Cloud security server based on trusted computing

A cloud security server, trusted computing technology, applied in the direction of electrical components, transmission systems, etc., can solve the problem of not fundamentally solving the problem of cloud computing information security

Inactive Publication Date: 2017-05-10
深圳耀东安全科技有限公司
View PDF13 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, cloud providers such as Amazon and Microsoft only implement security policies on software, and do not fundamentally solve the information security problem of cloud computing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud security server based on trusted computing
  • Cloud security server based on trusted computing
  • Cloud security server based on trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0020] figure 1 It is the overall structure of the cloud security server based on trusted computing.

[0021] The overall structure of the cloud security server based on trusted computing includes a client 100, a server 200 based on trusted computing, and a cloud platform 300. The server 200 based on trusted computing is connected to the cloud platform 300 through a trusted network 310, and is connected to the cloud platform 300 through the Internet 110. Connect with client 100. Among them, the server 200 based on trusted computing is divided into hardware layer 210, operating system 220 and appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention combines a trusted computing technology, and aims at security holes of an existing server, proposes a cloud security server based on trusted computing. The cloud security server includes two parts, i.e., a Trusted Cryptography Module (TCM) and a cloud security server. In various service modes of cloud computing, through the TCM which adopts trusted computing, security of software and hardware environment is measured, and a server system is guaranteed from not being attached by Trojan and viruses and from not being maliciously modified by a hacker; the TCM can also be used for a secret key for protection, storage and data security encryption, thereby performing encrypted protection; and the TCM can also be used for information of identify authentication and attribute authentication, and when a terminal device accesses the cloud security server, the TCM is used for attribute information of identity authentication.

Description

technical field [0001] The patent of the present invention uses trusted computing technology in the field of cloud servers to ensure the terminal security of cloud servers. Specifically, the present invention relates to a cloud security server based on trusted computing. Background technique [0002] Since the concept of cloud computing was first introduced in 2006, the technical and business prospects of cloud computing have brought together capital, talent and innovation. About 150 companies in Silicon Valley of the United States have participated in cloud computing design, and new business models are emerging one after another. Major IT industry giants are vying to be the first to participate in the ranks of cloud computing technology development. At present, the industry giants that have publicly announced to enter or support cloud computing technology development Including Google, Microsoft, Amazon, Netsuite, Adobe, NetApp, etc., they have all increased their investment...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/08H04L63/123H04L67/10
Inventor 陈磊朱红夏红星
Owner 深圳耀东安全科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products