Method and system for providing password resources and host machine

A host machine and cipher machine technology, applied in the field of cipher processing, to achieve the effect of easy security control and compliance

Pending Publication Date: 2020-10-16
BEIJING CERTIFICATE AUTHORITY
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the VM itself is a virtualized presentation, it is impossible to directly deploy a compliant and reliable cryptographic module on the VM to achieve secure key generation, security management, and secure cryptographic calculations like on a physical computer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for providing password resources and host machine
  • Method and system for providing password resources and host machine
  • Method and system for providing password resources and host machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0039]It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second" and the like are only used to distinguish descriptions, and cannot be understood as indicating or implying relative importance.

[0040] The related technology and the defects in the related technology are introduced below. Usually, there are several ways to protect business applications on virtual machines of cloud services using cryptographic technology: 1) Cloud cipher machine method, cloud cipher machine is on the physical cipher machine, through the underlying hardware and software v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and system for providing password resources and a host machine, at least one virtual machine runs on the host machine, and the host machine comprisesa virtual password module running on the virtual machine; and a virtual password back-end module which is configured to map a password function of a password function component to the virtual passwordmodule, and the password function comprises password calculation or key management. According to the embodiment of the invention, password calculation and key management presented by the virtual password module are completed in password resources on the host machine side, so that compliance is easier to realize, and security control is easier to perform.

Description

technical field [0001] The present application relates to the field of cryptographic processing, in particular to a method, system and host for providing cryptographic resources. Background technique [0002] With the continuous development of cloud computing, virtualization technology is also widely used. With virtualization technology, multiple guest virtual machines (VMs) can be simulated and run on a single physical platform. Virtualization technology can abstract and convert various physical resources of the computer, such as servers, networks, memory, and storage, etc., and break the inseparable barriers between physical structures, so that users can configure better than the original configuration. way to apply these resources. The new virtual portion of these resources is independent of how existing resources are set up, geographically or physically configured. [0003] Virtualization is the core technology of cloud computing. Cloud computing is a service related...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/45G06F21/60
CPCG06F9/45558G06F21/45G06F21/602G06F2009/45587
Inventor 李向锋郭井龙
Owner BEIJING CERTIFICATE AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products