Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security authentication resource allocation and management method in cloud environment

A technology of security authentication and management method, applied in the direction of digital transmission system, data exchange network, electrical components, etc., to achieve the effect of ensuring security, confidentiality, and high availability

Active Publication Date: 2019-05-07
SHANDONG INSPUR SCI RES INST CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the cloud environment, security authentication issues must also be considered by each user application system, and the traditional security authentication method has become a bottleneck in the cloud environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication resource allocation and management method in cloud environment
  • A security authentication resource allocation and management method in cloud environment
  • A security authentication resource allocation and management method in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments. It should be noted that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] The security authentication resource allocation and management method in the cloud environment realizes the identity authentication of the cloud security authentication PaaS platform for users based on digital certificates, and implements unified allocation and management of security authentication resources by pooling hardware security device resources, providing user application systems with Efficient and flexible security certification services;

[0047] Among them, the cloud security certification PaaS platform is responsible for the issuance of digital certificates,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention particularly relates to a security authentication resource allocation and management method in a cloud environment. According to the security authentication resource allocation and management method in a cloud environment, a cloud security authentication PaaS platform authenticates users based on a digital certificate, security authentication resources are allocated and managed in a unified manner by hardware security equipment resource pooling, and thus, efficient and flexible security authentication service is provided for user application systems. By using the security authentication resource allocation and management method in a cloud environment, the problem on how to allocate and manage various security authentication resources in a cloud computing environment is solved effectively, higher security is achieved, and the efficiency of user application system security authentication operation is improved greatly.

Description

technical field [0001] The invention relates to the fields of information security authentication technology and cloud computing technology, in particular to a method for allocating and managing security authentication resources in a cloud environment. Background technique [0002] With the popularization of cloud computing and virtual technology, many excellent cloud computing application service platforms have emerged, which aggregate a large number of physical hardware resources, and use virtualization technology to abstract the hardware resources of physical hardware devices to achieve heterogeneous The unified allocation, scheduling and management of network computing resources, so as to achieve the purpose of making full use of software and hardware resources and improving utilization. [0003] In recent years, IaaS (Infrastructure as a Service), PaaS (Platform as a Service) and SaaS (Software as a Service) service models have been widely recognized. Among them, the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/911
CPCH04L47/70H04L63/0823H04L67/10
Inventor 孙善宝于治楼金长新
Owner SHANDONG INSPUR SCI RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products