CN108418786A - A kind of cloud computing data security supporting platform - Google Patents
A kind of cloud computing data security supporting platform Download PDFInfo
- Publication number
- CN108418786A CN108418786A CN201711464615.XA CN201711464615A CN108418786A CN 108418786 A CN108418786 A CN 108418786A CN 201711464615 A CN201711464615 A CN 201711464615A CN 108418786 A CN108418786 A CN 108418786A
- Authority
- CN
- China
- Prior art keywords
- cloud
- credible
- platform
- management
- trusted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/131—Protocols for games, networked simulations or virtual reality
Abstract
The invention discloses a kind of cloud computing data security supporting platforms,Including cloud management layer,Cloud platform layer and virtualization layer,The cloud management layer includes cloud computing system,Cloud security subsystem and cloud trusted subsystem,The cloud computing system includes cloud management center,Cloud management center signal end is connected with cloud management component,The signal end of the cloud management component is connected with security management mechanism,The control terminal of the security management mechanism is connected with cloud trusted subsystem,The cloud trusted subsystem is internally provided with credible administrative center,The signal end of the credible administrative center is connected with cloud platform layer,The cloud platform layer is internally provided with platform credible server,The signal end of the platform credible server is connected with virtualization layer,The system establishes system,Safety,The credible independently operated subsystem of tripartite,Its transparent operation of medium cloud trusted subsystem,Credible support is provided for cloud security,Realize the Effec-tive Function of total system mechanism in cloud computing mode.
Description
Technical field
The present invention relates to data security arts, specially a kind of cloud computing data security supporting platform.
Background technology
Trust computing is a kind of new information security technology, can set up complete set in systems by root of trust
Credible tolerance mechanism, the operation action in monitoring system and operating status distinguish credible, untrusted application, are crime prevention systems
The effective means of middle illegal program operation, can fundamentally solve the credible of system.
For example, application No. is 201110029138.0, patent name is a kind of hair of cloud computing data security supporting platform
Bright patent:
Its profit after the metamessage encryption of extraction to being sent to cloud data safety service system;Cloud computing or cloud storage system are used
In the data that storage secure cloud client uploads;Cloud data safety service system is used to store what the encryption of secure cloud client uploaded
Metamessage and key information, and file access support and searching ciphertext and data service for checking credentials support are provided, this platform is significantly
The safety for improving data has many advantages, such as that computational efficiency is high, safety is good.
But existing cloud computing data security supporting platform has the following defects:
(1) traditional reliable computing technology is as trusted root using reliable hardware, and application program is run in cloud computing mode
In the running environment virtualized at one, this allow for traditional trust computing mechanism lack in cloud environment it is necessary credible hard
Part guarantee;
(2) resource in " cloud " is managed and is safeguarded using carrier service, how to establish operator and cloud tenant it
Between trust be also to solve the problems, such as the key of cloud security, this proposes new challenge to traditional reliable computing technology again.
Invention content
In order to overcome the shortcomings of that prior art, the present invention provide a kind of cloud computing data security supporting platform, can have
Effect solves the problems, such as that background technology proposes.
The technical solution adopted by the present invention to solve the technical problems is:
A kind of cloud computing data security supporting platform, including cloud management layer, cloud platform layer and virtualization layer, the cloud management
Layer includes cloud computing system, cloud security subsystem and cloud trusted subsystem, signal end and cloud security of the cloud computing system
System interaction connects, and the control terminal of the cloud security subsystem is connected with cloud trusted subsystem, and the cloud computing system includes
Cloud management center, cloud management center signal end are connected with cloud management component, and the signal end of the cloud management component is connected with
The control terminal of security management mechanism, the security management mechanism is connected with cloud trusted subsystem, the cloud trusted subsystem
It is internally provided with credible administrative center, the signal end of the credible administrative center is connected with third party's trusted service center, described
The signal end of credible administrative center is connected with cloud platform layer, and the cloud platform layer is internally provided with platform credible server,
The signal end of the platform credible server is connected with virtualization layer, the virtualization layer be internally provided with virtualization it is credible
The signal end of server, the virtualization trusted servers is connected with third party's trusted service center.
Further, the signal end of the platform credible server is connected with platform safety mechanism, the platform safety machine
System is internally provided with plug-in unit among cloud platform.
Further, the interaction port of the virtualization trusted servers is connected with VM security mechanisms, the VM safe machines
System is internally provided with virtualization layer program management module.
Further, the signal control terminal of the virtualization layer program management module is connected to user terminal, the user terminal
Signal wire with virtualization trusted servers be connected, the interaction port of the user terminal is connected with third party's trusted service center
It connects.
Further, third party's trusted service center is internally provided with credible tactful pattern library.
Further, the cloud security subsystem includes cloud service provider environmental level and physical platform, the cloud service provider
Environmental level includes the credible management module of cloud platform and user management module, the cloud platform is credible management module and user management
The signal end of module is respectively connected with cloud terminal, and the physical platform is internally provided with physics trusted root.
Further, the output end of the credible management module of the cloud platform is connected with credible platform node administration module, institute
The output end for stating credible platform node administration module is connected with physics trusted root.
Further, the signal end of the user management module is connected with virtual credible root, the control of the virtual credible root
End processed is connected with virtual credible root management module, and the signal end of the virtual credible root management module is connected with physics trusted root
It connects.
Further, the control terminal of the virtual credible root management module is connected with third party's trusted service center, institute
The control terminal for stating third party's trusted service center is connected with cloud terminal, signal end and the virtual credible root management of the cloud terminal
Module is connected.
Compared with prior art, the beneficial effects of the invention are as follows:
(1) credible cloud support system of the invention is integrated by all security components in cloud computing in each calculate node
Distributed credible cloud system, the subsystem are managed collectively and are safeguarded by third party administrative center, provided for cloud security credible
Support;
(2) support system of the invention establishes system, safety, the independently operated subsystem of credible tripartite, and medium cloud is credible
The transparent operation of subsystem provides credible support for cloud security, realizes the Effec-tive Function of total system mechanism in cloud computing mode.
Description of the drawings
Fig. 1 is the overall structure diagram of the present invention;
Fig. 2 is the cloud security subsystem schematic diagram of the present invention.
Figure label:
1- cloud management layers;2- cloud platform layers;3- virtualization layers;4- third party's trusted service center;5- is credible tactful benchmark
Library;6- user terminals;7- cloud terminals;
101- cloud computing systems;102- cloud security subsystems;103- cloud trusted subsystems;104- cloud managements center;105-
Cloud management component;106- security management mechanisms;107- is credible administrative center;108- cloud service provider environmental levels;109- physicals
Platform;Management module that 110- cloud platforms are credible;111- credible platform node administration modules;112- user management modules;113- is virtual
Trusted root;114- virtual credible root management modules;115- physics trusted roots;
201- platform safety mechanism;Plug-in unit among 202- cloud platforms;203- platform credible servers;
301- virtualizes trusted servers;302-VM security mechanisms;303- virtualization layer program management modules.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As depicted in figs. 1 and 2, the present invention provides a kind of cloud computing data security supporting platform, including cloud management layer 1,
Cloud platform layer 2 and virtualization layer 3, the cloud management layer 1 include cloud computing system 101, cloud security subsystem 102 and the credible son of cloud
System 103, in actual operation, the operation of security system be for cloud computing system 101 it is fully transparent, will not be to system
Operation generate any influence, although and cloud security subsystem 102 can pass through cloud trusted subsystem 103 call bottom credible work(
Can, but the specific implementation of these trusted functions is completed inside cloud trusted subsystem 103, is completely thoroughly to secure subsystem
Bright, accomplish cloud computing system, cloud security system and cloud reliability service.
The signal end of the cloud computing system 101 is interconnected with cloud security subsystem 102, the cloud security subsystem
102 control terminal is connected with cloud trusted subsystem 103, and the cloud computing system 101 includes cloud management center 104, the cloud
104 signal end of administrative center is connected with cloud management component 105, and the signal end of the cloud management component 105 is connected with safety management
The control terminal of mechanism 106, the security management mechanism 106 is connected with cloud trusted subsystem 103, the cloud trusted subsystem
103 are internally provided with credible administrative center 107, and the signal end of the credible administrative center 107, which is connected with third party, to convince
The signal end at business center 4, the credible administrative center 107 is connected with cloud platform layer 2, the inside setting of the cloud platform layer 2
There are platform credible server 203, the signal end of the platform credible server 203 to be connected with virtualization layer 3, the virtualization
Layer 3 is internally provided with virtualization trusted servers 301, and the signal end of the virtualization trusted servers 301 can with third party
Telecommunications services center 4 is connected.
It should be further noted that cloud management center 104 is located at management level, it is responsible for carrying out unified pipe to virtual platform
Reason, cloud management component are located in cloud computing system, and support is provided for the system management function of cloud computing;Security management mechanism 106
In cloud security subsystem, the security mechanism of cloud computing system is responsible for and safeguarded, safety is provided for the safety of cloud platform
It supports and protection, credible administrative center 107 interacts with third party's trusted service center 4 and platform trusted service, passes through calling the
The credible strategy that tripartite's trusted service center 4 provides provides credible management and credible security for virtual platform.
The virtualization layer 3 includes mainly guest virtual machine, can be in cloud computing system by virtualization layer application program
Layer application provides specific service, and the safety of guest virtual machine is realized by cloud security subsystem 102, cloud security system root
Demand for security according to client is the corresponding security mechanism of deploying virtual machine, in addition, to support the credible of cloud system, it is special credible in cloud
Subsystem establishes virtual machine trusted service program on 103, and virtual machine trusted service, which passes through, calls third party's trusted service center 4
Credible strategy provides credible support for secure virtual machine mechanism and platform trusted service, in entire credible cloud support subsystem
In, application system, security system and trusted system are not only interrelated but also energy independent operating, being embodied in for each functions of modules are each
Subsystem internal is completed, and is externally only provided the interface of data function interaction, is realized the transparent transmission of data.
It further illustrates, the signal end of the platform credible server 203 is connected with platform safety mechanism 201, institute
The plug-in unit 202 among cloud platform that is internally provided with of platform safety mechanism 201 is stated, is located in cloud computing system among cloud platform layer 2,
The interaction being mainly used between different virtual platforms;Platform safety mechanism 201 ensures virtual platform using safe practice
Safety;Platform credible server 203 obtains credible management by being communicated with credible administrative center, virtual machine trusted service
The credible demand of credible management strategy and virtual machine that center is sent provides trusted service to credible platform, supports platform peace
The trusted function of full mechanism 201.
It further illustrating, the interaction port of the virtualization trusted servers 301 is connected with VM security mechanisms 302,
The VM security mechanisms 302 are internally provided with virtualization layer program management module 303, the virtualization layer program management module
303 signal control terminal is connected to user terminal 6, and the signal wire of the user terminal 6 is connected with virtualization trusted servers 301,
The interaction port of the user terminal 6 is connected with third party's trusted service center 4, third party's trusted service center 4 it is interior
Portion is provided with credible tactful pattern library 5.
It further illustrates, the cloud security subsystem 102 includes cloud service provider environmental level 108 and physical platform
109, the cloud service provider environmental level 108 includes the credible management module 110 of cloud platform and user management module 112, the cloud
The signal end of platform credible management module 110 and user management module 112 is respectively connected with cloud terminal 7, the physical platform 109
It is internally provided with physics trusted root 115, the output end for management module 110 that the cloud platform is credible is connected with credible platform node pipe
Module 111 is managed, the output end of the credible platform node administration module 111 is connected with physics trusted root 115, and cloud user can
It is sent and is reported to trusted third party by virtual machine trusted service process, support the trust authentication of virtual machine running environment, in addition,
Cloud user also contemplates for directly establishing credible connection with trusted third party, to verify the credible of guest virtual machine integrity report
Property.
It further illustrates, the signal end of the user management module 112 is connected with virtual credible root 113, ensure that
Its operational process is transparent to underlying mechanisms, and the control terminal of the virtual credible root 113 is connected with virtual credible root management module
114, the signal end of the virtual credible root management module 114 is connected with physics trusted root 115, the virtual credible root management
The control terminal of module 114 is connected with third party's trusted service center 4, the control terminal at third party's trusted service center 4 with
Cloud terminal 7 is connected, and the signal end of the cloud terminal 7 is connected with virtual credible root management module 114.
In credible cloud hierarchical structure, application system independent operating, between the security strategy mechanism on different nodes also simultaneously
It is not connected directly, but is established and contacted by trusted subsystem, the unification of credible strategy is carried out by third party's trusted service center
It management and safeguards, and by the functions such as the extension of chain-of-trust based on trusted root and credible measurement, credible report, realizes different subsystems
Credible interconnection between system, ensures the credible of cloud environment.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Profit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims
Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.
Claims (9)
1. a kind of cloud computing data security supporting platform, including cloud management layer (1), cloud platform layer (2) and virtualization layer (3),
It is characterized in that:The cloud management layer (1) includes cloud computing system (101), cloud security subsystem (102) and cloud trusted subsystem
(103), signal end Yu cloud security subsystem (102) interactive connection of the cloud computing system (101), the cloud security subsystem
(102) control terminal is connected with cloud trusted subsystem (103), and the cloud computing system (101) includes cloud management center
(104), cloud management center (104) signal end is connected with cloud management component (105), the letter of the cloud management component (105)
Number end is connected with security management mechanism (106), control terminal and the cloud trusted subsystem (103) of the security management mechanism (106)
It is connected, the cloud trusted subsystem (103) is internally provided with credible administrative center (107), the credible administrative center
(107) signal end is connected with third party's trusted service center (4), and the signal end and cloud of the credible administrative center (107) are flat
Platform layer (2) is connected, and the cloud platform layer (2) is internally provided with platform credible server (203), the platform credible service
The signal end of device (203) is connected with virtualization layer (3), and the virtualization layer (3) is internally provided with virtualization trusted service
The signal end of device (301), the virtualization trusted servers (301) is connected with third party's trusted service center (4).
2. a kind of cloud computing data security supporting platform according to claim 1, it is characterised in that:The platform credible clothes
The signal end of business device (203) is connected with platform safety mechanism (201), and the platform safety mechanism (201) is internally provided with cloud
Plug-in unit (202) among platform.
3. a kind of cloud computing data security supporting platform according to claim 1, it is characterised in that:The virtualization is credible
The interaction port of server (301) is connected with VM security mechanisms (302), and the VM security mechanisms (302) are internally provided with void
Quasi-ization layer program management module (303).
4. a kind of cloud computing data security supporting platform according to claim 3, it is characterised in that:The virtualization layer journey
The signal control terminal of sequence management module (303) is connected to user terminal (6), and the signal wire of the user terminal (6) and virtualization are credible
Server (301) is connected, and the interaction port of the user terminal (6) is connected with third party's trusted service center (4).
5. a kind of cloud computing data security supporting platform according to claim 1, it is characterised in that:The third party is credible
Service centre (4) is internally provided with credible tactful pattern library (5).
6. a kind of cloud computing data security supporting platform according to claim 1, it is characterised in that:The cloud security subsystem
System (102) includes cloud service provider environmental level (108) and physical platform (109), and the cloud service provider environmental level (108) includes
Management module that cloud platform is credible (110) and user management module (112), the credible management module of cloud platform (110) and user
The signal end of management module (112) is respectively connected with cloud terminal (7), the physical platform (109) to be internally provided with physics credible
Root (115).
7. a kind of cloud computing data security supporting platform according to claim 6, it is characterised in that:The cloud platform is credible
The output end of management module (110) is connected with credible platform node administration module (111), the credible platform node administration module
(111) output end is connected with physics trusted root (115).
8. a kind of cloud computing data security supporting platform according to claim 1, it is characterised in that:The user management mould
The signal end of block (112) is connected with virtual credible root (113), and the control terminal of the virtual credible root (113), which is connected with, virtually may be used
Believe that root management module (114), the signal end of the virtual credible root management module (114) are connected with physics trusted root (115).
9. a kind of cloud computing data security supporting platform according to claim 1, it is characterised in that:The virtual credible root
The control terminal of management module (114) is connected with third party's trusted service center (4), third party's trusted service center (4)
Control terminal be connected with cloud terminal (7), the signal end of the cloud terminal (7) is connected with virtual credible root management module (114)
It connects.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711464615.XA CN108418786A (en) | 2017-12-28 | 2017-12-28 | A kind of cloud computing data security supporting platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711464615.XA CN108418786A (en) | 2017-12-28 | 2017-12-28 | A kind of cloud computing data security supporting platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108418786A true CN108418786A (en) | 2018-08-17 |
Family
ID=63125707
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711464615.XA Pending CN108418786A (en) | 2017-12-28 | 2017-12-28 | A kind of cloud computing data security supporting platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108418786A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109167785A (en) * | 2018-09-03 | 2019-01-08 | 郑州云海信息技术有限公司 | A kind of call method and service server of virtual credible root |
CN110324424A (en) * | 2019-05-13 | 2019-10-11 | 上海分布信息科技有限公司 | A kind of credible cloud service framework based on block chain |
CN111158906A (en) * | 2019-12-19 | 2020-05-15 | 北京可信华泰信息技术有限公司 | Credible cloud system for active immunization |
CN112016090A (en) * | 2019-05-30 | 2020-12-01 | 阿里巴巴集团控股有限公司 | Secure computing card, and measurement method and system based on secure computing card |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103139221A (en) * | 2013-03-07 | 2013-06-05 | 中国科学院软件研究所 | Dependable virtual platform and construction method thereof, data migration method among platforms |
CN103927489A (en) * | 2014-04-22 | 2014-07-16 | 陈幼雷 | System and method for trusted storage of data |
CN106059777A (en) * | 2016-08-23 | 2016-10-26 | 浪潮电子信息产业股份有限公司 | Design method for trusted middleware of cloud platform |
US20170359170A1 (en) * | 2016-06-10 | 2017-12-14 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Workload encryption key |
-
2017
- 2017-12-28 CN CN201711464615.XA patent/CN108418786A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103139221A (en) * | 2013-03-07 | 2013-06-05 | 中国科学院软件研究所 | Dependable virtual platform and construction method thereof, data migration method among platforms |
CN103927489A (en) * | 2014-04-22 | 2014-07-16 | 陈幼雷 | System and method for trusted storage of data |
US20170359170A1 (en) * | 2016-06-10 | 2017-12-14 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Workload encryption key |
CN106059777A (en) * | 2016-08-23 | 2016-10-26 | 浪潮电子信息产业股份有限公司 | Design method for trusted middleware of cloud platform |
Non-Patent Citations (1)
Title |
---|
张松鸽: "云计算下可信支撑机制关键技术研究与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑(月刊)》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109167785A (en) * | 2018-09-03 | 2019-01-08 | 郑州云海信息技术有限公司 | A kind of call method and service server of virtual credible root |
CN109167785B (en) * | 2018-09-03 | 2022-04-29 | 郑州云海信息技术有限公司 | Calling method of virtual trusted root and service server |
CN110324424A (en) * | 2019-05-13 | 2019-10-11 | 上海分布信息科技有限公司 | A kind of credible cloud service framework based on block chain |
CN112016090A (en) * | 2019-05-30 | 2020-12-01 | 阿里巴巴集团控股有限公司 | Secure computing card, and measurement method and system based on secure computing card |
CN112016090B (en) * | 2019-05-30 | 2024-01-23 | 阿里巴巴集团控股有限公司 | Secure computing card, and measuring method and system based on secure computing card |
CN111158906A (en) * | 2019-12-19 | 2020-05-15 | 北京可信华泰信息技术有限公司 | Credible cloud system for active immunization |
CN111158906B (en) * | 2019-12-19 | 2023-04-28 | 北京可信华泰信息技术有限公司 | Active immunity credible cloud system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105284091B (en) | A kind of certificate acquisition method and apparatus | |
CN108418786A (en) | A kind of cloud computing data security supporting platform | |
CN105991734B (en) | A kind of cloud platform management method and system | |
CN105095768B (en) | A kind of construction method of the trusted servers trust chain based on virtualization | |
CN103139159B (en) | Secure communication between virtual machine in cloud computing framework | |
CN103618752B (en) | A kind of virtual machine remote desktop safety accesses system and method | |
Xu et al. | An autonomic agent trust model for IoT systems | |
CN106059777B (en) | A kind of credible Design of Middleware method of cloud platform | |
CN107579998A (en) | Personal data center and digital identification authentication method based on block chain, digital identity and intelligent contract | |
CN107634951A (en) | Docker vessel safeties management method, system, equipment and storage medium | |
CN101729541B (en) | Method and system for accessing resources of multi-service platform | |
CN104320391A (en) | Cloud authentication method and system | |
CN106127016B (en) | A kind of operating system user logs in the system and implementation method of authentic authentication | |
US20200143493A1 (en) | Controlling access to a vault server in a multitenant environment | |
CN106470184A (en) | Safety certifying method, apparatus and system | |
CN106657032A (en) | System and method for realizing identity identification and data authentication based on security medium confidential short message | |
CN107704308A (en) | Virtual platform vTPM management systems, trust chain constructing method and device, storage medium | |
CN102567683A (en) | Cloud computing system and cloud computing realizing method | |
CN105354482A (en) | Single sign-on method and device | |
CN106406980B (en) | A kind of dispositions method and device of virtual machine | |
CN109828924A (en) | Test method, device and calculating equipment and medium | |
CN108365994A (en) | A kind of cloud security management platform for cloud computing security and unity management | |
CN104967515B (en) | A kind of identity identifying method and server | |
CN108965315A (en) | A kind of authentic authentication method of terminal device, device and terminal device | |
CN107623699A (en) | A kind of encryption system based on cloud environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180817 |