CN107197041A - A kind of safe cloud computing system - Google Patents
A kind of safe cloud computing system Download PDFInfo
- Publication number
- CN107197041A CN107197041A CN201710536112.2A CN201710536112A CN107197041A CN 107197041 A CN107197041 A CN 107197041A CN 201710536112 A CN201710536112 A CN 201710536112A CN 107197041 A CN107197041 A CN 107197041A
- Authority
- CN
- China
- Prior art keywords
- data
- cloud computing
- safe
- proxy terminal
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Biomedical Technology (AREA)
- Quality & Reliability (AREA)
- Alarm Systems (AREA)
Abstract
The present invention is applied to information security field there is provided a kind of safe cloud computing system, including:Cloud center, safe cloud computing server and proxy terminal, cloud center are connected with safe cloud computing server, and proxy terminal is arranged on safe cloud computing server Shang Qieyuyun centers and sets up communication connection;Using self contained data base, the data storage format of the three kinds of frameworks in isolated data storehouse and shared data bank, it can select storage form according to the height of data security levels, resource can be saved, reduce cost, and effective safety assurance is provided to data storage;Simultaneously; by way of authentication, efficiently solve the situation that cloud computing terminal safeguard procedures weakness causes user profile to reveal; prevent identity to give away secrets, data theft, information lose etc. many potential safety hazards; and the data and parameter of local side backup area data message and local side data field can be used in the case where there is communication abnormality or network interruption, prevent that user data information is lost under extreme case.
Description
Technical field
The invention belongs to information security field, more particularly to a kind of safe cloud computing system.
Background technology
Cloud computing is a kind of the new calculating of various data, services can more effectively to be provided the user using computing resource
Pattern, it links together substantial amounts of computing resource, storage resource and software resource, with virtual technology, provides the user
It is customizable to calculate, store and application service, it is to avoid the structure of the heavy infrastructure of user itself and maintenance.However, concentrating
The cloud computing center of management is by the highest priority as assault, due to unprecedented open and complexity, its safety
Property is faced with than ever more acid test, and the big data resources accessing control of cloud computing is the core of cloud computing safety problem
The heart, access control is the important means realized information security big data resource confidentiality and carry out secret protection.
The content of the invention
The embodiment of the present invention provides a kind of safe cloud computing system, it is intended to solve number of users under extreme case in the prior art
The problem of according to being lost with information.
The embodiment of the present invention is achieved in that a kind of safe cloud computing system, including:Cloud center, safe cloud computing clothes
Business device and proxy terminal, the cloud center are connected with the safe cloud computing server, and the proxy terminal is arranged on the peace
On full cloud computing server and set up communication with the cloud center to be connected, the cloud center includes self contained data base, isolated data
Storehouse and shared data bank, are provided with transmission channel, the independence between the self contained data base, isolated data storehouse and shared data bank
Pass through transmission channel data interaction two-by-two between database, isolated data storehouse and shared data bank;The safe cloud computing service
Device includes user authority management module, authentication management module, safety management module and cloud computing administrative center;The agency is eventually
End includes data backup module and data memory module.
Preferably, the safe cloud computing server, in addition to:Digital certificate computing stores IC modules and fingerprint authentication mould
Block, digital certificate computing storage IC modules respectively with the user authority management module, the authentication management module and institute
State safety management module connection;The fingerprint authentication module is connected with digital certificate computing storage IC modules.
Preferably, an identification code is respectively equipped with the self contained data base, isolated data storehouse and shared data bank, it is described
Proxy terminal according to circumstances classifies the data that transmit to cloud center and identify, and the mark is corresponding with corresponding identification code.
Preferably, the user authority management module, the authority distribution for managing administrator and terminal user;
The authentication management module, for the administrator and terminal user in the user authority management module
Authority distribution separately verify the authority information of keeper and the authority information of terminal user;
The safety management module, for entering to the session between the safe cloud computing server and the proxy terminal
Row encryption, prevents from being tampered;Ensure to provide safety protecting mechanism in the case where running into the attack of illegal proxy terminal;
The cloud computing administrative center, in managing, safeguard the safe cloud computing server.
Preferably, the cloud computing administrative center, including:
Communications management unit, for safeguard communication between the safe cloud computing server and the proxy terminal and
Synchronizing information ensures the uniformity of information, and ensures the normal operation of disaster-tolerating and error-tolerating scheme in extreme circumstances;
Session management unit, the session for managing, safeguarding the safe cloud computing server and the proxy terminal, really
Protect being normally carried out for session;
Disaster-tolerating and error-tolerating unit, for providing disaster-tolerating and error-tolerating solution in extreme circumstances, manages, safeguards that the disaster tolerance holds
Wrong solution, it is ensured that the normal work of safe cloud computing server and normal use and the data for ensuring proxy terminal
Normally use;And
Logging unit, the correlation log for recording Operation Log, cloud center and proxy terminal.
Preferably, the proxy terminal, in addition to:
Resource transfer module, for calling, local resource is calculated and result of calculation is uploaded into cloud center;
Session management module, for the session between administration agent terminal and cloud center, and is provided in off-line case
Conversation mechanism ensures the availability of data;
Backup management module, is backed up for data message and application program to proxy terminal and is saved to number
According to backup module;Local data and parameter are backed up and data memory module is saved to;And
Local authentication management module, for the user's checking under the user authentication and off-line state under presence.
Preferably, the digital certificate computing storage IC modules are used to produce Unique Device sequence number.
Preferably, the fingerprint authentication module is used to store the equipment sequence that IC modules are produced according to the digital certificate computing
Number checking user identity.
Preferably, communications status monitoring module, the communication shape are provided between the proxy terminal and the cloud center
State monitoring module is used to monitor the communication conditions between the proxy terminal and the cloud center.
Safe cloud computing system provided in an embodiment of the present invention, using self contained data base, isolated data storehouse and shared data
The data storage format of the three kinds of frameworks in storehouse, can select storage form, can save resource according to the height of data security levels,
Cost is reduced, and effective safety assurance is provided to data storage;Meanwhile, by way of authentication, efficiently solve
Cloud computing terminal safeguard procedures weakness causes the situation that user profile is revealed, it is therefore prevented that identity is given away secrets, data theft, information are lost
Many potential safety hazards such as mistake, and the usable local side backup area number in the case where there is communication abnormality or network interruption
It is believed that the data and parameter of breath and local side data field, prevent that user data information is lost under extreme case.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
These accompanying drawings obtain other accompanying drawings.
The following drawings is only intended to, in doing schematic illustration and explanation to the present invention, not delimit the scope of the invention.
Fig. 1 is a kind of structural representation of safe cloud computing system provided in an embodiment of the present invention;
Fig. 2 is the structural representation of safe cloud computing server provided in an embodiment of the present invention;
Fig. 3 is the structural representation of cloud computing administrative center provided in an embodiment of the present invention;
Fig. 4 is the structural representation of proxy terminal provided in an embodiment of the present invention;
Fig. 5 is the structural representation of alternative safe cloud computing system provided in an embodiment of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Safe cloud computing system provided in an embodiment of the present invention, using self contained data base, isolated data storehouse and shared data
The data storage format of the three kinds of frameworks in storehouse, can select storage form, can save resource according to the height of data security levels,
Cost is reduced, and effective safety assurance is provided to data storage;Meanwhile, by way of authentication, efficiently solve
Cloud computing terminal safeguard procedures weakness causes the situation that user profile is revealed, it is therefore prevented that identity is given away secrets, data theft, information are lost
Many potential safety hazards such as mistake, and the usable local side backup area number in the case where there is communication abnormality or network interruption
It is believed that the data and parameter of breath and local side data field, prevent that user data information is lost under extreme case.
Implementing for the present invention is described in detail below in conjunction with specific embodiment.
As shown in figure 1, in embodiments of the present invention, a kind of safe cloud computing system, including:Cloud center 100, secure cloud meter
Server 200 and proxy terminal 300 are calculated, the cloud center 100 is connected with the safe cloud computing server 200, the agency
Terminal 300 is arranged on the safe cloud computing server 200 and sets up communication with the cloud center 100 and is connected, in the cloud
The heart 100 includes self contained data base 110, isolated data storehouse 120 and shared data bank 130, the self contained data base 110, isolation number
According to being provided with transmission channel between storehouse 120 and shared data bank 130, the self contained data base 110, isolated data storehouse 120 and shared
Pass through transmission channel data interaction two-by-two between database 130;The safe cloud computing server 200 includes user authority management
Module 210, authentication management module 220, safety management module 230 and cloud computing administrative center 240;The proxy terminal 300
Including data backup module 310 and data memory module 320.Using self contained data base, isolated data storehouse and shared data bank three
The data storage format of kind of framework, can select storage form, can save resource, reduce according to the height of data security levels
Cost, and effective safety assurance is provided to data storage;Meanwhile, by way of authentication, efficiently solve cloud
Computing terminal safeguard procedures weakness causes the situation that user profile is revealed, it is therefore prevented that identity is given away secrets, data theft, information are lost etc.
Many potential safety hazards, and local side backup area data can be used to believe in the case where there is communication abnormality or network interruption
Breath and the data and parameter of local side data field, prevent that user data information is lost under extreme case.
In embodiments of the present invention, as shown in Fig. 2 the safe cloud computing server 200, in addition to:Digital certificate is transported
Calculate storage IC modules 250 and fingerprint authentication module 260, the digital certificate computing storage IC modules 250 respectively with the user
Authority management module 210, the authentication management module 220 and the safety management module 230 are connected;The fingerprint authentication module
260 are connected with digital certificate computing storage IC modules 250, and the digital certificate computing storage IC modules 250 are used to produce
Unique Device sequence number;The fingerprint authentication module 260 is used to store the equipment that IC modules are produced according to the digital certificate computing
Sequence number verifies user identity;IC modules are stored by built-in digital certificate computing and produce Unique Device sequence number, it is then built-in
Fingerprint authentication module verifies the identity of user, completes the safe cloud computing operation of user;
In embodiments of the present invention, in the self contained data base 110, isolated data storehouse 120 and shared data bank 130 respectively
Provided with an identification code, the data that the proxy terminal 100 will be transmitted to cloud center are according to circumstances classified and identified, the mark
It is corresponding with corresponding identification code, proxy terminal 100 can according to the instruction of transmission by data in self contained data base 110, isolation number
Mutually shifted according between storehouse 120 and shared data bank 130, can so save resource, reduce cost, level of security can wanted again
Higher data are asked to provide effective safety assurance;In order that the present invention has greater flexibility, the present invention can be according to data
The change of level of security, flexibly converts storage form, optimal of both cost and protection to reach.
In embodiments of the present invention, the user authority management module 210, for managing administrator and terminal user
Authority distribution;The authentication management module 220, for the administrator in the user authority management module and end
The authority distribution of end subscriber separately verifies the authority information of keeper and the authority information of terminal user;The safety management mould
Block 230, for the session between the safe cloud computing server and the proxy terminal to be encrypted, prevents from being tampered;
Ensure to provide safety protecting mechanism in the case where running into the attack of illegal proxy terminal;The cloud computing administrative center 240, uses
In in managing, safeguard the safe cloud computing server.
In invention the present embodiment, as shown in figure 3, the cloud computing administrative center 240, including communications management unit 241,
For safeguarding that communication between the safe cloud computing server and the proxy terminal and synchronizing information ensure the one of information
Cause property, and ensure the normal operation of disaster-tolerating and error-tolerating scheme in extreme circumstances;Session management unit 242, for managing, safeguarding
The session of the safe cloud computing server and the proxy terminal, it is ensured that session is normally carried out;Disaster-tolerating and error-tolerating unit 243,
For providing disaster-tolerating and error-tolerating solution in extreme circumstances, manage, safeguard the disaster-tolerating and error-tolerating solution, it is ensured that secure cloud
The normal work of calculation server and ensure that the normal use of proxy terminal and the normal of data are used;And log recording
Unit 244, the correlation log for recording Operation Log, cloud center and proxy terminal.
In embodiments of the present invention, as shown in figure 4, the proxy terminal 300, in addition to resource transfer module 301, it is used for
Call local resource to be calculated and result of calculation is uploaded to cloud center;Session management module 302, it is whole for administration agent
Session between Duan Yuyun centers, and the conversation mechanism provided in off-line case ensures the availability of data;Backup management mould
Block 303, is backed up for data message and application program to proxy terminal and is saved to data backup module;To this
The data and parameter on ground are backed up and are saved to data memory module;And local authentication management module 304, for
The user's checking under user authentication and off-line state under wire state.In the present embodiment, proxy terminal 300 is in local hard drive
Backup area and data field are hewed out, the backup area is used to provide data message, the backup of application program, and the data field is used for
The storage of data and parameter is provided.For backup area, when the first time of proxy terminal 300 is with the proper communication of cloud center, backup area
Meeting automatically backup data information and application program, are updated automatically in follow-up use if finding to have altered;If leading to
Believe exception or network interruption, proxy terminal can automatically restart and call the data message and application program of backup area;For data
Area, when proxy terminal 300 is using application program, data and parameter can be automatically saved in data field and real-time update, and by number
Cloud center is uploaded to according to parameter;If there is communication abnormality or network interruption, only update the data with parameter without uploading, wait to lead to
Uploaded again after letter is normal.
In embodiments of the present invention, as shown in figure 5, being provided between the proxy terminal 300 and the cloud center 100 logical
Believe monitoring module 400, the communications status monitoring module 400 is used to monitor the proxy terminal 300 and the cloud center
Communication conditions between 100, further ensure the security of system.
The safe cloud computing system that foregoing invention embodiment is provided, using self contained data base, isolated data storehouse and shared number
According to the data storage format of the three kinds of frameworks in storehouse, it can select storage form according to data security levels height, money can be saved
Source, reduces cost, and provide effective safety assurance to data storage;Meanwhile, by way of authentication, effectively solve
Cloud computing terminal safeguard procedures weakness of having determined causes the situation that user profile is revealed, it is therefore prevented that identity is given away secrets, data theft, information
Many potential safety hazards such as loss, and the usable local side backup area in the case where there is communication abnormality or network interruption
Data message and the data and parameter of local side data field, prevent that user data information is lost under extreme case.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
Any modifications, equivalent substitutions and improvements made within refreshing and principle etc., should be included in the scope of the protection.
Claims (9)
1. a kind of safe cloud computing system, it is characterised in that including:Cloud center, safe cloud computing server and proxy terminal, institute
Shu Yun centers are connected with the safe cloud computing server, the proxy terminal be arranged on the safe cloud computing server on and
Communication is set up with the cloud center to be connected, the cloud center includes self contained data base, isolated data storehouse and shared data bank, described
Between self contained data base, isolated data storehouse and shared data bank be provided with transmission channel, the self contained data base, isolated data storehouse and
Pass through transmission channel data interaction two-by-two between shared data bank;The safe cloud computing server includes user authority management mould
Block, authentication management module, safety management module and cloud computing administrative center;The proxy terminal include data backup module and
Data memory module.
2. safe cloud computing system as claimed in claim 1, it is characterised in that the safe cloud computing server, in addition to:
Digital certificate computing stores IC modules and fingerprint authentication module, the digital certificate computing storage IC modules respectively with the user
Authority management module, the authentication management module and safety management module connection;The fingerprint authentication module and the number
Word certificate computing storage IC module connections.
3. safe cloud computing system as claimed in claim 1, it is characterised in that the self contained data base, isolated data storehouse and
An identification code is respectively equipped with shared data bank, the proxy terminal according to circumstances classifies the data that transmit to cloud center
And identify, the mark is corresponding with corresponding identification code.
4. safe cloud computing system as claimed in claim 1, it is characterised in that
The user authority management module, the authority distribution for managing administrator and terminal user;
The authentication management module, for the administrator in the user authority management module and the power of terminal user
Limit distributes to separately verify the authority information of keeper and the authority information of terminal user;
The safety management module, for being added to the session between the safe cloud computing server and the proxy terminal
It is close, prevent from being tampered;Ensure to provide safety protecting mechanism in the case where running into the attack of illegal proxy terminal;
The cloud computing administrative center, in managing, safeguard the safe cloud computing server.
5. the safe cloud computing system as described in claim 1 or 4, it is characterised in that the cloud computing administrative center, including:
Communications management unit, for safeguarding communication and information between the safe cloud computing server and the proxy terminal
It is synchronous to ensure the uniformity of information, and ensure the normal operation of disaster-tolerating and error-tolerating scheme in extreme circumstances;
Session management unit, the session for managing, safeguarding the safe cloud computing server and the proxy terminal, it is ensured that meeting
That talks about is normally carried out;
Disaster-tolerating and error-tolerating unit, for providing disaster-tolerating and error-tolerating solution in extreme circumstances, manages, safeguards the disaster-tolerating and error-tolerating solution
Certainly scheme, it is ensured that the normal work of safe cloud computing server and ensure proxy terminal normal use and data it is normal
Use;And
Logging unit, the correlation log for recording Operation Log, cloud center and proxy terminal.
6. safe cloud computing system as claimed in claim 1, it is characterised in that the proxy terminal, in addition to:
Resource transfer module, for calling, local resource is calculated and result of calculation is uploaded into cloud center;
Session management module, for the session between administration agent terminal and cloud center, and provides session in off-line case
Mechanism ensures the availability of data;
Backup management module, is backed up for data message and application program to proxy terminal and to be saved to data standby
Part module;Local data and parameter are backed up and data memory module is saved to;And
Local authentication management module, for the user's checking under the user authentication and off-line state under presence.
7. safe cloud computing system as claimed in claim 1, it is characterised in that the digital certificate computing storage IC modules are used
In generation Unique Device sequence number.
8. safe cloud computing system as claimed in claim 7, it is characterised in that the fingerprint authentication module is used for according to described
The equipment serial number checking user identity that digital certificate computing storage IC modules are produced.
9. safe cloud computing system as claimed in claim 1, it is characterised in that between the proxy terminal and the cloud center
Be provided with communications status monitoring module, the communications status monitoring module be used to monitoring the proxy terminal and the cloud center it
Between communication conditions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710536112.2A CN107197041A (en) | 2017-07-04 | 2017-07-04 | A kind of safe cloud computing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710536112.2A CN107197041A (en) | 2017-07-04 | 2017-07-04 | A kind of safe cloud computing system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107197041A true CN107197041A (en) | 2017-09-22 |
Family
ID=59880442
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710536112.2A Pending CN107197041A (en) | 2017-07-04 | 2017-07-04 | A kind of safe cloud computing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107197041A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107911256A (en) * | 2017-12-28 | 2018-04-13 | 李淑芹 | A kind of cloud computing system |
CN108023890A (en) * | 2017-12-12 | 2018-05-11 | 温州市联科科技有限公司 | A kind of Internet of Things cloud computing system |
CN108040068A (en) * | 2017-12-27 | 2018-05-15 | 深圳技术大学(筹) | quick access control system based on cloud security platform |
CN108900595A (en) * | 2018-06-25 | 2018-11-27 | 郑州云海信息技术有限公司 | Access method, apparatus, equipment and the calculation medium of cloud storage service device data |
CN109117659A (en) * | 2018-08-29 | 2019-01-01 | 广东恒电信息科技股份有限公司 | A kind of big data security isolation management system under multi-tenant mode |
CN109460675A (en) * | 2018-10-26 | 2019-03-12 | 温州博盈科技有限公司 | A kind of enterprise information security management method |
CN109962799A (en) * | 2017-12-25 | 2019-07-02 | 中国科学院沈阳自动化研究所 | The crucial application service terminated disaster recovery and backup systems of industry and method based on cloud computing |
CN110533509A (en) * | 2019-08-28 | 2019-12-03 | 上海仪电智能科技有限公司 | A kind of multi-tenant subscriber management service system |
CN111143857A (en) * | 2019-12-27 | 2020-05-12 | 深圳前海达闼云端智能科技有限公司 | Data sharing method, robot controller and storage medium |
CN114239041A (en) * | 2022-02-24 | 2022-03-25 | 常州皓焱信息科技有限公司 | Data safety protection system based on internet |
CN114780569A (en) * | 2022-06-22 | 2022-07-22 | 之江实验室 | Input and output proxy method and device of mimicry redis database |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932326A (en) * | 2012-09-19 | 2013-02-13 | 无锡华御信息技术有限公司 | Safety cloud computing system |
CN104092728A (en) * | 2014-06-20 | 2014-10-08 | 裴兆欣 | Safe cloud computing system |
-
2017
- 2017-07-04 CN CN201710536112.2A patent/CN107197041A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932326A (en) * | 2012-09-19 | 2013-02-13 | 无锡华御信息技术有限公司 | Safety cloud computing system |
CN104092728A (en) * | 2014-06-20 | 2014-10-08 | 裴兆欣 | Safe cloud computing system |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108023890A (en) * | 2017-12-12 | 2018-05-11 | 温州市联科科技有限公司 | A kind of Internet of Things cloud computing system |
CN109962799A (en) * | 2017-12-25 | 2019-07-02 | 中国科学院沈阳自动化研究所 | The crucial application service terminated disaster recovery and backup systems of industry and method based on cloud computing |
CN109962799B (en) * | 2017-12-25 | 2021-09-28 | 中国科学院沈阳自动化研究所 | Cloud computing-based industrial key application service terminal disaster recovery system and method |
CN108040068A (en) * | 2017-12-27 | 2018-05-15 | 深圳技术大学(筹) | quick access control system based on cloud security platform |
CN107911256A (en) * | 2017-12-28 | 2018-04-13 | 李淑芹 | A kind of cloud computing system |
CN108900595A (en) * | 2018-06-25 | 2018-11-27 | 郑州云海信息技术有限公司 | Access method, apparatus, equipment and the calculation medium of cloud storage service device data |
CN108900595B (en) * | 2018-06-25 | 2021-08-31 | 郑州云海信息技术有限公司 | Method, device and equipment for accessing data of cloud storage server and computing medium |
CN109117659A (en) * | 2018-08-29 | 2019-01-01 | 广东恒电信息科技股份有限公司 | A kind of big data security isolation management system under multi-tenant mode |
CN109460675A (en) * | 2018-10-26 | 2019-03-12 | 温州博盈科技有限公司 | A kind of enterprise information security management method |
CN110533509A (en) * | 2019-08-28 | 2019-12-03 | 上海仪电智能科技有限公司 | A kind of multi-tenant subscriber management service system |
CN111143857A (en) * | 2019-12-27 | 2020-05-12 | 深圳前海达闼云端智能科技有限公司 | Data sharing method, robot controller and storage medium |
CN114239041A (en) * | 2022-02-24 | 2022-03-25 | 常州皓焱信息科技有限公司 | Data safety protection system based on internet |
CN114780569A (en) * | 2022-06-22 | 2022-07-22 | 之江实验室 | Input and output proxy method and device of mimicry redis database |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107197041A (en) | A kind of safe cloud computing system | |
US10455420B2 (en) | Physically secured authorization for utility applications | |
CN109361517A (en) | A kind of virtualization cloud cipher machine system and its implementation based on cloud computing | |
CN109379369A (en) | Single-point logging method, device, server and storage medium | |
CN107579998A (en) | Personal data center and digital identification authentication method based on block chain, digital identity and intelligent contract | |
CN105430000A (en) | Cloud computing security management system | |
CN103856345B (en) | Server account number and password management method and system and server | |
CN110061983A (en) | A kind of data processing method and system | |
CN102195930B (en) | Security access method among equipment and communication equipment | |
CN106302334A (en) | Access role acquisition methods, Apparatus and system | |
CN110866261A (en) | Data processing method and device based on block chain and storage medium | |
CN107920089A (en) | A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method | |
CN114866346B (en) | Password service platform based on decentralization | |
WO2019006637A1 (en) | Secure cloud computing system | |
CN107707517A (en) | A kind of HTTPs handshake methods, device and system | |
CN110189440A (en) | A kind of smart lock monitoring equipment and its method based on block chain | |
CN103065104A (en) | Mobile storage equipment and monitoring system formed by same | |
CN111884804A (en) | Remote key management method | |
CN114448748B (en) | System center deployment network system | |
CN109726584A (en) | Cloud database key management system | |
CN102822840B (en) | Use management system and use management method | |
CN105991524A (en) | Family information security system | |
Ziglari et al. | Deployment models: Enhancing security in cloud computing environment | |
CN104580997A (en) | Video monitoring management system | |
Chahal et al. | A Comprehensive Study of Security in Cloud Computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170922 |
|
RJ01 | Rejection of invention patent application after publication |