Trusted security enhancement method in desktop virtualization environment

A desktop virtualization and trusted technology, applied in the field of network security, can solve the problem of access network and user terminal heterogeneity data center, reduce the ability of user behavior review, etc., to achieve the effect of improving security and ensuring transmission security

Active Publication Date: 2014-04-23
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
View PDF7 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the heterogeneity of access networks and user terminals, virtualization of data...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted security enhancement method in desktop virtualization environment
  • Trusted security enhancement method in desktop virtualization environment
  • Trusted security enhancement method in desktop virtualization environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with drawings and embodiments.

[0027] The main flow chart of the method of the present invention is as follows figure 2 shown, including the following steps:

[0028] Step 1: Thin client and server perform trusted boot.

[0029] The trusted cryptographic module TCM is selected as the root of trust of the entire platform to provide the most basic trusted computing services for the entire platform. As the root of trust, TCM can well solve the problem that the BIOS can be illegally tampered with in the chain of trust transfer mechanism and cannot guarantee the trustworthiness of the root of trust. The trusted boot process for a thin client is as follows: image 3 As shown, the method is as follows:

[0030] (1) Under the action mechanism of the trust chain, after the system is powered on, the control right is first passed to the TCM, and the TCM measures the integrity of the BIOS, and stores the me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trusted security enhancement method in a desktop virtualization environment. The method comprises the following steps that: a thin client and a server are started and automatically carry out trusted measurement and trust chain transferring from bottom-layer hardware to upper-layer application software; thin client trusted access and platform bidirectional remote attestation is carried out; and after the successful access authentication, remote desktop connection software is started and the thin client obtains a desktop of a server virtual machine and carries out access and operation. According to the invention, the integrity and confidentiality principles of the terminal platform and communication transmission in the desktop virtualization environment can be fully considered; and techniques like physical trust root-based trust link transfer technique, the trusted BIOS measurement technique, the trusted platform access and remote attestation technique and the like can be utilized comprehensively. Therefore, defects of the traditional desktop virtualization safety protection measure can be overcome; and the management difficulty of the virtual data center can be effectively reduced and the security can be improved.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a trusted security enhancement method in a desktop virtualization environment. Background technique [0002] In recent years, desktop virtualization technology has changed the distributed computing usage mode of traditional PCs with server-based computing and the use of thin clients. It isolates the desktop or client operating system from the original physical hardware and realizes a more flexible application. User-centric desktop virtualization technology can configure and manage users instead of devices, effectively improving the efficiency of deploying and managing users' desktop environments. [0003] However, while desktop virtualization technology brings convenience to people's life and work, it also exposes many security risks. Traditional security protection mechanisms and strategies have already failed in the face of new security challenges brought ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
Inventor 周炼赤陈志浩段翼真王斌李红郭丽娜
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products