Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud Computing Information Security Visualization System Based on Trusted Computing

A technology of trusted computing and information security, applied in the field of information security

Inactive Publication Date: 2017-04-05
GUANGXI POWER GRID CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the description of Chinese information security experts in the book "Software Behavior", behavioral security should include: behavioral confidentiality, behavioral integrity, behavioral authenticity and other characteristics. In terms of situation maps, people are now doing more research How to ensure the confidentiality and authenticity of information, but there are always many deficiencies in the integrity of behavior, especially the complete information of visualization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud Computing Information Security Visualization System Based on Trusted Computing
  • Cloud Computing Information Security Visualization System Based on Trusted Computing
  • Cloud Computing Information Security Visualization System Based on Trusted Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be further described in detail below through specific embodiments and in conjunction with the accompanying drawings.

[0060] see figure 1 , the cloud computing information security visualization system based on trusted computing in this embodiment includes an information data mining module 1, a trusted information preprocessing module 2, an information storage module 3 and an information analysis and display module based on trusted integrity that are connected in sequence 4;

[0061] The information data mining module 1 authenticates the hardware nodes in the network for information collection, judges the reliability of the network hardware nodes, establishes the trust relationship of the collected information, and obtains the original information by grabbing network data packets in the local area network. Data, the original information data includes three types of data types: detection data of sensitive information transmission between IPs,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud computing information safe visualization system based on trusted computing. According to the visualization system, an integrated trust environment is established on the basis of function modules such as data mining, data identification and data dimension reduction, so that the information safe visualization system from data mining to data processing and storage, and to trusted data display is established. Starting from data mining and preprocessing modules, the data of a trusted data information analysis and display module is trusted. According to the system, through adoption of a brand new module combination and an innovative algorithm, the trust and safety of the network information are ensured; trusted quantification and visualization evaluation of the information safety are realized; and the convenience is provided for a manager in an aspect of network safety management.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a cloud computing information security visualization system based on trusted computing. Background technique [0002] In recent years, social informatization has continued to advance. Network applications are becoming more and more extensive, and network security problems are becoming increasingly serious. Network security visualization has also become a field of increasing attention in recent years. Using people's visual characteristics to display data in the form of graphics and images, users can more intuitively understand the information contained in the data. The existing security problems are judged, and the network status is analyzed. [0003] Regarding the concept of trusted computing, the following definition is given in the ISO / IEC 15408 standard: The behavior of a trusted component, operation or process is predictable under arbitrary operating conditions...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/069H04L41/22H04L63/20
Inventor 陈祖斌谢铭胡继军翁小云袁勇邓戈锋莫英红谢菁张鹏唐玲丽黄连月曾明霏杭聪贺冠博王海黎新何钟柱
Owner GUANGXI POWER GRID CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products