System and method for cloud application access control in cloud computing environment

A cloud computing environment and access control technology, applied in the field of cloud computing, can solve problems such as information leakage, and achieve the effect of shielding information leakage and flexible control

Active Publication Date: 2017-08-11
ECDATA INFORMATION TECHNOLOGY CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a system and method for cloud application access control in a cloud computing environment, which controls cloud application permissions, supports flexible and convenient application isolation, and uses physical isolation for high-security level applications to solve the problem of information leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for cloud application access control in cloud computing environment
  • System and method for cloud application access control in cloud computing environment
  • System and method for cloud application access control in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The application scenarios of the present invention include users and cloud application providers. The user is mainly the initiator of the application link, and the client may be assisted by a third-party desktop program to obtain the user's basic login information, which is also a necessary parameter for creating a cloud application link. The cloud application provider will provide the management and maintenance function of user permission information, which is stored in the user application permission service module. Cloud applications will run on cloud application servers. In actual deployment, cloud application servers are generally servers with multi-session login functions, which can be virtual machines or physical machines.

[0032] Cloud application provider based on the present invention in figure 2 The following service roles shown in to implement access control to cloud applications, including: gateway agent, routing service module, user application permissi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a system and method for cloud application access control in a cloud computing environment. The gateway agent interacts with the client, receives the user's link request for the cloud application or feeds back the authorized cloud application to the user; the user application through the interaction with the gateway agent The authority service module verifies the validity of the user authority; through the application routing service module interacting with the gateway agent, the effective application routing address is found in the routing table; through the cloud application service module interacting with the gateway agent, it provides information related to authority information The running environment of the matching cloud application. The present invention completes routing and authentication between internal services through the gateway agent, realizes unified management of application authority, flexible control, and shields the possibility of information leakage.

Description

technical field [0001] The invention belongs to the field of cloud computing, and in particular relates to the use and access authorization control technology of cloud applications. Background technique [0002] Cloud computing is a dynamic, scalable, and virtualized resource computing method, usually provided through the Internet, and users do not need to understand the details of the cloud. Cloud computing services include three layers, namely Infrastructure as a Service (IaaS), Basic Platform as a Service (PaaS) and Software as a Service (SaaS). Infrastructure as a service is the management of basic resources such as networks, hosts, and storage. Managed for user applications. [0003] There are two main implementation forms of cloud applications in the cloud computing environment: 1. The way of application service hosting. The application has a local running interface on the client side, but the data and calculation parts involved in the application are summarized in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/741H04L45/74
Inventor 徐广庆
Owner ECDATA INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products