Cloud computing information safe visualization system based on trusted computing

A technology of trusted computing and information security, applied in the field of information security

Inactive Publication Date: 2016-11-16
GUANGXI POWER GRID CORP
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the description of Chinese information security experts in the book "Software Behavior", behavioral security should include: behavioral confidentiality, behavioral integrity, behavioral authenticity and other characteristics. In terms of situation maps, people are now doing more research How to ensure the confidentiality and authenticity of information, but there are always many deficiencies in the integrity of behavior, especially the complete information of visualization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing information safe visualization system based on trusted computing
  • Cloud computing information safe visualization system based on trusted computing
  • Cloud computing information safe visualization system based on trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be described in further detail below through specific embodiments and in conjunction with the accompanying drawings.

[0060] see figure 1 , the cloud computing information security visualization system based on trusted computing in this embodiment includes an information data mining module 1 connected in sequence, a trusted information preprocessing module 2, an information storage module 3, and an information analysis and display module based on trusted integrity 4;

[0061] The information data mining module 1 authenticates the hardware nodes in the network for information collection, judges the credibility of the network hardware nodes, establishes the trust relationship of the collected information, and obtains the original information by grabbing network data packets in the local area network Data, the original information data includes three data types: sensitive information transmission detection data between IPs, mail detection log d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud computing information safe visualization system based on trusted computing. According to the visualization system, an integrated trust environment is established on the basis of function modules such as data mining, data identification and data dimension reduction, so that the information safe visualization system from data mining to data processing and storage, and to trusted data display is established. Starting from data mining and preprocessing modules, the data of a trusted data information analysis and display module is trusted. According to the system, through adoption of a brand new module combination and an innovative algorithm, the trust and safety of the network information are ensured; trusted quantification and visualization evaluation of the information safety are realized; and the convenience is provided for a manager in an aspect of network safety management.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a cloud computing information security visualization system based on trusted computing. Background technique [0002] In recent years, social informatization has been advancing continuously. Network applications are becoming more and more widespread, and network security issues have become increasingly prominent and severe. Network security visualization has also become an area of ​​increasing attention in recent years. Using people's visual characteristics to display data in the form of graphics and images, users can more intuitively understand the information contained in the data, making network managers more aware of the network Make a judgment on the existing security problems, so as to analyze the network status. [0003] Regarding the concept of trusted computing, the following definition is given in the ISO / IEC 15408 standard: the behavior of a trusted comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/069H04L41/22H04L63/20
Inventor 陈祖斌谢铭胡继军翁小云袁勇邓戈锋莫英红谢菁张鹏唐玲丽黄连月曾明霏杭聪贺冠博王海黎新
Owner GUANGXI POWER GRID CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products