Computer and user management method in virtual environment

A technology of virtual machine management and virtual machine manager, applied in computer security devices, computing, digital data processing and other directions, can solve problems such as information leakage and data destruction, and achieve the effect of avoiding information leakage

Active Publication Date: 2010-03-17
LENOVO (BEIJING) LTD
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In a multi-user, multi-tasking computer system, since multiple users operate on resources in the same operating system, users with top-level privileges can operate all computer resources, so users with low privileges can run certain The software obtains the authority of the user with the top authority and the control of all computer resources, thereby causing information leakage or data destruction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer and user management method in virtual environment
  • Computer and user management method in virtual environment
  • Computer and user management method in virtual environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the technical problems, technical solutions and advantages to be solved by the embodiments of the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0056] The embodiment of the present invention aims at the existing multi-user, multi-task computer system, the user with low authority can obtain the authority of the super user and the control right of all computer resources by running some software with loopholes, thereby causing information leakage Or the problem of data destruction, providing a user management method in computer and virtual environment.

[0057] Such as figure 1 As shown, the computer in the embodiment of the present invention includes: a hardware platform; a virtual machine management unit located on the hardware platform and equipped with a virtual machine manager;

[0058] The first operating unit is located on the hardware platform and installed with a first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user management device and a method in a virtual environment. The computer comprises a hardware platform, a virtual machine manager, a first operation unit, a second operation unit, a second operation system installed on the virtual machine manager and a virtual machine operation management unit, wherein the first operation unit comprises a management unit for setting a plurality of users and distributing corresponding resources and authorities for each of the plurality of users; and the virtual machine operation management unit is used for collecting the resources and the authorities corresponding to each of the plurality of users, transmitting a first user in the plurality of users, the resources and the authorities corresponding to the first user to the second operation system, acquiring read/write operation requests of the first user on resources corresponding to the first user according to the authorities corresponding to the first user, and returning corresponding read/write operation results to the second operation system through the virtual machine manager. The method avoids a condition that the first user uses resources of other users over the authority of the first user.

Description

technical field [0001] The invention relates to computer system user management in the computer field, in particular to a user management method in computers and virtual environments. Background technique [0002] Today's personal computers all support multi-user and multi-tasking operating systems. Generally, there is a default super user in the computer, who can create other users and grant them certain permissions. Other users created by superusers have different computer resources and operation permissions due to different roles; however, superusers or users authorized by superusers can see and operate all computer resources. [0003] Under normal circumstances, this kind of user rights management scheme can well realize the management of computer user resources. In the Internet age, under the attack and destruction of hackers and viruses, it often happens that low-level users obtain superuser authority and control of all computer resources by running programs with loo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F9/46G06F21/00G06F21/53
Inventor 余家忠
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products