Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

145 results about "Cloud computing security" patented technology

Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

Virtualized infrastructure platform for cloud data centers

The invention discloses a virtualized infrastructure platform for cloud data centers, which comprises a cloud management server, a cloud resource control server and a cloud security server, the whole life cycles of various computational resources of a cloud platform are monitored and managed by the cloud management server, the various resources of the physical layer of the cloud platform are scheduled, controlled and managed by the cloud resource control server, and the cloud security server is used for establishing a cloud computation security control system in a private cloud and a secure interaction system for the private cloud and a public cloud; the cloud management server is integrated with the cloud resource control server through REST interfaces, and the cloud security server is respectively connected with the cloud management server and the cloud resource control server. The virtualized infrastructure platform for cloud data centers can realize security gateway-based unified remote virtual machine control and management, providing administrators with a unified access entrance for the management of virtual resources, and moreover, by means of directory service, the virtualized infrastructure platform for cloud data centers checks the validity of user identities; and a user can use the Python language to extend the resource scheduling control function.
Owner:INFORMATION & TELECOMM COMPANY SICHUAN ELECTRIC POWER

Cloud computing safety protection system and method based on SDN

The invention discloses a cloud computing safety protection system based on an SDN. The system is composed of a controller cluster control module, an environment monitoring module and a cluster basic function guarantee module. The controller cluster control module is the core of the whole system and acquires the change situations such as addition and deletion of switches, and addition and deletion of terminals of a current network and the change situations such as addition, deletion and migration of virtual machines in a cloud computing environment according to information fed back by the environment monitoring module, virtual switches supporting the SDN and virtual platform management interfaces supporting the SDN are adopted in the environment monitoring module, and changes, caused by migration, addition and deletion of the virtual machines and other service flow changes, of safety requirements are automatically recognized under the condition that normal service operation is not affected. The cluster basic function guarantee module conducts coordinated management on multiple controllers in the cloud environment. The invention further discloses a cloud computing safety protection method based on the SDN. According to the system and the method, customizable safety protection services can be flexibly and quickly provided according to requirements in the cloud environment.
Owner:蓝盾信息安全技术有限公司

Method for certificateless cross-domain authentication in credible could computing environment

ActiveCN103546567AAddress certificate maintenance overheadReduce overheadKey distribution for secure communicationHypothesisAuthentication server
The invention relates to a method for certificateless cross-domain authentication in a credible cloud computing environment and belongs to the technical field of cloud computing safety. According to the method for certificateless cross-domain authentication in the credible cloud computing environment, the certificateless public key cryptography technology is introduced into cross-domain authentication, credible cross-domain authentication is achieved in the process of credible cloud computing, a certificateless public key cryptosystem is applied, the problem of the certificate maintenance expense of a traditional digital certificate authentication system and the problem of private key trusteeship of a public key cryptography system based on the identity are solved. According to the method for certificateless cross-domain authentication in the credible cloud computing environment, a user public key is generated based on the identity, a part of a private key of a user is generated by the user, and the other part of the private key of the user is generated by a center authentication server. According to the method for certificateless cross-domain authentication in the credible cloud computing environment, a certificate system is abandoned, the expense of the authentication system is reduced, the private key of the user is protected at the same time, bilinear pairing computation is applied to the certificateless public key cryptosystem, it is proved that a safety hypothesis based on bilinear pairing computation is high in safety, the certificateless public key cryptosystem is used for identity authentication and session key negotiation, and therefore it is ensured that the system is high in safety.
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND +1

Automatic standardization method and system for medical data dictionaries

The invention discloses an automatic standardization method and system for medical data dictionaries. The method comprises steps as follows: S1: a local client side uploads a data dictionary with unknown standard conformance to a cloud computing side; S2: the cloud computing side matches the uploaded data dictionary with unknown standard conformance with a center standard dictionary, and the corresponding relation between the two dictionaries is automatically established; S3: a standardized corresponding relation file is formed on the cloud computing side; S4: the cloud computing side sends the standardized corresponding relation file to the local client side, and the local client side standardizes local data according to the standardized corresponding relation file. Based on cloud service, non-standard data dictionaries of manufacturers or hospitals are standardized, local client sides of the manufacturers or the hospitals upload the non-standard data dictionaries to the cloud computing side, the cloud computing side performs automatic matching, the standardized corresponding relation files are sent to the local client sides, the local client sides can standardize the non-standard data dictionaries locally, and the method and system are convenient and quick.
Owner:国家卫生计生委统计信息中心 +1

Cloud computing scheduling method and system based on big data and deep learning neural networks

The invention discloses a cloud computing scheduling method and a system based on big data and deep learning neural networks. The method includes the steps that a cloud task type T to be scheduled, amount M of type T cloud tasks to be scheduled and a scheduled cloud resource candidate type are acquired; all past scheduling records scheduled from all the cloud tasks of the type T to the cloud resources of the candidate type are searched out from past ability big database; according to all the past scheduling records searched out, when T type cloud tasks of the amount M is scheduled to the cloudresources of the candidate type, the deep learning neural network is used to predict the amount of the can-be-occupied cloud resources of the candidate type; and according to the predicted results, the cloud computing scheduling is accomplished. The cloud computing scheduling method and the system based on the past ability big data and the deep learning neural networks, by a objective fact of occupation situation of the cloud resources when the cloud tasks of different types in the past are scheduled to different cloud resources, the predicting is carried out, the predicted results are more accurate, and the scheduling efficiency is higher. The cloud computing scheduling method and the system based on big data and deep learning neural networks are widely applicable to the field of cloud computing.
Owner:SUPERPOWER INNOVATION INTELLIGENT TECH DONGGUAN CO LTD

Virtualization technology-based cloud computing security terminal

InactiveCN104125251AHigh strengthRealize two-way data backupTransmissionHuman–machine interfaceOperational system
The invention discloses a virtualization technology-based cloud computing security terminal, which comprises a virtualization technology-based cloud computing terminal key, which is characterized in that the hardware part of the cloud computing terminal key comprises a cloud computing security terminal; and a software part is also included and comprises an operation system arranged on a virtualization operation platform. A clean, sealed, comprehensive and dedicated operation system which can realize two-way data backup is provided for the cloud computing terminal. Virtualization is carried out on all tools and applications of the cloud computing operation on the dedicated human-computer interface provided by the dedicated operation system. Self explosion and self destruction are carried out on the cloud computing terminal in the cases of illegal access, reading, copying and interception of data and the system. the invention provides a cloud computing security terminal which is high in strength and applicable to the government, the financial department, the military department and the political science and law department. The terminal can serve as an intelligent Key to be connected onto other intelligent online electronic device for use, can also be equipped with a display device, an input device and an internet device to serve as a special cloud computer and has wide market application prospects.
Owner:华茂云天科技(北京)有限公司

Security service device and method, service processing device and method, and system

The invention provides a security service device and method, a service processing device and method, and a system. The method comprises the steps of obtaining a current application scene and a security level setting parameter of a client as a strategy identifier in real time according to a security request sent by the client after the client is authenticated successfully; matching in a preset strategy library according to the strategy identifier, determining a security strategy corresponding to the strategy identifier, and issuing the security strategy to the client and a service processing module of the service processing device of a cloud computing security service system; providing a corresponding security service capability to the client and / or the service processing device according to the determined security strategy; and monitoring the resource use amount when the security service capability is called by the service processing device of the cloud computing security service system, and charging the resource use amount according to resource charging standards. According to the scheme, different security strategies are made through the strategy identifiers, therefore, the corresponding security service is provided, and the individual security demands of a user and service are satisfied.
Owner:CHINA MOBILE COMM GRP CO LTD

Data processing delay optimization method and system based on edge computing

The invention discloses a data processing delay optimization method and system based on edge computing. The method comprises the following steps: building a network architecture model; determining thecomputation delay of an edge computing layer by using a Lagrangian multiplier method; determining the communication delay of the edge computing layer by adopting a Kruskal method; determining the computation delay of a cloud computing layer; determining the communication delay of the cloud computing layer by adopting a balanced transmission method; determining a data processing delay optimizationmodel according to the computation delay and the communication delay of the edge computing layer, and the computation delay and the communication delay of the cloud computing layer; and determining an optimal data processing delay value according to the data processing delay optimization model. The data processing delay optimization method based on the edge computing provided by the invention firstly determines the data processing delay of the edge computing layer, then determines the data processing delay of the cloud computing layer, and finally, determines the optimal data processing delayvalue according to the data processing delay of the edge computing layer and the data processing delay of the cloud computing layer, therefore the system data processing delay is reduced, and the data processing efficiency is improved.
Owner:QUFU NORMAL UNIV

Cloud computing secure access method, device and system

The invention discloses a cloud computing secure access method, a device and a system. The method includes obtaining authentication information input by a client, determining a client identification of the client, which can not be changed voluntarily, when a common password corresponding to a user name is determined to be correct, determining whether a corresponding relationship between the client identification and the address of a cloud machine exists in a data base of a distribution authentication server or not through the distribution authentication server, determining whether a dynamic password is correct or not as well, if the corresponding relationship exists and the dynamic password is correct, informing the client of a successful logging, otherwise, informing the client of a failed logging, and when the password information corresponding to the user name is determined to be incorrect, informing the client of a failed logging. By means of the scheme, even though an illegal user steals the user name and the common password, the illegal user is incapable of establishing the corresponding relationship between the client identification and the address of the cloud machine, and the illegal user can not obtain a permission of logging in the cloud machine through stealing the common password, and thereby the safety of logging in the cloud machine is improved.
Owner:GUANGZHOU BINGO SOFTWARE

Cloud data privacy protection public auditing method based on symmetric keys

The invention discloses a cloud data privacy protection public auditing method based on symmetric keys and belongs to the technical field of cloud computing safety. The method comprises the steps of (1) key generation, (2) signature computing and (3) proving. In the key generation step, a data owner generates four private keys randomly, two private key pairs are formed, one private key pair is shared by the data owner and a cloud server, and the other private key pair is shared by the data owner and a third-party auditor; in the signature computing step, the data owner inputs the private keys and data blocks, signature computing is conducted on each data block and indexes of the data block, and signatures are sent to the cloud server; in the proving step, after the cloud server receives the indexes of the data blocks and challenges generated by the third-party auditor randomly from the third-party auditor, data integrity evidence is obtained through computing and sent to the third-party auditor, and the third-party auditor conducts verification. By means of the cloud data privacy protection public auditing method based on the symmetric keys, computing and storing expenses are reduced, and public auditing and privacy protection can be provided.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products