Trusted virtualization system

A virtualized system and trusted technology, applied in the field of virtual cloud security, can solve the problems of lack of virtualized system and internal protection of virtual machines, and the inability of virtual machines to be controlled by physical security hardware, so as to prevent damage and ensure overall security. Effect

Pending Publication Date: 2021-06-01
INST OF INFORMATION ENG CAS
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the inherent isolation properties of virtualization technology improve the security of the application running environment, but this isolation also brings about the problem that the inside of the virtual machine cannot be controlled by physical security hardware
[0004] In the current academia and industry, the system security protection technology based on the hardware trust base has been relatively perfect, but there are still some problems in the technology based on the hardware trust base, especially its lack of protection for the virtualization system and the inside of the virtual machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted virtualization system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. It should be understood that the described embodiments are only a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0030] Realize a kind of concrete implementation method of the present invention as follows:

[0031] Trusted virtualization system architecture such as figure 1 As shown, it mainly includes:

[0032] 1) Trusted server hardware environment

[0033] The host hardware includes a built-in security chip. This device is a special hardware device located in the PCI slot on the motherboard of the host computer. The device includes an independent processor, memory,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted virtualization system, which is characterized by comprising a host machine and a virtual machine manager running on the host machine, the virtual machine manager allocates a virtual BIOS, virtual measurement equipment and a virtual machine trusted migration module for each virtual machine on the host machine; wherein the virtual BIOS is used for executing measurement on a virtual machine core file set in a virtual machine mirror image in the starting process of the virtual machine; the virtual measurement equipment is used for actively and dynamically measuring a set important object in a system memory of the virtual machine in the running process of the virtual machine, and storing a measurement result to a built-in security chip; the virtual machine trusted migration module is used for transmitting measurement information of virtual measurement equipment of a source virtual machine to virtual measurement equipment of a target virtual machine in the virtual machine migration process, and the consistency of trusted startup information and trusted measurement information before and after migration and the continuity of trusted measurement operation before and after migration are guaranteed.

Description

technical field [0001] The invention belongs to the field of virtual cloud security, and in particular relates to a trusted virtualization system. Background technique [0002] With the rapid development of information technology, incidents that endanger information security continue to occur, and the situation of information security is becoming increasingly severe. The March 2020 Internet Security Threat Report released by the National Internet Emergency Response Center (CNCERT) pointed out that the number of terminals infected with network viruses in China was nearly 1.51 million, and the National Information Security Vulnerability Sharing Platform (CNVD) collected and sorted out 2,076 information system security vulnerabilities. , including 765 high-risk vulnerabilities and 1,591 vulnerabilities that can be exploited for remote attacks. System security issues will affect national security, economic development, and social stability. [0003] Virtualization technology i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F21/57G06F9/455
CPCG06F9/45558G06F21/53G06F21/572G06F2009/4557
Inventor 孟丹贾晓启张伟娟陈家赟白璐韦秋石武希耀孙慧琪王睿怡唐静
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products