CN108737494A - teaching platform based on cloud computing - Google Patents
teaching platform based on cloud computing Download PDFInfo
- Publication number
- CN108737494A CN108737494A CN201810304845.8A CN201810304845A CN108737494A CN 108737494 A CN108737494 A CN 108737494A CN 201810304845 A CN201810304845 A CN 201810304845A CN 108737494 A CN108737494 A CN 108737494A
- Authority
- CN
- China
- Prior art keywords
- data
- data storage
- storage layer
- service arrangement
- layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013500 data storage Methods 0.000 claims abstract description 24
- 241001310793 Podium Species 0.000 claims abstract description 18
- 230000001681 protective effect Effects 0.000 claims abstract description 14
- 238000012550 audit Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 10
- 230000006399 behavior Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000012423 maintenance Methods 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 238000000034 method Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 239000000243 solution Substances 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000007689 inspection Methods 0.000 description 3
- 230000005856 abnormality Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 238000002347 injection Methods 0.000 description 2
- 239000007924 injection Substances 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000008439 repair process Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 206010003830 Automatism Diseases 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 238000009825 accumulation Methods 0.000 description 1
- 238000004378 air conditioning Methods 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000001816 cooling Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 230000013011 mating Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000000306 recurrent effect Effects 0.000 description 1
- 230000006641 stabilisation Effects 0.000 description 1
- 238000011105 stabilization Methods 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Tourism & Hospitality (AREA)
- Computing Systems (AREA)
- Human Resources & Organizations (AREA)
- Computer Security & Cryptography (AREA)
- Educational Administration (AREA)
- Educational Technology (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Present invention is disclosed a kind of teaching platform based on cloud computing technology, which includes:Data storage layer, service arrangement layer, safe protective covering and podium level.Data storage layer is for storing teaching resource;Service arrangement layer is for accessing data storage layer and distributing data;Safe protective covering is used to carry out security protection to data storage layer and the access from podium level is authenticated and is audited;The data that podium level is used to send out access instruction to service arrangement layer and display is accessed.Information education resource is developed in virtualized environment by cloud computing technology, implementation information educational applications reduce equipment cost and operation cost, and so that teaching is more convenient flexible, data are safer, while being also convenient for student and rapidly using infrastructure resources.
Description
Technical field
The embodiment of the present invention is related to a kind of electrically operated teaching aid, flat in particular to a kind of teaching based on cloud computing
Platform.
Background technology
Cloud computing (English:Cloud computing), it is a kind of calculation Internet-based, in this way,
Shared software and hardware resources and information can be supplied to computer and other equipment on demand.It is large-scale distributed that its is corresponding
Environment, core are to provide data storage and network service.
The Web-based instruction is as a kind of emerging instructional mode, in particular to using computer network as the modern media of representative
The teaching carried out on platform, and network technology and Internet resources have fully been used in teaching process, promote the development of student.
Most of colleges and universities are owned by network center and the calculating center of oneself, and huge fund purchase underlying hardware facility, education network bandwidth,
System platform, software program, information resources etc., to application of promoting IT application.But for colleges and universities, pass through investment
Mode upgrade information central apparatus cost is higher, and is difficult to meet education Information System rapid development and services wanting for diversification
It asks.
Currently, most colleges and universities are all using the pattern for individually enjoying respective computer, this pattern has purchasing department
Affix one's name to the problems such as of high cost, final-period management is difficult in maintenance, the easy middle virus of system.In particular, computer hardware technique
It continues to develop, school needs constantly to undertake the cost of high software and hardware maintenance and upgrade.
Invention content
It is an object of the invention in view of the above-mentioned drawbacks in the prior art, provide a kind of low cost, easy care, and pacify
The reliable teaching platform based on cloud computing entirely, it is insufficient, soft or hard that there are teaching resources solving teaching platform in the prior art
Part updates the problems such as high with maintenance cost, slow, the existing resource utilization of renewal speed is low.
For achieving the above object, present invention employs following technical solutions:A kind of teaching platform based on cloud computing,
Including:Data storage layer, service arrangement layer, safe protective covering and podium level, wherein data storage layer is for storing teaching money
Source, it can be achieved that memory capacity elastic dilatation, according to the size dynamic retractility of stored data comprising local data library, with
And the strange land database of real-time synchronization is transmitted with the locality database data;Service arrangement layer includes being coupled with local data library
Local Cloud Server, and the strange land Cloud Server that is coupled with strange land database, local Cloud Server and strange land Cloud Server point
Not Cai Yong load balancing carry out traffic distribution, by the service ability of traffic distribution expanded application system external, pass through eliminate it is single
Point failure promotes the availability of application system;Safe protective covering is between service arrangement layer and podium level, for being deposited to data
Reservoir carries out security protection and access is authenticated and is audited comprising DDoS protection modules, WAF protection modules, peace are ridden
Scholar's module, CA certificate authentication module, database audit module and encrypting module;Podium level accesses service department by safe protective covering
Administration's layer simultaneously shows the data being accessed comprising work station and network mobile device.
Compared with the prior art, advantage of the invention is that:A kind of teaching platform based on cloud computing technology is disclosed, it should
Teaching platform includes:Data storage layer, service arrangement layer, safe protective covering and podium level.Data storage layer is imparted knowledge to students for storing
Resource;Service arrangement layer is for accessing data storage layer and distributing data;Safe protective covering is for pacifying data storage layer
Full protection and the access from podium level is authenticated and is audited;Podium level is used to send out access instruction to service arrangement layer
And the data that display is accessed.Information education resource, implementation information are developed in virtualized environment by cloud computing technology
To change educational applications, reduce equipment cost and operation cost, and so that teaching is more convenient flexible, data are safer, while
Student is facilitated rapidly to use infrastructure resources.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be in embodiment or description of Related Art
Required attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description merely relates to some of the present invention
Embodiment, not limitation of the present invention.
Fig. 1 is the system block diagram of the teaching platform based on cloud computing of the present embodiment.
Specific implementation mode
To better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real
It applies mode and further unrestricted detailed description is made to technical solution of the present invention.
See that Fig. 1, the teaching platform based on cloud computing technology of the present embodiment include successively from the bottom up:Data storage layer,
Service arrangement layer, safe protective covering and podium level.Data storage layer is for storing teaching resource;Service arrangement layer is for accessing number
According to accumulation layer and distribute data;Safe protective covering is used to carry out security protection to data storage layer and to the visit from podium level
It asks and is authenticated and audits;The data that podium level is used to send out access instruction to service arrangement layer and display is accessed.
One, data storage layer:
Data storage layer is mainly used for storing the data in teaching platform, to facilitate inquiry and analysis in the future.
The data storage layer of the present embodiment includes local data library and strange land database, and local data library includes master library and spare library again,
Strange land database equally includes master library and spare library.Data storage layer can realize the elastic dilatation of memory capacity, according to being stored
The size dynamic retractility of data, and can realize using data transport service the real-time synchronization of Liang Ge data centers.
The data storage layer of the present embodiment using strange land calamity for framework, using the framework, can regional A by earthquake,
The natural calamities such as typhoon or equipment fault and when normal service cannot be provided, operation system can automatically switch to regional B and continue just
Often work can eliminate influence of the Single Point of Faliure to system normal operation, ensure that system is safe and reliable.Want to realize operation system
Automatic switching function between regional A and area B, it is necessary to realize the real time data synchronization of the area two places A, B.Data transport service
It can solve the problems, such as remote, Millisecond real-time data transmission, realize that the data between the database between two different regions are real-time
It is synchronous.
Data transport service realizes that the process that data synchronize is as follows:
(1) initialization is synchronized, anti-data will be mainly deposited in regional A examples and initialize portion in regional B.
(2) real-time synchronization is carried out to data, it is same in real time into data in two database of regional A, B after the completion of initialization
Step section.At this stage, data transport service is by log read and playback, realizes the real-time same of two interzone data
Step.
Two, service arrangement layer:
Service arrangement layer includes the local Cloud Server coupled with local data library, and is coupled with strange land database different
Ground Cloud Server.In the data meeting real-time synchronization to database of Cloud Server.
Longitudinal extension (upgrading configuration) can be achieved in service arrangement layer, can also be achieved (elastic telescopic, increase number extending transversely
Amount), dynamic retractility can be carried out according to the demand of user at any time, largely reduce the expense of college youth league work.For
The burst flow for accessing peak period the periods such as the high flow capacity occurred or the end of term is distributed, this service arrangement layer is using negative
Balanced progress traffic distribution is carried, by the service ability of traffic distribution expanded application system external, is carried by eliminating Single Point of Faliure
Rise the availability of application system;
The concrete function of elastic telescopic is:According to the business demand and strategy of user, economically adjust automatically elastic calculation
The management service of resource.The application program that the portfolio that elastic telescopic is not only suitable for constantly fluctuates, while also being adapted for portfolio stabilization
Application program.
A, the cloud server cluster that can be leased colleges and universities is monitored, and replaces unsound cloud service automatically at any time
Device saves O&M cost;
B, the cloud server cluster that can be leased colleges and universities is managed, and increases ECS examples automatically in peak period, in industry
Business fall after rise when reduce ECS examples automatically, automatically according to user preset strategy create and discharge ECS examples, save infrastructure at
This;
C, it is not necessarily to manual intervention, is taken on demand, resource utilization is improved, effectively reduces cost.
The concrete function of load balancing is:It, will be positioned at more cloud services of same region by the way that Virtual Service Address is arranged
Device (ECS) example virtual is at a high-performance, the application service pond of High Availabitity;Further according to the specified mode of application, will come from flat
The network request of platform layer is distributed in Cloud Server pond.Load balancing service is that Cloud Server one towards multimachine scheme is mating
Service needs same Cloud Server to be used in combination, and is the load balancing service that more Cloud Servers are carried out with traffic distribution, Ke Yitong
Inflow-rate of water turbine distributes the service ability of expanded application system external, and the availability of application system is promoted by eliminating Single Point of Faliure.
Load balancing service can check the health status of Cloud Server in Cloud Server pond, the cloud of automatism isolation abnormality
Server improves the integrity service ability of application to solve the problems, such as the single-point of separate unit Cloud Server.
Load balancing supports poll, weighted polling, weighting Smallest connection three kinds of dispatching algorithms of number.
Poll:External request is sequentially distributed on the Cloud Server of rear end successively according to access times.
Weighted polling:Weighted value can be arranged to every back-end server in user.The higher server of weighted value, is polled
The number (probability) arrived is also higher.
Weight Smallest connection number:In addition to being polled according to the weighted value set to every back-end server, simultaneously also
Consider the actual loading (connecting number) of back-end server.It is current to connect the smaller back-end server of number when weighted value is identical
The number (probability) being polled to is also higher.
Three, safe protective covering:
Safe protective covering includes DDoS protection modules, WAF protection modules, peace knight module, CA certificate authentication module, data
Library Audit Module and encrypting module mainly carry out security protection to the teaching resource for being stored in data storage layer, and to accessing
Podium level be authenticated and audit, guarantee data security, wherein DDoS protection, WAF protection belongs to network safety prevention, pacify
Knight belongs to server security protection, and CA certificate belongs to using security protection, and database audit, cryptographic services belong to data peace
Entirely.The each submodule of safe protective covering has following function:
A, DDoS protection modules close rule for attack in traditional agency, detection, rebound, certification, black and white lists, message
Etc. on the basis of standard techniques, in conjunction with Web safety filterings, prestige, seven layers of applied analysis, user behavior analysis, feature learning, anti-
The multiple technologies such as shield confrontation carry out blocking filtering to threat, can protect three to seven layers of ddos attack.It is anti-by configuring DDoS high
Attack traffic is drained into high anti-IP by IP, it is ensured that source station it is reliable and stable, ensure by protection user in the case where attacking persistent state,
Business service still can be externally provided.
B, WAF protection modules, Web application firewalls (Web Application Firewall, abbreviation WAF) are based on cloud
Safe big data ability, for defend SQL injection, XSS cross site scriptings, common Web server plug-in unit loophole, wooden horse upload, it is non-
The common attacks such as core resource access are authorized, and filter the CC attacks of magnanimity malice.User is not necessarily to without installing any soft and hardware
Website configuration, code are changed, it is convenient, fast, efficient, and can detect to attack and protect in one millisecond and come into force, accomplish to protect nothing
Delay carries out real-time protection.It avoids website asset data from revealing, ensures the safety and availability of website.
C, pacify knight's module, the work(such as host Hole Detection, baseline inspection, hacker attacks detection, assets unified management are provided
Energy.Wherein, it is followed up in real time by the update to Microsoft, if finding Cloud Server, there are high-risk official's loopholes not to repair,
It will be repaired automatically, the loophole of host monitor and repair in real time;High-risk Configuration baseline verification provides account
Number safety detection, weak passwurd inspection and configuration risk supervision, can to left after hacker attacks account, weak password and common step on
Record configuration, process configuration and registration table configuration are checked;Hacker attacks inspection has recorded all and login record, for non-common
Login behavior is reminded in real time, and the behavior of illegal decryption is identified and is intercepted, and avoids repeatedly being guessed solution by hacker
Password and invade;In addition, periodically obtain and record the progress information run on server, carry out unified management and check, it is right
The change conditions of process are recorded, the assets that independently note abnormalities behavior.Body-fitting safety protection is carried out to Cloud Server, establishes one
A safe operation management platform.
D, CA certificate authentication module realizes website HTTPSization, encrypts the interactive access between user and website, strengthens website
Displaying degree that user side is credible, achieve the purpose that it is anti-kidnap, be anti-tamper, anti-monitoring.And before Certificate Revocation, carried in time
It wakes up, signs and issues new authentication, after preventing Certificate Revocation, unmanned follow-up leads to the influence to business.
E, database audit module records the database risks operation behavior such as database SQL injection, risk operations
With alarm.It supports RDS cloud databases, security diagnostics, maintenance, managerial ability is provided for cloud database.By monitor bypass pattern,
Support the deployment for being totally independent of database.Under the premise of not influencing database day-to-day operation efficiency, flexible audit is realized
With monitoring.It is audited based on data base manipulation statement:It can monitor database login, access behavior, effectively conducting audit strategy.Number
Powerful database activity audit analysis ability is also provided according to library auditing service, the activity of database is flexibly presented from multiple angles
State helps user effectively to execute security strategy.
F, encrypting module, hardware encryption equipment of the cryptographic services based on State Commercial Cryptography Administration's certification, using meeting state secret pipe
The password machine equipment that reason office and People's Bank of China require, supports symmetric cryptographic algorithm, asymmetric cryptographic algorithm, digest algorithm
Deng.In addition, realizing clustering and load-balancing function between cipher machine, the burst thing such as computer room broken string, equipment fault is successfully managed
Part has higher reliability.
Four, podium level:
Podium level includes that the networks such as work station and the large screen being connected with work station, notebook, tablet computer and mobile phone are set
It is standby, browser only need to be installed, network address can be specified by input, is accessed in data storage layer by service arrangement layer after authorized
Data.
In conclusion the teaching platform of the present invention develops information education money by cloud computing technology in virtualized environment
Source, implementation information educational applications.After colleges and universities access cloud computing service, no longer needs to spend substantial contribution purchase hardware, be not necessarily to greatly
Computer room deployment hardware device, without more air-conditionings to server cooling, it is not necessary that special messenger safeguards, not need to buy so much business soft
Part mandate, no longer needs to as some non-recurrent calculating tasks and the hardware device of purchasing expensive, these services can pass through cloud
Service platform obtains, and colleges and universities only need pay-for-use.Cloud computing technology is applied in teaching platform, fixed assets are not only reduced
The expense of expense, and so that teaching is more convenient flexibly, while it being also easy to manager's maintenance, facilitate student rapidly to use base
Infrastructure resource can need to only access internet after making student authorized and just may have access to needed for it at any time and any place
Resource.
It is pointed out that the technical concepts and features of above-mentioned preferred embodiment only to illustrate the invention, its object is to
Those skilled in the art can understand the contents of the present invention and implements according to this, and the protection of the present invention can not be limited with this
Range.Any equivalent change or modification in accordance with the spirit of the invention should be covered by the protection scope of the present invention.
Claims (1)
1. a kind of teaching platform based on cloud computing, it is characterised in that it includes:Data storage layer, service arrangement layer, safety are anti-
Sheath and podium level, wherein
Data storage layer realizes the elastic dilatation of memory capacity for storing teaching resource, can be according to the big of stored data
Small dynamic retractility comprising local data library, and the strange land database with locality database data transmission real-time synchronization;
Service arrangement layer includes the local Cloud Server coupled with local data library, and the strange land cloud coupled with strange land database
Server, local Cloud Server and strange land Cloud Server are respectively adopted load balancing and carry out traffic distribution, are expanded by traffic distribution
The external service ability of application system is opened up, the availability of application system is promoted by eliminating Single Point of Faliure;
Safe protective covering is between service arrangement layer and podium level, for carrying out security protection to data storage layer and to visiting
It asks and is authenticated and audits comprising DDoS protection modules, WAF protection modules, peace knight module, CA certificate authentication module, number
According to library Audit Module and encrypting module;
Podium level sends out access instruction by safe protective covering to service arrangement layer, and shows the data being accessed comprising work
Make station and network mobile device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810304845.8A CN108737494A (en) | 2018-04-08 | 2018-04-08 | teaching platform based on cloud computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810304845.8A CN108737494A (en) | 2018-04-08 | 2018-04-08 | teaching platform based on cloud computing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108737494A true CN108737494A (en) | 2018-11-02 |
Family
ID=63940658
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810304845.8A Pending CN108737494A (en) | 2018-04-08 | 2018-04-08 | teaching platform based on cloud computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108737494A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109493650A (en) * | 2018-12-05 | 2019-03-19 | 安徽智训机器人技术有限公司 | A kind of language teaching system and method based on artificial intelligence |
CN109617912A (en) * | 2019-01-15 | 2019-04-12 | 成都知道创宇信息技术有限公司 | A kind of device intelligently switching anti-ddos attack using multiple domain names |
WO2021139264A1 (en) * | 2020-07-28 | 2021-07-15 | 平安科技(深圳)有限公司 | Object storage control method and apparatus, computer device and storage medium |
CN114257566A (en) * | 2020-09-11 | 2022-03-29 | 北京金山云网络技术有限公司 | Domain name access method and device and electronic equipment |
CN116506105A (en) * | 2023-06-26 | 2023-07-28 | 山东极光智能科技有限公司 | Data theft and tampering prevention encryption method based on block chain |
CN117499397A (en) * | 2023-12-29 | 2024-02-02 | 广东信聚丰科技股份有限公司 | Education cloud service platform based on big data analysis |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102298762A (en) * | 2011-10-12 | 2011-12-28 | 佛山科学技术学院 | intelligent campus system |
CN102402777A (en) * | 2011-09-30 | 2012-04-04 | 广东电子工业研究院有限公司 | Digital campus virtual classroom ranking and registration system and method based on cloud computing |
CN107220259A (en) * | 2016-03-22 | 2017-09-29 | 北京京东尚科信息技术有限公司 | A kind of database extension system, equipment and the method for extending database |
CN107464461A (en) * | 2017-07-28 | 2017-12-12 | 广州致仪计算机软件科技有限公司 | One kind teaching cloud platform and its implementation |
US20180084057A1 (en) * | 2016-09-20 | 2018-03-22 | Samsung Electronics Co., Ltd | Activity driven smart home system |
-
2018
- 2018-04-08 CN CN201810304845.8A patent/CN108737494A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102402777A (en) * | 2011-09-30 | 2012-04-04 | 广东电子工业研究院有限公司 | Digital campus virtual classroom ranking and registration system and method based on cloud computing |
CN102298762A (en) * | 2011-10-12 | 2011-12-28 | 佛山科学技术学院 | intelligent campus system |
CN107220259A (en) * | 2016-03-22 | 2017-09-29 | 北京京东尚科信息技术有限公司 | A kind of database extension system, equipment and the method for extending database |
US20180084057A1 (en) * | 2016-09-20 | 2018-03-22 | Samsung Electronics Co., Ltd | Activity driven smart home system |
CN107464461A (en) * | 2017-07-28 | 2017-12-12 | 广州致仪计算机软件科技有限公司 | One kind teaching cloud platform and its implementation |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109493650A (en) * | 2018-12-05 | 2019-03-19 | 安徽智训机器人技术有限公司 | A kind of language teaching system and method based on artificial intelligence |
CN109617912A (en) * | 2019-01-15 | 2019-04-12 | 成都知道创宇信息技术有限公司 | A kind of device intelligently switching anti-ddos attack using multiple domain names |
CN109617912B (en) * | 2019-01-15 | 2021-05-28 | 成都知道创宇信息技术有限公司 | Device for preventing DDoS attack by adopting intelligent switching of multiple domain names |
WO2021139264A1 (en) * | 2020-07-28 | 2021-07-15 | 平安科技(深圳)有限公司 | Object storage control method and apparatus, computer device and storage medium |
CN114257566A (en) * | 2020-09-11 | 2022-03-29 | 北京金山云网络技术有限公司 | Domain name access method and device and electronic equipment |
CN116506105A (en) * | 2023-06-26 | 2023-07-28 | 山东极光智能科技有限公司 | Data theft and tampering prevention encryption method based on block chain |
CN116506105B (en) * | 2023-06-26 | 2023-09-01 | 山东极光智能科技有限公司 | Data theft and tampering prevention encryption method based on block chain |
CN117499397A (en) * | 2023-12-29 | 2024-02-02 | 广东信聚丰科技股份有限公司 | Education cloud service platform based on big data analysis |
CN117499397B (en) * | 2023-12-29 | 2024-03-22 | 广东信聚丰科技股份有限公司 | Education cloud service platform based on big data analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108737494A (en) | teaching platform based on cloud computing | |
Thota et al. | Big data security framework for distributed cloud data centers | |
CN106165371B (en) | The relay agent of secure connection is provided in controlled network environment | |
US20160248798A1 (en) | Method and apparatus for automating threat model generation and pattern identification | |
CN103023993B (en) | A kind of enterprise information system based on cloud computing | |
Ahmed et al. | A survey of big data cloud computing security | |
CN105656864B (en) | Key management system and management method based on TCM | |
CN105430000A (en) | Cloud computing security management system | |
CN105429999A (en) | Unified identity authentication system based on cloud platform | |
CN103067344A (en) | Non-invasive method and equipment for automatically issuing safety regulations in cloud environment | |
US11481478B2 (en) | Anomalous user session detector | |
Akhtar et al. | A comprehensive overview of privacy and data security for cloud storage | |
Tajadod et al. | Microsoft and Amazon: A comparison of approaches to cloud security | |
CN108390886A (en) | Educate big data secure access control system | |
Li | Cloud computing: introduction, application and security from industry perspectives | |
Yoshinov et al. | Specifications for Centralized DataCenter serving the educational cloud for Bulgaria | |
Chen | Network security protection technology under the background of computing big data | |
Thomas et al. | Cloud computing security using encryption technique | |
Fujimura et al. | New Educational ICT Environment with Cloud in Kyushu University | |
CN109818779A (en) | Network establishing method is concentrated in railway communication based on cloud computing technology | |
Sheela et al. | Secure Online Examination System on Azure Cloud with Load Balancer | |
Tripathi et al. | Study on secured framework for cloud based online banking | |
Yang et al. | Design and implementation of the platform for multimedia resource sharing based on cloud technology | |
Guster et al. | Pitfalls of devising a security policy in virtualized hosts | |
McLaughlin et al. | A high performance computing cluster under attack: the Titan incident |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181102 |
|
WD01 | Invention patent application deemed withdrawn after publication |