CN114035907A - Private computing system based on supercomputing center Slurm job scheduling and secure virtual machine container - Google Patents

Private computing system based on supercomputing center Slurm job scheduling and secure virtual machine container Download PDF

Info

Publication number
CN114035907A
CN114035907A CN202111538866.4A CN202111538866A CN114035907A CN 114035907 A CN114035907 A CN 114035907A CN 202111538866 A CN202111538866 A CN 202111538866A CN 114035907 A CN114035907 A CN 114035907A
Authority
CN
China
Prior art keywords
data
scheduling
privacy
job
supercomputing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111538866.4A
Other languages
Chinese (zh)
Other versions
CN114035907B (en
Inventor
毛宏斌
陈浩栋
宋雨筱
周航
张亚申
周岳骞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Impulse Online Technology Co ltd
Original Assignee
Beijing Impulse Online Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Impulse Online Technology Co ltd filed Critical Beijing Impulse Online Technology Co ltd
Priority to CN202111538866.4A priority Critical patent/CN114035907B/en
Publication of CN114035907A publication Critical patent/CN114035907A/en
Application granted granted Critical
Publication of CN114035907B publication Critical patent/CN114035907B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a privacy computing system based on a supercomputing center Slurm job scheduling and a secure virtual machine container, which is characterized in that tasks such as joint query, joint modeling, joint computing and the like are realized through a privacy computing platform, identity authentication and data ciphertext output of each data participant are realized through an identity authentication service and a data gateway, cross-platform scheduling of privacy computing tasks is realized through task management and job scheduling, static management and dynamic execution of privacy computing algorithms are realized through a secure computing container and an algorithm warehouse, scheduling and execution of the privacy computing tasks in the supercomputing center are realized through the Slurm job scheduling system of the supercomputing center, and ciphertext data uploading, job publishing, remote authentication report acquisition and job result acquisition are realized through a Slurm client tool.

Description

Private computing system based on supercomputing center Slurm job scheduling and secure virtual machine container
Technical Field
The invention relates to the field of trusted computing and privacy computing, in particular to a privacy computing system based on supercomputing center Slurm job scheduling and a secure virtual machine container.
Background
The existence of the data island problem provides challenges for value mining of multi-party data, and the appearance of the privacy computing technology brings about an eosin for solving the problem.
The production-level privacy computing platform is generally deployed in an IDC machine room of a user in a privatized manner, but as multi-party data mining generally needs to use more computing resources, the user can easily encounter the bottleneck of the computing resources.
Disclosure of Invention
The embodiment of the invention provides a privacy computing system based on supercomputing center Slurm job scheduling and a safe virtual machine container, which is used for solving the computational power bottleneck problem existing in the conventional privacy computing platform.
The embodiment of the invention provides a privacy computing system based on a supercomputing center Slurm job scheduling and a secure virtual machine container, which is characterized in that tasks such as joint query, joint modeling, joint computing and the like are realized through a privacy computing platform, identity authentication and data ciphertext output of each data participant are realized through an identity authentication service and a data gateway, cross-platform scheduling of privacy computing tasks is realized through task management and job scheduling, static management and dynamic execution of privacy computing algorithms are realized through a secure computing container and an algorithm warehouse, scheduling and execution of the privacy computing tasks in the supercomputing center are realized through the Slurm job scheduling system of the supercomputing center, and ciphertext data uploading, job publishing, remote authentication report acquisition and job result acquisition are realized through a Slurm client tool.
The privacy computing platform based on the privatization deployment is used for issuing various privacy computing tasks, including joint query, joint modeling and trusted computing, providing various management subsystems such as a user-defined algorithm, alliance management, data source management and user authentication, and controlling task management and job scheduling.
The data user console based on the webpage side access and the open interface is used for providing the data provider with the system and accessing the system to a service system of the data user through the open interface.
The task acceptance and data external output module based on the trusted data gateway is used for a data provider to receive a data uploading task, the data provider to encrypt data in a domain, and the user data provider to upload ciphertext data across regions.
The privacy calculation algorithm management, scheduling and execution system based on supercomputing center Slurm job scheduling is used for receiving issued jobs, scheduling the jobs in the supercomputing center and feeding back job execution results, a user stores and manages the privacy calculation algorithm of the user, ciphertext data of a data provider is stored, and the privacy calculation algorithm management, scheduling and execution system is used for creating a safety calculation container and executing the privacy calculation algorithm.
According to the privacy computing system based on the supercomputing center Slurm job scheduling and the safe virtual machine container, disclosed by the embodiment of the invention, the privacy computing task with sensitive performance can be scheduled to the supercomputing center for execution in a job mode by fully utilizing the powerful calculation resources and Slurm scheduling capability of the supercomputing center, and the follow-up addition is efficient.
The privacy computing system based on the supercomputing center Slurm job scheduling and the safe virtual machine container uses the safe virtual machine container technology, can be compatible with Slurm, and guarantees data safety, computing confidentiality and safety of a data provider by combining the TEE remote authentication technology and the key negotiation technology.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a system according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a secure virtual machine container technology provided in an embodiment of the present invention.
Fig. 3 is a schematic diagram of a data security design provided in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic structural diagram of a system according to an embodiment of the present invention, where the system architecture is described as follows:
the privacy computing platform provided by the embodiment of the invention is privatized and deployed on a private cloud for a data user to use;
in the embodiment of the invention, a data provider needs to deploy a data gateway to process data tasks and upload encrypted data;
in the embodiment of the invention, a privacy computing platform schedules and issues jobs to a supercomputing center through a client tool and an API (application programming interface) interface of the supercomputing center;
in the embodiment of the invention, the algorithm supported by the privacy computing platform is stored on the supercomputing shared storage in a container mirror image mode and is dynamically scheduled and executed by Slurm; s
For fig. 1, the detailed flow of tasks is illustrated as follows:
in the embodiment of the invention, a data user initiates a private calculation task for using super calculation resources of data providers A and B on a private calculation platform through a control console, the private calculation platform translates the calculation task into a super calculation operation task according to the configuration of an algorithm and the like selected by a user, and submits the operation task to the super calculation through a super calculation client tool or an API (application programming interface);
after receiving the operation, the supercomputing center in the embodiment of the invention dispatches and executes the operation by the slarm, and the slarm starts the safe computing container according to the operation configuration and carries out related initialization operation;
in the embodiment of the invention, a privacy computing platform acquires a remote authentication report of a started security computing container through a supercomputing client tool or an API (application programming interface) interface, and the remote authentication report is used as a material for a data provider to perform key agreement;
in the embodiment of the invention, a privacy computing platform issues data tasks to data gateways of various data providers, and gives a remote authentication report of a started security computing container as a certificate for verification;
in the embodiment of the invention, a data provider verifies a remote authentication report of a secure computing container, confirms that the report is a safe and credible TEE environment, encrypts data required by a task through a data encryption key generated by key agreement, and submits ciphertext data to an overcomputing shared memory through an overcomputing client tool or an API (application programming interface);
in the embodiment of the invention, a security calculation container detects that all data providers finish the submission of ciphertext data, obtains a data decryption secret key by using corresponding key negotiation calculation, executes privacy calculation after decrypting the data, and encrypts a calculation result according to an encryption key negotiated with a data user after finishing the execution, so that a privacy calculation platform can call an operation result;
fig. 2 is a schematic diagram of a secure virtual machine container technology provided in an embodiment of the present invention.
Specifically, the advantages of this technique are mainly embodied in the following three points:
the embodiment of the invention uses the lightweight safety container, and the starting is faster and the execution is lighter on the premise of maintaining the performance and the safety;
in the embodiment of the invention, the container exclusively occupies the kernel, and the TEE technology ensures the confidentiality and the security of the privacy computing container;
the container in the embodiment of the invention conforms to OCI container operation and mirror image specifications and supports the slurm scheduling;
FIG. 3 is a schematic diagram of data security design provided by the embodiment of the present invention
Specifically, to ensure that data provided by data in the embodiment of the present invention can only be decrypted by a secure container, and protect the security of the decryption key, the privacy computing platform makes full use of a remote authentication mechanism of the TEE, and the following design is made:
in the embodiment of the invention, the privacy computation container also randomly generates a public and private key pair (PubKey1, PrivKey1) for each task, embeds the public key PubKey1 in a remote authentication report of the TEE, and signs by the TEE;
in the embodiment of the invention, in order to ensure that a data provider can accurately and safely take the public key of the privacy computation container, the data provider needs to verify the remote authentication report of the privacy computation container and take the public key PubKey1 from the report;
in the embodiment of the invention, each time a data provider provides data, a public and private key pair (PubKey2, PrivKey2) is randomly generated to carry out key agreement with PubKey1, the generated agreement key (SecretKey) is used for encrypting the data, and the randomly generated public key (PubKey2) is added to the front of a ciphertext;
in the embodiment of the invention, after the privacy computation container takes the ciphertext, the privacy computation container carries out key agreement according to the PrivKey1 of the privacy computation container and the PubKey2 in front of the ciphertext data, so that the agreement key (SecretKey) can be safely obtained to decrypt the data;
in summary, embodiments of the present invention provide a privacy computing system based on a supercomputing center churm job scheduling and a secure virtual machine container, so as to solve the computational power bottleneck problem existing in the existing privacy computing platform.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (6)

1. A private computing system based on supercomputing centric Slurm job scheduling and secure virtual machine containers, comprising: the system comprises a privacy computing platform based on privatization deployment, a data user console based on webpage end access and an open interface, a task acceptance and data external output module based on a trusted data gateway, and a privacy computing algorithm management, scheduling and execution system based on supercomputing center Slurm job scheduling.
The privacy computing platform based on the privatization deployment is used for issuing various privacy computing tasks, including joint query, joint modeling and trusted computing, providing various management subsystems such as a user-defined algorithm, alliance management, data source management and user authentication, and controlling task management and job scheduling.
The data user console based on the webpage side access and the open interface is used for providing the data provider with the system and accessing the system to a service system of the data user through the open interface.
The task acceptance and data external output module based on the trusted data gateway is used for a data provider to receive a data uploading task, the data provider to encrypt data in a domain, and the user data provider to upload ciphertext data across regions.
The privacy calculation algorithm management, scheduling and execution system based on supercomputing center Slurm job scheduling is used for receiving issued jobs, scheduling the jobs in the supercomputing center and feeding back job execution results, a user stores and manages the privacy calculation algorithm of the user, ciphertext data of a data provider is stored, and the privacy calculation algorithm management, scheduling and execution system is used for creating a safety calculation container and executing the privacy calculation algorithm.
2. The supercomputing-center-churm-job-scheduling and secure virtual-machine-container-based privacy computing system of claim 1, wherein the privatization-deployment-based privacy computing platform further requires:
supporting the initiation of various types of privacy computing tasks, comprising: joint query, joint modeling and trusted computing; supporting identity authentication based on public key infrastructure; supporting task global life cycle management of a privacy computation task; supporting a privacy calculation task as operation to carry out cross-system and regional scheduling; and the data gateway of the data provider is initiated with a data task according to the task requirement.
3. The supercomputing-center-churm-job-scheduling and secure virtual-machine-container-based private computing system of claim 1, wherein the web-side-access and open-interface-based console can be integrated and used by a data consumer in a manner that includes: the webpage access and the open interface-based access are carried out in a business system of a data user.
4. The private computing system based on supercomputing center churm job scheduling and secure virtual machine container according to claim 1, wherein the trusted data gateway based task acceptance and data export module is capable of supporting a data provider to complete a data task, and the operations supported by the data provider include: and receiving a data preparation task from the privacy computing platform, verifying the remote authentication report, preprocessing and encrypting data in the domain, and uploading ciphertext data across the domain and the system.
5. The supercomputing-center-based churm job scheduling and secure virtual machine container based privacy computing system according to claim 1, wherein the supercomputing-center-based churm job scheduling system based privacy computing algorithm management, scheduling and execution system is capable of providing functions of job publishing, remote authentication report acquisition, job result acquisition and ciphertext data uploading to the outside through a churm client tool.
6. A private computing system based on supercomputing center Slurm job scheduling and secure virtual machine containers according to any of claims 1-5, characterized in that computing tasks initiated by data users on the private computing platform can be scheduled to supercomputing centers for execution and return results correctly.
CN202111538866.4A 2021-12-16 2021-12-16 Privacy computing system based on super computing center Slurm job scheduling and secure virtual machine container Active CN114035907B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111538866.4A CN114035907B (en) 2021-12-16 2021-12-16 Privacy computing system based on super computing center Slurm job scheduling and secure virtual machine container

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111538866.4A CN114035907B (en) 2021-12-16 2021-12-16 Privacy computing system based on super computing center Slurm job scheduling and secure virtual machine container

Publications (2)

Publication Number Publication Date
CN114035907A true CN114035907A (en) 2022-02-11
CN114035907B CN114035907B (en) 2024-06-14

Family

ID=80140757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111538866.4A Active CN114035907B (en) 2021-12-16 2021-12-16 Privacy computing system based on super computing center Slurm job scheduling and secure virtual machine container

Country Status (1)

Country Link
CN (1) CN114035907B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114968525A (en) * 2022-05-26 2022-08-30 深圳致星科技有限公司 Cloud native task scheduling method and device for privacy computation and privacy data protection
CN115495223A (en) * 2022-11-18 2022-12-20 安徽华云安科技有限公司 Task safety scheduling method, device, equipment and storage medium
CN117056061A (en) * 2023-10-13 2023-11-14 浙江远算科技有限公司 Cross-supercomputer task scheduling method and system based on container distribution mechanism
TWI843356B (en) 2022-07-15 2024-05-21 大陸商中國銀聯股份有限公司 A privacy computing device, method, system, electronic device and medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109101822A (en) * 2018-07-10 2018-12-28 西安交通大学 A method of solving data-privacy leakage problem in multi-party calculate
CN110213231A (en) * 2019-04-26 2019-09-06 西安电子科技大学 A kind of the outsourcing data access control method and control system of the lightweight towards SGX
US20200366653A1 (en) * 2019-05-13 2020-11-19 Verizon Patent And Licensing Inc. System and method for providing a privacy layer to secure client data in a network
CN112100606A (en) * 2020-09-28 2020-12-18 邓燕平 Online education processing method based on cloud big data calculation and online education platform
CN112416565A (en) * 2019-08-20 2021-02-26 中国科学院计算机网络信息中心 Medium and small enterprise computing community system based on national high-performance computing environment
CN113157399A (en) * 2021-05-17 2021-07-23 北京冲量在线科技有限公司 Unsupervised joint modeling method based on ARM architecture chip
CN113239367A (en) * 2020-07-07 2021-08-10 上海超算科技有限公司 Identification data encryption access method in nuclear power networked collaborative computing environment
CN113556339A (en) * 2021-07-20 2021-10-26 北京冲量在线科技有限公司 Privacy calculation method supporting heterogeneous TEE computational power node interaction

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109101822A (en) * 2018-07-10 2018-12-28 西安交通大学 A method of solving data-privacy leakage problem in multi-party calculate
CN110213231A (en) * 2019-04-26 2019-09-06 西安电子科技大学 A kind of the outsourcing data access control method and control system of the lightweight towards SGX
US20200366653A1 (en) * 2019-05-13 2020-11-19 Verizon Patent And Licensing Inc. System and method for providing a privacy layer to secure client data in a network
CN112416565A (en) * 2019-08-20 2021-02-26 中国科学院计算机网络信息中心 Medium and small enterprise computing community system based on national high-performance computing environment
CN113239367A (en) * 2020-07-07 2021-08-10 上海超算科技有限公司 Identification data encryption access method in nuclear power networked collaborative computing environment
CN112100606A (en) * 2020-09-28 2020-12-18 邓燕平 Online education processing method based on cloud big data calculation and online education platform
CN113157399A (en) * 2021-05-17 2021-07-23 北京冲量在线科技有限公司 Unsupervised joint modeling method based on ARM architecture chip
CN113556339A (en) * 2021-07-20 2021-10-26 北京冲量在线科技有限公司 Privacy calculation method supporting heterogeneous TEE computational power node interaction

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SALHAB, NAZIH: "Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators", 2020 IFIP NETWORKING CONFERENCE AND WORKSHOPS (NETWORKING), pages 673 - 674 *
周俊;沈华杰;林中允;曹珍富;董晓蕾;: "边缘计算隐私保护研究进展", 计算机研究与发展, no. 10, pages 21 - 45 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114968525A (en) * 2022-05-26 2022-08-30 深圳致星科技有限公司 Cloud native task scheduling method and device for privacy computation and privacy data protection
CN114968525B (en) * 2022-05-26 2023-03-24 深圳致星科技有限公司 Cloud native task scheduling method and device for privacy computation and privacy data protection
TWI843356B (en) 2022-07-15 2024-05-21 大陸商中國銀聯股份有限公司 A privacy computing device, method, system, electronic device and medium
CN115495223A (en) * 2022-11-18 2022-12-20 安徽华云安科技有限公司 Task safety scheduling method, device, equipment and storage medium
CN117056061A (en) * 2023-10-13 2023-11-14 浙江远算科技有限公司 Cross-supercomputer task scheduling method and system based on container distribution mechanism
CN117056061B (en) * 2023-10-13 2024-01-09 浙江远算科技有限公司 Cross-supercomputer task scheduling method and system based on container distribution mechanism

Also Published As

Publication number Publication date
CN114035907B (en) 2024-06-14

Similar Documents

Publication Publication Date Title
US10601801B2 (en) Identity authentication method and apparatus
CN114035907A (en) Private computing system based on supercomputing center Slurm job scheduling and secure virtual machine container
US10305688B2 (en) Method, apparatus, and system for cloud-based encryption machine key injection
KR101712784B1 (en) System and method for key management for issuer security domain using global platform specifications
TWI601405B (en) Method and apparatus for cloud-assisted cryptography
KR101891420B1 (en) Content protection for data as a service (daas)
WO2018090763A1 (en) Method and device for configuring terminal master key
CN105359486A (en) Secured access to resources using a proxy
CN106980794A (en) TrustZone-based file encryption and decryption method and device and terminal equipment
CN105027107A (en) Secure virtual machine migration
CN103069428A (en) Secure virtual machine bootstrap in untrusted cloud infrastructures
CN113904806A (en) Multi-node authentication method for trusted execution environment
CN114584307B (en) Trusted key management method and device, electronic equipment and storage medium
CN110889696A (en) Storage method, device, equipment and medium for alliance block chain secret key based on SGX technology
CN103107994A (en) Vitualization environment data security partition method and system
CN111008094B (en) Data recovery method, device and system
CN106452771B (en) JCE calls the method and device of the built-in RSA key operation of cipher card realization
CN109547208B (en) Online distribution method and system for master key of financial electronic equipment
CN116601912A (en) Post-secret provisioning service providing encryption security
WO2020073712A1 (en) Method for sharing secure application in mobile terminal, and mobile terminal
TW201719476A (en) Method and device for authorization between devices
WO2013097209A1 (en) Encryption method, decryption method, and relevant device and system
EP3292654B1 (en) A security approach for storing credentials for offline use and copy-protected vault content in devices
CN106506147A (en) A kind of method that IPsec VPN are realized based on the close algorithm of state
WO2023030009A1 (en) Smart device cross-platform binding method and system, and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant