算機(jī)為基礎(chǔ)的信息系統(tǒng),或單個(gè)接入的一個(gè)方面。通常情況下,憑證可以是你知道的東西(如號(hào)碼或PIN ) ,你所擁有的(如接入徽章) ,你的東西(如生物特征)或一些組合這些項(xiàng)目。典型的憑據(jù)是門禁卡,鑰匙鏈,或其他關(guān)鍵物品。有許多卡磁條,條形碼,韋根, 125 kHz感應(yīng)技術(shù),包括26位刷卡,接觸式智能卡,非接觸式智能卡技術(shù)。此外,還包括密鑰鑰匙環(huán),這是比身份證更緊湊和重視的關(guān)鍵一環(huán)。典型的生物識(shí)別技術(shù),包括指紋識(shí)別,面部識(shí)別,虹膜識(shí)
14、別,視網(wǎng)膜掃描,聲音和手形。</p><p><b> 門禁控制系統(tǒng)的組成</b></p><p> 訪問(wèn)控制點(diǎn),它可以是一門,旋轉(zhuǎn)門,停車場(chǎng)門,電梯,或其他物理障礙,授予訪問(wèn)可以通過(guò)電子控制。通常情況下,無(wú)線接入點(diǎn)是一門。電子訪問(wèn)控制門可以包含多個(gè)元素。在其最基本的是一個(gè)獨(dú)立的電子鎖。由操作者用一個(gè)開關(guān)就鎖被解鎖。自動(dòng)化,操作員的干預(yù)被讀者所取代。閱讀器可以是一
15、個(gè)鍵盤輸入代碼,它可能是一個(gè)讀卡器,或者它可能是一個(gè)生物體的讀者。讀者不能決定訪問(wèn),但卡號(hào)發(fā)送到門禁管理面板 ,門禁管理面板擁有驗(yàn)證號(hào)碼與一個(gè)訪問(wèn)列表。若要監(jiān)視門開關(guān)的位置,使用磁性門開關(guān)。在概念上與冰箱開關(guān)門或汽車門是沒(méi)有什么不同的。一般只有進(jìn)入是被控制的但退出是不受控制的。在出口是受控制的情況下,第二讀取器用于開關(guān)門側(cè)位上的。退出在沒(méi)有控制的情況下,自由退出,設(shè)備稱為請(qǐng)求退出(RTE) 。請(qǐng)求到出口裝置的可以是一個(gè)按鈕,或一個(gè)運(yùn)動(dòng)檢
16、測(cè)器。在門口當(dāng)按鈕被按下或運(yùn)動(dòng)檢測(cè)器檢測(cè)到運(yùn)動(dòng),門被打開時(shí),暫時(shí)忽略門報(bào)警 。而退出無(wú)需電打開門一門被稱為機(jī)械的自由出口。這是一個(gè)重要的安全功能。電鎖必須在退出解鎖的情況下,要求對(duì)出口裝置也打開門。</p><p> 門禁管理系統(tǒng)的拓?fù)浣Y(jié)構(gòu)</p><p> 訪問(wèn)控制決策是由門禁控制列表的憑據(jù)組成。此表可以是由一讀者,主機(jī)或服務(wù)器,訪問(wèn)和控制面板來(lái)完成。門禁管理系統(tǒng)的發(fā)展,已經(jīng)推動(dòng)了從
17、中央主機(jī)系統(tǒng)的邊緣查找,或讀的發(fā)展。大約2009是占主導(dǎo)地位的拓?fù)錁屑~和輻射帶控制面板的輻條的輪轂和讀者。查找和控制功能是通過(guò)控制面板上。查找和控制功能是通過(guò)控制面板來(lái)完成的。輻條通過(guò)串行連接,通常是RS485通訊。一些制造商通過(guò)在門口放置一個(gè)控制器來(lái)推動(dòng)決策。該控制器支持IP,能連接到主機(jī),并使用標(biāo)準(zhǔn)的網(wǎng)絡(luò)數(shù)據(jù)庫(kù)。</p><p><b> 讀者類型</b></p><
18、;p> 門禁管理讀者由他們能夠執(zhí)行的功能來(lái)被分類:</p><p> 基本(非智能)讀者:簡(jiǎn)單地讀取卡號(hào)或密碼,并將它轉(zhuǎn)發(fā)到控制面板。</p><p> 在生物特征識(shí)別的情況下,這樣的讀者輸出用戶的ID號(hào)碼。韋根協(xié)議通常用于將數(shù)據(jù)傳送到控制面板,但其他選項(xiàng),如RS- 232,RS- 485和時(shí)鐘/數(shù)據(jù)的情況并不少見。這是最流行類型的訪問(wèn)控制讀者。這樣的讀者的例子是RF微型RFL
19、OGICS ,PROX點(diǎn)HID ,P300遠(yuǎn)東足尖數(shù)據(jù)。</p><p> 半智能的讀者:半聰明的讀者:有必要控制所有輸入和輸出控制門的硬</p><p> 件(鎖,門接觸,退出按鈕),但不作任何訪問(wèn)的決定。當(dāng)用戶提供一個(gè)卡或輸入PIN ,讀取器的信息發(fā)送到主控制器,并等待其響應(yīng)。如果訪問(wèn)到主控制器的鏈接中斷,這樣的讀者在這樣降級(jí)模式的情況下停止工作或功能。通常,半聰明的讀者通過(guò)RS-
20、485總線連接到控制面板。這樣的讀者的例子是: InfoProx的精簡(jiǎn)版IPL200的CEM系統(tǒng)和AP- 510。 </p><p> 智能的讀者:控制所有必要的輸入和輸出控制門的硬件,他們也有獨(dú)立</p><p> 進(jìn)行訪問(wèn)決策所需的內(nèi)存和處理能力。同半聰明的讀者比,他們通過(guò)RS-485總線連接到控制面板??刂泼姘灏l(fā)送配置更新和檢索事件的讀者。這樣的讀者可以是InfoProx IPO
21、200 CEM系統(tǒng)和AP-500。也有聰明的讀者稱為“IP讀者”的新一代。系統(tǒng)的IP讀者通常不具備傳統(tǒng)的控制面板,讀者直接與作為主機(jī)PC的溝通。這樣的讀者的例子是 通過(guò)Isonas安全系統(tǒng)的 PowerNet的IP讀卡器, ID08索盧斯,有內(nèi)置的web服務(wù),它的用戶界面友 好, 邊緣ER40讀者HID Global的通過(guò)ASPiSYS的 LogLock UNiLOCK有限公司, Suprema 公司的 BioEntry
22、Plus讀卡器。有些讀者可能有額外的特征,如能數(shù)據(jù)收集(即打卡事件的考勤報(bào)表)的液晶顯示屏和功能鍵,攝像頭/喇叭/麥克風(fēng),對(duì)講,智能卡讀/寫支持。</p><p> 門禁讀卡器也可以通過(guò)識(shí)別技術(shù)的不同來(lái)類型。</p><p><b> 基于屬性的訪問(wèn)控制</b></p><p> 在基于屬性的訪問(wèn)控制(ABAC) ,不是基于主體與用戶身份
23、驗(yàn)證,而是根據(jù)用戶的屬性。一個(gè)基于屬性的訪問(wèn)控制策略,必須滿足授予訪問(wèn)權(quán)限的對(duì)象。例如,要求可能是“ 18歲以上” 。任何用戶都可以證明這種說(shuō)法被授予訪問(wèn)權(quán)限。用戶可以用匿名身份驗(yàn)證和識(shí)別,對(duì)此并沒(méi)有嚴(yán)格要求。例如,這可以使用匿名憑據(jù)或XACML(可擴(kuò)展訪問(wèn)控制標(biāo)記語(yǔ)言)來(lái)實(shí)現(xiàn)。</p><p> The Access control system</p><p> Access
24、 control system is widely used in recent years and it is one of the high-tech and safety equipment , has become one of the intelligent signs of modern architecture. Access control , the export and the entrance control s
25、ystem, is to control the export and entrance channel system. Access control system is developed on the basis of the traditional locks (Entrance Guard/Access Control in English).</p><p> Access control is, i
26、n reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. Bouncers standing
27、in front of a night club is perhaps a more primitive mode of access control (given the evident lack of information technology involved). The possession of access control is of prime importance when pe
28、rsons seek to secure important, confidential, or sensitive information and equipment .Item cont</p><p> Physical access by a person may be allowed depending on payment, authorization, etc. Also there m
29、ay be one-way traffic of people. These can be enforced by personnel such as a border guard, a doorman, a ticket checker, etc., or with a device such as a turnstile. There may be fences&
30、#160;to avoid circumventing this access control. An alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transp
31、ort</p><p> Within these environments , physical key management may also be employed as a means of further managing and monitoring access to mechanically keyed areas or access to certain small assets .
32、 Physical access control is a matter of who , where, and when. An access control system determines who is allowed to enter or exit, where they are allowed to exit or enter, and when they are allowed to enter or exit. Hi
33、storically this was partially accomplished through keys and locks. When a door is locked on</p><p> When a credential is presented to a reader, the reader sends the credential’s information, usually a numbe
34、r, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. Whe
35、n access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a</p><p> There are three typ
36、es (factors) of authenticating information :</p><p> something the user knows, ega password, pass-phrase or PIN</p><p> something the user has, such as smart card</p><p> somethi
37、ng the user is, such as fingerprint, verified by biometric </p><p> measurement.</p><p> Passwords are a common means of verifying a user's identity before access is given to information s
38、ystems. In addition, a fourth factor of authentication is now recognized: someone you know, where another person who knows you can provide a human element of authentication in situations where systems have been set up to
39、 allow for such scenarios. For example, a user may have their password, but have forgotten their smart card. In such a scenario, if the user is known to designated cohorts, the coho</p><p> need a professio
40、nal computer operating level.</p><p> Credential</p><p> A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individu
41、al access to a given physical facility or computer-based information system. Typically, credentials can be something you know (such as number or PIN), something you have (such as an access badge), something you are
42、(such as a biometric feature) or some combination of these items. The typical credential is an access card, key fob, or other key. There are many card tec</p><p> Access control system components</p>
43、<p> An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier where granting access can be electronically controlled. Typically the access point is a door. An
44、 electronic access control door can contain several elements. At its most basic there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced
45、 by a reader. The reader could be a keypad where a code is entered, it could </p><p> Access control topology</p><p> Access control decisions are made by comparing the credential to an access
46、 control list. This lookup can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the lookup out from a central host to the edge o
47、f the system, or the reader. The predominate topology circa 2009 is hub and spoke with a control panel as the hub and the readers as the spokes. The lookup and control functions are by the control panel. Th</p>&l
48、t;p> Types of readers</p><p> Access control readers may be classified by functions they are able to perform:</p><p> Basic (non-intelligent) readers: simply read card number or PIN and fo
49、rward </p><p> it to a control panel. In case of biometric identification, such readers output ID number of a user. Typically Wiegand protocol is used for transmitting data to the control panel,
50、but other options such as RS-232, RS-485 and Clock/Data are not uncommon. This is the most popular type of access control readers. Examples of such readers are RF Tiny by RFLOGICS, Prox Point by HID, and P300 by Far poin
51、te Data.</p><p> Semi-intelligent readers: have all inputs and outputs necessary to </p><p> control door hardware (lock, door contact, exit button), but do not make any access decisions. When
52、 a user presents a card or enters PIN, the reader sends information to the main controller and waits for its response. If the connection to the main controller is interrupted, such readers stop working or function in a d
53、egraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus. Examples of such readers are InfoProx Lite IPL200 by CEM Systems and AP-510 by Apo</p><p> Intell
54、igent readers: have all inputs and outputs necessary to control door </p><p> hardware, they also have memory and processing power necessary to make access decisions independently. Same as semi-intelligent
55、readers they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates and retrieves events from the readers. Examples of such readers could be InfoProx IPO200 by CEM Systems and A
56、P-500 by Apollo. There is also a new generation of intelligent readers referred to as "IP readers". Systems with IP readers usually do not have traditio</p><p> Some readers may have additional fe
57、atures such as LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support.</p><p>
58、; Access control readers may also be classified by the type of identification technology.</p><p> Attribute-based access control</p><p> In attribute-based access control (ABAC), access
59、is granted not based on the rights of the subject associated with a user after authentication, but based on attributes of the user. The user has to prove so called claims about his attributes to the access control engine
60、. An attribute-based access control policy specifies which claims need to be satisfied in order to grant access to an object. For instance the claim could be "older than 18" . Any user that can prove this claim
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 半導(dǎo)體電子制冷系統(tǒng)的設(shè)計(jì)外文資料翻譯含原文
- 教務(wù)管理系統(tǒng)畢業(yè)設(shè)計(jì)(含外文翻譯)
- 教務(wù)管理系統(tǒng)畢業(yè)設(shè)計(jì)(含外文翻譯)
- 外文原文 外文翻譯.doc
- 門禁管理系統(tǒng)
- 外文原文 外文翻譯.doc
- 外文翻譯(原文+翻譯).docx
- 外文原文 外文翻譯.doc
- 外文原文 外文翻譯.doc
- 網(wǎng)上花店管理系統(tǒng)畢業(yè)論文(含外文翻譯)
- asp外文翻譯+原文
- 外文翻譯原文.pdf
- 外文翻譯原文.doc
- 外文翻譯原文.pdf
- 外文翻譯原文.pdf
- 外文翻譯原文.pdf
- 外文翻譯原文.pdf
- 外文翻譯原文.pdf
- 外文翻譯原文.pdf
- 外文翻譯原文.pdf
評(píng)論
0/150
提交評(píng)論