Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and system for virtual machine system

An access control and virtual machine monitor technology, applied in the field of resource access, can solve problems such as uncertainty, and achieve the effect of preventing attacks between virtual machines

Inactive Publication Date: 2012-10-03
ZTE CORP
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Currently, the issue of virtual security is still in the discussion stage, how to implement and what kind of virtual machine security mechanism is still uncertain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system for virtual machine system
  • Access control method and system for virtual machine system
  • Access control method and system for virtual machine system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The basic idea of ​​the present invention is, by dividing the virtual machine into a management virtual machine and a client virtual machine, and setting an access control agent module in the virtual machine monitor, so that the virtual machine monitor receives the resource access request or After accessing other customer virtual machine requests, the resource access request is forwarded to the management virtual machine, and the management virtual machine performs authentication and authorization operations on the customer virtual machine, and allows access to other customer machines after the authentication is passed, or according to the security policy The information and the like determine the corresponding resource access rights for the client virtual machine, and send the information to the virtual machine monitor, and the virtual machine monitor performs corresponding resource access management on the client virtual machine.

[0041] In a virtual machine system, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method for a virtual machine system. A virtual machine is arranged in a system to serve as a manager virtual machine, and other virtual machines serve as client virtual machines. An access control module is arranged in the manager virtual machine and used for performing access control over the client virtual machines according to the information of the client virtual machines, and an access control proxy module is arranged in a virtual machine monitor and used for receiving access request information of the client virtual machines and forwarding the access request information to the access control module. By the technical scheme, the scale of the virtual machine monitor is not increased, the safety of the virtual machine monitor is not reduced, the access control over the virtual machines can be performed, the access of the virtual machines to physical resources can be effectively controlled, and safety threat such as attack and communication among the virtual machines and service rejection in the virtual machine system can be avoided.

Description

technical field [0001] The present invention relates to resource access technology, in particular to a virtual machine system access control method and system based on cloud computing. Background technique [0002] Cloud computing brings a new era of information technology (IT, Information Technology) service provision and consumption in the business field. Cloud computing enhances collaboration, agility, scalability, availability, and reduced costs through optimized, more efficient computing. More specifically, the cloud describes the use of services, applications, information, and infrastructure, etc., composed of "resource pools" of computing, networking, information, and storage. Components in cloud computing can be quickly provisioned, deployed, and decommissioned, and can be rapidly expanded or reduced, providing an on-demand distribution and consumption model similar to utility computing. [0003] The National Institute of Standards and Technology (NIST, National In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455H04L29/06
CPCG06F9/468
Inventor 陈小华林兆骥王治平
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products