Virtual machine safety protocol method and system based on TPM
A technology of security protocol and virtual machine, which is applied in the field of TPM-based virtual machine security protocol method and system, can solve the problems of complexity and inability to distinguish different virtual machines, and achieve the effect of improving limitations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.
[0047] There are three virtual machines in the virtual machine environment in this embodiment, namely, the privileged virtual machine domain0, the non-privileged virtual machine domainU1, and the non-privileged virtual machine domainU2.
[0048] This embodiment relates to a TPM-based virtual machine security protocol method, including the following specific steps:
[0049] Step 1. The privileged virtual machine domain0 initializes the two non-privileged virtual machines domainU1 and domainU2 that need to communicate and establishes the identity information of the non-...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com