会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • AUTHENTICATION AND AUTHORIZATION METHODS FOR CLOUD COMPUTING PLATFORM SECURITY
    • 云计算平台安全的认证和授权方法
    • WO2013000080A1
    • 2013-01-03
    • PCT/CA2012/050422
    • 2012-06-26
    • INTERNATIONAL BUSINESS MACHINES CORPORATIONIBM CANADA LIMITED-IBM CANADA LIMITEECHANG, David YuBENANTAR, MessaoudCHANG, John Yow-ChunVENKATARAMAPPA, Vishwanath
    • CHANG, David YuBENANTAR, MessaoudCHANG, John Yow-ChunVENKATARAMAPPA, Vishwanath
    • H04L9/32H04L12/24
    • H04L63/104G06F21/62G06F21/6218G06F21/78G06F2221/2115H04L63/08H04L63/0815H04L67/10H04L67/34H04L67/42
    • An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
    • 云计算环境的认证和授权插件模型使云客户在将应用程序部署在云中时能够保留对其企业信息的控制。 云服务提供商为客户安全模块提供可插拔的界面。 当客户部署应用程序时,云环境管理员为客户的应用程序和数据分配资源组(例如,处理器,存储和内存)。 客户将其自己的认证和授权安全模块注册到云安全服务,然后该安全模块用于控制哪些人员或实体可以访问与部署的应用程序相关的信息。 然而,云环境管理员通常没有在客户的安全模块中注册(作为允许的用户); 因此,云环境管理员无法访问(或向其他人或云的一般资源池)访问分配给云客户的资源(即使管理员自己分配了这些资源)或相关联的业务信息。 为了进一步平衡各方的权利,第三方公证服务在将应用程序和信息部署在云中时保护客户的隐私和访问权限。