Virtualization technology-based cloud computing security terminal
A virtualization technology and security terminal technology, applied in the direction of electrical components, transmission systems, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0079] The cloud computing security terminal control method of this embodiment is applied to the cloud tablet (Cloud Pad), the system is a combination of software and hardware, the software system is converted to the hardware design and implementation, and cannot be transplanted or installed to other SD cards, TF cards superior. The system runs independently, can access cloud computing resources without connecting to a computer, and is powered by a high-capacity lithium battery. Each user module is automatically loaded during the startup process. Firstly, the security module is loaded to ensure the startup security of the system, and the integrity verification of the operating system data and programs is performed in combination with the trusted computing module integrated on the hardware to ensure that the BIOS, operating system , system information such as applications has not been maliciously tampered with.
[0080] This system is completely independent, completely incompa...
Embodiment 2
[0097] The cloud computing security system in this embodiment uses a portable secure U disk as a carrier to provide a secure access terminal interface for the cloud computing system. The system is a combination of software and hardware. The software system is designed and implemented for the hardware, and cannot be transplanted or installed on other SD cards or TF cards. The system cannot run alone, and it needs to be connected to a computer to use the computer's keyboard, mouse and monitor, and the network can access cloud computing resources.
[0098]After the U disk system is connected to the computer, it will start automatically. Each user module is automatically loaded during the startup process. First, the security module is loaded to ensure the startup security of the system, and the integrity verification of the operating system data and programs is performed in combination with the encryption module integrated on the hardware to ensure the operating system and applica...
Embodiment 3
[0122] The cloud computing security terminal in this embodiment is a device for end users to access their own cloud resources. The system adopts the most portable design method, does not require additional input and output devices, and is directly combined with the user's actions and brain waves. There are two forms of the terminal, and the user can freely choose the connection method of the human body or the connection method of the device.
[0123] Device connection method: The terminal will be realized as a patch of an integrated chip, which can be pasted on mobile phones, computers and other devices that support a unified cloud computing interface, so that the user's device is automatically converted into a terminal for cloud computing access. The patch can be as thin as 1cm*1cm, and it is completely transparent, so that the user will not find the existence of the cloud computing terminal in terms of touch and vision when using the device. In this way, access to cloud reso...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com