Cloud computing based password service system

A cryptographic service and cloud computing technology, which is applied in the field of cloud computing, can solve problems such as insecure data transfer, and achieve the effect of fast encryption and decryption, strong practicability, and easy promotion

Inactive Publication Date: 2014-12-10
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Users have doubts about the security and privacy of cloud computing, resulting in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing based password service system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] The present invention will be further described below in conjunction with the drawings and specific embodiments.

[0034] The invention provides a cryptographic service system based on cloud computing, which implements file encryption, data encryption, key management and identity authentication and other cryptographic services on a cloud computing infrastructure platform, provides efficient data protection measures, and effectively protects cloud computing data Safety. Based on the above ideas, as attached figure 1 As shown, the cloud computing cryptographic service system includes a physical layer, a computing resource layer, a service layer, and an application layer, where:

[0035] Physical layer: describes the hardware architecture of the physical layer and the functions of each part.

[0036] Computing resource layer: describes the various modules and functions that make up the computing resource layer.

[0037] Service layer: describes the cryptographic computing softwa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud computing based password service system comprising a physical layer, a computing resource layer, a service layer and an application layer. The physical layer is used for describing its hardware architecture and functions of its parts. The computing resource layer is used for describing its modules and functions of the modules. The service layer is used for describing password operation software and a password computing application interface. The application layer is used for describing various password services provided. Compared with the prior art, the system has the advantages that the techniques such as the cryptographic techniques, the Hadoop technology and the parallel computing technology are adopted, password services such as file encryption, data encryption, key management and identity authentication are provided, safeguarding efficiency can be significantly improved, data processing speed, encryption speed and decryption speed are higher, and data security is effectively protected for cloud computing.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a cloud computing-based cryptographic service system with strong practicability. Background technique [0002] Cloud computing is an increase, use and delivery model of Internet-based related services. It is a pay-as-you-go model. This model provides available, convenient, and on-demand network access to a configurable computing resource sharing pool. (Resources include network, server, storage, application software, service), these resources can be provided quickly, with little management effort, or little interaction with service providers. [0003] Due to the dependence of data on the network and servers in the cloud computing environment, data security issues are more prominent than those in the network environment. Users have doubts about the security and privacy of cloud computing, resulting in the inability of data to be safely transferred to the cloud computing e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L9/32
Inventor 苏振宇
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products