Security monitoring method based on license authentication of cluster virtual machine

A security monitoring and virtual machine technology, applied in the communication field, can solve problems such as weak monitoring and core data theft

Pending Publication Date: 2020-05-05
UNICLOUD (NANJING) DIGITAL TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The core data on the target virtual machine is at risk of being stolen
At the same time, the traditional virtual machine monitoring is still relative

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in combination with the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0024] A security monitoring method based on cluster virtual machine license authentication, comprising a cvm management platform and multiple target virtual machines; the cvm management platform is connected to the multiple target virtual machines through a Virtio channel.

[0025] Among them, it includes: the cvm management platform distributes a cluster license certificate to each virtual machine, and each virtual machine performs independent stand-alone license certification...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security monitoring method based on license authentication of a cluster virtual machine, and relates to the technical field of communication. The method comprises a cvm management platform and a plurality of target virtual machines, the cvm management platform is connected with the plurality of target virtual machines through Virtio channels. The cvm management platform distributes a license certificate with clustering to each virtual machine, and each virtual machine carries out independent stand-alone license authentication. Through license authentication of the cluster virtual machine, it is guaranteed that even if the virtual machine is operated on an unsafe hypervisor, any data in the target virtual machine is protected, and the risk that core data on the target virtual machine is stolen is avoided; and meanwhile, by injecting license, the target virtual machine can identify whether to run in a safe and reliable hypervisor environment or not, so that thelimitation and protection behaviors of the target virtual machine are changed through the agent agent program.

Description

technical field [0001] The invention belongs to the technical field of communications, in particular to a security monitoring method based on cluster virtual machine license authentication. Background technique [0002] In the architecture of the Lares internal monitoring system, security tools are deployed in an isolated virtual machine. The environment where the virtual machine is located is considered safe in theory, called a security domain, such as the Xen management virtual machine. [0003] The deployment of security tools and guest operating systems in the external monitoring framework is the same as that of the internal monitoring framework, and they are respectively located in two virtual machines isolated from each other, which enhances the security of security tools. [0004] The problem existing in the existing technical solutions is that if the target virtual machine is stolen and runs on an unsafe hypervisor environment, then the protection of the virtual mach...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44G06F21/53G06F9/455
CPCG06F21/44G06F21/53G06F9/45558G06F2009/45587G06F2009/45562
Inventor 张旭东
Owner UNICLOUD (NANJING) DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products