Container-based virtual desktop device isolation method and device

A technology of virtual desktops and containers, applied in the computer field, can solve problems such as large attack surface of container security vulnerabilities

Inactive Publication Date: 2019-01-15
ZHUHAI HOTDOOR TECH CO LTD
View PDF7 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This leaves significant security gaps ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container-based virtual desktop device isolation method and device
  • Container-based virtual desktop device isolation method and device
  • Container-based virtual desktop device isolation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The concept, specific structure and technical effects of the present application will be clearly and completely described below in conjunction with the embodiments and drawings, so as to fully understand the purpose, scheme and effect of the present application. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The same reference numbers are used throughout the drawings to indicate the same or similar parts.

[0069] refer to figure 1 The schematic diagram of the existing virtual machine and container structure is shown. As two typical examples of virtualization technology, virtual machines and containers contain applications and the necessary components (such as system binaries and libraries) to run the applications, and are respectively passed through the virtual machine monitor running on the physical computer. (Hypervisor) and container engine (Docker...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A device isolation method of container-based virtual desktop comprises the following steps: identifying at least one resource attribute of capability for a hardware resource newly added to a server; associating the hardware resources with one of a plurality of hardware resource pools using the identified resource attributes such that each hardware resource in the hardware resource pool is associated with one of a plurality of resource attributes; assigning a uniquely identified ID to each hardware resource in a plurality of hardware resource pools; through the container engine, the hardware resources in the hardware resource pool are allocated to the corresponding containers according to the ID of each hardware resource, and the hardware resources are recovered from the corresponding containers into the hardware resource pool. A corresponding device isolation device for a container-based virtual desktop is also disclosed.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a device isolation method and device for a container-based virtual desktop. Background technique [0002] Operating system virtualization simulates real computer hardware devices, so that multiple users can share and use hardware resources through the virtualized operating system, so that hardware resources can be used efficiently. At the same time, due to the virtualization of the operating system, various applications and their dependencies are isolated, so that each user operates an independent operating system on a personal computer. [0003] For example, as a typical example of operating system virtualization, a virtual machine usually runs on a host device of underlying hardware such as a server, and allocates hardware resources such as memory and CPU to multiple virtual machines through a hypervisor. Therefore, it can be allocated dynamically according to the computer h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F2009/45587
Inventor 杨立群
Owner ZHUHAI HOTDOOR TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products