Security protection interface device for cloud computing platform

A cloud computing platform and security protection technology, applied in the field of cloud computing information security, can solve problems such as high cost and technology, difficulty, and company loss, and achieve the effects of avoiding copying internal information, ingenious structure, and novel ideas

Inactive Publication Date: 2020-04-10
HUANGHE S & T COLLEGE
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the development of cloud computing and virtualization technology, the interaction and dissemination of information has become more frequent and more convenient; but what follows is the issue of information security. , the identity of the user needs to be verified during the transmission of information. For example, when the user needs to interact with the cloud computing center, it is necessary to enter a verification password composed of numbers and symbols. However, when such an encryption method is maliciously attacked, it will also cause Information leakage; so now people pay enough attention to the security of online information transmission, and have formulated a variety of security protocols to control; but in offline use, leakers steal and leak stored information privately unpredictable
[0004] Now in specific enterprise operation and management, most of them will use cloud computing platform or big data for unified management of company internal information calculation and storage. Some very important information can only be accessed by some authorized personnel, and even some An information leakage and destruction device is designed, but some of them steal confidential information for profit. With online information theft, due to the importance of enterprises and the high cost and technology required, it has become more and more difficult. , copying private information directly from the company's internal management platform offline has become the main means of stealing information, but the current company's internal control over computer interfaces is not strict, and some criminals may take advantage of the intervals when managers leave their work stations to steal If it is withdrawn, it will cause great losses to the company.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection interface device for cloud computing platform
  • Security protection interface device for cloud computing platform
  • Security protection interface device for cloud computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The specific implementation manners of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0027] Depend on Figure 1-10 It can be seen that the present invention includes a body 1, the body 1 is provided with a socket 3, the front side of the body 1 is provided with a shield 2, the shield 2 is provided with a through hole 18 corresponding to the position of the socket 3, the shield 2 and the body 1 A connecting shaft 4 is fixed between them, and the inside of the shield 2 is provided with a turntable 6 mounted on the connecting shaft 4 and rotatable. The end surface of the turntable 6 is provided with a plurality of circumferentially uniform grooves 5, each groove All can be placed on the same straight line with the rotation of the turntable 6 with the through groove and the socket 3, and a mounting groove is provided on the side wall of each groove 5, and a wedge-shaped baffle plate 7 is installed in each mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security protection interface device for a cloud computing platform. According to the security protection interface device, security assurance for an information platform canbe well improved. The security protection interface device comprises a machine body, a socket is arranged on machine body, a shield is arranged on the front side of the machine body; through holes areformed in the shield, a rotary disc is arranged in the shield, grooves are formed in the end surface of the rotary disc; a wedge-shaped baffle plate is mounted in each groove; first springs are connected between the wedge-shaped baffles and the grooves; one of the grooves is designed to be a communicating groove, and the other grooves are blind grooves; a wedge-shaped hole is formed in the end face of the rotary disc, a push rod is arranged on the shield, the push rod is pressed to drive the rotary disc to rotate unidirectionally through matching of the push rod and the wedge-shaped hole, a torsional spring is connected between the rotary disc and a base body, and the rotary disc can move forwards and backwards along a connecting shaft and can reset under the action of the torsional spring. According to the security protection interface device, the security protection of the computer platform interface can be well realized, and foreign persons are prevented from copying internal information.

Description

technical field [0001] The invention relates to the technical field of cloud computing information security, in particular to a security protection interface device for a cloud computing platform. Background technique [0002] With the development and popularization of cloud computing technology, infrastructure service IAAS (Infrastructure as a Service, Infrastructure as a Service) products are more and more widely used. At present, the mainstream IAAS platform mainly manages the computing, storage, network and other resources of physical servers in a unified manner through virtualization technology, and realizes the automatic deployment of infrastructure resources, that is, after receiving user service requests, automatically deploys single or multiple servers. resources such as virtual servers or virtual disks. During the operation of the platform, it is necessary to monitor the availability, non-interruption, stability, authority management, and system operation status o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/85
CPCG06F21/85
Inventor 郭惠芳
Owner HUANGHE S & T COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products