Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for obtaining credible state of platform where virtual machine is located

A virtual machine and platform technology, applied in the computer field, can solve problems such as hidden dangers, failure of virtual machine tenants, tenant business interruption, etc., to achieve the effect of enhancing security value, alleviating trust problems, and improving usability

Active Publication Date: 2019-11-29
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) Part of the virtual root of trust implementation and application does not include the trusted state information of the computing node where it is located, resulting in virtual machine tenants being unable to obtain the trusted state information of the computing node where it is located through a secure means, and the tenant has nothing about the trusted status of the computing node where it is located Know;
[0005] 2) Part of the virtual root of trust implementation and application extends the trust status information of the computing node where the virtual machine is located to PCR0~7 of the virtual root of trust, which is consistent with the PCR (platform configuration register) used by the virtual machine's own firmware, resulting in hot In the migration scenario, the trusted state of the computing node cannot be directly updated (the virtual machine needs to be restarted to update, which will cause the interruption of tenant business);
[0006] 3) The creation and initialization process of the virtual root of trust of the virtual machine in the existing implementation and application does not detect the trust status of the target computing node, which may lead to security risks in the initialization process of the virtual root of trust;
[0007] 4) In the existing virtual machine migration scheme equipped with a virtual root of trust, only the trusted state of the target computing node is verified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for obtaining credible state of platform where virtual machine is located
  • Method and device for obtaining credible state of platform where virtual machine is located
  • Method and device for obtaining credible state of platform where virtual machine is located

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0038] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0039] Based on the above purpose, the first aspect of the embodiments of the present invention proposes an embodiment of a method for obtaining a trusted state of a platform where a virtual machine is located. figure 1 Shown is a schematic flow chart of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for obtaining the credible state of a platform where a virtual machine is located. The method comprises the steps of adding a PCR to a virtual credible root; dividing the added PCR into platform resources, setting a platform domain authorization value in the platform resources as a random value, and sending the random value to a platform for storage; responding to platform starting and matching the stored random value with the current platform domain authorization value, and transmitting the computing node hardware platform integrity information inthe computing node physical trusted root where the virtual machine is located to the added PCR; comparing the integrity information of the hardware platform with a reference value of the platform; inresponse to conforming the hardware platform integrity information to a reference value of the platform, determining a fact that the platform is trusted. According to the method, the problem of synchronous updating of the trusted state information of the computing node where the virtual machine is located in the virtual machine migration process can be effectively solved, the usability of the virtual trusted root in a cloud computing scene is improved, the safety value of the virtual trusted root is enhanced, and meanwhile the trust problem between a cloud tenant and a cloud service provider can be relieved.

Description

technical field [0001] This field relates to the computer field, and more specifically relates to a method and a device for obtaining a trusted state of a platform where a virtual machine is located. Background technique [0002] Cloud computing has become the main way to provide infrastructure in the field of information technology. However, the trust between virtual machine (cloud host) tenants and cloud service providers is still the focus of consideration for users to choose cloud services. Trusted computing technology has become a solution to this problem. One of the main means. Virtual machine tenants can obtain the trusted state information of the platform where the virtual machine is located through the root of trust of the virtual machine. Migration due to reasons such as balance and computing node maintenance needs, which leads to the need to update the trusted state stored in the root of trust of the cloud host along with the migration of the root of trust. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/57
CPCG06F9/45558G06F21/57G06F2009/45587
Inventor 吴保锡
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD