Third-party server security management system

A server security and management system technology, applied in the field of third-party server security management systems, can solve problems such as cloud computing data security, and achieve the effect of strengthening security

Active Publication Date: 2018-05-01
武汉长江计算科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a third-party server security management system for solving the problem of data security in cloud computing due to data distribution in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third-party server security management system
  • Third-party server security management system
  • Third-party server security management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0082] It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic ideas of the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the compo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security management system for a third-party server. The security management system comprises a client, a cloud terminal and the third-party server. The client comprises a security information management system. The cloud terminal is connected with the client and controlled by the client and comprises an encryption system, a data file classification system and a trust level integral authentication system. The third-party server is connected with the cloud terminal and comprises a third-party server partitioned storage system, a third-party server authorized access system, a third-party server access port limitation system, a third-party server monitoring system and a third-party server periodical inspection system. Through various cooperating security management mechanisms including various kinds of security information, encryption, file secret levels, access authorities and trust levels on the client, the cloud terminal and the third-party server, the security of cloud calculation is enhanced.

Description

technical field [0001] The invention relates to the field of network cloud technology, in particular to a third-party server security management system. Background technique [0002] The concept of cloud computing is familiar to more and more people, and the application fields of cloud computing are becoming more and more extensive. How to build a safe cloud computing environment has become one of the current computer science research issues. [0003] The solution to security issues is a key element related to whether cloud services can be recognized by users, and cloud security is also one of the main obstacles hindering the current cloud computing application. In addition to possible system failures of large-scale computing resources, cloud computing security risks also include the lack of unified security standards, applicable regulations, and issues such as user privacy protection, data sovereignty, migration, transmission, security, and disaster recovery. [0004] Clou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0884H04L67/06
Inventor 余启轩
Owner 武汉长江计算科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products