Unlock instant, AI-driven research and patent intelligence for your innovation.
Virtual machine system and safety control method thereof
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of security control and virtual machine monitor, which is applied in transmission systems, program control devices, software simulation/interpretation/simulation, etc., and can solve problems such as virtual machine system security technology lagging behind
Active Publication Date: 2012-12-05
ZTE CORP
View PDF4 Cites 29 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0008] Although the virtualization technology has developed rapidly, the security technology of the virtual machine system is seriously lagging behind
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0086] In this embodiment, a management virtual machine and a security virtual machine are set in the virtual machine system to implement a security control method for the virtual machine system, such as image 3 As shown, the method includes the following steps:
[0087] Step 201: the client virtual machine sends an access request R1 to the virtual machine monitor;
[0088] In this step, the R1 includes: the customer virtual machine identification ID (IDv), resource number (Nv), and the like.
[0089] Step 202: the security agent of the virtual machine monitor captures R1 and forwards it to the management virtual machine;
[0090] Step 203: the management virtual machine authenticates the client virtual machine, and sends the authentication result (token1) to the virtual machine monitor;
[0091] Described token1 comprises: IDv, Nv, authentication result mark (Av) and time (Tv) etc.; Said Av here is authentication passing mark when authentication is passed, and is authentic...
Embodiment 2
[0100] In this embodiment, a management virtual machine and a security virtual machine are set in the virtual machine system, and the virtual machine monitor saves the authentication result to realize the security control method of the virtual machine system, such as Figure 4 As shown, the method includes the following steps:
[0101] Step 301: the client virtual machine sends an access request R1 to the virtual machine monitor;
[0102] In this step, the R1 includes: the customer virtual machine identification ID (IDv), resource number (Nv), and the like.
[0103] Step 302: the security agent of the virtual machine monitor captures R1 and forwards it to the management virtual machine;
[0104] Step 303: the management virtual machine authenticates the client virtual machine, and sends the authentication result (token1) to the virtual machine monitor;
[0105] The token1 includes: IDv, Nv, authentication result identification (Av) and time (Tv), etc.; the Av here is the aut...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a virtual machinesystem which comprises a management virtual machine, a virtual machine monitor, a client virtual machine and a safety virtual machine. The management virtual machine is used for authenticating the client virtual machine and sending an authenticated result to the virtual machine monitor. The virtual machine monitor is used for transmitting an access request sent from the client virtual machine to the management virtual machine. The authenticated result sent from the management virtual machine is transmitted to the client virtual machine. The authenticated result sent from the client virtual machine is transmitted to the safety virtual machine. According to access permission, physical resources are accessed and an access result is returned to the client virtual machine. The client virtual machine is used for sending the access request and the authenticated result to the virtual machine monitor. The safety virtual machine is used for issuing the access permission of the client virtual machine to the virtual machine monitor. The invention further discloses a safety control method of the virtual machine system. With the system and the method, workload of the virtual machine monitor can be lowered, the access permission of the client virtual machine can be flexibly controlled, and the access of the client virtual machine to the physical resources is effectively controlled.
Description
technical field [0001] The invention relates to the virtualization technology of cloud computing, in particular to a virtual machine system and a security control method thereof. Background technique [0002] Cloud computing brings the business world a new era of providing and consuming information technology (IT) services. Cloud computing enhances collaboration, agility, scalability, availability, and the potential to reduce costs through optimized, more efficient computing. More specifically, cloud computing describes the use of services, applications, information, and infrastructure that consist of "resource pools" of computing, networking, information, and storage. These components can be rapidly planned, provisioned, deployed, and decommissioned, and scaled up or down rapidly, providing an on-demand, utility-computing-like allocation and consumption model. [0003] The National Institute of Standards and Technology (NIST, National Institute of Standards and Technology...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.