Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Host safeguarding method and device

A safety protection device and safety protection technology, applied in the field of virtualization, can solve problems such as potential safety hazards, and achieve the effect of guaranteeing safety, simple logic and reliable results

Inactive Publication Date: 2017-05-31
BEIJING CHINA POWER INFORMATION TECH +3
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although virtualization technology can shield information transmission between different virtual machines, due to the inherent security vulnerabilities of Hypervisor, this virtualization platform still has serious security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host safeguarding method and device
  • Host safeguarding method and device
  • Host safeguarding method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0071] figure 1 Shown is a host machine security protection method, which can be applied to Hypervisor, which includes the following steps:

[0072] Step 101, obtaining virtualization software information in the host computer, the virtualization software information including the type and version of the virtualization software;

[0073] Step 102, issuing a corresponding security protection policy to the host computer according to the virtualization software information;

[0074] Step 103, monitor the access action initiated by the virtual machine in the host machine through the virtual machine monitor;

[0075] Step 104, intercepting access actions that violate the security protection policy.

[0076] The method in thi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a host safeguarding method and device and belongs to the technical field of virtualization; the host safeguard method comprises: acquiring information of virtualization software, issuing a safeguard strategy, monitoring access actions of a virtual machine, intercepting illegal actions, and other steps. The access actions of the virtual machine are correlated to the type and version of virtualization software, whether the actions are secure or not is judged by monitoring the actions of the virtual machine, and unsecure actions are intercepted in time; the host safeguarding method and device have the advantages of good logic simplicity, ease of implementation and good result reliability, comprehensive safeguarding can be provided for a host and virtualization software without changing existing Hypervisor code, and the host safeguarding method and device are a new path compared to the prior art and belong to a major modification to the prior art.

Description

technical field [0001] The present invention relates to the technical field of virtualization, in particular to a host machine security protection method and device. Background technique [0002] Virtualization technology can virtualize one computer into multiple logical computers, so that multiple logical computers can run on one physical computer at the same time, each logical computer can run a different operating system, and applications can run on each other. Run in an independent space without affecting each other, thereby significantly improving the work efficiency of the computer. Virtualization technology uses software to re-divide computing resources, which can realize dynamic allocation, flexible scheduling, and cross-domain sharing of computing resources, improve the utilization rate of computing resources, and enable computing resources to truly become social infrastructure and serve flexible services in all walks of life. Changing application requirements. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F9/455
CPCG06F21/554G06F9/45558G06F2009/45587
Inventor 张春光李祉岐孙磊刘芮彤刘晓蕾曹明明焦腾宋洁石佳磊唐甜田李杰苏国华段红超杨璐羽范维杨滢璇
Owner BEIJING CHINA POWER INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products