Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtual machine system and safety control method thereof

A technology of security control and virtual machine monitor, which is applied in transmission systems, program control devices, software simulation/interpretation/simulation, etc., and can solve problems such as virtual machine system security technology lagging behind

Active Publication Date: 2012-12-05
ZTE CORP
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Although the virtualization technology has developed rapidly, the security technology of the virtual machine system is seriously lagging behind

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine system and safety control method thereof
  • Virtual machine system and safety control method thereof
  • Virtual machine system and safety control method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] In this embodiment, a management virtual machine and a security virtual machine are set in the virtual machine system to implement a security control method for the virtual machine system, such as image 3 As shown, the method includes the following steps:

[0087] Step 201: the client virtual machine sends an access request R1 to the virtual machine monitor;

[0088] In this step, the R1 includes: the customer virtual machine identification ID (IDv), resource number (Nv), and the like.

[0089] Step 202: the security agent of the virtual machine monitor captures R1 and forwards it to the management virtual machine;

[0090] Step 203: the management virtual machine authenticates the client virtual machine, and sends the authentication result (token1) to the virtual machine monitor;

[0091] Described token1 comprises: IDv, Nv, authentication result mark (Av) and time (Tv) etc.; Said Av here is authentication passing mark when authentication is passed, and is authentic...

Embodiment 2

[0100] In this embodiment, a management virtual machine and a security virtual machine are set in the virtual machine system, and the virtual machine monitor saves the authentication result to realize the security control method of the virtual machine system, such as Figure 4 As shown, the method includes the following steps:

[0101] Step 301: the client virtual machine sends an access request R1 to the virtual machine monitor;

[0102] In this step, the R1 includes: the customer virtual machine identification ID (IDv), resource number (Nv), and the like.

[0103] Step 302: the security agent of the virtual machine monitor captures R1 and forwards it to the management virtual machine;

[0104] Step 303: the management virtual machine authenticates the client virtual machine, and sends the authentication result (token1) to the virtual machine monitor;

[0105] The token1 includes: IDv, Nv, authentication result identification (Av) and time (Tv), etc.; the Av here is the aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual machine system which comprises a management virtual machine, a virtual machine monitor, a client virtual machine and a safety virtual machine. The management virtual machine is used for authenticating the client virtual machine and sending an authenticated result to the virtual machine monitor. The virtual machine monitor is used for transmitting an access request sent from the client virtual machine to the management virtual machine. The authenticated result sent from the management virtual machine is transmitted to the client virtual machine. The authenticated result sent from the client virtual machine is transmitted to the safety virtual machine. According to access permission, physical resources are accessed and an access result is returned to the client virtual machine. The client virtual machine is used for sending the access request and the authenticated result to the virtual machine monitor. The safety virtual machine is used for issuing the access permission of the client virtual machine to the virtual machine monitor. The invention further discloses a safety control method of the virtual machine system. With the system and the method, workload of the virtual machine monitor can be lowered, the access permission of the client virtual machine can be flexibly controlled, and the access of the client virtual machine to the physical resources is effectively controlled.

Description

technical field [0001] The invention relates to the virtualization technology of cloud computing, in particular to a virtual machine system and a security control method thereof. Background technique [0002] Cloud computing brings the business world a new era of providing and consuming information technology (IT) services. Cloud computing enhances collaboration, agility, scalability, availability, and the potential to reduce costs through optimized, more efficient computing. More specifically, cloud computing describes the use of services, applications, information, and infrastructure that consist of "resource pools" of computing, networking, information, and storage. These components can be rapidly planned, provisioned, deployed, and decommissioned, and scaled up or down rapidly, providing an on-demand, utility-computing-like allocation and consumption model. [0003] The National Institute of Standards and Technology (NIST, National Institute of Standards and Technology...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08G06F9/455H04L29/06
Inventor 陈小华林兆骥王治平
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products