Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

License control method and device in cloud calculating system

A control method and cloud computing technology, applied in the field of network security, can solve problems such as unproposed solutions and increase the cost of software and hardware, and achieve the effect of protecting legitimate rights and interests, ensuring uniqueness and security

Active Publication Date: 2014-07-09
OPZOON TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Network authentication and hardware encryption methods can solve the software license problem very well, but undoubtedly increase the cost of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • License control method and device in cloud calculating system
  • License control method and device in cloud calculating system
  • License control method and device in cloud calculating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0042] figure 1 A flow chart of a license control method in a cloud computing system according to an embodiment of the present invention is shown.

[0043] like figure 1 Shown, the method of the embodiment of the present invention comprises the following steps:

[0044] Step S101, using an asymmetric encryption algorithm to generate a key pair, including a public key and a private key.

[0045] Before generating a lic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a license control method and device in a cloud calculating system. The method includes the steps of generating a secret key pair according to an asymmetric cryptographic algorithm, wherein the secret key pair comprises a public key and a secret key; encrypting a license with the public key as a parameter, and generating the encrypted license; compiling the secret key, and then implanting the secret key into a code of the cloud calculating system; verifying the license through the secret key. On the premise of not additionally arranging software and hardware facilities, the uniqueness and safety of generation and verification of the license are achieved, and safety of enterprises and users is ensured.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and device for generating and managing licenses in a cloud computing system. Background technique [0002] In a cloud computing system, a license (license) is required to control the number of virtual machines and to centrally manage servers. Therefore, the security of the generated license becomes very important. The license is generated by encrypting some necessary information. If the license is not managed properly, the server and virtual machine management of the cloud computing system will be out of control, or even fall into disarray. into the hands of criminals, posing a serious threat to the interests of enterprises and users. [0003] Existing solutions include serial numbers, network authentication, and hardware encryption methods. The most common permission method is the serial number. After obtaining the machine feature code, the serial number is generated t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L29/08
Inventor 崔隆
Owner OPZOON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products