Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for building desktop cloud virtual trust safety wall

A security wall and desktop cloud technology, applied in the field of building a desktop cloud virtual trusted security wall, can solve the problems of low degree of automation, extensive security granularity of user desktops, and difficulty in following up with different organizations, and achieve the effect of enhancing security.

Active Publication Date: 2013-09-04
INFORMATION & COMMNUNICATION BRANCH STATE GRID JIANGXI ELECTRIC POWER CO +1
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional security software deployment method has a low degree of automation, and the granularity of user desktop security is extensive. It is difficult for managers to follow up on the individual needs of different organizations and users for refined IT security management.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for building desktop cloud virtual trust safety wall

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0023] A method for constructing a desktop cloud virtual trusted security wall. In the present invention, TCM is used as the root of trust, and the security wall trust chain and the basic trust chain are formed together to form a two-dimensional trust chain, and the virtual trusted security wall is implemented along with the virtual desktop. Simultaneously migrate, build a two-dimensional trust chain, and extend the trust relationship from the trust root to the entire desktop cloud system through the two-dimensional trust chain.

[0024] In the present invention, the basic trust chain includes: TCM root of trust, BIOS, MBR, OS Loader, OS Kernel, Service / Application, virtual security wall management center.

[0025] In the present invention, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for building a desktop cloud virtual trust safety wall. A TCM serves as a trust root, a safety wall trust chain and a basic trust chain together form a two-dimensional trust chain, the virtual trust safety wall can move along with virtual desktops synchronously, the two-dimensional trust chain is built, and a trust relationship can be expanded to a whole desktop cloud system from the trust root through the two-dimensional trust chain. By means of a virtual trust safety wall system structure, on the basis of a trust computing basis platform, a virtual trust safety wall is built for each virtual desktop, and a desktop visit method high in safety and instantaneity is provided for business application. For enhancing the safety of desktop cloud, the two-dimensional trust chain is formed by the safety wall trust chain and the basis trust chain, and the trust relationship is expanded to the whole desktop cloud system from the trust root. Aiming at dynamic characteristics of the cloud environment, the virtual trust safety wall has the capability of moving along with the virtual desktops dynamically, and the aim of 'safe service' can be achieved.

Description

technical field [0001] The present invention relates to the technical field of computer desktop cloud, specifically a method for constructing a desktop cloud virtual trusted security wall. Background technique [0002] In 1983, the U.S. Department of Defense formulated the world's first "Trusted Computer System Evaluation Criteria" TCSEC. In TCSEC, the concept of trusted computer and trusted computing base TCB is proposed for the first time, and TCB is taken as the basis of system security. In 1999, well-known IT companies such as IBM, HP, Intel, and Microsoft initiated the establishment of the Trusted Computing Platform Alliance TCPA. There are also related application products such as trusted servers and trusted security gateways in China. And it has carried out experimental applications in the State Grid Electric Power Research Institute. At present, trusted computing has become a new trend in the field of information security in the world, and the concept of "security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/50
Inventor 刘显明钟华孙慧勤潘理孙珂轩朱学文
Owner INFORMATION & COMMNUNICATION BRANCH STATE GRID JIANGXI ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products