Protection method for secure cloud computing terminal

A cloud computing and secure technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve the problems of cloud terminal security protection, information loss, data theft, etc., and solve security risks. The effect of identity loss, great business value and social value

Inactive Publication Date: 2014-05-07
SHANGHAI JUNYUE INTELLIGENT TECH
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] At present, with the increasing number of terminals connected to the cloud, security risks such as identity loss, data theft, and information loss are gradually exposed, and the security of cloud terminals needs to be strengthened urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method for secure cloud computing terminal
  • Protection method for secure cloud computing terminal
  • Protection method for secure cloud computing terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0027] like Figure 1-Figure 3 As shown, a protection method for a secure cloud computing terminal, the secure cloud computing terminal 1 includes a main board 11, a digital certificate operation and storage IC module 12, a fingerprint device 13, a WiFi module 14, a USB interface 15 and a fiber-optic converter 16 , the secure cloud computing terminal 1 is respectively connected to the authentication server 2 and the cloud virtual server 3, and the protection method adopts a combination of multiple security authentication and protection facilities on a low-power, micro-volume cloud terminal through a unified security policy , so that the data and user information of the cloud terminal are effectively protected, and the specific steps of the protection method are as follows:

[0028] In step 101, the built-in digital certificate operation storage IC module 12 generates a unique device serial number, and then executes step 102.

[0029] In step 102 , the built-in fingerprint dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a protection method for a secure cloud computing terminal. The protection method comprises a first step in which a unique equipment serial number is generated by a digital certificate computing storage IC module arranged inside the secure cloud computing terminal; a second step in which a user identity is verified by a fingerprint reader arranged inside the secure cloud computing terminal; a third step in which the secure cloud computing terminal is connected with a virtual cloud server via a client connection protocol to start a remote cloud virtual machine; a fourth step in which normal starting is judged, if yes, the sixth step is carried out, and if not, the fifth step is carried out; a fifth step in which initial setup is restored by the secure cloud computing terminal, and the first step is carried out; and a sixth step in which the secure cloud computing terminal is connected to a cloud operation system, and the start/stop state of a WiFi module, a USB interface and an optical photoelectric converter can be controlled via controllable signal output and input interfaces. Compared with the prior art, the protection method for a secure cloud computing terminal has the advantages that the problem that the user information is revealed duo to weak secure cloud computing terminal protection measures can be effectively solved and the like.

Description

technical field [0001] The invention relates to a technology related to a secure cloud computing terminal, in particular to a protection method for a secure cloud computing terminal. Background technique [0002] In the era of cloud computing, the security protection of the client needs to be strengthened. It is an increasingly urgent realistic demand to provide each user with a safe, privacy-protected, and reliable computing experience. [0003] With the arrival of cloud terminals, many problems have emerged. The most important thing is the security issues that users often care about. The cloud terminal computing platform is similar to the traditional computer system that adopts the master / slave computing architecture. Most of the calculations are performed by the server, and the server is also responsible for storage. [0004] The purpose of terminal access model development is to reduce the input cost of enterprise computerization, reduce maintenance costs, maximize the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 叶丹唐荣喜
Owner SHANGHAI JUNYUE INTELLIGENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products