Secure virtual machine system design method and system based on trusted execution environment
A security virtual machine and execution environment technology, applied in the field of virtualization, can solve the problem of not taking into account security and functionality, and achieve the effect of good universality and easy update and upgrade
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0064] According to a method for designing a secure virtual machine system based on a trusted execution environment provided by the present invention, such as Figure 1-Figure 6 shown, including:
[0065] Divide trusted hypervisors into normal world hypervisors and secure world hypervisors:
[0066] The normal world virtual machine monitor is responsible for basic scheduling, memory management, and device management;
[0067] Enter the trusted virtual machine when the normal world virtual machine monitor completes configuration, and trigger cross-world switching;
[0068] The safe world virtual machine monitor is responsible for security checks, and cooperates to ensure the availability and security of trusted virtual machines;
[0069] The Secure World virtual machine monitor uses methods such as paravirtualization to provide I / O functions to trusted virtual machines;
[0070] The normal world virtual machine monitor and the secure world virtual machine monitor cooperate t...
Embodiment 2
[0083] Embodiment 2 is a preferred example of Embodiment 1 to describe the present invention more specifically.
[0084] Those skilled in the art can understand a trusted execution environment-based secure virtual machine system design method provided by the present invention as a specific implementation of a trusted execution environment-based secure virtual machine system design system, that is, the trusted-based The design system of a secure virtual machine system for an execution environment can be realized by executing the steps and procedures of the method for designing a secure virtual machine system based on a trusted execution environment.
[0085] According to a trusted execution environment-based secure virtual machine system design system provided by the present invention, it includes:
[0086] Divide trusted hypervisors into normal world hypervisors and secure world hypervisors:
[0087] The normal world virtual machine monitor is responsible for basic scheduling...
Embodiment 3
[0104] Embodiment 3 is a preferred example of Embodiment 1 to describe the present invention more specifically.
[0105] The goal of the whole invention is to realize the safe virtual machine service (or be called the trusted virtual machine service), guarantee the safety of the virtual machine, and provide more comprehensive security protection for the virtual machine.
[0106] The basic working principle of the whole invention is to use the trusted execution environment technology to split the previously unified virtual machine management and security functions into two parts. Administration section and Security section. The administrative part runs in the normal world, and the security part runs in the secure world. Since these functions were originally implemented in the virtual machine monitor (Hypervisor or VMM), we named the management part N-Visor and the security part S-Visor. Take its suffix.
[0107] While the separation of management functions and security funct...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


