Virtual machine memory key generation device and method, encryption method and SoC system

A key generation device and key generation technology, applied in the field of virtualization, can solve problems such as ineffective security virtualization, and achieve the effects of ensuring data security, improving security, and improving security

Active Publication Date: 2019-04-26
HYGON INFORMATION TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, once the memory of the security processor itself is exposed, the VEK may be exposed, thereby indirectly exp

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine memory key generation device and method, encryption method and SoC system
  • Virtual machine memory key generation device and method, encryption method and SoC system
  • Virtual machine memory key generation device and method, encryption method and SoC system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033]Embodiments of the present invention will be described with reference to the drawings. The same components are given the same reference numerals. Exemplary embodiments of the present invention are first described. The exemplary embodiments are provided to illustrate aspects of the invention and should not be construed as limiting the scope of the invention. When exemplary embodiments are described with reference to block diagrams or flowcharts, each block may represent a method step or an apparatus element for performing a method step. Depending on the implementation, the corresponding device elements may be configured as hardware, software, firmware or a combination thereof.

[0034] To ensure the security of VEK, the security virtualization technology uses a separate processor—the security processor to manage VEK. The processor in the security processor SoC (system on chip) handles memory encryption and decryption and starts virtual machines. The security processor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtual machine memory key generation system. The method is used for a SoC system comprising more than one processing core. The system comprises a security processor and a virtual machine memory key generation device, wherein the security processor generates a virtual machine memory key index based on a request from the processing core, and the virtual machine memory keygeneration device receives the virtual machine memory key index from the security processor and calculates and generates a memory key for the processing core through a specific algorithm. The memory key generation device includes: a random key generation unit that generates a random key; And a key derivation function circuit that generates the memory key by using the virtual machine memory key index and the random key through the specific algorithm. According to the method, the security of the memory key of the virtual machine in security virtualization is improved, and the data security of the virtual machine is better ensured.

Description

technical field [0001] The present invention relates to the technical field of virtualization of the present invention, and relates to a virtual machine memory key generation device, a method, an encryption method and a SoC system for generating a virtual machine memory key (VEK-VM Encryption Key) in a specific safe virtualization environment . Background technique [0002] With the advancement of hardware virtual machine technology, it becomes possible to simulate the same computer environment for multiple users using server resources on the server. But along with this, because the memory resource is a resource shared among various virtual machines, preventing the virtual machine hypervisor or other virtual machine users from stealing the content of other virtual machines has become the focus of current research by various manufacturers. [0003] In order to solve this problem, for example, known safe virtualization technology exists, and this technology can realize that t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F2009/45587
Inventor 刘子行应志伟杜朝晖
Owner HYGON INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products