Security access control method, device and system based on cloud environment

A technology of security access control and cloud environment, which is applied in the field of security access control system based on cloud environment, can solve the problems of complex security product deployment, difficult business migration, and large network changes of business hosts on the cloud.

Pending Publication Date: 2021-11-16
杭州安恒信息安全技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of security product deployment method is relatively complicated, and the network changes of the business host on the cloud are relatively large; and once the cloud security product is down, it is difficult to realize business migration; in addition, it does not make full use of the original security capability resources of the cloud platform, resulting in certain degree of duplication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security access control method, device and system based on cloud environment
  • Security access control method, device and system based on cloud environment
  • Security access control method, device and system based on cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The core of the present invention is to provide a security access control method based on cloud environment. In the existing technology, there are a large number of cloud security products of different models and types from different manufacturers on the market, but they are all software products that are independently deployed in the cloud environment. Generally, virtual machines need to be directly mounted on the cloud security products, or divert traffic to cloud security products to identify and protect against network threats. This kind of security product deployment method is relatively complicated, and the network changes of the business host on the cloud are relatively large; and once the cloud security product is down, it is difficult to realize business migration; in addition, it does not make full use of the original security capability resources of the cloud platform, resulting in certain degree of repetitive construction.

[0042] And a kind of security ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security access control method based on a cloud environment. The method comprises the following steps: obtaining the mirror image flow of a business virtual machine through an api of a cloud management platform, and transmitting the mirror image flow to a cloud security audit virtual machine. The process does not need to change the network environment and architecture of the business virtual machine, and only needs to call the api of the cloud management platform, so that security access control can be realized through the cloud security audit virtual machine without changing the network architecture of the cloud service host. The invention also provides a security access control device based on the cloud environment and a security access control system based on the cloud environment, which also have the above beneficial effects.

Description

technical field [0001] The present invention relates to the technical field of cloud computing, in particular to a cloud-based security access control method, a cloud-based security access control device and a cloud-based security access control system. Background technique [0002] With the vigorous development of cloud computing, the establishment of cloud data centers has become the general trend. However, in the face of increasingly massive data and increasingly difficult to find virus threats in the cloud environment, it is often difficult for traditional devices to meet security requirements while ensuring performance requirements. At present, major manufacturers have launched their own cloud security products to empower security capabilities on the cloud. However, the security products on the market still follow the architectural logic of traditional security products. Some features provide targeted solutions. At the same time, security vendors cannot transform the n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F9/455
Inventor 牟向阳郑舟
Owner 杭州安恒信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products