Supercharge Your Innovation With Domain-Expert AI Agents!

Identification data encryption access method in nuclear power networked cooperative computing environment

A technology for identification data and access methods, which is applied in the field of encrypted access to identification data in the nuclear power network collaborative computing environment, can solve problems such as illegal acquisition, malicious attacks on data information, etc., to improve data information security and enhance the level of collaborative design , The effect of improving the efficiency of R & D and design

Pending Publication Date: 2021-08-10
上海超算科技有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cloud storage system has many advantages such as high scalability, high efficiency, and low cost. On the one hand, users can enjoy the convenience of cloud services by sending local storage data to the cloud server. There are also cloud security issues caused by data information being maliciously attacked or even illegally obtained by irrelevant users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification data encryption access method in nuclear power networked cooperative computing environment
  • Identification data encryption access method in nuclear power networked cooperative computing environment
  • Identification data encryption access method in nuclear power networked cooperative computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments:

[0019] (1) When it is necessary to carry out simulation analysis of nuclear power equipment, the professional simulation calculation engineer will log in to the collaborative design management service platform based on the nuclear power identification analysis system to carry out daily work after confirming his identity through the enterprise security LDAP unified authentication mechanism. In daily work, each nuclear power equipment component opened by the user on the collaborative design platform must have a clear identification code.

[0020] The initialization algorithm INIT is enabled, and the enterprise private cloud storage server generates and outputs the public key PK and the system master key SK to the designat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identification data encryption access method in a nuclear power networked cooperative computing environment. The method comprises the following steps: 1, performing identity security authentication on a simulation computing engineer, directly connecting the nuclear power collaborative design platform to the supercomputing public cloud computing platform to carry out simulation calculation work of nuclear power equipment with identification information; 2, respectively encrypting calculation result data generated by the supercomputing public cloud calculation platform according to the importance of the calculation result data and calculation operation identification information, and storing the encrypted calculation result data in a supercomputing public cloud storage server and an enterprise private cloud storage server; 3, after identity security authentication is carried out on a collaborative design engineer, sending a search request for calling specified identification calculation operation simulation calculation data of specified identification nuclear power equipment through the nuclear power collaborative design platform; 4, after nuclear power equipment identification verification and engineer authority verification are passed, enabling the file server to search part of core and non-core calculation result data in the enterprise private cloud storage and the supercomputing public cloud storage in sequence; 5, decrypting and combining the two parts of encrypted files, and returning the two parts of encrypted files to the nuclear power collaborative design platform for collaborative design engineers to use. According to the method, the research and development design efficiency and the data information security are improved in the hybrid cloud computing environment, and the collaborative design level of complex nuclear power equipment can be improved for enterprises.

Description

technical field [0001] The invention belongs to the technical field related to data information processing in a nuclear power networked collaborative cloud computing platform and the application of a nuclear power identification analysis system, and specifically relates to an identification data encryption access method in a nuclear power networked collaborative computing environment. Background technique [0002] At present, cloud computing service deployment models are divided into three types: public cloud, private cloud and hybrid cloud, among which hybrid cloud is the future development trend. The public cloud is currently the most mainstream and popular service model, which can provide the public with good development and large-scale request services; the private cloud mainly provides cloud services for the enterprise, and is located in the local area network, so that the internal personnel of the enterprise can process data Effective management of efficiency and secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/31G06F30/20
CPCG06F21/604G06F21/6218G06F21/31G06F30/20G06F2221/2141
Inventor 丁峻宏程懿何炳海刘波刘磊杨富军郭俞陈小龙成振宇乔明奎李馨朱炜垚王莲
Owner 上海超算科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More