Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtual machine security protection method and apparatus

A virtual machine and virtual machine mirroring technology, applied in the computer field, can solve the problem that the security mechanism is no longer applicable

Inactive Publication Date: 2015-08-26
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF14 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, traditional security measures and tools are developed based on physical machines, while virtualization technology breaks the traditional division of hosts and network boundaries. In a virtualized environment, traditional security mechanisms are no longer applicable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine security protection method and apparatus
  • Virtual machine security protection method and apparatus
  • Virtual machine security protection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0045] Such as figure 1 As shown, the embodiment of the present invention provides a method for protecting the security of a virtual machine, and the method may include the following steps:

[0046] S0: Predetermine the key image files to be measured in the virtual machine image, and pre-set the security measurement module;

[0047] S1: load the curre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a virtual machine security protection method and apparatus. The method comprises: pre-determining a key mirror file to be measured in a virtual machine mirror, and pre-configuring a security measurement module; and further comprises: S1, loading a current virtual mirror of a current virtual machine; S2, calling the security measurement module via a Libvirt interface, and measuring a current key mirror file in the current virtual machine mirror using the security measurement module; and S3, determining, according to a measurement result of the current mirror file, whether to enable the current virtual machine. The virtual machine security protection method and apparatus provided by the present invention can protect security of the virtual machine.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for protecting the safety of a virtual machine. Background technique [0002] Virtualization technology refers to the use of computer software services to simulate computer IT (Information Technology, information technology) physical resources into logical resources, thereby abstracting IT resource logic into resource pools. After abstracting physical resources into resource pools, various scattered resources can be centrally monitored, managed, and maintained. Virtualization technology has the following advantages: Simplify IT operations and improve management efficiency; integrate services to maximize resource utilization; centralize data center management; improve business system continuity, etc. With the rapid development of virtualization technology, the security protection of virtual machines is becoming more and more important. [0003] At present, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/14G06F21/57
Inventor 刘海伟
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products