Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for implementing secure migration of virtual machine password information

A virtual machine migration and information security technology is applied in the implementation method and system field of virtual machine password information security migration, which can solve the problems that the migration of password equipment and key password information cannot be guaranteed, so as to ensure consistency and improve safety effect

Active Publication Date: 2020-11-24
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical task of the present invention is to provide a method and system for implementing secure migration of virtual machine password information to solve the problem of migration of password information such as cryptographic devices and keys configured in virtual machines due to the introduction of cryptographic devices during virtual machine migration. The problem of not being guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing secure migration of virtual machine password information
  • Method and system for implementing secure migration of virtual machine password information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] The implementation method of virtual machine password information security migration of the present invention, the method is to deploy a monitoring module and a migration module on each computing node, each component in the OpenStack realizes interaction through a message queue, and the monitoring module monitors the information in the message queue at all times, when The migration module is triggered when the successful migration of the virtual machine is detected; after the migration module is triggered, the migration module sends an unbinding request to the key management system, and the key management system calls the corresponding interface to realize the migration of the virtual machine password information. Virtual machine migration can be performed manually or automatically.

[0036] as attached figure 1 As shown, the specific working process of the monitoring module is as follows:

[0037] (1) The monitoring module continuously monitors whether Nova's live_mig...

Embodiment 2

[0055] A system for safe migration of virtual machine password information based on Embodiment 1, the system includes a key management system, computer node 1 and computer node 2, and computer node 1 and computer node 2 are both deployed with a message queue, a listening module and a migration module, The key management system is used to manage password information, and the monitoring module is used to monitor messages in the message queue at all times, and is responsible for triggering the migration module, which is used to call the corresponding interface to complete the safe migration of virtual machine password information. The corresponding interface invoked by the migration module includes a key recycling interface, a device unbinding interface, a device binding interface and a key distribution interface.

[0056] In addition to computer underlying hardware, computer node 1 and computer node 2 also include cryptographic devices, and virtual machines may allocate virtual c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual machine password information safety migration implementation method and system, and belongs to the field of security and secrecy of virtual machine password information migration. The technical problem that due to the fact that password equipment is introduced, migration of password information such as the password equipment and a secret key which are configured by a virtual machine cannot be guaranteed is solved. According to the technical scheme, the virtual machine password information safety migration implementation method comprises the steps that monitoring modules and migration modules are deployed on all computing nodes, all modules in OpenStack achieve interaction through a message queue, the monitoring modules monitor information in the message queue constantly, when the message that the virtual machine migrates successfully is monitored, the migration modules are triggered; after the migration modules are triggered, the migration module sendsan unbinding request to a secret key management system, the secrete key management system calls corresponding interfaces to achieve migration of the virtual machine password information. The invention further discloses the virtual machine password information safety migration system.

Description

technical field [0001] The invention relates to the field of security and confidentiality of password information security migration during virtual machine migration in a cloud computing environment, in particular to a method and system for realizing security migration of virtual machine password information. Background technique [0002] The virtual machine live migration technology refers to the technology of moving a virtual machine from the current physical host to another physical host without interrupting the operation of the virtual machine. The virtual machine migration process is mainly to achieve transparency to users, maintain all network status and application program status during the migration process, and prevent the migration process from affecting the quality of service of other applications through resource contention. [0003] In order to ensure the security of the cloud data center and realize the security of identity authentication, access control, compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F9/455
CPCG06F9/45558G06F2009/4557G06F2009/45587H04L63/06H04L63/083H04L63/20H04L63/205
Inventor 孙晓妮朱书杉陈小龙李若寒
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD