Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Kernel access method and device and medium

An access method and kernel technology, applied in the field of system security, can solve problems such as occupation, multiple resources and space, and achieve the effect of avoiding illegal attacks and ensuring security.

Pending Publication Date: 2020-04-28
INSPUR BUSINESS MACHINE CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the virtual machine can provide good isolation and compatibility, it needs to occupy more resources and space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Kernel access method and device and medium
  • Kernel access method and device and medium
  • Kernel access method and device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0047] In the existing technology, the method of deploying virtual machines is adopted to provide each container with its own virtual machine, and each virtual machine is independent of each other. Ev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose a kernel access method and device, and a medium. The method comprises: intercepting data access requests of all applications for a system kernel; detecting whether each data access request belongs to a preset interception range or not; for the first data access request belonging to the preset interception range, calling a corresponding preset process to process the first data access request according to the service type corresponding to the first data access request; and for the second data access request which does not belong to the preset interception range, transmitting the second data access request to the system kernel for processing. Operation corresponding to the data access request may have a security hole, and if the access to the system kernel is directly executed, the security of the system kernel is threatened. According to the technical scheme, the data access request belonging to the preset interception range is processed by the independent preset process by intercepting the data access request, so that the system kernel is effectively prevented from being illegally attacked, and the security of the container system is ensured.

Description

technical field [0001] The present invention relates to the technical field of system security, in particular to a kernel access method, device and computer-readable storage medium. Background technique [0002] Container technology has revolutionized how we develop, package, and deploy applications. However, the system still exposes a large attack surface when interfacing with containers, so a considerable number of security experts do not recommend running untrusted or potentially malicious applications in containers. [0003] In the prior art, in order to realize the running of heterogeneous and low-trust applications in the container, the isolation capability of the container is improved. By providing each container with its own virtual machine, the container can run in its own virtual machine. run. In this case, even if there is a vulnerability in the guest VM, the hypervisor can still keep the container secure by isolating it from the host and other applications and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F21/57
CPCG06F21/53G06F21/577
Inventor 华飞君
Owner INSPUR BUSINESS MACHINE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products