Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Principal Century CCypher CVM password machine: make Shangyun more secure

2025-02-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >

Share

Shulou(Shulou.com)11/24 Report--

In recent years, with the rapid development of cloud computing, the security of cloud computing has attracted more and more attention. The demand for cloud services in finance, government affairs, e-commerce and other fields is very urgent, which gives rise to the demand for key management and cryptographic computing services, in order to ensure the confidentiality, integrity, validity and non-repudiation of users' sensitive information.

The cryptographic function requirements of cloud computing are mainly two aspects, one is the security protection of the cloud platform itself, and the other is to meet the needs of cloud business services.

The security of the cloud platform is mainly reflected in the basic environment security of cloud computing, data security, access control and authentication; the cryptographic computing function requirements of cloud services add the requirements of high availability of cryptographic services and flexible allocation of cryptographic computing resources on the basis of traditional cryptographic requirements.

CCypher CVM password machine

Cryptographic technology enables cloud computing. In the era of "everything can be cloud", Principal Century CCypher CVM password machine provides high-performance, multi-tasking cryptographic operations and key management services for applications to ensure cloud security!

CCypher CVM cipher machine is a high-performance cryptographic device developed by Principal Century to meet the needs of cloud computing cryptographic features. Through virtualization technology, it can support multiple virtual server cipher machines to provide services at the same time, while ensuring the secure isolation of computing resources and password resources of various virtual machine cryptographic devices. Provide a variety of domestic cryptographic algorithms such as SM1, SM2, SM3, SM4, etc., which can meet the requirements of signature / verification and decryption of application system data, and can provide high-performance cryptographic operations with multi-task parallel processing for all kinds of business systems to ensure the confidentiality, integrity and validity of information.

Product highlight

High security

CCypher adopts kernel-based security isolation technology and cryptographic hardware virtualization technology, which can safely run multiple virtual server password machines, and the key isolation, authority isolation, network isolation and operation isolation between each virtual server password machine.

Dynamic allocation

CCypher can flexibly scale and allocate cryptographic resources according to business requirements in order to maximize the utilization of cryptographic resources.

Deep fusion CSSP-Cloud

Deep integration of CCypher and CSSP-Cloud can provide flexible and scalable cloud password resource pool on demand in cloud environment, and provide scalable, high-concurrency and high-performance password service capabilities for business systems.

Core function

Host

L whole life cycle management of virtual password machine

L virtual password machine security drift

L key isolation between virtual cryptographic machines

Virtual server password machine

L Lifecycle Management of key

L data / decryption, signature / verification, digital envelope

L generate data summaries and random numbers

User authority control of separation of powers

L apply whitelist settings

Product qualification

Commercial password product certification certificate (non-creative version)

Commercial password product certification certificate (Xinchuang version)

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

IT Information

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report