Trusted virtualization system
A virtualized system and trusted technology, applied in the field of virtual cloud security, can solve the problems of lack of virtualized system and internal protection of virtual machines, and the inability of virtual machines to be controlled by physical security hardware, so as to prevent damage and ensure overall security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. It should be understood that the described embodiments are only a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.
[0030] Realize a kind of concrete implementation method of the present invention as follows:
[0031] Trusted virtualization system architecture such as figure 1 As shown, it mainly includes:
[0032] 1) Trusted server hardware environment
[0033] The host hardware includes a built-in security chip. This device is a special hardware device located in the PCI slot on the motherboard of the host computer. The device includes an independent processor, memory,...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com