Supercharge Your Innovation With Domain-Expert AI Agents!

Security protection method and system based on virtualization environment

A technology for virtualized environment and security protection, applied in the field of security protection methods and systems, can solve problems such as being unable to continue being protected, and achieve the effect of uninterrupted security protection and security.

Active Publication Date: 2017-06-13
BEIJING RISING NETWORK SECURITY TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a virtualization environment-based The security protection method and system are capable of performing uninterrupted security protection on the protected virtual machine when the virtual machine being protected in the physical host adopting the agentless security protection mode is migrated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method and system based on virtualization environment
  • Security protection method and system based on virtualization environment
  • Security protection method and system based on virtualization environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the object, technical solution and advantages of the present invention clearer, the security protection method and system based on the virtualization environment of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0057] In one embodiment, such as figure 1 , figure 2 As shown, a method for security protection based on a virtualized environment is provided, and the method includes the following steps:

[0058] S100, when a virtual machine needs to be migrated from the source physical host to the destination physical host, and the source security virtual machine of the source physical host is performing a security protection event on the migration virtual machine that needs to be migrated, the migration virtual machine Obta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security protection method and system based on the virtualization environment. The security protection method includes the steps that when virtual machines need to be transferred to an aim physical host from a source physical host of the virtual machines, and when a source security virtual machine of the source physical host carries out security protection events on transferred virtual machines needing to be transferred, the transferred virtual machines obtain protection schedule information of the security protection events from the source security virtual machine, and to-be-protected data corresponding to the security protection events is obtained from source physical memory space; the transferred virtual machines send the protection schedule information to an aim security virtual machine of the aim physical host after being transferred to the aim physical host, and meanwhile the to-be-protected data is written into aim physical memory space of the aim physical host; the aim security virtual machine continues to carry out security protection on the to-be-protected data written in the aim physical memory space according to the protection schedule information after receiving the protection schedule information. Uninterrupted security protection of virtual machine transferring can be achieved.

Description

technical field [0001] The invention relates to the technical field of virtualization, in particular to a security protection method and system based on a virtualization environment. Background technique [0002] With the widespread application of hardware virtualization technology, multiple operating systems can run simultaneously on a physical host, and the operating systems are isolated from each other, making the management of hardware facilities more effective, flexible and economical. For example: the virtual machines on the physical host with high resource usage can be migrated to a physical host with low resource usage, so as to achieve a reasonable allocation of resources; or all the virtual machines on the physical host with low resource usage can be migrated to other physical hosts, and shut down the physical host so as to achieve the effect of energy saving. However, the security threats faced in the traditional operating system deployment will also be faced in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F2009/4557G06F2009/45587
Inventor 唐政
Owner BEIJING RISING NETWORK SECURITY TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More