Protect Cloud security Dawn launch encryption products and solutions

Source: Internet
Author: User
Keywords Security solution Dawn information security

"Sadie Network News" Although "cloud computing" in the domestic by many manufacturers of the pursuit, but often are wool, the security of cloud computing has become an important obstacle to development, especially some enterprises, still for the information stored in the "cloud" lack of confidence. If the issue of information security is considered a war, then in this battle to maintain information security, everyone in society becomes a cyber-security fighter guarding their own domain security.

It is understood that at present, China's information security areas mainly related to things networking, mobile internet, cloud computing system security and the three network integration industry security and other fields of content security, these areas of information security market scale is huge. According to statistics, the existing area of information security will affect the future 160 billion of the incremental market. Therefore, this information security campaign is more noticeable than any previous war.

Recently, the domestic renowned server manufacturers Shuguang company, in the face of strong market security needs, launched a relying on Nikey and secret encryption card information security solutions. Shuguang Product manager said that the new series based solution will provide network security, especially in the cloud security to build a strong protection system, can effectively protect the user information data security.

It is understood that the core of this set of security solutions is a series of security software, including: signature, signature service software, identity authentication Service software, Encrypting File system software. Three kinds of software are like three levels, for each person who is in contact with the information for careful screening, lack of any "password" even if the Server Manager, can not contact the core content of the data, thus greatly enhance the security of information data, so that information "owners" can be assured that the data stored in the "cloud."

and support software applications include Nikey series products (NiKey100, NiKey200, NiKey300) and secret encryption card, Nikey series products are mainly used in the field of identity authentication. NiKey100 conforms to the ISO7816-4 specification, which can meet the standard interface specification of CSP, PKCS11 and state-secret bureau interface, and supports many algorithms, such as RSA, DES, 3DES, SM1, SHA-1, and ITU-T X.509v3 certificate storage and hardware random number generator. and NiKey200 can support NiKey100 all functions, only the keyboard input pin code, can be signed to confirm the operation. Similarly, NiKey300 can support all NiKey100 functions, but NiKey300 uses biometric fingerprint recognition without the use of memory pin codes.

NiKey100 NiKey200 NiKey300

And the secret card built-in signature server, authentication server and encrypted storage server, the secret card has been established in addition to the application of identity authentication domain, but also can be applied to CA Certificate Center, PKI public key infrastructure and storage encryption and other fields. will be mainly applied to the provincial CA system and customs and other industries CA system, can effectively execute the identity of the unified Rights management system, and the existing system security documents and encrypted shared files to perform effective protection.

The Secret card of dawning

Shuguang Product manager said, based on the introduction of a variety of security products, dawning company will launch a series of corresponding solutions: based on USB key operating system User login solution, it can support xp/win2003, vista/win7/win2008 operating system, to protect the user's login security. The Identity authentication System technical scheme, the client will enable the key the private key signature, the server end uses the key public key authentication signature, but the authentication system based on the CA The technical scheme will issue the digital certificate for the user, and will store this in the key as the file certificate, the user in the process of enabling, The server side of the system will automatically verify the validity of the user certificate, so it needs to be integrated with the existing user management to ensure the security of login. and DCSD Shuguang cluster security domain will mainly play to encrypt local and network file system, prevent LAN monitoring, prevent the secret leakage between multiple operating system users, protect the data itself security (storage media), can effectively protect the data security in the security domain.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.