Unlock instant, AI-driven research and patent intelligence for your innovation.

A data migration method between secure virtual platforms on discrete computing nodes

A computing node and virtual platform technology, applied in the field of information security, can solve the problems of differences between virtual machine operating systems and application programs, and does not involve dynamic security detection and operating environment maintenance, so as to avoid security defects and ensure independence and effectiveness , the effect of ensuring safety

Active Publication Date: 2020-11-06
SHENZHEN JULINGSHEN TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in actual application scenarios, discretely distributed computing nodes, such as PCs and laptops of different users, have different virtual machine monitors installed, and the operating systems and applications contained in the running virtual machines are also different.
How to perform unified security management on virtual machine monitors on discrete computing nodes, operating systems and applications contained in virtual machines that need to be migrated, and on-site operating data, which is not covered by this patent application
At the same time, vTPM technology only solves the problem of building a static trusted environment on the computing node, and does not involve dynamic security detection and operating environment maintenance during the operation of the computing node, safe migration of virtual machines and related data, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data migration method between secure virtual platforms on discrete computing nodes
  • A data migration method between secure virtual platforms on discrete computing nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0028] Such as figure 1 As shown, it is a block diagram of the system structure realized by the present invention. The virtual machine migration and related data migration schemes between the secure virtual platforms on the discrete computing nodes realized by the present invention are based on figure 1 The security-hardened computing system shown is carried out. Wherein, the core of the present invention is to add a safety monitor into the virtual machine monitor, and simultaneously connect an independent hardware safety monitoring system for safety monitoring and safety detection.

[0029] The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for data migration between safety virtual platforms on a discrete computing node. The method comprises the following steps: establishing a safety reinforcing system for a virtual machine monitor on each discrete computing node; utilizing an independent hardware safety monitoring system to simulate a client software issuing function of a remote server under a network environment; utilizing a communication port of the computing node and the internet to connect the safety reinforcing system with the remote safety server; uniformly marking, managing, maintaining and upgrading the versions, compatibility and integrity of the virtual machine monitor, safety monitor, operation system, middleware and application program stored in the safety reinforcing system connected with each computing node by the safety server; completing the data migration by the safety reinforcing system and the safety server.

Description

technical field [0001] The invention relates to the field of information security, in particular to a data migration method and a security policy between security virtual platforms on discrete computing nodes. Background technique [0002] In a cloud computing environment, due to load balancing and the need to fully utilize the underlying hardware processing capabilities, virtual machine migration and data migration on server clusters often occur. With the continuous improvement of network communication bandwidth and transmission rate, it is a broad field to combine discrete computing nodes, especially PCs and laptops, into clusters, and use cloud computing similar to server clusters to fully exploit the potential of these computing resources. The direction of development prospects. Virtual machine migration and data migration on discrete computing nodes is an important factor affecting the collaborative computing efficiency of discrete computing nodes, and it is also an im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/455
CPCG06F9/45533G06F9/45558G06F2009/4557
Inventor 张景
Owner SHENZHEN JULINGSHEN TECH CO LTD