Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authority control method, system and device for virtual machine

A technology of access rights and control devices, applied in transmission systems, electrical components, etc., to achieve the effect of security control

Active Publication Date: 2012-07-11
CHINA MOBILE COMM GRP CO LTD
View PDF7 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, the existing virtual machine security management technology is mainly based on the realization of the virtual machine management requirements of the system administrator according to the network side, and cannot realize the security control of the virtual machine according to the actual security requirements of the virtual machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authority control method, system and device for virtual machine
  • Access authority control method, system and device for virtual machine
  • Access authority control method, system and device for virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Embodiment 1 of the present invention provides a method for controlling access authority of a virtual machine, based on the method, the security control of the virtual machine can be realized according to the security requirements of the virtual machine.

[0035] The method provided by Embodiment 1 of the present invention can be applied to a virtual machine system, and the virtual machine system includes such as figure 1 In the multiple physical machines shown, each physical machine includes a user layer and an intermediate layer above the user layer, the user layer includes at least a first virtual machine, and the intermediate layer includes a security management module, which mainly realizes Controlling the access rights of the first virtual machine. The first virtual machine can access the second virtual machine on the physical machine through the control of the security management module, and can also access the second virtual machine on other physical machines th...

Embodiment 2

[0138] Embodiment 2 of the present invention provides a device for controlling access rights of a virtual machine, and based on the device, security control of the virtual machine can be realized according to the security requirements of the virtual machine.

[0139] Such as Figure 7 As shown, the virtual machine access authority control device provided by Embodiment 2 of the present invention mainly includes:

[0140] A receiving unit 701, a security identifier determining unit 702, and an authority control unit 703;

[0141] in:

[0142] a receiving unit 701, configured to receive an access request sent by the first virtual machine to the second virtual machine;

[0143] A security identification determining unit 702, configured to determine security identifications respectively corresponding to the first virtual machine and the second virtual machine according to the access request received by the receiving unit 701;

[0144]The authority control unit 703 is configured ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access authority control method, a system and a device for a virtual machine. The main technical scheme is as follows: receiving an access request of a second virtual machine sent by a first virtual machine; determining security identifiers respectively corresponding to the first virtual machine and the second virtual machine; and allowing the first virtual machine to access the second virtual machine after comparing that the determined security identifiers are consistent with each other. According to the technical scheme, whether to allow the first virtual machine to access the second virtual machine can be determined according to the security identifiers of the virtual machines, so that the security control of the virtual machine can be performed according to security requirements of the virtual machine.

Description

technical field [0001] The present invention relates to the technical field of virtual machine security control, in particular to a method, system and device for controlling access authority of a virtual machine. Background technique [0002] Cloud computing is a technology that uses a computing system composed of large-scale low-cost computing units connected through an IP network to provide computing services. The underlying hardware platform of the cloud computing system consists of a large number of standardized commercial servers, interconnected through a complex IP network, and runs the cloud computing software stack on the platform. [0003] The elastic computing cloud platform provides users with a virtual cluster environment, which makes the user's application fully flexible, and also reduces the management burden of the cloud computing platform manager. The virtual machine instances in the elastic computing cloud are actually running virtual machine servers, and e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 周伟张志宏孙少陵赵鹏罗治国
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products