A system and method for trusted data storage
A storage system and trusted technology, applied in the field of information security in information technology, can solve problems such as low key strength, key leakage, and reduced practicability, and achieve the effects of reducing risk, fine-grained control, and high strength
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0045] refer to figure 1 In this embodiment, a system for trusted data storage includes four logical entities, which are respectively a trusted management center, an application server, a storage virtualization security gateway, and a back-end storage system. The trusted management center acts as a configuration and management entity for trusted policies. The application server is the entity that initiates the data access request, and a trusted storage client agent function component is implemented in the application server. The storage virtualization security gateway is used to receive data requests from the application layer, and use virtualization technology to realize the mapping of virtual ports, the translation of virtual storage devices to physical storage devices, address translation, and the encapsulation of...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com