CN104636960B - Electronic invoice security middleware construction method based on cloud computing technology - Google Patents

Electronic invoice security middleware construction method based on cloud computing technology Download PDF

Info

Publication number
CN104636960B
CN104636960B CN201410564097.9A CN201410564097A CN104636960B CN 104636960 B CN104636960 B CN 104636960B CN 201410564097 A CN201410564097 A CN 201410564097A CN 104636960 B CN104636960 B CN 104636960B
Authority
CN
China
Prior art keywords
service
cloud
security
clouds
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410564097.9A
Other languages
Chinese (zh)
Other versions
CN104636960A (en
Inventor
徐兵兵
王永军
于治楼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Inspur Software Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Software Group Co Ltd filed Critical Inspur Software Group Co Ltd
Priority to CN201410564097.9A priority Critical patent/CN104636960B/en
Publication of CN104636960A publication Critical patent/CN104636960A/en
Application granted granted Critical
Publication of CN104636960B publication Critical patent/CN104636960B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an electronic invoice security middleware construction method based on a cloud computing technology, which is characterized in that a security middleware cloud security service is constructed by using the cloud computing technology, cloud security KEY equipment and security server equipment are issued and managed, and meanwhile, computing resource balance is carried out on service modules with business peaks and valleys through a resource scheduling service in the cloud computing technology; the method comprises the steps that a special communication protocol is adopted to carry out certificate and algorithm filling on cloud security KEY equipment, an API (application program interface) is issued to the outside through the equipment, and offline, movable and single-thread security service is provided for electronic invoice users; performing certificate synchronization on cloud security server equipment through a standard directory service LDAP and a certificate status query service OCSP, and providing a multi-thread security service based on a local area network for an electronic invoice user; the method is characterized in that the cloud security middleware is composed of a cloud security service, a cloud KEY device and a cloud security server.

Description

A kind of electronic invoice Security Middleware construction method based on cloud computing technology
Technical field
The present invention relates to finance tax-controlling field, in the middle of specifically a kind of electronic invoice safety based on cloud computing technology Part construction method.
Background technology
At present, electronic invoice has become the certainty of national invoice reform with advantages such as its inexpensive, easy-to-use, easy cares Trend, but its safety supports system based on conventional architectures, but constantly expose computing resource during system Construction The problems such as distributing unbalance, overlapping investment construction, the high system degree of coupling, or even the big scattered, industry of small concentration of user can not be met Business distributed model, for example:
A. because electronic invoice system belongs to trade type operation system, therefore there is peak traffic phase, low ebb phase and continue in it The situation of change.In the peak traffic phase, its safety supports system service request is sharply increased, system pressure rise, can't bear the heavy load; And in the business low ebb phase, because its safety supports system service request is drastically reduced, a large amount of computing resources of system are idle again, make Into the wasting of resources;
B. for the service distribution model of electronic invoice user scattered, small concentration greatly, conventional security support system is due to lacking Weary necessary flexibility, therefore can not effectively be supported:The taxpayer disperseed for most business, it is desirable that single line On the line of journey/line under security service;Taxpayer for fraction service set, it is necessary to be then multithreading security service. The medelling construction mode of conventional security structure system, it is impossible to meet this flexible and changeable business demand;
C. under conventional security structure system, the degree of coupling is very high between system, causes to implement, safeguards extremely complex, it is impossible to enters Row heat is safeguarded.
The presence of these problems, causes sluggishness of the electronic invoice in extension process, and the system of having badly influenced is pushed away Wide and CSAT, as the fast-developing bottleneck of restriction electronic invoice.
The invention proposes a kind of new, the method for using cloud computing technology to encapsulate Security Middleware.With it, making Security Middleware system is built with cloud computing framework, its SAAS layers of dynamic adjustresources ability is utilized, it is ensured that safety is calculated Service reasonable distribution computing resource;Using distributed computing technology, realize and the security service based on PKI is reconstructed, in terms of carrying out Calculate scheduling and load balancing;Using cloud device, single thread is provided for the taxpayer of different business distributed model(Or it is multi-thread Journey)Line on(Or under line)Security service;By SOA methods of service, Security Middleware service interface is externally issued(Sign, test Label, encryption, decryption, safety certification, safety time etc.), reduce the system degree of coupling.To solve conventional security system in electronic invoice Problem encountered in application process.
The content of the invention
The present invention relates to one kind in Tax, build what electronic invoice Security Middleware was serviced using cloud computing technology Method, it is specifically a kind of to construct Security Middleware cloud security service, KEY equipment safe to high in the clouds, peace using cloud computing technology Full server apparatus is issued and managed, while by the scheduling of resource service in cloud computing technology, to wherein there is business Peak, the service module of low ebb carry out computing resource balance;Demonstrate,proved using private communication protocol to the safe KEY equipment in high in the clouds Book, algorithm are filling, and externally issue api interface by equipment, and under line, removable, single thread is provided for electronic invoice user Security service;Pass through standard directories service(LDAP), certificate retraction service(OCSP)To high in the clouds security server equipment Cert sync is carried out, based on LAN, multithreading security service is provided for electronic invoice user;By cloud security service, high in the clouds KEY equipment, high in the clouds security server collectively constitute a kind of method of cloud security middleware.
The purpose of the present invention is realized in the following manner, and the peace of cloud computing application platform is constructed using cloud computing technology Full middleware cloud security service, service includes the service of cloud certificate database, the service of cloud directory service LDAP, cloud certificate retraction OCSP, high in the clouds security server equipment control service, cloud signature and sign test service, cloud encryption and decryption service, cloud authentication Service, by the scheduling of resource service in cloud computing technology, to wherein exist peak traffic, the signature of low ebb and sign test service, Encryption and decryption service, identity authentication service carry out computing resource balance;Serviced by cloud security equipment control, to high in the clouds safety KEY equipment, high in the clouds security server equipment are issued and managed, and the safe KEY equipment in high in the clouds uses private communication protocol, from cloud It is filling that security service carries out certificate, algorithm;Inside there is security audit journal function, all calculating operations are recorded;To outgoing Cloth api interface, under line, moveable security service is provided for electronic invoice user;
High in the clouds security server equipment can only single thread carry out single task role processing, it is adaptable to business scattered taxpayer use Family, high in the clouds security server equipment is entered using standard directories service LDAP, certificate retraction service OCSP and cloud security service Row Cert sync, the security service based on LAN is provided for electronic invoice user, can multithreading batch processing user safety Service request, it is adaptable to the user of service set;Cloud security service, the safe KEY equipment in high in the clouds, common group of high in the clouds security server Into cloud security middleware, the Security Middleware service based on cloud computing technology is completed.
Build cloud computing application platform, including cloud resource allocation server, cloud application server, cloud storage service device, cloud Threshold cryptosystem server, cloud auditing and supervisory server, cloud computing application platform provide the service of IAAS, PAAS, SAAS stratus, support Universal distributed calculating or computational language system operation.
On the basis of cloud computing application platform, cloud security service is built, the cloud security service takes including cloud certificate database Business, cloud directory service LDAP, cloud certificate retraction service OCSP, cloud security equipment control service, cloud signature and sign test service, Cloud is encrypted and decryption service, cloud identity authentication service;Cloud security service operates in SAAS layers of cloud platform.
Cloud security service uses Distributed Calculation language development, can be split as by the SAAS layer resource scheduling modules of cloud platform Code segment or subprogram, Distributed Calculation or formation service load balancing are carried out to form boot image.
Cloud security service supports the security system based on PKI;Support PKCS#11 public key cryptography standards;Support X.509 form Safety certificate management;Support that SM1, SM2, SM3, SM4, RSA, 3DES algorithm are filling;Signature is externally issued in SOA forms and is tested Label, encryption and decryption, authentication interface service API.
The safe KEY equipment in high in the clouds, is made up of the filling area of certificate, the filling area of algorithm, security audit area and COS;Wherein certificate By COS, by private communication protocol progress, X.509 form certificate is filling in filling area, can only be in safe KEY after the completion of certificate is filling Practicality is carried out in equipment, can not be read outside equipment;The filling area of algorithm is identical with the algorithm that cloud security service is supported, support SM1, SM2, SM3, SM4, RSA, 3DES algorithm are filling, are applied to signature and sign test, encryption and decryption, identity authentication service;Safety Area audit for record security audit log.
The safe KEY equipment in high in the clouds can only single thread carry out single safe task processing, it is not possible to while to multiple safety clothes Business request is responded.
High in the clouds security server equipment, by the service of high in the clouds certificate database, high in the clouds directory service LDAP, high in the clouds certificate status Inquiry service OCSP, the service of high in the clouds security audit, signature and sign test, encryption and decryption, the high in the clouds algorithm service group of authentication Into;Certificate and state synchronized are carried out by high in the clouds directory service LDAP, high in the clouds certificate retraction service OCSP and cloud security service; Certificate is managed collectively by high in the clouds certificate database service, is only used in equipment, can not be read outside equipment;Calculate in high in the clouds Method is serviced supports that algorithm is identical with cloud security service, supports that SM1, SM2, SM3, SM4, RSA, 3DES algorithm are filling, is applied to Signature and sign test, encryption and decryption, identity authentication service;The operation of all security servers, is awarded by high in the clouds security audit service Weigh and recorded.
The security service request of high in the clouds security server equipment multithreading batch processing user, while handling many safety clothes Business business.
Taxpayer is before using security service, it is necessary into " cloud security equipment control service " module of cloud security service Registered, and select used safety means and security service type, be managed collectively by cloud security service.
The beneficial effects of the invention are as follows:Solve calculating money of the conventional security system in the presence of electronic invoice application process The problems such as source distributes unbalance, overlapping investment construction, system degree of coupling height, can not effectively meet service distribution model.
Brief description of the drawings
Fig. 1 is the electronic invoice Security Middleware configuration diagram based on cloud computing technology;
Fig. 2 is KEY device structure schematic diagrams in high in the clouds used in the present invention;
Fig. 3 is security server device structure schematic diagram in high in the clouds used in this religious name.
Embodiment
The method of the present invention is described in detail below with reference to Figure of description.
A kind of electronic invoice Security Middleware construction method based on cloud computing technology, is constructed using cloud computing technology Security Middleware cloud security service, including the service of cloud certificate database, the service of cloud directory service LDAP, cloud certificate retraction Service, cloud identity authentication service etc. are encrypted and decrypted to OCSP, cloud security equipment control service, cloud signature and sign test service, cloud;It is logical The scheduling of resource service crossed in cloud computing technology, conciliates to wherein there is peak traffic, the signature of low ebb and sign test service, encryption Close service, identity authentication service carry out computing resource balance;Serviced by cloud security equipment control, KEY equipment safe to high in the clouds, Security server equipment is issued and managed.The safe KEY equipment in high in the clouds uses private communication protocol, is carried out from cloud security service Certificate, algorithm are filling;It is interior to use security audit journal function, all calculating operations are noted down;Api interface is externally issued, is Electronic invoice user provides under line, moveable security service;The equipment can only single thread carry out single task role processing, be applicable The taxpayer user disperseed in business.High in the clouds security server equipment is using standard directories service LDAP, certificate retraction clothes Business OCSP carries out Cert sync with cloud security service, and the security service based on LAN is provided for electronic invoice user, can be multi-thread The security service request of journey batch processing user, it is adaptable to the user of service set.Set by cloud security service, the safe KEY in high in the clouds Standby, high in the clouds security server collectively constitutes cloud security middleware, common to complete to build the Security Middleware based on cloud computing technology The purpose of service, implementation step is as follows:
1) build cloud computing application platform, including cloud resource allocation server, cloud application server, cloud storage service device, Yunmen limit encryption server, cloud auditing and supervisory server etc., the platform provides the service of IAAS, PAAS, SAAS stratus, supports general Distributed Calculation or computational language system operation;
2) on the basis of cloud computing application platform, cloud security service is built, the cloud security service includes cloud certificate database Service, cloud directory service(LDAP), cloud certificate retraction service(OCSP), cloud security equipment control service, cloud signature(Test Label)Service, cloud encryption(Decryption)Service, cloud identity authentication service;Cloud security service operates in SAAS layers of cloud platform;
3) cloud security service uses Distributed Calculation language development, can be split by the SAAS layer resource schedulings module of cloud platform For code segment or subprogram, Distributed Calculation or formation service load balancing are carried out to form boot image;
4) cloud security service supports the security system based on PKI;Support PKCS#11 public key cryptography standards;Support X.509 lattice The safety certificate management of formula;Support that SM1, SM2, SM3, SM4, RSA, 3DES algorithm are filling;Signature is externally issued in SOA forms (Sign test), encryption(Decryption), authentication interface service API;
5) the safe KEY equipment in high in the clouds, is made up of the filling area of certificate, the filling area of algorithm, security audit area and COS;Wherein demonstrate,prove By COS, by private communication protocol progress, X.509 form certificate is filling in book filling area, can only be in safety after the completion of certificate is filling Practicality is carried out in KEY equipment, can not be read outside equipment;The filling area of algorithm is identical with the algorithm that cloud security service is supported, supports SM1, SM2, SM3, SM4, RSA, 3DES algorithm are filling, are applied to signature and sign test, encryption and decrypt), identity authentication service; Security audit area is used to note down security audit daily record;
6) the safe KEY equipment in high in the clouds can only single thread carry out single safe task processing, it is not possible to while to multiple safety Service request is responded;
7) high in the clouds security server equipment, by the service of high in the clouds certificate database, high in the clouds directory service LDAP, high in the clouds certificate shape State inquiry service OCSP, the service of high in the clouds security audit, signature and sign test, encryption and decryption, the high in the clouds algorithm service of authentication Composition;Certificate and state synchronized are carried out by high in the clouds directory service LDAP, high in the clouds certificate retraction service OCSP and security service; Certificate is managed collectively by high in the clouds certificate database service, is only used in equipment, can not be read outside equipment;Calculate in high in the clouds Method is serviced supports that algorithm is identical with cloud security service, supports that SM1, SM2, SM3, SM4, RSA, 3DES algorithm are filling, is applied to Signature and sign test, encryption and decryption, identity authentication service;The operation of all security servers, is awarded by high in the clouds security audit service Weigh and recorded;
8) security server equipment in high in the clouds can be asked with the security service of multithreading batch processing user, while many of processing Security service business;
9) taxpayer using before security service, it is necessary to " cloud security equipment control service " module of cloud security service It is middle to be registered, and used safety means and security service type are selected, it is managed collectively by cloud security service;
10) taxpayer, according to the security service type of selected middleware, directly invokes when carrying out electronic invoice business Unified SOA API can complete the respective services including authentication, signature sign test, encrypting and decrypting, safety time etc..
In addition to the technical characteristic described in specification, the known technology of those skilled in the art is.

Claims (10)

1. a kind of electronic invoice Security Middleware construction method based on cloud computing technology, it is characterised in that use cloud computing skill Art is to construct the Security Middleware cloud security service of cloud computing application platform, and servicing includes the service of cloud certificate database, cloud catalogue Service LDAP, cloud certificate retraction service OCSP, high in the clouds security server equipment control service, cloud signature and sign test service, Cloud is encrypted and decryption service, cloud identity authentication service, by the scheduling of resource service in cloud computing technology, to wherein there is business Peak, the signature of low ebb and sign test service, encryption and decryption service, identity authentication service carry out computing resource balance;Pass through cloud Safety means management service, KEY equipment safe to high in the clouds, high in the clouds security server equipment are issued and managed, high in the clouds safety KEY equipment uses private communication protocol, and it is filling to carry out certificate, algorithm from cloud security service;Inside there is security audit journal function, it is right All calculating operations are recorded;Externally issue api interface, under line, moveable safety clothes are provided for electronic invoice user Business;
High in the clouds security server equipment can only single thread carry out single task role processing, it is adaptable to the scattered taxpayer user of business, High in the clouds security server equipment is demonstrate,proved using standard directories service LDAP, certificate retraction service OCSP and cloud security service Book is synchronous, and the security service based on LAN is provided for electronic invoice user, can multithreading batch processing user security service Request, it is adaptable to the user of service set;Cloud security service, the safe KEY equipment in high in the clouds, high in the clouds security server collectively constitute cloud Security Middleware, completes the Security Middleware service based on cloud computing technology.
2. according to the method described in claim 1, it is characterised in that:Build cloud computing application platform, including cloud scheduling of resource clothes Business device, cloud application server, cloud storage service device, Yunmen limit encryption server, cloud auditing and supervisory server, cloud computing application are flat Platform provides the service of IAAS, PAAS, SAAS stratus, supports universal distributed calculating or computational language system operation.
3. according to the method described in claim 1, it is characterised in that:On the basis of cloud computing application platform, cloud security clothes are built Business, the cloud security service includes the service of cloud certificate database, cloud directory service LDAP, cloud certificate retraction service OCSP, cloud Safety means management service, cloud signature and sign test service, cloud encryption and decryption service, cloud identity authentication service;Cloud security service Operate in SAAS layers of cloud platform.
4. method according to claim 3, it is characterised in that:Cloud security service uses Distributed Calculation language development, can Code segment or subprogram are split as by the SAAS layer resource scheduling modules of cloud platform, Distributed Calculation is carried out to form boot image Or form service load balancing.
5. method according to claim 3, it is characterised in that:Cloud security service supports the security system based on PKI;Support PKCS#11 public key cryptography standards;Support the safety certificate management of X.509 form;Support SM1, SM2, SM3, SM4, RSA, 3DES Algorithm is filling;Signature and sign test, encryption and decryption, authentication interface service API are externally issued in SOA forms.
6. according to the method described in claim 1, it is characterised in that:The safe KEY equipment in high in the clouds, is filled by the filling area of certificate, algorithm Fill area, security audit area and COS compositions;Wherein the filling area of certificate carries out X.509 form certificate by COS by private communication protocol It is filling, practicality can only be carried out after the completion of certificate is filling in safe KEY equipment, can not be read outside equipment;The filling area of algorithm with Cloud security service support algorithm it is identical, support SM1, SM2, SM3, SM4, RSA, 3DES algorithm it is filling, be applied to signature and Sign test, encryption and decryption, identity authentication service;Security audit area is used for record security audit log.
7. method according to claim 6, it is characterised in that:The safe KEY equipment in high in the clouds can only the single peace of single thread progress Full task processing, it is not possible to while being responded to multiple security services request.
8. according to the method described in claim 1, it is characterised in that:High in the clouds security server equipment, by high in the clouds certificate database Service, high in the clouds directory service LDAP, high in the clouds certificate retraction service OCSP, the service of high in the clouds security audit, signature and sign test, added Close and decryption, the high in the clouds algorithm service composition of authentication;Serviced by high in the clouds directory service LDAP, high in the clouds certificate retraction OCSP carries out certificate and state synchronized with cloud security service;Certificate is managed collectively by high in the clouds certificate database service, only Use, can not be read outside equipment in equipment;High in the clouds algorithm service supports that algorithm is identical with cloud security service, support SM1, SM2, SM3, SM4, RSA, 3DES algorithm are filling, are applied to signature and sign test, encryption and decryption, identity authentication service;It is all The operation of security server, by high in the clouds security audit authorization of service and is recorded.
9. method according to claim 8, it is characterised in that:High in the clouds security server equipment multithreading batch processing user Security service request, while handle many security service business.
10. according to the method described in claim 1, it is characterised in that:Taxpayer is before using security service, it is necessary to arrive Yunan County Registered in " the cloud security equipment control service " module serviced entirely, and select used safety means and security service class Type, is managed collectively by cloud security service.
CN201410564097.9A 2014-10-22 2014-10-22 Electronic invoice security middleware construction method based on cloud computing technology Active CN104636960B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410564097.9A CN104636960B (en) 2014-10-22 2014-10-22 Electronic invoice security middleware construction method based on cloud computing technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410564097.9A CN104636960B (en) 2014-10-22 2014-10-22 Electronic invoice security middleware construction method based on cloud computing technology

Publications (2)

Publication Number Publication Date
CN104636960A CN104636960A (en) 2015-05-20
CN104636960B true CN104636960B (en) 2017-07-14

Family

ID=53215672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410564097.9A Active CN104636960B (en) 2014-10-22 2014-10-22 Electronic invoice security middleware construction method based on cloud computing technology

Country Status (1)

Country Link
CN (1) CN104636960B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635132B (en) * 2015-12-24 2018-09-07 浪潮软件集团有限公司 User authentication method and system
CN108881434A (en) * 2018-06-16 2018-11-23 武汉商启网络信息有限公司 A kind of management control system of on-demand bulk management cloud resource
CN111131207B (en) * 2019-12-13 2021-12-07 新华三大数据技术有限公司 Certificate verification method and device in distributed task and server
CN111641652A (en) * 2020-05-29 2020-09-08 北京中超伟业信息安全技术股份有限公司 Application security service platform based on cloud computing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184606A (en) * 2011-04-12 2011-09-14 浪潮电子信息产业股份有限公司 Cloud-computing-based tax control system
CN102368327A (en) * 2011-10-31 2012-03-07 浪潮齐鲁软件产业有限公司 Online billing system of roll type bill based on cloud computing
CN102404389A (en) * 2011-11-04 2012-04-04 浪潮齐鲁软件产业有限公司 Network invoicing method based on cloud compute and data asynchronous transmission technology
CN102693595A (en) * 2012-05-30 2012-09-26 浪潮齐鲁软件产业有限公司 Network cloud open terminal on-line invoice issuing method based on CSOI technology

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140229348A1 (en) * 2013-02-08 2014-08-14 Hewlett-Packard Development Company, L.P. Electronic invoice management and printing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184606A (en) * 2011-04-12 2011-09-14 浪潮电子信息产业股份有限公司 Cloud-computing-based tax control system
CN102368327A (en) * 2011-10-31 2012-03-07 浪潮齐鲁软件产业有限公司 Online billing system of roll type bill based on cloud computing
CN102404389A (en) * 2011-11-04 2012-04-04 浪潮齐鲁软件产业有限公司 Network invoicing method based on cloud compute and data asynchronous transmission technology
CN102693595A (en) * 2012-05-30 2012-09-26 浪潮齐鲁软件产业有限公司 Network cloud open terminal on-line invoice issuing method based on CSOI technology

Also Published As

Publication number Publication date
CN104636960A (en) 2015-05-20

Similar Documents

Publication Publication Date Title
US11741251B2 (en) System of enclaves
CN105027107B (en) Migrate the computer implemented method and computing system of computing resource
CN102932459B (en) A kind of method of controlling security of virtual machine
EP3232634B1 (en) Identity authentication method and device
TWI797056B (en) Method and apparatus for supporting multi-user cluster authentication
CN103051455B (en) The implementation method of the credible password module cryptographic function devolution under a kind of cloud computing environment
CN104636960B (en) Electronic invoice security middleware construction method based on cloud computing technology
CN103534976A (en) Data security protection method, server, host, and system
CN106027235A (en) PCI password card, and password operation method and system for massive keys
CN104202421A (en) Cloud computing based password service system
CN109450620B (en) Method for sharing security application in mobile terminal and mobile terminal
CN107948156A (en) The closed key management method and system of a kind of identity-based
US20150156180A1 (en) Handheld video visitation
CN109842589A (en) A kind of cloud storage encryption method, device, equipment and storage medium
CN109921902A (en) A kind of key management method, safety chip, service server and information system
CN103516523A (en) Data encryption system structure based on cloud storage
CN109918937A (en) A kind of information processing method, device, equipment and medium
CN104954137A (en) Method of virtual machine security certification based on domestic password technique
CN108574573A (en) Method, encryption device and the virtual VPN service systems of cryptographic service are provided for virtual VPN
CN103425939B (en) A kind of SM3 algorithm realization method and system in JAVA environment
Moghaddam et al. UAA: user authentication agent for managing user identities in cloud computing environments
Tan et al. Research of cloud computing data security technology
CN106973070A (en) A kind of big data calculates trusteeship service security certification system and method
CN105208044A (en) Key management method suitable for cloud computing
CN109389503A (en) Block chain account model and implementation method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180809

Address after: 250100 S06 tower, 1036, Chao Lu Road, hi tech Zone, Ji'nan, Shandong.

Patentee after: Shandong wave cloud Mdt InfoTech Ltd

Address before: 250100 Ji'nan hi tech Zone No. 2877, Shandong Province

Patentee before: Inspur Group Co., Ltd.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 250100 No. 1036 Tidal Road, Jinan High-tech Zone, Shandong Province, S01 Building, Tidal Science Park

Patentee after: Inspur cloud Information Technology Co., Ltd

Address before: 250100 Ji'nan science and technology zone, Shandong high tide Road, No. 1036 wave of science and Technology Park, building S06

Patentee before: SHANDONG LANGCHAO YUNTOU INFORMATION TECHNOLOGY Co.,Ltd.