Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operation method and system for virtual trusted root instance in trusted cloud platform

A root of trust and cloud of trust technology, applied in the field of cloud computing

Inactive Publication Date: 2018-11-02
STATE GRID INFORMATION & TELECOMM GRP +5
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the virtual environment of cloud computing, there is still how to realize the trustworthiness and management of resources such as cloud platform physical machines, virtual machines, and image storage, how to transparently transmit the root of trust to the virtual machine based on the physical root of How does the root realize the creation, initialization, destruction, backup, recovery, migration and other technical issues of virtual machines

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation method and system for virtual trusted root instance in trusted cloud platform
  • Operation method and system for virtual trusted root instance in trusted cloud platform
  • Operation method and system for virtual trusted root instance in trusted cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0093] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0094] see figure 1 A method for operating a virtual trusted root instance of a trusted cloud platform disclosed in this embodiment is applied to a cloud platform, and specifically includes the following steps:

[0095] S101: The trusted cloud platform receives the virtual machine creation request sent by the user, and creates a trusted virtual machine according to the trusted resource pool and the virtual machine creation mechanism. When the trusted cloud pla...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an operation method for a virtual trusted root instance in a trusted cloud platform. The method is applied to the trusted cloud platform. The trusted cloud platform receives a virtual machine establishment request sent by a user and establishes a trusted virtual machine according to a trusted resource pool and a virtual machine establishment mechanism; when a virtual machinestarting command is monitored, a virtual trusted root and a virtual trusted root data channel are generated, and the trusted virtual machine, the virtual trusted root and the virtual trusted root data channel are bound; when a virtual trusted root backup request is received, the virtual trusted root is backed up according to a preset backup mechanism; when a virtual machine migration request is received, the virtual machine and the virtual trusted root are migrated according to a preset migration mechanism; when a virtual machine destruction request is received, the trusted virtual machine, the virtual trusted root and the virtual trusted root data channel are destroyed according to a preset destruction mechanism; and when a trusted root recovery request is received, the virtual trusted root is recovered according to a preset recovery mechanism.

Description

technical field [0001] The present invention relates to the technical field of cloud computing, and more specifically, to a method and system for operating a virtual trusted root instance of a trusted cloud platform. Background technique [0002] Trusted Computing (Trusted Computing) is a trusted computing platform supported by hardware security modules that is widely used in computing and communication systems to improve the overall security of the system. TCG defines Trusted Computing proposed by Trusted TCG from the perspective of behavior. The definition of entity trustworthiness is given from the perspective of behavior: An entity is trustworthy if it always behaves in the expected way to achieve the expected goal. [0003] In recent years, a global standard such as TPM has been developed, and TCM and TPCM are Chinese standard chips. The transmission of the root of trust and the chain of trust has already been applied and realized in a purely physical environment. How...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455H04L9/32
CPCG06F9/45558G06F2009/45562H04L9/3234
Inventor 杨立红董爱强李云鹏徐晓轶姚一杨赵保华高灵超杨永艳桂胜王勇刚安宁钰
Owner STATE GRID INFORMATION & TELECOMM GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products