Cloud computing based password service system
A cryptographic service and cloud computing technology, which is applied in the field of cloud computing, can solve problems such as insecure data transfer, and achieve the effect of fast encryption and decryption, strong practicability, and easy promotion
Inactive Publication Date: 2014-12-10
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
3 Cites 28 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreMethod used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention discloses a cloud computing based password service system comprising a physical layer, a computing resource layer, a service layer and an application layer. The physical layer is used for describing its hardware architecture and functions of its parts. The computing resource layer is used for describing its modules and functions of the modules. The service layer is used for describing password operation software and a password computing application interface. The application layer is used for describing various password services provided. Compared with the prior art, the system has the advantages that the techniques such as the cryptographic techniques, the Hadoop technology and the parallel computing technology are adopted, password services such as file encryption, data encryption, key management and identity authentication are provided, safeguarding efficiency can be significantly improved, data processing speed, encryption speed and decryption speed are higher, and data security is effectively protected for cloud computing.
Application Domain
Technology Topic
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Hand-held mobile electronic visiting system with fingerprint identity recognition function, and the visiting method
InactiveCN101059875AImprove work efficiencyEasy to useChecking time patrolsCharacter and pattern recognitionMobile electronicsFingerprint
Owner:SHENYANG VS DIGITAL TECH
Novel automatic cleaning machine for inside and outside of water barrel
InactiveCN104096702AImprove work efficiencyReduce manufacturing costHollow article cleaningEngineeringHygienic quality
Owner:宋树建
Anti-fatigue controlled laser shot peening method and device therefor
InactiveCN101275177AImprove work efficiencyMeet the reinforcement requirementsHeat treatment process controlProcess efficiency improvementLife valuePulse parameter
Owner:JIANGSU UNIV
Automatic axial turnover mechanism for fixtures
ActiveCN101885128AReduce labor intensityImprove work efficiencyWelding/cutting auxillary devicesAuxillary welding devicesCylinder blockEngineering
Owner:CHERY AUTOMOBILE CO LTD
Surveying system
ActiveUS20090244277A1Convenience to workImprove work efficiencyActive open surveying meansCathode-ray tube indicatorsRadio unitSurveyor
Owner:KK TOPCON
Classification and recommendation of technical efficacy words
- Fast encryption and decryption
- Improve work efficiency
Encryption method based on cycle queue shift rule
InactiveCN101237321AFast encryption and decryptionSimple transformationMultiple keys/algorithms usageTransformation matrixLow speed
Owner:NORTHWEST A & F UNIV
Information security chip for Internet of Things
ActiveCN109818745AFast encryption and decryptionReduce chip areaEncryption apparatus with shift registers/memoriesPublic key for secure communicationKey generationInternet of Things
Owner:佛山芯珠微电子有限公司
WEB performance optimization method and device, computer equipment and storage medium
PendingCN114282233ASimple algorithmFast encryption and decryptionDigital data protectionDigital data authenticationWeb performanceComputer equipment
Owner:SHANGHAI PUDONG DEVELOPMENT BANK
Digital content encryption and decryption method based on ARX white-box block cipher
ActiveCN113541942AFast encryption and decryptionLow cost of decrypted storage spaceKey distribution for secure communicationEncryption apparatus with shift registers/memoriesEmbedded systemRound function
Owner:XIDIAN UNIV
Terminal MAC address acquisition method, device and system, terminal and medium
PendingCN111131546AImprove securityFast encryption and decryptionTransmissionSecurity arrangementEngineeringReal-time computing
Owner:NINGBO AUX ELECTRIC +1