Virtual machine safety protocol method and system based on TPM

A technology of security protocol and virtual machine, which is applied in the field of TPM-based virtual machine security protocol method and system, can solve the problems of complexity and inability to distinguish different virtual machines, and achieve the effect of improving limitations

Inactive Publication Date: 2009-05-06
SHANGHAI JIAO TONG UNIV
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its shortcoming is that it only proposes a method of sharing a hardware trusted computing module TPM in the virtual machine environment, but does not solve how to use the hardware trusted computing module TPM in the virtual machine environment to ensure communication security in the virtual environment
However, traditional security protocol methods and systems are not suitable for new features and new requirements in the virtual machine environment, mainly in the following aspects: 1. The communication between virtual machines is different from traditional computer systems. The communication between virtual machines may be two The communication between physical computers may also be the communication within a physical computer; 2. Multiple virtual machines can be deployed on a physical computer, and different virtual machines cannot be simply identified by the hardware difference of the physical computer; 3. Multiple virtual machines can be further nested and deployed on one virtual machine, which introduces new complexity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine safety protocol method and system based on TPM
  • Virtual machine safety protocol method and system based on TPM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.

[0047] There are three virtual machines in the virtual machine environment in this embodiment, namely, the privileged virtual machine domain0, the non-privileged virtual machine domainU1, and the non-privileged virtual machine domainU2.

[0048] This embodiment relates to a TPM-based virtual machine security protocol method, including the following specific steps:

[0049] Step 1. The privileged virtual machine domain0 initializes the two non-privileged virtual machines domainU1 and domainU2 that need to communicate and establishes the identity information of the non-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a virtual machine security protocol method and a system based on TPM, belonging to the technical field of computer application. The method comprises the following steps: firstly, ensuring the authenticity of identity of a correspondent by identity authentication under the virtual machine environment; secondly, ensuring the communication content between the correspondents under the virtual machine environment to be encrypted and preventing other nodes on a transmission path from obtaining the communication content; and finally, coming down security problems to a TPM module for ensuring the accuracy and reliability of security in the virtual machine. The system comprises a TPM hardware module, a TPM driver program, a TPM software stack module, a virtual machine monitor, a privilege virtual machine, a plurality of nonprivileged virtual machine and a security protocol module. The security of the invention is easy to be guaranteed, thus leading the communication security under the whole virtual machine environment to be easy to obtain guarantee.

Description

technical field [0001] The present invention relates to a method and system in the field of computer application technology, in particular to a TPM-based virtual machine security protocol method and system. Background technique [0002] With the continuous expansion of computing system resources, continuous enhancement of processing capabilities, continuous improvement of application requirements, and continuous popularization of multi-core high-performance processors, how to use and exert the powerful functions of computers has become a major challenge in the field of information technology in the future. As a new type of computer technology, the virtualization technology of computer system has greatly improved the resource utilization rate of computer system, thus excavated the idle computing potential of computer system and maximized the processing capacity of computer system. [0003] In addition, virtualized computer systems (virtual machines) also have the following ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/54G06F9/455G06F21/00G06F21/33
Inventor 骆源方喆李明禄翁楚良
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products