Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computing safe access control based on domestic cryptographic algorithm

A security access control, domestic password technology, applied in the field of cloud computing security access control based on domestic password algorithm, can solve the problems of privacy and sensitive data leakage, meet the control requirements, enhance the information security protection ability, and prevent identity counterfeiting. Effect

Inactive Publication Date: 2016-12-07
INSPUR GROUP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the popularization of cloud computing, a large amount of user sensitive data is stored in the cloud. Once the user's identity is counterfeited, it is easy to cause the leakage of privacy and sensitive data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0018] A cloud computing security access control method based on a domestic cryptographic algorithm described in this embodiment, a security access control module is embedded in the cloud computing application service system, and the security access control module is integrated with the application service system, through secure access The control module controls the attributes of secure access, including initialization, user identity confirmation, confirmation and change of access control authority; and uses domestic cryptographic algorithms for data encryption.

[0019] A security access control module is embedded in the cloud computing application service system, the security access control module is integrated with the application service system, and can automatically call, sign and access control information while performing various business operations. The security access control module is responsible for adding measures such as data encryption storage, visitor identity a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud computing safe access control based on domestic cryptographic algorithm, and relates to the technical field of safe access control. A safe access control module is embedded into a cloud computing application service system. The safe access control module and the application service system are integrated together. Attribute control of safe access is carried out through the safe access control module. The attribute control comprises initialization, confirmation of a user identity, and confirmation and change of access control authority. Safety protection and access safety control of data are carried out by employing the domestic cryptographic algorithm. According to the method, the safe access control demand of the cloud computing application service system is satisfied, the safety protection capability of the cloud computing application service system is enhanced, and identity counterfeit and illegal access of the data information can be effectively prevented.

Description

technical field [0001] The invention relates to the technical fields of cloud computing, domestic cryptographic algorithms and security access control, in particular to a cloud computing security access control method based on domestic cryptographic algorithms. Background technique [0002] Users have significantly less control over computing resources. Therefore, the development of cloud computing brings massive access authentication requests and complex user rights management, which promotes the continuous development of identity authentication technology. Identity authentication technologies based on various security credentials appear in cloud computing. With the popularity of cloud computing, a large amount of user sensitive data is stored in the cloud. Once the user's identity is counterfeited, it is easy to cause the leakage of privacy and sensitive data. [0003] The application of identity authentication and access control methods based on domestic cryptographic a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/10H04L9/3247H04L63/0823H04L67/10
Inventor 王金超孙善宝李润生
Owner INSPUR GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products