Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A virtualization system and method based on xen secure computer trusted device

A technology of secure computer and virtualization system, applied in the field of Xen-based secure computer trusted device virtualization system, can solve the problems of not guaranteeing the security of virtual guest operating system, impossible domestic trusted device virtualization, inconvenient expansion and update, etc. Achieve convenient access, simplify functions, and eliminate dependencies

Inactive Publication Date: 2011-12-21
SOUTH CHINA UNIV OF TECH
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, on the one hand, although the security computer improves the security of the system to a certain extent, it does not guarantee the security of the virtual guest operating system that directly interacts with ordinary users; on the other hand, the original trusted device virtualization technology relies on Because of the trusted device emulation tool (tpm_emulator), it is not easy to expand and update, and it is impossible to realize the virtualization of domestic trusted devices in the same way

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtualization system and method based on xen secure computer trusted device
  • A virtualization system and method based on xen secure computer trusted device
  • A virtualization system and method based on xen secure computer trusted device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0036] Such as figure 1 As shown, the first object of the invention of the present invention is to provide a kind of virtualization system based on Xen safe computer trusted device, including the virtual trusted device arranged in privileged domain operating system and virtual client system, which is used for virtual client system Access hardware trusted device 5, virtual trusted device includes trusted device virtualization backend driver 2, trusted device virtualization front-end driver 3 and trusted backend management module 4;

[0037] The trusted device virtualization front-end driver 3 is arranged in the virtual client system, and the virtual client system is also provided with an application program 9, the application program 9 is connected with the trusted device virtualization front-end driver 3, and the virtual client system passes the appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the application field of virtualization technology, and in particular relates to a virtualization system and method based on a Xen secure computer trusted device. The system includes a virtual trusted device, and the virtual trusted device includes a trusted device virtualization back-end driver, a trusted device virtualization front-end driver and a trusted back-end management module; the trusted device virtualization front-end driver is set in the virtual client system In the virtual client system, there is also an application program, and the application program is connected to the trusted device virtualization back-end driver set in the privileged domain operating system through the trusted device virtualization front-end driver; the trusted back-end management module is set in the privileged domain In the domain operating system, it is connected with the trusted device virtualization back-end driver and the hardware trusted device. The invention provides trusted device services for the virtual client system under the condition of ensuring the credibility of the virtual client operating system, relieves the dependence of the original trusted device virtualization technology on the trusted device simulation tool, and realizes the domestic trusted device virtualization.

Description

technical field [0001] The invention belongs to the application field of virtualization technology, and in particular relates to a virtualization system and method of a Xen-based secure computer trusted device. Background technique [0002] With the rapid development and wide application of computer and network technology, the degree of global informatization continues to increase. Information security is not only inseparable from our daily life, but also directly affects national security, economic development and social stability. Especially in recent years, the country implements the information system hierarchical protection policy, and the demand for computer security functions is very urgent. [0003] In order to solve the problem of information security, countries and enterprises are formulating relevant laws, regulations and systems to protect their own information security. Domestic and foreign software development companies have developed targeted anti-virus softw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F13/12G06F21/53
Inventor 刘发贵谢然吴刚王亮明
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products