Unlock instant, AI-driven research and patent intelligence for your innovation.

Virtual machine safety isolation system under network environment

A technology of security isolation and network environment, which is applied in the field of computer security in the network environment, and can solve problems such as limiting the time and place of surfing the Internet

Inactive Publication Date: 2016-08-17
杨越
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, many technologies are used, one is to use hardware to isolate dangers, the other is to install anti-virus software, the third is to separate two computers, one uses the Internet function, and the other is disconnected from the network, and the fourth is to limit the time and place of Internet access , the fifth is to use niche systems such as LINUX, Apple, etc. Some are effective, but more still need to be connected to the Internet, which will give hackers opportunities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine safety isolation system under network environment
  • Virtual machine safety isolation system under network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Referring now to the drawings, a description will be given in detail according to the present invention.

[0020] According to attached figure 1 , a virtual machine security isolation system in a network environment, comprising:

[0021] (1) Before the Internet is connected to the real computer, access the virtual machine and firewall, where the firewall is a network firewall, and scan the network communication flowing through it, so that some attacks can be filtered out to prevent it from being executed on the target computer, the firewall You can also close unused ports, prohibit outbound communications from specific ports, and block Trojan horses. In addition, the firewall can block access from special sites, thus preventing all communications from unknown intruders;

[0022] (2) Connect the firewall to the virtual machine, and the virtual machine is connected to the real computer through the data copy system;

[0023] (3) Install a fake streaking computer on the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a virtual machine safety isolation system under a network environment. The virtual machine safety isolation system comprises a secret key management subsystem and an isolation subsystem, and is characterized in that (1), a real computer access a virtual machine and a firewall before accessing the internet so as to scan network communication flowing through the real computer; (2), the firewall is connected with the virtual machine and the virtual machine is connected with the real computer through a data copying system; (3), a false unprotected computer is installed on the virtual machine and a virtual machine safety isolation scheme is set on the false unprotected computer so as to enable an intruder to identify true information difficultly.

Description

technical field [0001] The invention relates to the field of computer security, in particular to the security guarantee of computers in the network environment. Background technique [0002] With the rapid development of science and technology, banks, computers, mobile phones, and game passwords are closely related to us. There are also some unscrupulous computer experts who have begun to engage in gray areas and engage in illegal activities. In the mobile Internet era, the value of users' personal information is unprecedentedly prominent, and the commercial value that "big data" can bring will lead to a huge change, stealing personal computer confidential information and user data. DDOS attacks on the network, virus spread, phishing pages, pornographic and violent reactionary information. At present, many technologies are used, one is to use hardware to isolate dangers, the other is to install anti-virus software, the third is to separate two computers, one uses the Intern...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L9/40
Inventor 杨越
Owner 杨越