Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Out-of-band authorization safety reinforcement method for cloud computing platform

A cloud computing platform and cloud platform technology, applied in the field of cloud computing security, can solve problems such as access to core data, program operation and customer sensitive information security problems have not been well resolved, gain control over program operation, etc., to achieve defense The effect of illegal access, hacker defense, high security

Inactive Publication Date: 2012-07-04
INSPUR TIANYUAN COMM INFORMATION SYST CO LTD
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The security issues of cloud computing involve many aspects such as cloud computing platform security, application program operation security, customer information security, interface and network security, among which there are relatively mature solutions in the industry for network security, platform host and storage system security, but Program operation and customer sensitive information security issues have not been well resolved
[0004] Existing solutions mainly take measures such as access authentication, firewall, IDS, virus and Trojan horse killing, data encryption, etc. However, once the attacker (super hacker, Trojan horse, etc.) It is possible to access the internal core data, and even gain control over the operation of the program, resulting in serious consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Out-of-band authorization safety reinforcement method for cloud computing platform
  • Out-of-band authorization safety reinforcement method for cloud computing platform
  • Out-of-band authorization safety reinforcement method for cloud computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be described in detail below with reference to the accompanying drawings.

[0019] A cloud computing platform out-of-band authorization security reinforcement method of the present invention is composed of a complete application system based on the present invention, which generally includes a security reinforcement server SSR, an out-of-band authorization component (or system), a cloud computing platform program operation monitoring component, and an external security system. There are four parts in the management center, the detailed working process can be found in figure 2 .

[0020] If there is no external security management center, a high-intensity security protection system can also be formed from other program parts, but the level (or reliability) of security protection is reduced.

[0021] Using the active defense technology based on out-of-band encryption authorization and security hardening server SSR, the program on the cloud com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety reinforcement method for a cloud computing platform. The method is characterized in that: programs on the cloud computing platform are subjected to out-of-band encryption authorization by adopting an active defense technology based on server system reinforcement (SSR) and the out-of-band encryption authorization, and the legitimacy of running a cloud computing program and the security of related data access are ensured under the support of the SSR by dynamic cross authorization between a cloud platform operation monitoring and management system and an external security management center. Therefore, a program running right is prevented from being illegally stolen and controlled by a super hacker Trojan, critical data is prevented from being illegally accessed, and the security of the cloud platform program running and the critical data can be greatly improved.

Description

technical field [0001] The present invention relates to a cloud computing security field, in particular to a cloud computing platform out-of-band authorization security reinforcement method. Background technique [0002] Cloud security has become the number one challenge for cloud computing applications. Security issues have become the main concern for most customers when choosing cloud computing services, and have seriously hindered the development of cloud computing. Due to the virtualization, intensification, dynamic, and multi-tenant characteristics of cloud computing, security threats have increased significantly. How to ensure information security and operational security is a major issue in cloud computing. [0003] The security issues of cloud computing involve many aspects such as cloud computing platform security, application program operation security, customer information security, interface and network security, among which there are relatively mature solutions ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 苗再良
Owner INSPUR TIANYUAN COMM INFORMATION SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products