Virtual machine system and safety control method thereof
A technology of security control and virtual machine monitor, which is applied in transmission systems, program control devices, software simulation/interpretation/simulation, etc., and can solve problems such as virtual machine system security technology lagging behind
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0086] In this embodiment, a management virtual machine and a security virtual machine are set in the virtual machine system to implement a security control method for the virtual machine system, such as image 3 As shown, the method includes the following steps:
[0087] Step 201: the client virtual machine sends an access request R1 to the virtual machine monitor;
[0088] In this step, the R1 includes: the customer virtual machine identification ID (IDv), resource number (Nv), and the like.
[0089] Step 202: the security agent of the virtual machine monitor captures R1 and forwards it to the management virtual machine;
[0090] Step 203: the management virtual machine authenticates the client virtual machine, and sends the authentication result (token1) to the virtual machine monitor;
[0091] Described token1 comprises: IDv, Nv, authentication result mark (Av) and time (Tv) etc.; Said Av here is authentication passing mark when authentication is passed, and is authentic...
Embodiment 2
[0100] In this embodiment, a management virtual machine and a security virtual machine are set in the virtual machine system, and the virtual machine monitor saves the authentication result to realize the security control method of the virtual machine system, such as Figure 4 As shown, the method includes the following steps:
[0101] Step 301: the client virtual machine sends an access request R1 to the virtual machine monitor;
[0102] In this step, the R1 includes: the customer virtual machine identification ID (IDv), resource number (Nv), and the like.
[0103] Step 302: the security agent of the virtual machine monitor captures R1 and forwards it to the management virtual machine;
[0104] Step 303: the management virtual machine authenticates the client virtual machine, and sends the authentication result (token1) to the virtual machine monitor;
[0105] The token1 includes: IDv, Nv, authentication result identification (Av) and time (Tv), etc.; the Av here is the aut...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com