Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security requirements query method, feedback method and device

A query method and security technology, applied in the field of communication, can solve problems such as the decline of data security, and achieve the effect of flexible selection and improved security.

Active Publication Date: 2019-02-19
ZTE CORP
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention provides a security requirement query method, a feedback method and a device to at least solve the technical problem in the prior art that the CSU cannot quickly and correctly select a CSP that meets the security requirements, resulting in a decrease in data security when the CSU uses the CSP

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security requirements query method, feedback method and device
  • Security requirements query method, feedback method and device
  • Security requirements query method, feedback method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] In this embodiment, taking the CSU querying CTTP for CSPs that meet its own security requirements as an example, this embodiment of the present invention provides a method for querying security requirements, such as figure 1 shown, including:

[0066] S102: The CSU sends a security requirement query request to the CTTP, where the security requirement query request is used to instruct the CTTP to return to the CSU the CSP identifier of the CSP that meets the security requirements of the CSU;

[0067] S104: The CSU receives a response message returned by the CTTP, where the response message carries a CSP identifier;

[0068] S106: The CSU obtains the CSP identifier from the response message.

[0069] In this preferred embodiment, the CSU sends a security requirement query request to the CTTP, and the CTTP responds to the query request and returns to the CSU relevant information about CSPs that meet the security requirements of the CSU, so that the CSU can obtain potentia...

Embodiment 2

[0075] After the CSU obtains the CSP ID of the CSP that meets its security requirements returned by CTTP, or the CSU selects a CSP from the CSPs with high public recognition, it directly sends a security requirement query message to the selected CSP to confirm whether the CSP is genuine. meet the security requirements of CSP.

[0076] Based on the above purpose, the embodiment of the present invention provides a method for querying security requirements, such as figure 2 shown, including:

[0077] S202: The CSU sends a security requirement query request to the CSP;

[0078] S204: The CSU receives a response message returned by the CSP, wherein the response message carries indication information for indicating whether the CSP meets the security requirements of the CSU;

[0079] S206: The CSU acquires indication information according to the response message.

[0080] In the preferred embodiment described above, the CSU can directly send a security requirement query request t...

Embodiment 3

[0086] The embodiment of the present invention provides a safety requirement feedback method. In this embodiment, the CSP is used as the execution subject for description, as follows image 3 shown, including:

[0087] S302: The first CSP receives the first security requirement query request sent by the CSU;

[0088] S304: The first CSP returns a first response message to the CSU, where the first response message carries indication information for indicating whether the first CSP meets the security requirements of the CSU.

[0089] In the preferred embodiment described above, the CSU can directly send a security requirement query request to the selected CSP to confirm whether the CSP really meets the security requirements of the CSU, further ensuring that the selected CSP meets the security requirements of the CSU, and solves the problem of prior art Due to the fact that the CSU cannot quickly and correctly select the CSP that meets the security requirements, the data securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security demand query method, a security demand feedback method and a security demand query device. The method comprises the following steps: a cloud computing user (CSU) sends a security demand query request to a cloud-computing trusted third party (CTTP), wherein the security demand query request is used for instructing the CTTP to return a CSP identifier of a CSP meeting the safety demand of the CSU to the CSU; the CSU receives a response message returned by the CTTP, wherein the response message carries the CSP identifier; and the CSU acquires the CSP identifier from the response message. With the security demand query method, the security demand feedback method and the security demand query device, the technical problem that data security is decreased when the CSU uses the CSP due to the fact that the CSU cannot quickly and accurately select the CSP meeting the safety demand in the prior art is solved, and a technical effect of improving the data security when the CSU acquires a cloud service from the CSP is achieved.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a security requirement query method, feedback method and device. Background technique [0002] Cloud Computing is a new consumption and delivery model combining information technology and business services. The core of cloud computing is that the hardware and software of cloud computing are resources, and are packaged as services, and users can access and use them according to their own needs through the network. The five core characteristics of cloud computing are: On-demand self-service, Broad network access, Resource pooling, Rapid scalability and Measurable services (Measured service). [0003] According to the types of services provided by cloud computing, the National Institute of Standards and Technology (NIST) divides cloud computing into: Infrastructure as a Service (IaaS for short), Platform as a Service (Platform as a Service). a Service, referred to as PaaS) and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 张瑞山林兆骥
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products