Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

84 results about "Virtual machine introspection" patented technology

In computing, virtual machine introspection (VMI) is a technique "for monitoring the runtime state of a system-level virtual machine (VM)", which is helpful for debugging or forensic analysis. The term introspection in application to the virtual machines was introduced by Garfinkel and Rosenblum. They invented an approach for "protecting a security application from attack by malicious software" and called it VMI. Now VMI is a common term for different virtual machine forensics and analysis methods. VMI-based approaches are widely used for security applications, software debugging, and systems management.

Global migration manager, gateway, virtual machine migration system and method thereof

The invention provides a global migration manager, a gateway, a virtual machine migration system and a method thereof. The business continuity and the cloud service quality are ensured in the migration among different subnets. The global migration manager comprises a memory used for storing a virtual machine information management table of global unique virtual machine identification information; a virtual machine migration controller which is used for receiving a virtual machine migration request and notifying a source subnet to migrate a virtual machine in the source subnet to a target subnet and is further used for receiving a virtual machine migration completion notification, updating the virtual machine information management table and generating a virtual machine destination address transition request according to the global unique virtual machine identification information, a network address of the virtual machine before the migration and a network address of the virtual machine after the migration; and a gateway controller used for sending the generated virtual machine destination address transition request to each gateway and sending a false ARP update request message to the gateway of the source subnet. By adopting the technical scheme, the business continuity and the cloud service quality are ensured.
Owner:HITACHI LTD

Virtual machine on-line transfer method across virtualization data centers

The invention provides a virtual machine on-line transfer method across virtualization data centers. The method includes that step 1, a plurality of virtualization data centers are deployed on a wide area network (WAN), and each virtual machine mirror file is divided into a template and user private data files, step 2, the virtualization data centers are connected through a virtual private network (VPN) of a two-tier bridge pattern, step 3, dirty blocks written into a disk every time are monitored in a virtual machine input / output (I / O) drive course on a source node, a transfer thread is created for the drive course, and the transfer thread pre-transfers the user private data files and transfers monitoring records of the dirty blocks, step 4, a transfer course of a virtual machine on the source node controls the pre-transfer and the transfer of the monitoring record, and step 5, the execution sequence of a destination node recovery course of the virtual machine is changed, a recovery thread is created for the recovery course, and the recovery thread receives information about the pre-transfer and the transfer of the monitoring records and writes the information into a storage node. The virtual machine on-line transfer method across the virtualization data centers can achieve dynamic mapping of virtual machines and resources among the plurality of virtualization data centers.
Owner:SHANGHAI YINGLIAN SOMATOSENSORY INTELLIGENT TECH CO LTD

Virtual machine migration prediction method based on SLA

The invention relates to the technical field of cloud computing, in particular to a virtual machine migration prediction method based on an SLA (Service Level Agreement). According to the method, firstly, the resource use condition of each virtual machine is monitored once every a period of time; then, after the curve fitting by a mathematical method on the basis of monitoring data, an equation of the curve is obtained; then, the resource quantity used by the virtual machines at the next time interval can be predicted; next, the resource use quantity at the next time interval is compared to the threshold value specified in the SLA; if the resource use quantity at the next time interval exceeds the threshold value, the virtual machine is likely to be about to overload; otherwise, the coming of the next monitoring time interval is waited; and finally, if the overload condition occurs, the virtual machine is migrated to an idle host. The virtual machine migration prediction method based on the SLA provided by the invention has the advantages that an active virtual machine migration strategy is realized through actively predicting the resource use trend of the virtual machine; the problem that the SLA cannot be met after the migration by a conventional migration strategy is solved; and the method can be used for virtual machine migration.
Owner:G CLOUD TECH

Agent-free client process protection method based on virtualization technology

The invention discloses an agent-free client process protection method based on a virtualization technology. The method comprises the steps of transparently obtaining a windows non-paging memory page in a KVM, and recording an initial address of the memory page to a KVM structure body corresponding to a virtual machine; injecting virtual machine information; setting an IA32-SYSENTER-EIP register as a newly injected KiFastCallEntry function address, and conducting hook on a KiSystemService function; conducting clearing on original SSDT contents; setting VMCS structure relevant fields, and setting read-write sinking of the IA32-SYSENTER-EIP register and pagefault abnormal sinking of an instruction fetching type; intercepting instruction fetching pagefault abnormality of a client by a virtual machine monitor, analyzing a current operation, feeding a result back to the client, and finishing one-time accessing processing. According to the agent-free client process protection method based on the virtualization technology, the safe execution of system functions is ensured, there is no need to install an agent drive inside the client, there is no need to consider the security of the agent drive, and the influence on the performance of the virtual machine is reduced to the minimum.
Owner:SICHUAN UNIV

Software testing and evaluation method based on cloud computation technology

The invention relates to a software testing and evaluation method based on a cloud computation technology. The method comprises the steps that a testing cloud platform and an evaluation cloud platformare established; a lightweight cloud probe is deployed on the testing cloud platform; state data is collected by using the cloud probe and transmitted to the evaluation cloud platform through a network; analysis is conducted in the evaluation cloud platform, tested software is comprehensively established according to testing and evaluation standards, and a testing and evaluation report is generated. The software testing and evaluation method has the advantages that through the cloud computation technology, the utilization rate of equipment can be effectively increased, the required resourcesare dynamically adjusted according to service demands, the tested software is continuously tested, and the method helps to run and maintain a whole testing system. Through an introspection technologyof a virtual machine, the tested software is separated from a detection module. The tested software is deployed in the virtual machine, the detection module is deployed in a safer virtual machine monitor layer with a higher power level, and by integrating multiple advantages of the introspection technology of the virtual machine, the tested software is continuously, accurately and comprehensivelydetected.
Owner:TIANJIN UNIVERSITY OF TECHNOLOGY

Virtual machine-based dynamic introspection function-level virtual machine kernel detection system and method

The invention discloses a virtual machine-based dynamic introspection function-level virtual machine kernel detection system and method, and belongs to the field of cloud safety. The device compriseshardware which is used for providing hardware basis for a secure virtual machine, a target virtual machine and a virtual machine management layer; the secure virtual machine comprises a monitoring framework; the secure virtual machine interacts with the target virtual machine through the virtual machine management layer; the virtual machine management layer comprises a connection extraction module; and the extraction module is connected with each of the learning module and a monitoring module through page execution information. The method comprises the following steps of: starting a monitor, injecting a monitoring point to the target virtual machine by the extraction module, so as to ensure that the virtual machine management layer can monitor sub-functions in calling; carrying out staticanalysis by utilizing a static memory analysis method and dynamic tracking, so as to obtain subsequent sub-functions and carry out monitoring; and carrying out loop execution until system calling is returned. According to the system and method, execution information is modeled through three learning methods, so that integrity of kernel control flows is detected, and the kernel control flows are prevented from being detected and broken through by attackers.
Owner:HARBIN INST OF TECH +1

Openstack based physical machine remote maintenance method

The invention relates to the technical field of physical machine power control and cloud computing virtual machine migration, in particular to an Openstack based physical machine remote maintenance method. The method comprises: firstly, establishing an Openstack cloud platform and setting an IPMI address, an IPMI login user name and a password of a physical machine; secondly, searching for an available physical node in a normal state according to a greedy algorithm at a control node of the Openstack cloud platform, sending an instruction of migrating a virtual machine to the available physical node to a target physical machine through a component, and after all virtual machines are migrated, sending a shutdown command to a baseboard management controller (BMC) of the target physical machine; and finally, executing a request by the BMC of the target physical machine, and returning an executive result. According to the method, the problems that the virtual machines need to be migrated before physical machine maintenance, a Juno version of the Openstack open source cloud platform cannot perform remote physical machine maintenance, an application cannot be ensured to be normally and continuously used, inconvenience is provided for the operation and maintenance personnel to maintain the physical machine, and the like are solved; and the method can be applied to physical machine maintenance and virtual machine migration of the cloud platform.
Owner:G CLOUD TECH

Online migration redundancy removal method for virtual machine disk

The invention discloses an online migration redundancy removal method for a virtual machine disk. The method comprises the following steps: firstly, reading a super block in a disk according to a filesystem organization mode, then reading a bitmap in each block group according to block group description information in the super block, determining whether each block in the bitmap record block group is used or available, and constructing a complete bitmap for the whole disk by utilizing the obtained bitmaps of all the block groups; secondly, in the virtual machine migration process, carrying out disk migration according to the obtained disk use information, and at the moment, only transmitting used disk blocks; and thirdly, extracting unused block bitmaps which are possibly updated from theoriginal memory data by using a virtual machine introspection technology, updating bitmap information by using the unused block bitmaps after obtaining caches of metadata of all block equipment in the memory, and migrating used disk blocks which are not migrated before to a destination end by using an existing method. According to the method, semantic information of the data is mainly used for data compression, so that very small overhead for upper-layer applications is introduced.
Owner:XI AN JIAOTONG UNIV

Public infrastructure resource scheduling method based on application priority

The invention discloses a public infrastructure resource scheduling method based on an application priority. The method comprises the following steps that: (1) uniformly deploying an application system in different virtual machine, uniformly deploying the application system in the virtual machine, and configuring an operating environment on which the application system depends in the virtual machine, wherein only an independent application system is deployed in each virtual machine, and the virtual machine where the application system is positioned is taken as granularity for scheduling during scheduling; and (2) in a resource scheduling process, monitoring the resource use situation of the application system in real time, and according to the load situation of the application system, taking virtual machine migration as the resource scheduling method to dynamically deploy application system resources according to the priority of the application system. By use of the method, through a virtualization technology, full-ship information resources are integrated to realize the sharing and the uniform scheduling of the full-ship information resources, and the resource requirements of a combat and platform application system are subjected to overall consideration so as to perform a supporting function of the public information infrastructure to a maximum degree and improve the integral combat effectiveness.
Owner:CHINA SHIP DEV & DESIGN CENT

An Android application security protection method based on dynamic virtual instruction transformation

The invention discloses an Android application security protection method based on dynamic virtual instruction transformation. According to the invention, a user-defined virtual instruction set and avirtual machine interpreter are defined; converting the Dalvik instruction set into a self-defined virtual instruction set through an instruction obfuscation operation; during execution, the mapping relation between the instruction sets is dynamically transformed, and the transformed instruction is interpreted and executed by the user-defined virtual machine interpreter, so that the protection ofthe key method and execution logic in the Android application is realized. Meanwhile, the Android application code based on the user-defined virtual instruction set and the virtual machine interpretercorresponding to the Android application code are embedded in the Android application, and therefore Root authority does not need to be owned or an Android underlying system does not need to be modified. According to the method, effective protection can be provided for key methods and execution logic in the Android application, the confusion degree and the non-readability of the application program are improved, the time and space complexity of an attacker for implementing reverse analysis and code dump attack can be effectively improved, and safety reinforcement of the Android application isachieved.
Owner:NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products