CN114035907A - Private computing system based on supercomputing center Slurm job scheduling and secure virtual machine container - Google Patents
Private computing system based on supercomputing center Slurm job scheduling and secure virtual machine container Download PDFInfo
- Publication number
- CN114035907A CN114035907A CN202111538866.4A CN202111538866A CN114035907A CN 114035907 A CN114035907 A CN 114035907A CN 202111538866 A CN202111538866 A CN 202111538866A CN 114035907 A CN114035907 A CN 114035907A
- Authority
- CN
- China
- Prior art keywords
- data
- scheduling
- privacy
- job
- supercomputing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 18
- 238000004364 calculation method Methods 0.000 claims description 17
- 230000000977 initiatory effect Effects 0.000 claims 1
- 238000007781 pre-processing Methods 0.000 claims 1
- 238000002360 preparation method Methods 0.000 claims 1
- 230000003068 static effect Effects 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000000034 method Methods 0.000 description 2
- 238000007418 data mining Methods 0.000 description 1
- YQGOJNYOYNNSMM-UHFFFAOYSA-N eosin Chemical compound [Na+].OC(=O)C1=CC=CC=C1C1=C2C=C(Br)C(=O)C(Br)=C2OC2=C(Br)C(O)=C(Br)C=C21 YQGOJNYOYNNSMM-UHFFFAOYSA-N 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/4881—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides a privacy computing system based on a supercomputing center Slurm job scheduling and a secure virtual machine container, which is characterized in that tasks such as joint query, joint modeling, joint computing and the like are realized through a privacy computing platform, identity authentication and data ciphertext output of each data participant are realized through an identity authentication service and a data gateway, cross-platform scheduling of privacy computing tasks is realized through task management and job scheduling, static management and dynamic execution of privacy computing algorithms are realized through a secure computing container and an algorithm warehouse, scheduling and execution of the privacy computing tasks in the supercomputing center are realized through the Slurm job scheduling system of the supercomputing center, and ciphertext data uploading, job publishing, remote authentication report acquisition and job result acquisition are realized through a Slurm client tool.
Description
Technical Field
The invention relates to the field of trusted computing and privacy computing, in particular to a privacy computing system based on supercomputing center Slurm job scheduling and a secure virtual machine container.
Background
The existence of the data island problem provides challenges for value mining of multi-party data, and the appearance of the privacy computing technology brings about an eosin for solving the problem.
The production-level privacy computing platform is generally deployed in an IDC machine room of a user in a privatized manner, but as multi-party data mining generally needs to use more computing resources, the user can easily encounter the bottleneck of the computing resources.
Disclosure of Invention
The embodiment of the invention provides a privacy computing system based on supercomputing center Slurm job scheduling and a safe virtual machine container, which is used for solving the computational power bottleneck problem existing in the conventional privacy computing platform.
The embodiment of the invention provides a privacy computing system based on a supercomputing center Slurm job scheduling and a secure virtual machine container, which is characterized in that tasks such as joint query, joint modeling, joint computing and the like are realized through a privacy computing platform, identity authentication and data ciphertext output of each data participant are realized through an identity authentication service and a data gateway, cross-platform scheduling of privacy computing tasks is realized through task management and job scheduling, static management and dynamic execution of privacy computing algorithms are realized through a secure computing container and an algorithm warehouse, scheduling and execution of the privacy computing tasks in the supercomputing center are realized through the Slurm job scheduling system of the supercomputing center, and ciphertext data uploading, job publishing, remote authentication report acquisition and job result acquisition are realized through a Slurm client tool.
The privacy computing platform based on the privatization deployment is used for issuing various privacy computing tasks, including joint query, joint modeling and trusted computing, providing various management subsystems such as a user-defined algorithm, alliance management, data source management and user authentication, and controlling task management and job scheduling.
The data user console based on the webpage side access and the open interface is used for providing the data provider with the system and accessing the system to a service system of the data user through the open interface.
The task acceptance and data external output module based on the trusted data gateway is used for a data provider to receive a data uploading task, the data provider to encrypt data in a domain, and the user data provider to upload ciphertext data across regions.
The privacy calculation algorithm management, scheduling and execution system based on supercomputing center Slurm job scheduling is used for receiving issued jobs, scheduling the jobs in the supercomputing center and feeding back job execution results, a user stores and manages the privacy calculation algorithm of the user, ciphertext data of a data provider is stored, and the privacy calculation algorithm management, scheduling and execution system is used for creating a safety calculation container and executing the privacy calculation algorithm.
According to the privacy computing system based on the supercomputing center Slurm job scheduling and the safe virtual machine container, disclosed by the embodiment of the invention, the privacy computing task with sensitive performance can be scheduled to the supercomputing center for execution in a job mode by fully utilizing the powerful calculation resources and Slurm scheduling capability of the supercomputing center, and the follow-up addition is efficient.
The privacy computing system based on the supercomputing center Slurm job scheduling and the safe virtual machine container uses the safe virtual machine container technology, can be compatible with Slurm, and guarantees data safety, computing confidentiality and safety of a data provider by combining the TEE remote authentication technology and the key negotiation technology.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a system according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a secure virtual machine container technology provided in an embodiment of the present invention.
Fig. 3 is a schematic diagram of a data security design provided in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic structural diagram of a system according to an embodiment of the present invention, where the system architecture is described as follows:
the privacy computing platform provided by the embodiment of the invention is privatized and deployed on a private cloud for a data user to use;
in the embodiment of the invention, a data provider needs to deploy a data gateway to process data tasks and upload encrypted data;
in the embodiment of the invention, a privacy computing platform schedules and issues jobs to a supercomputing center through a client tool and an API (application programming interface) interface of the supercomputing center;
in the embodiment of the invention, the algorithm supported by the privacy computing platform is stored on the supercomputing shared storage in a container mirror image mode and is dynamically scheduled and executed by Slurm; s
For fig. 1, the detailed flow of tasks is illustrated as follows:
in the embodiment of the invention, a data user initiates a private calculation task for using super calculation resources of data providers A and B on a private calculation platform through a control console, the private calculation platform translates the calculation task into a super calculation operation task according to the configuration of an algorithm and the like selected by a user, and submits the operation task to the super calculation through a super calculation client tool or an API (application programming interface);
after receiving the operation, the supercomputing center in the embodiment of the invention dispatches and executes the operation by the slarm, and the slarm starts the safe computing container according to the operation configuration and carries out related initialization operation;
in the embodiment of the invention, a privacy computing platform acquires a remote authentication report of a started security computing container through a supercomputing client tool or an API (application programming interface) interface, and the remote authentication report is used as a material for a data provider to perform key agreement;
in the embodiment of the invention, a privacy computing platform issues data tasks to data gateways of various data providers, and gives a remote authentication report of a started security computing container as a certificate for verification;
in the embodiment of the invention, a data provider verifies a remote authentication report of a secure computing container, confirms that the report is a safe and credible TEE environment, encrypts data required by a task through a data encryption key generated by key agreement, and submits ciphertext data to an overcomputing shared memory through an overcomputing client tool or an API (application programming interface);
in the embodiment of the invention, a security calculation container detects that all data providers finish the submission of ciphertext data, obtains a data decryption secret key by using corresponding key negotiation calculation, executes privacy calculation after decrypting the data, and encrypts a calculation result according to an encryption key negotiated with a data user after finishing the execution, so that a privacy calculation platform can call an operation result;
fig. 2 is a schematic diagram of a secure virtual machine container technology provided in an embodiment of the present invention.
Specifically, the advantages of this technique are mainly embodied in the following three points:
the embodiment of the invention uses the lightweight safety container, and the starting is faster and the execution is lighter on the premise of maintaining the performance and the safety;
in the embodiment of the invention, the container exclusively occupies the kernel, and the TEE technology ensures the confidentiality and the security of the privacy computing container;
the container in the embodiment of the invention conforms to OCI container operation and mirror image specifications and supports the slurm scheduling;
FIG. 3 is a schematic diagram of data security design provided by the embodiment of the present invention
Specifically, to ensure that data provided by data in the embodiment of the present invention can only be decrypted by a secure container, and protect the security of the decryption key, the privacy computing platform makes full use of a remote authentication mechanism of the TEE, and the following design is made:
in the embodiment of the invention, the privacy computation container also randomly generates a public and private key pair (PubKey1, PrivKey1) for each task, embeds the public key PubKey1 in a remote authentication report of the TEE, and signs by the TEE;
in the embodiment of the invention, in order to ensure that a data provider can accurately and safely take the public key of the privacy computation container, the data provider needs to verify the remote authentication report of the privacy computation container and take the public key PubKey1 from the report;
in the embodiment of the invention, each time a data provider provides data, a public and private key pair (PubKey2, PrivKey2) is randomly generated to carry out key agreement with PubKey1, the generated agreement key (SecretKey) is used for encrypting the data, and the randomly generated public key (PubKey2) is added to the front of a ciphertext;
in the embodiment of the invention, after the privacy computation container takes the ciphertext, the privacy computation container carries out key agreement according to the PrivKey1 of the privacy computation container and the PubKey2 in front of the ciphertext data, so that the agreement key (SecretKey) can be safely obtained to decrypt the data;
in summary, embodiments of the present invention provide a privacy computing system based on a supercomputing center churm job scheduling and a secure virtual machine container, so as to solve the computational power bottleneck problem existing in the existing privacy computing platform.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (6)
1. A private computing system based on supercomputing centric Slurm job scheduling and secure virtual machine containers, comprising: the system comprises a privacy computing platform based on privatization deployment, a data user console based on webpage end access and an open interface, a task acceptance and data external output module based on a trusted data gateway, and a privacy computing algorithm management, scheduling and execution system based on supercomputing center Slurm job scheduling.
The privacy computing platform based on the privatization deployment is used for issuing various privacy computing tasks, including joint query, joint modeling and trusted computing, providing various management subsystems such as a user-defined algorithm, alliance management, data source management and user authentication, and controlling task management and job scheduling.
The data user console based on the webpage side access and the open interface is used for providing the data provider with the system and accessing the system to a service system of the data user through the open interface.
The task acceptance and data external output module based on the trusted data gateway is used for a data provider to receive a data uploading task, the data provider to encrypt data in a domain, and the user data provider to upload ciphertext data across regions.
The privacy calculation algorithm management, scheduling and execution system based on supercomputing center Slurm job scheduling is used for receiving issued jobs, scheduling the jobs in the supercomputing center and feeding back job execution results, a user stores and manages the privacy calculation algorithm of the user, ciphertext data of a data provider is stored, and the privacy calculation algorithm management, scheduling and execution system is used for creating a safety calculation container and executing the privacy calculation algorithm.
2. The supercomputing-center-churm-job-scheduling and secure virtual-machine-container-based privacy computing system of claim 1, wherein the privatization-deployment-based privacy computing platform further requires:
supporting the initiation of various types of privacy computing tasks, comprising: joint query, joint modeling and trusted computing; supporting identity authentication based on public key infrastructure; supporting task global life cycle management of a privacy computation task; supporting a privacy calculation task as operation to carry out cross-system and regional scheduling; and the data gateway of the data provider is initiated with a data task according to the task requirement.
3. The supercomputing-center-churm-job-scheduling and secure virtual-machine-container-based private computing system of claim 1, wherein the web-side-access and open-interface-based console can be integrated and used by a data consumer in a manner that includes: the webpage access and the open interface-based access are carried out in a business system of a data user.
4. The private computing system based on supercomputing center churm job scheduling and secure virtual machine container according to claim 1, wherein the trusted data gateway based task acceptance and data export module is capable of supporting a data provider to complete a data task, and the operations supported by the data provider include: and receiving a data preparation task from the privacy computing platform, verifying the remote authentication report, preprocessing and encrypting data in the domain, and uploading ciphertext data across the domain and the system.
5. The supercomputing-center-based churm job scheduling and secure virtual machine container based privacy computing system according to claim 1, wherein the supercomputing-center-based churm job scheduling system based privacy computing algorithm management, scheduling and execution system is capable of providing functions of job publishing, remote authentication report acquisition, job result acquisition and ciphertext data uploading to the outside through a churm client tool.
6. A private computing system based on supercomputing center Slurm job scheduling and secure virtual machine containers according to any of claims 1-5, characterized in that computing tasks initiated by data users on the private computing platform can be scheduled to supercomputing centers for execution and return results correctly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111538866.4A CN114035907B (en) | 2021-12-16 | 2021-12-16 | Privacy computing system based on super computing center Slurm job scheduling and secure virtual machine container |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111538866.4A CN114035907B (en) | 2021-12-16 | 2021-12-16 | Privacy computing system based on super computing center Slurm job scheduling and secure virtual machine container |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114035907A true CN114035907A (en) | 2022-02-11 |
CN114035907B CN114035907B (en) | 2024-06-14 |
Family
ID=80140757
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111538866.4A Active CN114035907B (en) | 2021-12-16 | 2021-12-16 | Privacy computing system based on super computing center Slurm job scheduling and secure virtual machine container |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114035907B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114968525A (en) * | 2022-05-26 | 2022-08-30 | 深圳致星科技有限公司 | Cloud native task scheduling method and device for privacy computation and privacy data protection |
CN115495223A (en) * | 2022-11-18 | 2022-12-20 | 安徽华云安科技有限公司 | Task safety scheduling method, device, equipment and storage medium |
CN117056061A (en) * | 2023-10-13 | 2023-11-14 | 浙江远算科技有限公司 | Cross-supercomputer task scheduling method and system based on container distribution mechanism |
TWI843356B (en) | 2022-07-15 | 2024-05-21 | 大陸商中國銀聯股份有限公司 | A privacy computing device, method, system, electronic device and medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109101822A (en) * | 2018-07-10 | 2018-12-28 | 西安交通大学 | A method of solving data-privacy leakage problem in multi-party calculate |
CN110213231A (en) * | 2019-04-26 | 2019-09-06 | 西安电子科技大学 | A kind of the outsourcing data access control method and control system of the lightweight towards SGX |
US20200366653A1 (en) * | 2019-05-13 | 2020-11-19 | Verizon Patent And Licensing Inc. | System and method for providing a privacy layer to secure client data in a network |
CN112100606A (en) * | 2020-09-28 | 2020-12-18 | 邓燕平 | Online education processing method based on cloud big data calculation and online education platform |
CN112416565A (en) * | 2019-08-20 | 2021-02-26 | 中国科学院计算机网络信息中心 | Medium and small enterprise computing community system based on national high-performance computing environment |
CN113157399A (en) * | 2021-05-17 | 2021-07-23 | 北京冲量在线科技有限公司 | Unsupervised joint modeling method based on ARM architecture chip |
CN113239367A (en) * | 2020-07-07 | 2021-08-10 | 上海超算科技有限公司 | Identification data encryption access method in nuclear power networked collaborative computing environment |
CN113556339A (en) * | 2021-07-20 | 2021-10-26 | 北京冲量在线科技有限公司 | Privacy calculation method supporting heterogeneous TEE computational power node interaction |
-
2021
- 2021-12-16 CN CN202111538866.4A patent/CN114035907B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109101822A (en) * | 2018-07-10 | 2018-12-28 | 西安交通大学 | A method of solving data-privacy leakage problem in multi-party calculate |
CN110213231A (en) * | 2019-04-26 | 2019-09-06 | 西安电子科技大学 | A kind of the outsourcing data access control method and control system of the lightweight towards SGX |
US20200366653A1 (en) * | 2019-05-13 | 2020-11-19 | Verizon Patent And Licensing Inc. | System and method for providing a privacy layer to secure client data in a network |
CN112416565A (en) * | 2019-08-20 | 2021-02-26 | 中国科学院计算机网络信息中心 | Medium and small enterprise computing community system based on national high-performance computing environment |
CN113239367A (en) * | 2020-07-07 | 2021-08-10 | 上海超算科技有限公司 | Identification data encryption access method in nuclear power networked collaborative computing environment |
CN112100606A (en) * | 2020-09-28 | 2020-12-18 | 邓燕平 | Online education processing method based on cloud big data calculation and online education platform |
CN113157399A (en) * | 2021-05-17 | 2021-07-23 | 北京冲量在线科技有限公司 | Unsupervised joint modeling method based on ARM architecture chip |
CN113556339A (en) * | 2021-07-20 | 2021-10-26 | 北京冲量在线科技有限公司 | Privacy calculation method supporting heterogeneous TEE computational power node interaction |
Non-Patent Citations (2)
Title |
---|
SALHAB, NAZIH: "Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators", 2020 IFIP NETWORKING CONFERENCE AND WORKSHOPS (NETWORKING), pages 673 - 674 * |
周俊;沈华杰;林中允;曹珍富;董晓蕾;: "边缘计算隐私保护研究进展", 计算机研究与发展, no. 10, pages 21 - 45 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114968525A (en) * | 2022-05-26 | 2022-08-30 | 深圳致星科技有限公司 | Cloud native task scheduling method and device for privacy computation and privacy data protection |
CN114968525B (en) * | 2022-05-26 | 2023-03-24 | 深圳致星科技有限公司 | Cloud native task scheduling method and device for privacy computation and privacy data protection |
TWI843356B (en) | 2022-07-15 | 2024-05-21 | 大陸商中國銀聯股份有限公司 | A privacy computing device, method, system, electronic device and medium |
CN115495223A (en) * | 2022-11-18 | 2022-12-20 | 安徽华云安科技有限公司 | Task safety scheduling method, device, equipment and storage medium |
CN117056061A (en) * | 2023-10-13 | 2023-11-14 | 浙江远算科技有限公司 | Cross-supercomputer task scheduling method and system based on container distribution mechanism |
CN117056061B (en) * | 2023-10-13 | 2024-01-09 | 浙江远算科技有限公司 | Cross-supercomputer task scheduling method and system based on container distribution mechanism |
Also Published As
Publication number | Publication date |
---|---|
CN114035907B (en) | 2024-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10601801B2 (en) | Identity authentication method and apparatus | |
CN114035907A (en) | Private computing system based on supercomputing center Slurm job scheduling and secure virtual machine container | |
US10305688B2 (en) | Method, apparatus, and system for cloud-based encryption machine key injection | |
KR101712784B1 (en) | System and method for key management for issuer security domain using global platform specifications | |
TWI601405B (en) | Method and apparatus for cloud-assisted cryptography | |
KR101891420B1 (en) | Content protection for data as a service (daas) | |
WO2018090763A1 (en) | Method and device for configuring terminal master key | |
CN105359486A (en) | Secured access to resources using a proxy | |
CN106980794A (en) | TrustZone-based file encryption and decryption method and device and terminal equipment | |
CN105027107A (en) | Secure virtual machine migration | |
CN103069428A (en) | Secure virtual machine bootstrap in untrusted cloud infrastructures | |
CN113904806A (en) | Multi-node authentication method for trusted execution environment | |
CN114584307B (en) | Trusted key management method and device, electronic equipment and storage medium | |
CN110889696A (en) | Storage method, device, equipment and medium for alliance block chain secret key based on SGX technology | |
CN103107994A (en) | Vitualization environment data security partition method and system | |
CN111008094B (en) | Data recovery method, device and system | |
CN106452771B (en) | JCE calls the method and device of the built-in RSA key operation of cipher card realization | |
CN109547208B (en) | Online distribution method and system for master key of financial electronic equipment | |
CN116601912A (en) | Post-secret provisioning service providing encryption security | |
WO2020073712A1 (en) | Method for sharing secure application in mobile terminal, and mobile terminal | |
TW201719476A (en) | Method and device for authorization between devices | |
WO2013097209A1 (en) | Encryption method, decryption method, and relevant device and system | |
EP3292654B1 (en) | A security approach for storing credentials for offline use and copy-protected vault content in devices | |
CN106506147A (en) | A kind of method that IPsec VPN are realized based on the close algorithm of state | |
WO2023030009A1 (en) | Smart device cross-platform binding method and system, and related device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |