Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtualization technology-based cloud computing security terminal

A virtualization technology and security terminal technology, applied in the direction of electrical components, transmission systems, etc.

Inactive Publication Date: 2014-10-29
华茂云天科技(北京)有限公司
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The invention independently designs and develops a complete end-to-end cloud computing solution that cooperates with the cloud computing platform, and solves the problem of terminal security to the greatest extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] The cloud computing security terminal control method of this embodiment is applied to the cloud tablet (Cloud Pad), the system is a combination of software and hardware, the software system is converted to the hardware design and implementation, and cannot be transplanted or installed to other SD cards, TF cards superior. The system runs independently, can access cloud computing resources without connecting to a computer, and is powered by a high-capacity lithium battery. Each user module is automatically loaded during the startup process. Firstly, the security module is loaded to ensure the startup security of the system, and the integrity verification of the operating system data and programs is performed in combination with the trusted computing module integrated on the hardware to ensure that the BIOS, operating system , system information such as applications has not been maliciously tampered with.

[0080] This system is completely independent, completely incompa...

Embodiment 2

[0097] The cloud computing security system in this embodiment uses a portable secure U disk as a carrier to provide a secure access terminal interface for the cloud computing system. The system is a combination of software and hardware. The software system is designed and implemented for the hardware, and cannot be transplanted or installed on other SD cards or TF cards. The system cannot run alone, and it needs to be connected to a computer to use the computer's keyboard, mouse and monitor, and the network can access cloud computing resources.

[0098]After the U disk system is connected to the computer, it will start automatically. Each user module is automatically loaded during the startup process. First, the security module is loaded to ensure the startup security of the system, and the integrity verification of the operating system data and programs is performed in combination with the encryption module integrated on the hardware to ensure the operating system and applica...

Embodiment 3

[0122] The cloud computing security terminal in this embodiment is a device for end users to access their own cloud resources. The system adopts the most portable design method, does not require additional input and output devices, and is directly combined with the user's actions and brain waves. There are two forms of the terminal, and the user can freely choose the connection method of the human body or the connection method of the device.

[0123] Device connection method: The terminal will be realized as a patch of an integrated chip, which can be pasted on mobile phones, computers and other devices that support a unified cloud computing interface, so that the user's device is automatically converted into a terminal for cloud computing access. The patch can be as thin as 1cm*1cm, and it is completely transparent, so that the user will not find the existence of the cloud computing terminal in terms of touch and vision when using the device. In this way, access to cloud reso...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtualization technology-based cloud computing security terminal, which comprises a virtualization technology-based cloud computing terminal key, which is characterized in that the hardware part of the cloud computing terminal key comprises a cloud computing security terminal; and a software part is also included and comprises an operation system arranged on a virtualization operation platform. A clean, sealed, comprehensive and dedicated operation system which can realize two-way data backup is provided for the cloud computing terminal. Virtualization is carried out on all tools and applications of the cloud computing operation on the dedicated human-computer interface provided by the dedicated operation system. Self explosion and self destruction are carried out on the cloud computing terminal in the cases of illegal access, reading, copying and interception of data and the system. the invention provides a cloud computing security terminal which is high in strength and applicable to the government, the financial department, the military department and the political science and law department. The terminal can serve as an intelligent Key to be connected onto other intelligent online electronic device for use, can also be equipped with a display device, an input device and an internet device to serve as a special cloud computer and has wide market application prospects.

Description

technical field [0001] The invention relates to a security system based on cloud computing, and in particular discloses a cloud computing security terminal realization technology based on hardware virtualization technology, which provides guarantee for users to safely use cloud computing resources. The invention belongs to the technical field of cloud computing. Background technique [0002] Usually cloud computing products only focus on server-side infrastructure services, while ignoring the operation, reading, storage, processing and network security issues of different computer terminals accessing cloud data. For example, computer terminals may be invaded by viruses, implanted with Trojan horses, contain worms, have backdoors, and have software, hardware, system, and network defects. [0003] If only one identity authentication Key is used to log in to the cloud server, viruses, worms, Trojan horses, and software, hardware, system, and network defects on the computer ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06
Inventor 不公告发明人
Owner 华茂云天科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products