Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted verifying method and equipment used in running process of virtual machine

A verification method and virtual machine technology, applied in the direction of digital data authentication, software simulation/interpretation/simulation, program control devices, etc. And other issues

Active Publication Date: 2015-06-17
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. Directly encrypt and protect your own data, and cannot take advantage of the various cloud services deployed on the cloud platform to effectively calculate, manage and mine data;
[0011] 2. The smooth implementation of the audit function requires the credibility support of the lower layer in the computing model. If the lower virtualization layer tampers with the system call, the audit and access control modules are easily damaged or bypassed;
[0012] 3. Directly build a trusted cloud platform and directly prove its credibility to users. During the verification process, the software and hardware configuration information, IP addresses, etc. of all physical nodes will be exposed, which brings great security to the cloud platform Threat; In addition, each client needs to maintain a characteristic data area containing all possible configurations to determine the credibility of the cloud platform, which is difficult to manage and lacks scalability;
The platform only considers the credibility of the physical nodes when the virtual machine starts and migrates, and does not consider the state changes caused by untrusted threats during the running of the virtual machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted verifying method and equipment used in running process of virtual machine
  • Trusted verifying method and equipment used in running process of virtual machine
  • Trusted verifying method and equipment used in running process of virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Aiming at the above-mentioned technical problems in the prior art, an embodiment of the present invention provides a technical solution for trusted verification when a virtual machine is running, which is applied to a system including a virtual machine and an external trusted entity. In this technical solution, the virtual machine includes a configuration information collection module, a remote verification service module, and a VTPM; the configuration information collection module in the operating system kernel of the virtual machine saves in the configuration information list in the operating system kernel of the virtual machine The name and hash value of other kernel modules, as well as the name and hash value of the executable program and script loaded into the memory, and the hash value of the other kernel module, as well as the hash value of the executable program and the hash value of the script Added to the PCR (Program Control Register) of the VTPM; when the rem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted verifying method and equipment used in the running process of a virtual machine. The method comprises the steps that a configuration information collecting module stores the names and hash values of other inner core modules in an operating system inner core of the virtual machine, the name and hash value of an executable program loaded to internal storage and the name and hash value of a script in a configuration information list, and the hash values of the other inner core modules, the hash value of the executable program and the hash value of the script are added to a PCR of a VTPM; when a remote verifying service module receives a trusted evidence verifying request sent by an outer trusted entity, the configuration information list and a PCR value stored in the PCR of the VTPM are obtained and returned to the outer trusted entity, so that after the outer trusted entity confirms that the configuration information list is not modified according to the PCR value, the configuration information list is verified according to a local characteristic database, and whether the virtual machine is trusted or not is determined according to a verifying result. In the trusted verifying method and equipment, the safety and realizability of verifying the credibility of the virtual machine are improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a trusted verification method and device when a virtual machine is running. Background technique [0002] When users use the infrastructure cloud computing system, they need to deploy their own data and applications on virtual machines running on remote physical machines. In order to ensure the security of data and applications without affecting the use, users need to trust the cloud computing service provider itself , the credibility of the virtual machine when it is running (that is, whether the virtual machine runs the functions it claims correctly, including: whether all program files on the virtual machine such as the core system, configuration files, scripts, executable programs, etc. tampered with, whether there are other dangerous programs running in the virtual machine, etc.), so it is necessary to collect and verify the credibility of the virtual machine ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/33G06F9/455
Inventor 王珂
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products