CN106789891A - A kind of various dimensions software authorization control method suitable for IaaS cloud platform - Google Patents

A kind of various dimensions software authorization control method suitable for IaaS cloud platform Download PDF

Info

Publication number
CN106789891A
CN106789891A CN201611031651.2A CN201611031651A CN106789891A CN 106789891 A CN106789891 A CN 106789891A CN 201611031651 A CN201611031651 A CN 201611031651A CN 106789891 A CN106789891 A CN 106789891A
Authority
CN
China
Prior art keywords
cloud platform
certificate
authority
user
management end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611031651.2A
Other languages
Chinese (zh)
Inventor
刘勇彬
杨松
季统凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
G Cloud Technology Co Ltd
Original Assignee
G Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by G Cloud Technology Co Ltd filed Critical G Cloud Technology Co Ltd
Priority to CN201611031651.2A priority Critical patent/CN106789891A/en
Publication of CN106789891A publication Critical patent/CN106789891A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The present invention relates to soft ware authorization technical field, particularly a kind of various dimensions software authorization control method suitable for IaaS cloud platform.The method of the present invention is the restrictive condition of the dimension selection certificate at certificates constructing interface as needed;Then Generate Certificate;When, when first time cloud platform is used, certificate is uploaded after user's purchase certificate of authority, login formally uses cloud platform;Then when user uses cloud platform, management end is by calling certificate verification interface;Management end obtains the bright key of file encryption by asymmetric bright key, and certificate content is obtained by the bright key of file encryption;Then management backstage reads and authorizes relevant information and data;And then whether parsing user's current operation is within the scope of authority.The present invention solves the control of various dimensions soft ware authorization;Can be used for the soft ware authorization control of IaaS cloud platform.

Description

A kind of various dimensions software authorization control method suitable for IaaS cloud platform
Technical field
The present invention relates to soft ware authorization technical field, particularly a kind of various dimensions soft ware authorization suitable for IaaS cloud platform Control method.
Background technology
With the development of cloud computing, domestic cloud computing producer emerges in large numbers one after another, and facility is service based on IaaS cloud platform Platform is even more in government industry, IDC data centers, medium-sized and small enterprises popularization;It greatly improves infrastructure resources utilization rate, drop The operation cost of Di Liao enterprises.But the deployment particularity based on IaaS cloud platform, its authorization brings not to producer always Few puzzlement, and each cloud producer develops one's own soft ware authorization mode according to the service needed of oneself, general point with Under it is several:
1st, limited by physical machine quantity, that is, cloud platform can only be deployed in the user for buying cloud platform the number for authorizing limitation Within amount;
2nd, limited by physical cpu, authorized by limiting the physical cpu number of cloud platform virtualization;
3rd, virtual machine quantity is limited, i.e., is authorized by the maximum virtual machine quantity that can be managed of cloud platform.
There is following drawback in above several ways:
1st, limited by physical machine or quantity, it will usually promote user to purchase configuration physical machine high such that it is able to create Or manage more virtual machines.
2nd, limited by physical cpu, although solve allocation problem high, but user can be promoted by the way of hyperthread core To increase virtual machine quantity.
3rd, by limiting virtual machine quantity, client will improve every configuration of virtual machine so that customer resources utilization rate Decline.
In order to from truly realize to IaaS cloud platform soft ware authorization control, it is necessary to a kind of software of various dimensions is awarded Power control method, this method should be able to be directed to the control of the use characteristic offer various dimensions of IaaS cloud platform, such as limit single The configuration of individual physical node, limits the combinations such as the number of hyperthread core, and product is coordinated with this in the sale of different clients.
The content of the invention
Present invention solves the technical problem that being to provide a kind of various dimensions soft ware authorization control suitable for IaaS cloud platform Method, solves the single control method of IaaS cloud platform soft ware authorization at this stage, and being that cloud platform is legal authorizes and use safely A kind of flexible safe control method is provided.
The present invention solve above-mentioned technical problem technical scheme be:
Described method is the restrictive condition of the dimension selection certificate at certificates constructing interface as needed;Then generate, Transmission, using, checking certificate.
Described method specifically includes following steps:
Step 1:The restrictive condition of certificate is selected at product certification generation interface;
Step 2:Click Generates Certificate, and certificates constructing software preserves relevant information with file mode, and is added using symmetrical Close algorithm for encryption, and decruption key is encrypted by asymmetric arithmetic;
Step 3:User buys the certificate of authority;
Step 4:User uploads certificate when first time is using cloud platform, and login formally uses cloud platform;
Step 5:When user uses cloud platform, management end is by calling certificate verification interface;
Step 6:Management end obtains the bright key of file encryption by asymmetric bright key, is obtained in certificate by the bright key of file encryption Hold;
Step 7:Management end backstage is read and authorizes relevant information and data,
Step 8:Whether parsing user's current operation is currently demonstrate,proved when virtual machine is created within the scope of authority, it is necessary to parse Whether book exceeds cloud platform mandate for cloud platform virtual machine quantity, the resource size of establishment;
Step 9:If in the scope of authority, allowing client to enter next operating procedure;If exceeding the scope of authority, return Beyond the cloud platform scope of authority, producer please be contact.
Described product certification generation interface, is the administration interface for being responsible for generating cloud platform certificate specially;
Described restrictive condition include product version, authorize time range, limit physics number of nodes, virtual machine quantity, Physical cpu quantity, thread CPU quantity, the configuration of separate unit physical machine highest, the configuration of separate unit virtual machine highest;
Described physical node, refers to for doing the physical server for virtualizing;
Described thread CPU, refers to the threaded core number of CPU, i.e., can be carried using physical server after Hyper-Threading The threaded core number of confession, is 2 times of physical core calculation;
Described highest configuration, refers to maximum support how much core how many G internal memories of CPU, does not limit storage here.
Described management end refers to responsible generation task, transmission task, reception task feedback in cloud computing solution Service control management module, the module is only responsible for generation task, and irresponsibility is pragmatic existing.
Described authorization is divided to simultaneously or two kinds;
Described authorization, refers to take to take the mode of one or require many inside all mandate restrictive conditions Plant combination verification mode;During multiple combination mode, it is desirable to which the behavior of user must authorize ability quilt in the range of restrictive conditions all Allow operation.
Method of the present invention scalability is good, with the development of IaaS technologies, can at any time add a kind of authorization control plan Slightly.The method of the present invention is safe, and certificate uses two layers of cipher mode, while the control mode of various dimensions, it is to avoid Ke Hutong Illegal operation is crossed to be licensed.The inventive method flexibility is good, can take different mandate plans according to different clients Slightly, such as desktop cloud client, the configuration mode of virtual machine quantity and each calculate node can be authorized, can user use Legal mandate, can ensure that the performance for using again.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings:
Fig. 1 is flow chart of the invention.
Specific embodiment
As shown in figure 1, the inventive method comprises the following steps:
Step 1:In product certification generation interface selection product version, time range is authorized, limit physics number of nodes, it is empty The limitations such as plan machine quantity, physical cpu quantity, thread CPU quantity, the configuration of separate unit physical machine highest, the configuration of separate unit virtual machine highest Condition.Following methods are the main program logics for generating encrypted certificate:
Step 2:Click Generates Certificate, and certificates constructing software preserves relevant information with file mode, and is added using symmetrical Close algorithm for encryption, and decruption key is encrypted by asymmetric arithmetic.
Here symmetric encipherment algorithm uses AES, rivest, shamir, adelman to use RSA.
Step 3:User buys the certificate of authority.
Step 4:User uploads certificate when first time is using cloud platform, and login formally uses cloud platform.
Upload certificate will certificate upload to cloud platform management server and specify engineering catalogue, facilitate cloud platform management end to read Take, if cloud platform management end does not find certificate file when startup, during user login management platform, will be switched on user Credential interface is passed, is facilitated user to upload certificate and is operated.The following is certificate upload code:
Step 5:When user uses cloud platform, management end is by calling certificate verification interface.
Step 6:Management end obtains the bright key of file encryption by asymmetric bright key, is obtained in certificate by the bright key of file encryption Hold.Core code is verified the following is certificate:
Step 7:Management end backstage is read and authorizes relevant information and data, reads authorization, and authorization is divided to simultaneously or two Kind.
Step 8:, it is necessary to parse current when whether parsing user's current operation creates virtual machine within the scope of authority, such as Whether certificate exceeds cloud platform mandate for cloud platform virtual machine quantity, the resource size of establishment.
Step 9:If in the scope of authority, allowing client to enter next operating procedure;If exceeding the scope of authority, return Beyond the cloud platform scope of authority, producer please be contact.

Claims (6)

1. a kind of various dimensions software authorization control method suitable for IaaS cloud platform, it is characterised in that:Described method be Certificates constructing interface dimension as needed selects the restrictive condition of certificate;Then generate, transmission, using, checking certificate.
2. various dimensions software authorization control method according to claim 1, it is characterised in that:Described method is specifically included Following steps:
Step 1:The restrictive condition of certificate is selected at product certification generation interface;
Step 2:Click Generates Certificate, and certificates constructing software preserves relevant information with file mode, and is calculated using symmetric cryptography Method is encrypted, and decruption key is encrypted by asymmetric arithmetic;
Step 3:User buys the certificate of authority;
Step 4:User uploads certificate when first time is using cloud platform, and login formally uses cloud platform;
Step 5:When user uses cloud platform, management end is by calling certificate verification interface;
Step 6:Management end obtains the bright key of file encryption by asymmetric bright key, and certificate content is obtained by the bright key of file encryption;
Step 7:Management end backstage is read and authorizes relevant information and data,
Step 8:Whether user's current operation is parsed within the scope of authority, when virtual machine is created, it is necessary to parse current certificates pair In cloud platform virtual machine quantity, whether the resource size of establishment exceeds cloud platform mandate;
Step 9:If in the scope of authority, allowing client to enter next operating procedure;If exceeding the scope of authority, return exceeds The cloud platform scope of authority, please contact producer.
3. method according to claim 2, it is characterised in that:
Described product certification generation interface, is the administration interface for being responsible for generating cloud platform certificate specially;
Described restrictive condition includes product version, authorizes time range, limits physics number of nodes, virtual machine quantity, physics CPU quantity, thread CPU quantity, the configuration of separate unit physical machine highest, the configuration of separate unit virtual machine highest;
Described physical node, refers to for doing the physical server for virtualizing;
Described thread CPU, refers to the threaded core number of CPU, i.e., can be provided using physical server after Hyper-Threading Threaded core number, is 2 times of physical core calculation;
Described highest configuration, refers to maximum support how much core how many G internal memories of CPU, does not limit storage here.
4. method according to claim 2, it is characterised in that:
Described management end refers to responsible generation task, transmission task, the business of reception task feedback in cloud computing solution Control management module, the module is only responsible for generation task, and irresponsibility is pragmatic existing.
5. method according to claim 3, it is characterised in that:
Described management end refers to responsible generation task, transmission task, the business of reception task feedback in cloud computing solution Control management module, the module is only responsible for generation task, and irresponsibility is pragmatic existing.
6. the method according to any one of claim 2 to 5, it is characterised in that:Described authorization is divided to simultaneously or two kinds;
Described authorization, refers to take to take the mode of one or require various groups inside all mandate restrictive conditions Close verification mode;During multiple combination mode, it is desirable to which the behavior of user must just be allowed in the range of all mandate restrictive conditions Operation.
CN201611031651.2A 2016-11-22 2016-11-22 A kind of various dimensions software authorization control method suitable for IaaS cloud platform Pending CN106789891A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611031651.2A CN106789891A (en) 2016-11-22 2016-11-22 A kind of various dimensions software authorization control method suitable for IaaS cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611031651.2A CN106789891A (en) 2016-11-22 2016-11-22 A kind of various dimensions software authorization control method suitable for IaaS cloud platform

Publications (1)

Publication Number Publication Date
CN106789891A true CN106789891A (en) 2017-05-31

Family

ID=58971477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611031651.2A Pending CN106789891A (en) 2016-11-22 2016-11-22 A kind of various dimensions software authorization control method suitable for IaaS cloud platform

Country Status (1)

Country Link
CN (1) CN106789891A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109561095A (en) * 2018-06-20 2019-04-02 安徽省泰岳祥升软件有限公司 Micro services authorization management method and device
WO2019109943A1 (en) * 2017-12-05 2019-06-13 北京金山云网络技术有限公司 Cloud platform management method and apparatus, electronic device and readable storage medium
CN110855668A (en) * 2019-11-14 2020-02-28 浙江九州云信息科技有限公司 Method and system for managing authorization certificate of container cloud platform
CN113282371A (en) * 2021-05-27 2021-08-20 杭州迪普科技股份有限公司 Performance management method and device of virtualized network equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916415A (en) * 2010-08-06 2010-12-15 西北工业大学 On-demand service method for software license in cloud computing platform
CN102324009A (en) * 2011-09-07 2012-01-18 上海普元信息技术股份有限公司 Software copyright control system based on cloud computing platform and method thereof
CN102509034A (en) * 2011-09-30 2012-06-20 广东电子工业研究院有限公司 Software license control device and method
CN103491097A (en) * 2013-09-30 2014-01-01 华中师范大学 Software authorization system based on public key cryptosystem
US20160147981A1 (en) * 2013-07-25 2016-05-26 Siemens Healthcare Diagnostics Inc. Anti-piracy Protection for Software

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916415A (en) * 2010-08-06 2010-12-15 西北工业大学 On-demand service method for software license in cloud computing platform
CN102324009A (en) * 2011-09-07 2012-01-18 上海普元信息技术股份有限公司 Software copyright control system based on cloud computing platform and method thereof
CN102509034A (en) * 2011-09-30 2012-06-20 广东电子工业研究院有限公司 Software license control device and method
US20160147981A1 (en) * 2013-07-25 2016-05-26 Siemens Healthcare Diagnostics Inc. Anti-piracy Protection for Software
CN103491097A (en) * 2013-09-30 2014-01-01 华中师范大学 Software authorization system based on public key cryptosystem

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019109943A1 (en) * 2017-12-05 2019-06-13 北京金山云网络技术有限公司 Cloud platform management method and apparatus, electronic device and readable storage medium
CN109561095A (en) * 2018-06-20 2019-04-02 安徽省泰岳祥升软件有限公司 Micro services authorization management method and device
CN110855668A (en) * 2019-11-14 2020-02-28 浙江九州云信息科技有限公司 Method and system for managing authorization certificate of container cloud platform
CN113282371A (en) * 2021-05-27 2021-08-20 杭州迪普科技股份有限公司 Performance management method and device of virtualized network equipment

Similar Documents

Publication Publication Date Title
US10790980B2 (en) Establishing trust in an attribute authentication system
CN108683747B (en) Resource obtaining, distributing and downloading method, device, equipment and storage medium
CN104969201B (en) For calling the safe interface of privileged operation
US11038698B2 (en) Securing a path at a selected node
US10833860B2 (en) Shared key processing by a host to secure links
Liu et al. Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates
EP4102387A1 (en) System of enclaves
US11025413B2 (en) Securing a storage network using key server authentication
US11038671B2 (en) Shared key processing by a storage device to secure links
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
US20210119784A1 (en) Securing a path at a node
CN112671720B (en) Token construction method, device and equipment for cloud platform resource access control
CN106789891A (en) A kind of various dimensions software authorization control method suitable for IaaS cloud platform
US20220141039A1 (en) Certificate based security using post quantum cryptography
CN103051455A (en) Method for realizing delegation of cipher function of TCM (trusted cryptographic module) under cloud computing environment
US20150082027A1 (en) Drm method and drm system for supporting offline sharing of digital contents
Chalse et al. A new technique of data integrity for analysis of the cloud computing security
CN103401894A (en) Streaming media DRM (Digital Rights Management) cloud service system with browser/server architecture and implementation method thereof
US20200296089A1 (en) Validating containers on a microservice framework
US9755832B2 (en) Password-authenticated public key encryption and decryption
Kumar et al. Multi-authentication for cloud security: A framework
CN113452521B (en) Block chain state password adaptation method, state password adapter, system and device
Gaikwad et al. Providing storage as a service on cloud using OpenStack
CN103746798A (en) Data access control method and data access control system
CN109918938A (en) A kind of storage, querying method and the device of cloud computing platform user data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170531

WD01 Invention patent application deemed withdrawn after publication