Method for constructing virtual environment trust

A construction method and technology of virtual environment, applied in the direction of instrument, digital data processing, platform integrity maintenance, etc., can solve problems such as difficulty in building a trust chain mechanism in virtual environment

Active Publication Date: 2009-01-21
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF0 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The trust chain mechanism built by the current trusted virtual platform mainly focuses on a certain aspect, and at the same

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for constructing virtual environment trust
  • Method for constructing virtual environment trust
  • Method for constructing virtual environment trust

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0076] The present invention will be further described below through specific embodiments in conjunction with the accompanying drawings.

[0077] The implementation and construction of the trust system in the virtual environment in this embodiment is mainly based on the Xen technology. Xen is built on the para-virtualization technology (Para Virtualization). ) implements virtualization for memory, CPU, and I / O, and on this basis, provides an address space isolation mechanism for each virtual domain to improve system performance. To better implement security applications, Xen implements the management virtual domain and the application virtual domain as Domain0 and DomainU respectively, where Domain0 manages the running and operation of DomainU. At present, Xen mainly adopts the Event Channel communication mechanism between Domain0 and DomainU for the TPM command request issued by DomainU, and Domain0 accepts the TPM command request from DomainU and maintains the corresponding ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtual environment trust building method, which belongs to the trusted computing field in information security. The invention uses a single TPM to realize the trust of one or a plurality of virtual domains and comprises the following steps: firstly, measuring hardware, a virtual layer, a management virtual domain and one or a plurality of application virtual domains in turn by the TPM, realizing the trust of the application virtual domains, secondly, receiving and processing TPM command requests from each virtual domain, and establishing and maintaining TPM context for each virtual domain. The invention has the advantages that firstly, the platform safety and credibility are intensified through a complete trusted isolating mechanism, the trusted application service is better supported, and secondly, the safe sharing of each virtual domain to a trusted hardware root TPM is realized.

Description

technical field [0001] The present invention relates to a method for building trust in a virtual environment. Specifically, the present invention relates to a security application solution that combines trusted computing with virtual technology and builds a trusted virtual platform through a perfect trust chain transmission mechanism, which belongs to information technology. The field of trusted computing in security. The method supports secure sharing of trusted hardware roots by each virtual domain, and provides reliable services for distributed security applications. Background technique [0002] With the development of information technology, the environment in which computer systems live is further complicated and diversified. Traditional software-based security solutions (such as firewalls, intrusion detection, and anti-virus) are often difficult to resist hackers, viruses, and internal theft. the invasion of the In response to these problems, in order to enhance the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/53
Inventor 冯等国秦宇聂晓伟
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products