CN104202421A - Cloud computing based password service system - Google Patents
Cloud computing based password service system Download PDFInfo
- Publication number
- CN104202421A CN104202421A CN201410480227.0A CN201410480227A CN104202421A CN 104202421 A CN104202421 A CN 104202421A CN 201410480227 A CN201410480227 A CN 201410480227A CN 104202421 A CN104202421 A CN 104202421A
- Authority
- CN
- China
- Prior art keywords
- module
- cryptographic
- interface
- layer
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a cloud computing based password service system comprising a physical layer, a computing resource layer, a service layer and an application layer. The physical layer is used for describing its hardware architecture and functions of its parts. The computing resource layer is used for describing its modules and functions of the modules. The service layer is used for describing password operation software and a password computing application interface. The application layer is used for describing various password services provided. Compared with the prior art, the system has the advantages that the techniques such as the cryptographic techniques, the Hadoop technology and the parallel computing technology are adopted, password services such as file encryption, data encryption, key management and identity authentication are provided, safeguarding efficiency can be significantly improved, data processing speed, encryption speed and decryption speed are higher, and data security is effectively protected for cloud computing.
Description
Technical field
The present invention relates to cloud computing technology field, specifically a kind of practical, cryptographic service system based on cloud computing.
Background technology
Cloud computing is increase, use and the delivery mode of the related service based on the Internet, it is a kind of pattern of paying by use amount, this pattern provides access to netwoks available, easily, as required, and (resource comprises network, server to enter configurable computing resource sharing pond, storage, application software, service), these resources can be supplied by Quick, only need to drop into management work seldom, or carry out seldom mutual with service supplier.
Due to the dependence of the data under cloud computing environment to network and server, problem of data safety is more outstanding than net environment.User exists and queries the fail safe of cloud computing and privacy confidentiality, and what cause that data cannot safety transfers in cloud computing environment.Based on this, a kind of cryptographic service system based on cloud computing is now provided, this system is used after cryptographic technique in cloud computing, the encryption of data is no longer only relied on to the hardware devices such as encrypted card in local PC, key, but rely on huge network service, carry out in real time data acquisition, analysis and processing.Greatly improved the operating efficiency of security protection, made data processing, encryption and decryption quicker.
Summary of the invention
Technical assignment of the present invention is for above weak point, and a kind of practical, cryptographic service system based on cloud computing is provided.
A cryptographic service system based on cloud computing, this cloud computing cryptographic service system comprises physical layer, computational resource layer, service layer and application layer, wherein:
Physical layer: comprise some servers, equal deployment operation system, memory module, crypto module, the network equipment in each server; Server in this physical layer is the Infrastructure platform of cloud computing, for upper strata provides crypto-operation, data storage resource, disposes or move the software of oneself for user, and the software here comprises operating system or application;
Computational resource layer: computational resource layer comprises cryptographic algorithm module, key management module, data backup module, scheduling of resource module and monitoring module, these module compositions a computing pool;
Service layer: comprise cryptographic calculations application interface and crypto-operation software; The cryptographic calculations application interface of described service layer comprises file encryption-decryption interface, data encrypting and deciphering interface, cipher key management interface, authentication interface and data backup interface; Crypto-operation software adopts Hadoop distributed computing architecture to realize large-scale distributed data set is processed;
Application layer: comprise various cipher application software, file encryption, data encryption, key management, authentication, data backup cryptographic service are provided; The cryptographic calculations application interface of each software corresponding with service layer.
Described computational resource layer is used many tenants model, according to user, needs, and different physics and virtual resource are dynamically distributed to a plurality of users' uses.
In described physical layer, the operating system of installing in server is Windows, Unix or linux system;
Cryptographic hardware module is the high speed password card with PCI-E interface, is connected to the PCI-E slot of server by PCI-E interface, realizes partial password algorithm, and this high speed password card blocks concurrent working more;
Memory module is the hard disk of SATA interface, for storing user's identity information, key, password, encrypted message;
The network equipment comprises router and switch, and the infrastructure component of physical layer and the integral frame of cloud computing link together by network, provide service by network to user simultaneously.
Partial password algorithm in described cryptographic hardware module is symmetry algorithm SM1, elliptic curve cryptography SM2 or physics real random number generator.
In described computational resource layer, cryptographic algorithm module provides following cryptographic algorithm:
SM1 symmetric cryptographic algorithm module: by integrated SM1 hardware algorithm module, the server of above-mentioned PCI-E cipher card provides;
SM2 public key algorithm module: by integrated SM2 hardware algorithm module, the server of above-mentioned PCI-E cipher card provides;
SM3 cryptographic Hash algoritic module: adopt software programming to realize on server;
SM4 symmetric cryptographic algorithm module: adopt software programming to realize on server;
Real random number generator module: by integrated physics noise source module, the server of above-mentioned PCI-E cipher card provides; True random number is as the key in crypto-operation process, intermediate operations vector parameter;
Above-mentioned any one cryptographic algorithm, is provided by one or more server, or concurrent execution on a station server, and the cryptographic calculations application interface of service layer, parallel computation service interface, Distributed Calculation interface concurrent call various cryptographic algorithms;
Key management module is used for user's key information distribute and manage, and backs up; Only have the user by upper strata authentication just can call key management module;
Data backup module is for backing up, and recover data timely user's key, personal information data;
Monitoring module is responsible for the important information of supervisory user, and key data is limited in server and is used.
In described service layer, the detailed process that crypto-operation software adopts the realization of Hadoop distributed computing architecture to process large-scale distributed data set is:
First, build Hadoop cluster, Hadoop operates on the interconnected server cluster of physical layer network, according to the framework of Hadoop, writes and move Distributed Application, and data Storage and Processing is all carried out on this cluster; User submits to the calculation task of data encrypting and deciphering to Hadoop cluster from client independently;
Secondly, set up after Hadoop cluster, configured HDFS file system, under Hadoop framework, call parallel computation interface and Distributed Calculation interface carries out parallel computation and distributed treatment to large data; Large data sets is stored as Single document in HDFS, is segmented physically and is stored in many back end parallel processing on these nodes.
Application layer user uses client device, the cipher application that visits service layer by customer interface, application software meets the demand of oneself, the cipher application here comprises file encryption, data encryption, key management, authentication, data backup, and user does not manage or control the cloud infrastructure of physical layer; The key that user inserts USB interface in local side computer carries out the authentication of identity; User configures computing capability when needed automatically, and the computing capability here comprises response time, the network storage of server.
A kind of cryptographic service system based on cloud computing of the present invention, has the following advantages:
A kind of cryptographic service system based on cloud computing of this invention, take cloud computing as Infrastructure platform, adopt cryptographic technique, Hadoop technology, parallel computing etc., the cryptographic service such as file encryption, data encryption, key management and authentication are provided, can significantly improve the operating efficiency of security protection, make data processing, encryption and decryption quicker, effectively protect the data security of cloud computing; Practical, applied widely, fail safe is good, is easy to promote.
Accompanying drawing explanation
Accompanying drawing 1 is structural representation of the present invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, the invention will be further described.
The invention provides a kind of cryptographic service system based on cloud computing; on cloud computing Infrastructure platform, realize the cryptographic service such as file encryption, data encryption, key management and authentication; efficient data protection measure is provided, effectively protects the data security of cloud computing.Based on above-mentioned thinking, as shown in Figure 1, this cloud computing cryptographic service system comprises physical layer, computational resource layer, service layer and application layer, wherein:
Physical layer: the function of having described hardware structure and the each several part of physical layer.
Computational resource layer: described the modules and the function that form computational resource layer.
Service layer: described crypto-operation software and cryptographic calculations application interface.
Application layer: the various cryptographic service that provide have been provided.
Further, above-mentioned four structure sheaf concrete structures are:
Physical layer: physical layer comprises a plurality of servers, has disposed the resources such as operating system, memory module, crypto module, the network equipment in each server.Server is the Infrastructure platform of cloud computing, and the computational resources such as crypto-operation, data storage are provided for upper strata, and the software of disposing or move oneself for user, comprises operating system or application.
Computational resource layer: computational resource layer is used many tenants model, needs according to user, and different physics and virtual resource are dynamically distributed to a plurality of users' uses.Computational resource layer comprises each cryptographic algorithm module, key management module, data backup module, scheduling of resource module and monitoring module etc.These module compositions a computing pool.
Service layer: comprise cryptographic calculations application interface and crypto-operation software.Cryptographic calculations application interface comprises file encryption-decryption interface, data encrypting and deciphering interface, cipher key management interface, authentication interface and data backup interface.Crypto-operation software adopts Hadoop distributed computing architecture to realize large-scale distributed data set is processed.
Application layer: comprise various cipher application software, the cryptographic service such as file encryption, data encryption, key management, authentication, data backup are provided.The cryptographic calculations application interface of each software corresponding with service layer.
Below in conjunction with 1 pair of every one deck of the present invention of accompanying drawing, do further and describe in detail.
1, physical layer.
Operating system: comprise the main flow system platforms such as Windows, Unix, Linux.
Cryptographic hardware module: cryptographic hardware module is the high speed password card of PCI-E interface, by PCI-E interface, be connected to the PCI-E slot of server, effect is to realize partial password algorithm, as symmetry algorithm SM1, elliptic curve cryptography SM2, physics real random number generator etc.In order to improve the performance of crypto-operation, adopt the parallel working method of many cards.
Memory module: memory module is the hard disk of SATA interface, for storing user's the important information such as identity information, key, password, password.
The network equipment: the network equipment comprises router and switch, the infrastructure component of physical layer and the integral frame of cloud computing are linked together by network, provide service by network to user simultaneously.User can be by different terminal equipments, and the application by standard realizes the access to network.
2, computational resource layer:
Cryptographic algorithm module: following cryptographic algorithm is provided.
SM1 symmetric cryptographic algorithm module: the server by integrated SM1 hardware algorithm module (PCI-E cipher card) provides;
SM2 public key algorithm module: the server by integrated SM2 hardware algorithm module (PCI-E cipher card) provides;
SM3 cryptographic Hash algoritic module: adopt software programming to realize on server;
SM4 symmetric cryptographic algorithm module: adopt software programming to realize on server;
Real random number generator module: the server by integrated physics noise source module (PCI-E cipher card) provides; True random number can be used as the parameters such as key in crypto-operation process, intermediate operations vector.
For above-mentioned a kind of specific cryptographic algorithm, can be provided by one or more server, also can concurrent execution on a station server, the cryptographic calculations application interface of service layer, parallel computation service interface, Distributed Calculation interface etc. can walk abreast calls various cryptographic algorithms.
Key management module is used for user's the key messages such as key distribute and manage, and backs up.Only have the user by upper strata authentication just can call key management module.
Data backup module, for the significant datas such as user's key, personal information are backed up, prevents user misoperation, mistake deletion.And can recover timely data.
Monitoring module is responsible for the important information of supervisory user and is not revealed, and wherein the important data such as key only limit to use in server, can not export to user side, can be encrypted use to key data if desired again.
3, service layer is for the different cipher application software of application layer, and crypto-operation software adopts Hadoop distributed computing architecture to realize large-scale distributed data set is processed.
First, built Hadoop cluster.Hadoop operates on the interconnected server cluster of physical layer network, according to the framework of Hadoop, writes and move Distributed Application, and data Storage and Processing is all carried out on this cluster.User submits to the calculation tasks such as data encrypting and deciphering to Hadoop cluster from client independently.
Secondly, set up after Hadoop cluster, configured HDFS file system, under Hadoop framework, call parallel computation interface and Distributed Calculation interface carries out parallel computation and distributed treatment to large data.Large data sets is in HDFS(Hadoop distributed file system) in be stored as Single document, be segmented physically and be stored in many back end, and can parallel processing on these nodes.
Parallel computation service interface is used multiple computational resource to solve various cryptographic algorithms simultaneously.By carry out the same cryptographic algorithm of Cooperative Solving with a plurality of processors, can significantly promote crypto-operation speed and disposal ability.This parallel computation service interface both can call the encryption and decryption that the server that contains a plurality of processors completes data, also can call some station servers of interconnection, completed the encryption and decryption of data by parallel computing trunking.
4, application layer: use various client devices application layer user, the cipher application that visits service layer by customer interface, application software etc. meets the demand of oneself, comprise file encryption, data encryption, key management, authentication, data backup etc., user does not manage or controls the cloud infrastructure of physical layer.A large amount of users can be concurrent, parallel execution Password Operations.The key that wherein user inserts USB interface in local side PC carries out the authentication of identity.User can configure computing capability when needed automatically, such as response time of server, network storage etc., and without mutual with service supplier's attendant.
Above-mentioned embodiment is only concrete case of the present invention; scope of patent protection of the present invention includes but not limited to above-mentioned embodiment; suitable variation or replacement that person of an ordinary skill in the technical field claims of any a kind of cryptographic service system based on cloud computing according to the invention and any does it, all should fall into scope of patent protection of the present invention.
Claims (7)
1. the cryptographic service system based on cloud computing, is characterized in that: this cloud computing cryptographic service system comprises physical layer, computational resource layer, service layer and application layer, wherein:
Physical layer: comprise some servers, equal deployment operation system, memory module, crypto module, the network equipment in each server; Server in this physical layer is the Infrastructure platform of cloud computing, for upper strata provides crypto-operation, data storage resource, disposes or move the software of oneself for user, and the software here comprises operating system or application;
Computational resource layer: computational resource layer comprises cryptographic algorithm module, key management module, data backup module, scheduling of resource module and monitoring module, these module compositions a computing pool;
Service layer: comprise cryptographic calculations application interface and crypto-operation software; The cryptographic calculations application interface of described service layer comprises file encryption-decryption interface, data encrypting and deciphering interface, cipher key management interface, authentication interface and data backup interface; Crypto-operation software adopts Hadoop distributed computing architecture to realize large-scale distributed data set is processed;
Application layer: comprise various cipher application software, file encryption, data encryption, key management, authentication, data backup cryptographic service are provided; The cryptographic calculations application interface of each software corresponding with service layer.
2. a kind of cryptographic service system based on cloud computing according to claim 1, is characterized in that: described computational resource layer is used many tenants model, according to user, needs, and different physics and virtual resource are dynamically distributed to a plurality of users' uses.
3. a kind of cryptographic service system based on cloud computing according to claim 1 and 2, is characterized in that: in described physical layer, the operating system of installing in server is Windows, Unix or linux system;
Cryptographic hardware module is the high speed password card with PCI-E interface, is connected to the PCI-E slot of server by PCI-E interface, realizes partial password algorithm, and this high speed password card blocks concurrent working more;
Memory module is the hard disk of SATA interface, for storing user's identity information, key, password, encrypted message;
The network equipment comprises router and switch, and the infrastructure component of physical layer and the integral frame of cloud computing link together by network, provide service by network to user simultaneously.
4. a kind of cryptographic service system based on cloud computing according to claim 3, is characterized in that: the partial password algorithm in described cryptographic hardware module is symmetry algorithm SM1, elliptic curve cryptography SM2 or physics real random number generator.
5. a kind of cryptographic service system based on cloud computing according to claim 4, is characterized in that: in described computational resource layer, cryptographic algorithm module provides following cryptographic algorithm:
SM1 symmetric cryptographic algorithm module: by integrated SM1 hardware algorithm module, the server of above-mentioned PCI-E cipher card provides;
SM2 public key algorithm module: by integrated SM2 hardware algorithm module, the server of above-mentioned PCI-E cipher card provides;
SM3 cryptographic Hash algoritic module: adopt software programming to realize on server;
SM4 symmetric cryptographic algorithm module: adopt software programming to realize on server;
Real random number generator module: by integrated physics noise source module, the server of above-mentioned PCI-E cipher card provides; True random number is as the key in crypto-operation process, intermediate operations vector parameter;
Above-mentioned any one cryptographic algorithm, is provided by one or more server, or concurrent execution on a station server, and the cryptographic calculations application interface of service layer, parallel computation service interface, Distributed Calculation interface concurrent call various cryptographic algorithms;
Key management module is used for user's key information distribute and manage, and backs up; Only have the user by upper strata authentication just can call key management module;
Data backup module is for backing up, and recover data timely user's key, personal information data;
Monitoring module is responsible for the important information of supervisory user, and key data is limited in server and is used.
6. a kind of cryptographic service system based on cloud computing according to claim 1, is characterized in that: in described service layer, crypto-operation software adopts Hadoop distributed computing architecture to realize the detailed process that large-scale distributed data set is processed to be:
First, build Hadoop cluster, Hadoop operates on the interconnected server cluster of physical layer network, according to the framework of Hadoop, writes and move Distributed Application, and data Storage and Processing is all carried out on this cluster; User submits to the calculation task of data encrypting and deciphering to Hadoop cluster from client independently;
Secondly, set up after Hadoop cluster, configured HDFS file system, under Hadoop framework, call parallel computation interface and Distributed Calculation interface carries out parallel computation and distributed treatment to large data; Large data sets is stored as Single document in HDFS, is segmented physically and is stored in many back end parallel processing on these nodes.
7. a kind of cryptographic service system based on cloud computing according to claim 1, it is characterized in that: application layer user uses client device, the cipher application that visits service layer by customer interface, application software meets the demand of oneself, the cipher application here comprises file encryption, data encryption, key management, authentication, data backup, and user does not manage or control the cloud infrastructure of physical layer; The key that user inserts USB interface in local side computer carries out the authentication of identity; User configures computing capability when needed automatically, and the computing capability here comprises response time, the network storage of server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410480227.0A CN104202421A (en) | 2014-09-19 | 2014-09-19 | Cloud computing based password service system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410480227.0A CN104202421A (en) | 2014-09-19 | 2014-09-19 | Cloud computing based password service system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104202421A true CN104202421A (en) | 2014-12-10 |
Family
ID=52087646
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410480227.0A Pending CN104202421A (en) | 2014-09-19 | 2014-09-19 | Cloud computing based password service system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104202421A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104519140A (en) * | 2015-01-08 | 2015-04-15 | 浪潮(北京)电子信息产业有限公司 | Server system for distributed parallel computing and management method thereof |
CN105306576A (en) * | 2015-11-10 | 2016-02-03 | 中国电子科技集团公司第三十研究所 | Scheduling method and system for password arithmetic units |
CN106101096A (en) * | 2016-06-10 | 2016-11-09 | 北京数盾信息科技有限公司 | A kind of high-speed encryption module separated based on interface bus |
CN108063813A (en) * | 2017-12-15 | 2018-05-22 | 华中农业大学 | The method and system of cryptographic service network parallelization under a kind of cluster environment |
WO2018119990A1 (en) * | 2016-12-30 | 2018-07-05 | 刘清华 | Cloud data platform key setting method |
CN108418856A (en) * | 2018-01-22 | 2018-08-17 | 济南浪潮高新科技投资发展有限公司 | A kind of government affairs cloud cipher application platform construction method based on cloud computing technology |
CN108574573A (en) * | 2017-12-14 | 2018-09-25 | 成都卫士通信息产业股份有限公司 | Method, encryption device and the virtual VPN service systems of cryptographic service are provided for virtual VPN |
CN109688116A (en) * | 2018-12-11 | 2019-04-26 | 北京数盾信息科技有限公司 | A kind of dense tubular system (DTS) for supporting dynamic expansion algorithm and operational capability |
CN109687956A (en) * | 2018-12-11 | 2019-04-26 | 北京数盾信息科技有限公司 | A kind of unification provides key management and key computational service system to client |
CN109729170A (en) * | 2019-01-09 | 2019-05-07 | 武汉巨正环保科技有限公司 | A kind of cloud computing data backup of new algorithm and restoring method |
CN109981267A (en) * | 2019-03-22 | 2019-07-05 | 西安电子科技大学 | Large-scale consumer multi-key cipher scene cloud encrypting database system and storage querying method |
CN110086750A (en) * | 2018-01-26 | 2019-08-02 | 北京数盾信息科技有限公司 | A kind of encryption system based on optical fiber data link road network and satellite communication network |
CN110321695A (en) * | 2019-07-11 | 2019-10-11 | 成都卫士通信息产业股份有限公司 | Big data system password method of servicing, device |
CN110572258A (en) * | 2019-07-24 | 2019-12-13 | 中国科学院数据与通信保护研究教育中心 | Cloud password computing platform and computing service method |
CN111488602A (en) * | 2020-04-16 | 2020-08-04 | 支付宝(杭州)信息技术有限公司 | Data object privacy protection method and device and electronic equipment |
CN111541664A (en) * | 2020-04-14 | 2020-08-14 | 北京数盾信息科技有限公司 | Unified password service management platform |
CN111859396A (en) * | 2020-07-21 | 2020-10-30 | 中国人民解放军国防科技大学 | Soft and hard cooperation multi-layer password service method and system supporting universal/trusted double computing system |
CN112134872A (en) * | 2020-09-16 | 2020-12-25 | 江苏省未来网络创新研究院 | Network system with multi-application-layer cloud computing function |
CN112905993A (en) * | 2021-03-22 | 2021-06-04 | 华东师范大学 | Large-scale network-oriented distributed password equipment management system and construction method |
CN114189330A (en) * | 2021-11-25 | 2022-03-15 | 成都国泰网信科技有限公司 | Password service platform based on cloud architecture |
CN114884661A (en) * | 2022-07-13 | 2022-08-09 | 麒麟软件有限公司 | Hybrid security service password system and implementation method thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102946440A (en) * | 2012-12-04 | 2013-02-27 | 乐视致新电子科技(天津)有限公司 | Automatic cloud synchronization and recovery system based on cloud storage technology |
US8719590B1 (en) * | 2012-06-18 | 2014-05-06 | Emc Corporation | Secure processing in multi-tenant cloud infrastructure |
CN103905557A (en) * | 2014-04-09 | 2014-07-02 | 曙光云计算技术有限公司 | Data storage method and device used for cloud environment and downloading method and device |
-
2014
- 2014-09-19 CN CN201410480227.0A patent/CN104202421A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8719590B1 (en) * | 2012-06-18 | 2014-05-06 | Emc Corporation | Secure processing in multi-tenant cloud infrastructure |
CN102946440A (en) * | 2012-12-04 | 2013-02-27 | 乐视致新电子科技(天津)有限公司 | Automatic cloud synchronization and recovery system based on cloud storage technology |
CN103905557A (en) * | 2014-04-09 | 2014-07-02 | 曙光云计算技术有限公司 | Data storage method and device used for cloud environment and downloading method and device |
Non-Patent Citations (2)
Title |
---|
刘晓毅: "云计算中的数据全生命周期防护技术", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 * |
苏振宇: "基于FPGA和DSP的PCI_E高速密码卡设计与实现", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 * |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104519140A (en) * | 2015-01-08 | 2015-04-15 | 浪潮(北京)电子信息产业有限公司 | Server system for distributed parallel computing and management method thereof |
CN105306576A (en) * | 2015-11-10 | 2016-02-03 | 中国电子科技集团公司第三十研究所 | Scheduling method and system for password arithmetic units |
CN106101096A (en) * | 2016-06-10 | 2016-11-09 | 北京数盾信息科技有限公司 | A kind of high-speed encryption module separated based on interface bus |
CN106101096B (en) * | 2016-06-10 | 2022-06-28 | 北京数盾信息科技有限公司 | High-speed encryption module based on interface bus separation |
WO2018119990A1 (en) * | 2016-12-30 | 2018-07-05 | 刘清华 | Cloud data platform key setting method |
CN108574573A (en) * | 2017-12-14 | 2018-09-25 | 成都卫士通信息产业股份有限公司 | Method, encryption device and the virtual VPN service systems of cryptographic service are provided for virtual VPN |
CN108574573B (en) * | 2017-12-14 | 2021-07-23 | 成都卫士通信息产业股份有限公司 | Method for providing password service for virtual VPN, password device and virtual VPN service system |
CN108063813A (en) * | 2017-12-15 | 2018-05-22 | 华中农业大学 | The method and system of cryptographic service network parallelization under a kind of cluster environment |
CN108063813B (en) * | 2017-12-15 | 2020-09-08 | 武汉东湖大数据交易中心股份有限公司 | Method and system for parallelizing password service network in cluster environment |
CN108418856A (en) * | 2018-01-22 | 2018-08-17 | 济南浪潮高新科技投资发展有限公司 | A kind of government affairs cloud cipher application platform construction method based on cloud computing technology |
CN110086750A (en) * | 2018-01-26 | 2019-08-02 | 北京数盾信息科技有限公司 | A kind of encryption system based on optical fiber data link road network and satellite communication network |
CN109688116A (en) * | 2018-12-11 | 2019-04-26 | 北京数盾信息科技有限公司 | A kind of dense tubular system (DTS) for supporting dynamic expansion algorithm and operational capability |
CN109687956A (en) * | 2018-12-11 | 2019-04-26 | 北京数盾信息科技有限公司 | A kind of unification provides key management and key computational service system to client |
CN109729170A (en) * | 2019-01-09 | 2019-05-07 | 武汉巨正环保科技有限公司 | A kind of cloud computing data backup of new algorithm and restoring method |
CN109981267B (en) * | 2019-03-22 | 2021-06-08 | 西安电子科技大学 | Large-scale user multi-key scene cloud encryption database system and storage query method |
CN109981267A (en) * | 2019-03-22 | 2019-07-05 | 西安电子科技大学 | Large-scale consumer multi-key cipher scene cloud encrypting database system and storage querying method |
CN110321695A (en) * | 2019-07-11 | 2019-10-11 | 成都卫士通信息产业股份有限公司 | Big data system password method of servicing, device |
CN110572258A (en) * | 2019-07-24 | 2019-12-13 | 中国科学院数据与通信保护研究教育中心 | Cloud password computing platform and computing service method |
CN111541664A (en) * | 2020-04-14 | 2020-08-14 | 北京数盾信息科技有限公司 | Unified password service management platform |
CN111488602A (en) * | 2020-04-16 | 2020-08-04 | 支付宝(杭州)信息技术有限公司 | Data object privacy protection method and device and electronic equipment |
CN111859396A (en) * | 2020-07-21 | 2020-10-30 | 中国人民解放军国防科技大学 | Soft and hard cooperation multi-layer password service method and system supporting universal/trusted double computing system |
CN111859396B (en) * | 2020-07-21 | 2023-10-03 | 中国人民解放军国防科技大学 | Soft-hard collaborative multi-level password service method and system supporting general/trusted double computing system |
CN112134872A (en) * | 2020-09-16 | 2020-12-25 | 江苏省未来网络创新研究院 | Network system with multi-application-layer cloud computing function |
CN112134872B (en) * | 2020-09-16 | 2022-07-26 | 江苏省未来网络创新研究院 | Network system with multi-application-layer cloud computing function |
CN112905993A (en) * | 2021-03-22 | 2021-06-04 | 华东师范大学 | Large-scale network-oriented distributed password equipment management system and construction method |
CN114189330A (en) * | 2021-11-25 | 2022-03-15 | 成都国泰网信科技有限公司 | Password service platform based on cloud architecture |
CN114884661A (en) * | 2022-07-13 | 2022-08-09 | 麒麟软件有限公司 | Hybrid security service password system and implementation method thereof |
CN114884661B (en) * | 2022-07-13 | 2022-10-14 | 麒麟软件有限公司 | Hybrid security service cryptographic system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104202421A (en) | Cloud computing based password service system | |
CN105027494B (en) | The data processing of trust in public cloud | |
CN109361517A (en) | A kind of virtualization cloud cipher machine system and its implementation based on cloud computing | |
EP3158497B1 (en) | Methods and devices for key management in an as-a-service context | |
CN103534976A (en) | Data security protection method, server, host, and system | |
CN104520873A (en) | Systems and methods for securing and restoring virtual machines | |
CN109710386B (en) | Overall dynamic migration method for virtual trusted root instance of virtual machine | |
Chalse et al. | A new technique of data integrity for analysis of the cloud computing security | |
Kaur et al. | Analyzing data security for cloud computing using cryptographic algorithms | |
CN103107994A (en) | Vitualization environment data security partition method and system | |
Tajadod et al. | Microsoft and Amazon: A comparison of approaches to cloud security | |
Soofi et al. | Security issues in SaaS delivery model of cloud computing | |
CN104980269A (en) | Secret key sharing method, device and system | |
Maher et al. | DropStore: A secure backup system using multi-cloud and fog computing | |
Gupta et al. | Data storage security in cloud computing using container clustering | |
Li | Cloud computing: introduction, application and security from industry perspectives | |
Lei et al. | Research and design of cryptography cloud framework | |
Annane et al. | SecNetworkCloudSim: An extensible simulation tool for secure distributed mobile applications | |
CN105554127B (en) | The private clound back mechanism of the safe cryptographic means of multi-layer data | |
US11468356B2 (en) | Matrix-based quantum-resilient server-cluster | |
Amalarathinam et al. | Survey on data security in multi-cloud environment | |
Saxena et al. | Protecting data storage on cloud to enhance security level and processing of the data by using Hadoop | |
Dinesh | Cloud Computing and its Variable Techniques in Obtaining Data Security Parameter | |
Mishra et al. | Improved cloud security approach with threshold cryptography | |
US10997521B1 (en) | Quantum-resilient computer cluster |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20141210 |