Segmentation method for trust domain of virtual machine monitor
A virtual machine monitor and trust domain technology, applied in the field of cloud computing security, can solve the problems of consuming system memory resources, unable to resist overflow attacks, easy to enter a busy state, etc., to reduce startup time, easy configuration and auditing, and simple sharing the effect of the strategy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0021] Attached figure 1 It is a schematic diagram of a traditional single-chip trust domain. The control virtual machine shown in the figure has a complete operating system, has high-level system permissions similar to Hypervisor, and is connected to guest virtual machines through numerous interfaces to provide services for each guest virtual machine. This structure will control the virtual machine and the hypervisor together to form a monolithic trust domain, which makes the control virtual machine vulnerable to hacker attacks, and once it is compromised, the entire system will suffer huge losses.
[0022] According to the function of the control virtual machine, the present invention decomposes it into nine types of service virtual machines. Each service virtual machine contains a single-purpose control logic and performs a single function. The essence of this is to trust the virtual machine monitor. Split up. These nine types of service virtual machines include: PCIBack (No. ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap