A cloud encryption computing platform and computing service method
A technology of computing services and algorithms, applied in the field of cyberspace security, to achieve reasonable and efficient resource management and scheduling, and to improve security and availability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The present invention will be described in further detail below in conjunction with the accompanying drawings.
[0036] Such asfigure 1 As shown, the cloud cryptographic computing platform system of the present invention mainly includes four parts: a physical cryptographic machine cluster, a resource management module, an access authentication module, and a data storage module.
[0037] The physical cipher machine provides external cipher calculation capabilities, mainly including national secret sm2, sm3, and sm4 cipher operations, and uses the cipher machine to protect the user's master key, uses the user master key to protect the algorithm key, and the cipher machine master key uses The key protection card is used for protection, so that the security of the computing platform is effectively guaranteed.
[0038] The resource management module deployed on the resource management server controls and converts the cloud user's cryptographic calculation request according t...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com