Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing safe working environment based on virtualization technology

A virtualization technology and security work technology, applied in the field of virtualization technology application and Windows driver development, it can solve the problems of inability to call each other, prevent interaction, and lengthy, and achieve the effect of convenient deployment

Inactive Publication Date: 2012-01-11
胡建斌 +1
View PDF3 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages of this traditional installation process are: ① installation has many steps and is a long process; ② due to hardware update or computer failure, all user applications must be reinstalled and configured on a new machine; ③ installed programs It does not have portability. Users often use a USB flash drive to carry files and then work on another machine. However, the application program cannot be carried to another machine, and the files on the USB flash drive may also lack some associated files and be unavailable; ④When an organization needs to update the current Windows operating system version, the application program needs to be reinstalled, which also includes a new machine. Because all programs use a common file path, when using the same file name, conflicts often occur in DLL and other files
However, this method has the following disadvantages: ① Only developers who own the source code can modify it, and third parties, integrators, and enterprises cannot modify it; ② Modification requires developers to choose an appropriate method to store information instead of relying on the Windows registry. More time will be spent on development, debugging, and documentation; ③The use of all persistent services will prevent the interaction between applications and operating systems and common resources, which will prolong development time and prevent the use of common resources. performance improvements for
However, this method has the following defects: each virtualized program is closed, and each virtualized program and between the virtualized program and the application program installed on the host cannot call each other, which prevents the development of the application suite. Use, such as Microsoft office, to embed an excel sheet in a word document or PowerPoint file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing safe working environment based on virtualization technology
  • Method for realizing safe working environment based on virtualization technology
  • Method for realizing safe working environment based on virtualization technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Such as figure 1 and figure 2 As shown, a method of realizing a safe working environment based on virtualization technology is to build a virtualization layer on the operating system, and use application virtualization technology to create a virtualized safe working environment to accommodate multiple virtualized applications. The virtualized safe working environment is a virtualized file system, and the virtualized layer is composed of a policy control module, a virtualized core layer module, a monitoring module, a virtualized communication bus, a virtualized file system and a virtual registry.

[0023] The virtualized communication bus mainly completes the communication between the virtualized application programs and the communication and interaction between the virtualized application programs and the application programs installed on the PC; meanwhile, during the installation process of the application programs, the virtualized communication bus manages all standa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing a safe working environment based on a virtualization technology. In the method, a virtual layer is constructed on an operating system, and an application program virtualization technology is utilized to establish a virtual safe working environment to accommodate a plurality of virtual application programs, wherein the virtual safe working environment is a virtual file system, and the virtual layer is formed by a strategy control module, a virtual core layer module, a monitoring module, a virtual communication bus, a virtual file system and a virtual registry. The method has the advantages that the application program virtualization technology is utilized to establish a virtual working area to accommodate a plurality of virtual application programs, and the operating system is separated from the application programs, the settings and the data while the mutual interaction of multiple applications is realized through the virtual communication bus, thereby greatly facilitating the deployment of the application programs.

Description

technical field [0001] The technology belongs to virtualization technology application and Windows driver development technology, and in particular relates to a method for realizing a safe working environment based on virtualization technology. Background technique [0002] Most applications use a mechanism that is permanently stored in Windows, including the Windows file system, the Windows registry that stores state and configuration information, and creates a strong association between the application program and the underlying operating system. These associations become obstacles to transferring applications to another machine, updating the underlying operating system, and remotely managing the operating system. [0003] A typical Windows application requires the installation process to write to the registry, bind application binaries, and configure the local PC environment and resources. The installation process can be manifested in the following steps: ①Copy files to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/22G06F21/53
Inventor 李鹏
Owner 胡建斌
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products