A PaaS-based secure cloud computing method and system
A cloud computing and security technology, applied in the field of cloud computing, can solve the problems of complex technology, high cost, high security and reliability requirements of certification bodies, etc., achieve high computing speed, ensure security, and overcome the effect of resisting decimal attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.
[0035] The traditional SKEY authentication technology is a common OTP authentication technology in cloud computing. It can effectively resist replay attacks. Since each hash function operation is different, the password transmitted each...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
