Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cross-domain security access and resource control method for virtualization equipment

An access control and resource control technology, applied in the field of virtualization, can solve problems such as hidden dangers in cross-domain access security and imperfect resource allocation and scheduling rules, and achieve the effect of improving security and utilization.

Active Publication Date: 2020-05-22
北京安盛联合科技有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, traditional virtualization systems often have hidden dangers in cross-domain access security, and resource allocation and scheduling rules are not perfect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain security access and resource control method for virtualization equipment
  • Cross-domain security access and resource control method for virtualization equipment
  • Cross-domain security access and resource control method for virtualization equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Such as figure 1 and figure 2 As shown, a cross-domain security access and resource control method for virtualized devices includes three parts: multiple virtualized device platforms, an access control center, and a resource pool. The specific implementation method is as follows: First, the newly added routing device establishes a neighbor relationship with each device participating in the routing through the neighbor table; secondly, the newly added routing device authenticates the device through the centralized authentication center; Confirm the authentication of the neighbor routing device; secondly, after the authentication and confirmation of the neighbor routing device, use the asymmetric encryption technology to encrypt the message and send it to the neighbor routing device. Finally, after receiving the encrypted message, the neighbor routing device uses the asymmetric Symmetric encryption technology decrypts messages to obtain original messages for business ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-domain security access and resource control method for virtualization equipment, and the method comprises the steps: firstly carrying out the authentication of each virtualization equipment platform at an access control center; secondly, after platform authentication is passed, each set of virtualization equipment needs to be authenticated in an access control center; thirdly, the platform needs to carry out authentication confirmation on the access control center every time the virtualization equipment is started; after secondary authentication and confirmationof the virtualization equipment, encrypting a virtualization equipment starting command line by using an asymmetric encryption technology, and sending the encrypted virtualization equipment startingcommand line to an access control center; and finally, the access control center decrypts the virtualization equipment operation command line by using an asymmetric encryption technology, and sends the decrypted virtualized equipment operation command line to the resource pool starting equipment after meeting the resource allocation rule. The security of each virtualization platform and the virtual equipment is effectively improved, the utilization rate of virtual the virtualization resources is improved, the risk that the command line is captured and cracked in the transmission process is reduced and the network data transmission security is greatly improved.

Description

technical field [0001] The invention relates to the technical field of virtualization, in particular to a cross-domain security access and resource control method for virtualization equipment. Background technique [0002] Virtualization refers to virtualizing a computer into multiple logical computers through virtualization technology. Run multiple logical computers on one computer at the same time, each logical computer can run a different operating system, and the application programs can run in independent spaces without affecting each other, thereby significantly improving the work efficiency of the computer. Virtualization uses software to redefine and divide IT resources, enabling dynamic allocation, flexible scheduling, and cross-domain IT resources. [0003] At present, traditional virtualization systems often have hidden dangers in cross-domain access security, and resource allocation and scheduling rules are not perfect. Contents of the invention [0004] In o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F2009/45587G06F2009/45595
Inventor 关健
Owner 北京安盛联合科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products