Security hardening method for virtual machine monitor based on security chip

A technology of virtual machine monitor and security chip, applied in the field of information security, can solve the problems of lack of integrity and security detection of virtual machine monitor, and achieve the effect of preventing intrusion and preventing the intrusion of malicious software.

Active Publication Date: 2020-04-28
SHENZHEN JULINGSHEN TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a virtual machine monitor security reinforcement method based on a security chip, which solves the problem of lack of integrity and security detection of the virtual machine monitor during system operation, and achieves the goal of virtual machine monitor security reinforcement. Purpose

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security hardening method for virtual machine monitor based on security chip
  • Security hardening method for virtual machine monitor based on security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0024] The computing node security reinforcement implemented by the present invention is as follows: figure 1 As shown, a security monitor is added to the virtual machine monitor, and an independent hardware security monitoring system is set at the connection with the computing node. The virtual machine monitor communicates with the hardware security monitoring system, and the virtual machine monitor is connected to An independent hardware security monitoring system for security monitoring and security detection.

[0025] Thus, the specific implementation of the present invention is divided into t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security chip-based security reinforcement method for a virtual machine monitor. According to the method, a security monitor is arranged in the virtual machine monitor; an independent hardware security monitoring system is arranged at the joint of the virtual machine monitor and a computing node; the virtual machine monitor communicates with the hardware security monitoring system; and the virtual machine monitor is subjected to security reinforcement through the security monitor and the hardware security monitoring system. Through the security monitor, a key point in running of a virtual machine can be effectively selected for performing security detection, so that not only the detection efficiency but also the detection accuracy are improved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a security hardening system and method for a virtual machine monitor. Background technique [0002] Cloud computing concentrates computing / storage / communication resources on the cloud and provides users with their own services through the Internet. Including: Infrastructure as a Service (Infrastructure-as-a-Service, IaaS), Platform as a Service (Platform-as-a-Service, PaaS), Software as a Service (Software-as-a-Service, SaaS). Among them, infrastructure services, which provide users with scalable computing / storage / communication resources, are the basis of cloud computing. [0003] The virtualization of hardware resources is the core technology in cloud computing applications. The security of the virtual machine monitor itself is a basic premise to ensure the security of the virtual machines running on it. Therefore, the security of the virtual machine monito...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/54G06F21/55G06F21/56G06F21/64G06F9/455
CPCG06F9/45558G06F21/54G06F21/554G06F21/567G06F21/64G06F2221/033
Inventor 张景
Owner SHENZHEN JULINGSHEN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products