Supercharge Your Innovation With Domain-Expert AI Agents!

A cloud encryption computing platform and computing service method

A technology of computing services and algorithms, applied in the field of cyberspace security, to achieve reasonable and efficient resource management and scheduling, and to improve security and availability

Active Publication Date: 2021-12-14
DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current cryptographic cloud service solution uses virtualization technology to run multiple virtual cryptographic machines on one physical cryptographic machine. Its advantage is that it flexibly cuts the cryptographic computing power, but its disadvantage is that the computing power of a single physical cryptographic machine determines the entire platform. Computational upper limit for

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud encryption computing platform and computing service method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0036] Such asfigure 1 As shown, the cloud cryptographic computing platform system of the present invention mainly includes four parts: a physical cryptographic machine cluster, a resource management module, an access authentication module, and a data storage module.

[0037] The physical cipher machine provides external cipher calculation capabilities, mainly including national secret sm2, sm3, and sm4 cipher operations, and uses the cipher machine to protect the user's master key, uses the user master key to protect the algorithm key, and the cipher machine master key uses The key protection card is used for protection, so that the security of the computing platform is effectively guaranteed.

[0038] The resource management module deployed on the resource management server controls and converts the cloud user's cryptographic calculation request according t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud password computing platform and a computing service method. The method is as follows: 1) Start n physical cipher machines to form a cipher machine cluster and connect them to the resource management module; 2) Synchronize the master keys of the n cipher machines so that they share the cipher machine master key K m ; 3) Send the received key generation request to a cipher machine A; 4) The cipher machine A uses K m Generate the corresponding user master key K for the user identity processing in the request i ; 5) Cipher machine A generates algorithm key AK i , with K i against AK i Encrypt and send it to the resource management module; 6) When user i requests computing service j, use the key [AK i ]K i It is added to the user's request for encryption and decryption or signature verification and sent to cipher machine B; 7) cipher machine B according to the identity and K in the request m Decrypt to get K i , using K i to [AK i ]K i Decrypt and use AK i Complete Compute Service j.

Description

technical field [0001] The invention relates to the field of network space security, in particular to a cloud cryptography computing platform and computing service method capable of resource management. Background technique [0002] Cloud Computing: Cloud Computing is the increase, use and delivery model of related services based on the Internet, usually involving the provision of dynamically scalable and often virtualized resources through the Internet. It is a type of distributed computing technology, and its most basic concept , through the network, the huge calculation processing program is automatically split into countless smaller subroutines, and then the huge system composed of multiple servers is searched, calculated and analyzed, and the processing results are sent back to the user. [0003] Cryptographic computing equipment: devices that provide users with cryptographic computing services such as symmetric / asymmetric encryption and decryption of data, data integri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/08
CPCH04L9/0863H04L9/0866H04L9/0894H04L9/085H04L9/0897H04L9/3226H04L9/3213H04L9/3247H04L67/1008
Inventor 林璟锵王伟荆继武郎帆任良钦吴鹏一王琼霄郑昉昱
Owner DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More