Virtual machine exchange visit safety control method and device
A security control and virtual machine technology, applied in the field of virtualization, can solve problems such as network communication port mismatch, server computing performance idleness, etc., achieve the effect of simple design, avoid high cost and low cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Please refer to figure 1 , the virtualization architecture of the server is to introduce a virtualization layer on the physical server, which is a middle layer virtualization software, which is mainly used to create a virtual machine (Virtual Machine, VM) and allocate reasonable hardware resources for the virtual machine, such as One or more cores in the CPU (that is, one or more complete computing engines integrated in the CPU) are allocated to the virtual machine 1 and so on. In terms of logical function, a virtual machine is no different from a traditional physical server. It has its own operating system and can install various applications on the operating system. After the physical servers in the data center are widely virtualized, security problems also arise accordingly. In computer network and software technology, any new function may have security issues and needs to be considered. Virtualization software is equivalent to introducing new security threats base...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 