Single Linux core and multiple Android systems-based network virtualization method

A system network and virtualization technology, which is applied in the field of network virtualization based on a single Linux kernel and multiple Android systems to reduce management costs and economic costs and ensure security.

Active Publication Date: 2018-08-10
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It cannot completely solve the problem of network security and pro

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Single Linux core and multiple Android systems-based network virtualization method
  • Single Linux core and multiple Android systems-based network virtualization method
  • Single Linux core and multiple Android systems-based network virtualization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] Such as figure 1 Shown, a kind of network virtualization method based on multiple Android systems of single Linux kernel, three containers are set, and described container refers to the container that realizes by the namespace technology of Linux kernel; The main system is set in one of the containers, all the other containers are set with The virtual Android systems with independent network protocol stacks are independent and isolated from each other; the virtual Android systems include various versions of Android.

[0021] The main system assigns a physical network adapter to each virtual Android system, and the virtual Android system directly communicates with the external network through the network protocol stack and the physical network adapter.

[0022] Furthermore, each container is set with an independent APN and VPN, so as to realize the function of independently accessing a specific network. For many users who need to access a specific internal network, need...

Embodiment 2

[0024] The difference between this embodiment and embodiment 1 is: as figure 2 As shown, a physical network adapter and a network proxy forwarding module are set in the main system, a virtual network adapter is set in each virtual Android system, and a plurality of virtual network adapters are respectively connected with the network proxy forwarding module;

[0025] The data of the virtual Android system is sent to the outside world sequentially through the network protocol stack, the virtual network adapter, the network agent forwarding module and the physical network adapter; meanwhile, the physical network adapter will receive The received network packet is forwarded by the virtual network adapter to the corresponding virtual Android system, thereby realizing the network access of the virtual Android system.

Embodiment 3

[0027] The difference between this embodiment and embodiment 1 is: as image 3 As shown, a plurality of physical network adapters and a plurality of network agent forwarding modules are set in the main system, a virtual network adapter is set in each virtual Android system, and each network agent forwarding module is respectively connected with a physical network adapter and A virtual network adapter is associated.

[0028] The data of described virtual Android system is sent to by the network protocol stack, described virtual network adapter, the network agent forwarding module associated with described virtual network adapter and the physical network adapter associated with described network agent forwarding module successively outside world. At the same time, the physical network adapter sends the received data sequentially through the network proxy forwarding module associated with the physical network adapter, the virtual network adapter associated with the network proxy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a single Linux core and multiple Android systems-based network virtualization method. The method comprises the steps of setting at least two containers, wherein one container isinternally provided with a main system, and other containers are provided with a virtual Android system with an independent network protocol stack separately; and setting a physical network adapter or a virtual network adapter in the virtual Android system, wherein the virtual Android system communicates with an external network through the physical network adapter or the virtual network adapter.Through adoption of the method, the network data of each container is independent, and outgoing access to networks is realized, so that online transaction and sensitive information of each containerare kept safe, and the management cost and economic cost are lowered remarkably.

Description

technical field [0001] The invention relates to Linux kernel container technology, in particular to a network virtualization method based on a single Linux kernel and multiple Android systems. Background technique [0002] With the development of the Internet, online transactions are becoming more and more popular. Network applications such as online shopping, e-commerce, electronic banking, and virtual goods transactions have brought great convenience to users, and a large amount of funds and transaction information are circulated on the Internet. At the same time, with the popularity of smart phones and the development of the mobile Internet, a large amount of sensitive information, financial data, and online transactions began to occur on mobile terminals. However, while online transactions on mobile terminals bring convenience to everyone, there are also many potential security risks, which always threaten the security of users' funds and transaction information. Users'...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/46H04L12/24G06F9/455H04L29/08
CPCH04L12/4641H04L41/0893G06F9/45558H04L67/56
Inventor 刘长河刘熙胖刘琳王平马茜媛雷宇龙
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products