Virtual safety detecting method and system

A security detection and virtualization technology, applied in the computer field, can solve the problem of high physical machine resource occupation, achieve the effect of reducing resource occupation, improving efficiency, and increasing resource occupation

Active Publication Date: 2015-04-08
BEIJING QIANXIN TECH
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the fact that the above-mentioned existing virtualization security detection method performs security on information in multiple virtual machines, which may easily cause the problem of high resource occupation of physical machines, the present invention is proposed to provide a method to overcome the above problems or at least partially solve the above problems Virtualization security detection method and system based on

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual safety detecting method and system
  • Virtual safety detecting method and system
  • Virtual safety detecting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] A virtualization security detection method provided by an embodiment of the present invention is introduced in detail.

[0064] refer to figure 1 , shows a flow chart of steps of a virtualization security detection method in an embodiment of the present invention.

[0065] The virtualization security detection method in the embodiment of the present invention can be applied to a system including a light agent client, a cache server, and an antivirus server.

[0066] Wherein, the light proxy client may be set in a virtual machine, and the cache server and the killing server may be set in a virtual machine or a physical machine. For example, the light proxy client can be set in one virtual machine among multiple virtual machines, and the cache server and the killing server can be set in only one physical machine, or can also be set in one In one virtual machine, optionally, the light proxy client, the cache server and the antivirus server may be set in the same virtual ...

Embodiment 2

[0081] A virtualization security detection method provided by an embodiment of the present invention is introduced in detail.

[0082] refer to figure 2 , shows a flow chart of steps of a virtualization security detection method in an embodiment of the present invention.

[0083] The virtualization security detection method in the embodiment of the present invention can be applied to a system including a light agent client, a cache server, and an antivirus server.

[0084] Wherein, the light proxy client may be set in a virtual machine, and the cache server and the killing server may be set in a virtual machine or a physical machine. For example, the light proxy client can be set in one virtual machine among multiple virtual machines, and the cache server and the killing server can be set in only one physical machine, or can also be set in one In one virtual machine, optionally, the light proxy client, the cache server and the antivirus server may be set in the same virtual...

Embodiment 3

[0125] A virtualization security detection system provided by an embodiment of the present invention is introduced in detail.

[0126] refer to image 3 , shows a structural block diagram of a virtualization security detection system in an embodiment of the present invention.

[0127] The system may include: a light proxy client 300 set in a virtual machine, a cache server 302 and an killing server 304;

[0128] Wherein, the cache server 302 and the killing server 304 can be set in a physical machine or a virtual machine. For example, the light proxy client 300 can be set in one virtual machine among multiple virtual machines, and the cache server 302 and the killing server 304 can be set in only one physical machine, or Set in a virtual machine, optionally, the light proxy client 300, the cache server 302 and the killing server 304 can be set in the same virtual machine among multiple virtual machines, while other virtual machines There is no need to set it in the machine....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a virtual safety detecting method and a virtual safety detecting system. The method comprises the following steps that a light agent client acquires to-be-detected information and sends the to-be-detected information to a cache server through a network; the cache server judges whether corresponding relation between the to-be-detected information and a corresponding safety level of to-be-detected information exists or not; if the corresponding relation between the to-be-detected information and the corresponding safety level of to-be-detected information does not exist, the cache server sends the to-be-detected information to a checking server through the network to perform safety detection on the to-be-detected information; according to the detecting result of the checking server, the safety level of the to-be-detected information is determined; if the to-be-detected information and the corresponding safety level of to-be-detected information exists, according to the corresponding relation, the safety level of the to-be-detected information is determined, wherein the light agent client is installed in a virtual machine. The efficiency of safety detection is improved, and the resource occupation rate of a physical machine is reduced.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a virtualization security detection method and system. Background technique [0002] Virtualization refers to virtualizing a computer into multiple logical computers through virtualization technology. Run multiple logical computers on one computer at the same time, each logical computer can run a different operating system, and the application programs can run in independent spaces without affecting each other, thereby significantly improving the work efficiency of the computer. [0003] In the existing virtualization security detection scheme, if there are multiple virtual logical computers (virtual machines) on the same physical machine, when performing security detection on the information in the multiple virtual machines, it is necessary to set up killing in each virtual machine. server, the information in each virtual machine is checked for security in its own killing ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F21/57
CPCG06F21/53G06F9/45533G06F21/577
Inventor 汪圣平杨晓东徐锐波王院生
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products