CN102707985A - Access control method and system for virtual machine system - Google Patents

Access control method and system for virtual machine system Download PDF

Info

Publication number
CN102707985A
CN102707985A CN2011100755328A CN201110075532A CN102707985A CN 102707985 A CN102707985 A CN 102707985A CN 2011100755328 A CN2011100755328 A CN 2011100755328A CN 201110075532 A CN201110075532 A CN 201110075532A CN 102707985 A CN102707985 A CN 102707985A
Authority
CN
China
Prior art keywords
virtual machine
guest virtual
access control
guest
monitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100755328A
Other languages
Chinese (zh)
Inventor
陈小华
林兆骥
王治平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2011100755328A priority Critical patent/CN102707985A/en
Priority to PCT/CN2011/081078 priority patent/WO2012129904A1/en
Publication of CN102707985A publication Critical patent/CN102707985A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses an access control method for a virtual machine system. A virtual machine is arranged in a system to serve as a manager virtual machine, and other virtual machines serve as client virtual machines. An access control module is arranged in the manager virtual machine and used for performing access control over the client virtual machines according to the information of the client virtual machines, and an access control proxy module is arranged in a virtual machine monitor and used for receiving access request information of the client virtual machines and forwarding the access request information to the access control module. By the technical scheme, the scale of the virtual machine monitor is not increased, the safety of the virtual machine monitor is not reduced, the access control over the virtual machines can be performed, the access of the virtual machines to physical resources can be effectively controlled, and safety threat such as attack and communication among the virtual machines and service rejection in the virtual machine system can be avoided.

Description

A kind of access control method of dummy machine system and system
Technical field
The present invention relates to the resource access technology, relate in particular to a kind of dummy machine system access control method and system based on cloud computing.
Background technology
Cloud computing brings infotech of commercial field (IT, Information Technology) New Times that service provides and consumes.Collaborative, agility, extendability, availability have been strengthened in cloud computing, and the characteristics through optimizing, more efficient calculating reduces cost.In particular, cloud has been described the use of service, application, information and the infrastructure etc. be made up of calculating, network, information and the storage etc. of " resource pool " change.Form in the cloud computing that assembly can be purchased rapidly, deployment and retired, and can expand rapidly or reduce, provide as required, with distribution and consumption mode like the effectiveness compute classes.
(the NIST of USA National Institute of Standard and Technology; National Institute of Standards andTechnology) five key features have been defined to cloud computing, promptly as required from service, broadband access, virtualized resource " pond ", resilient infrastructure, measurable service etc. fast.Many tenants also are the key factors of cloud computing as the essential characteristic of cloud computing.
Why automatically the cloud computing system resource of certain service of Control and Optimization is used, and is because utilized through abstract to a certain degree measurement capability.In cloud computing, Intel Virtualization Technology is one of important selection technology that resource is abstract.
In the virtual machine technology, different according to treating virtual entity, can be divided into dissimilar virtual.Wherein, the system virtualization technology is by a kind of Intel Virtualization Technology of extensive understanding.
The core concept of system virtualizationization is that virtualization software fictionalizes one or more virtual machine on a physical machine.Virtual machine operates in the isolation environment, is the logical machine system with complete hardware function, and it comprises client operating system and application program wherein.In dummy machine system, a plurality of operating systems can be moved multiplexing physical resource independently simultaneously on same physical machine.
In X86 server (adopting the server of complicated order framework computing machine (CISC, Complex Instruction SetComputer) architecture processor), use virtual machine technique can improve the utilization factor of server.Dummy machine system has obtained large-scale commercialization.
Although Intel Virtualization Technology obtains fast development, the safety technique of dummy machine system but seriously lags behind.Operation various services and safeguards system safety on virtual machine is than complicated many on single computing machine.The security threat of dummy machine system is a lot, the for example attack between the virtual machine, resource occupation conflict and the threat etc. of escaping.Therefore, when using virtual machine to bring application and administrative convenience, should pay attention to solving the virtual secure problem more, research secure virtual machine mechanism.At present, which type of secure virtual machine mechanism how the virtual secure problem to be implemented and implemented and still be not sure of still in talking stage.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide a kind of access control method and system of dummy machine system, can realize the safety management to dummy machine system, also can not increase the processing burden of monitor of virtual machine.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of access control system of dummy machine system is characterized in that, a virtual machine is set as managing virtual machines in dummy machine system, and all the other virtual machines are as guest virtual machine; Said device also comprises access control module and access control proxy module, wherein,
Said access control module is arranged in the managing virtual machines, is used for the guest virtual machine control that conducts interviews;
Said access control proxy module is arranged in the monitor of virtual machine, is used to receive the access request of guest virtual machine, and said access request is forwarded to said access control module.
Preferably, store the client virtual machine information in the database of said managing virtual machines; Wherein, said guest virtual machine information comprises guest virtual machine sign, security policy information.
Preferably, said access request comprises resource access request, visits other guest virtual machine requests.
Preferably; When said guest virtual machine access request is resource access request; Said access control module is further used for said guest virtual machine is carried out authentication, mandate; And after said guest virtual machine authentication is passed through, from said security policy information, obtain the corresponding resource access authority of said guest virtual machine, send to said monitor of virtual machine.
Preferably, said monitor of virtual machine is further used for, and is said guest virtual machine management and Resources allocation according to received resource access authority.
Preferably, when said guest virtual machine access request was other guest virtual machine requests of visit, said access control module was further used for said guest virtual machine is carried out authentication, mandate; And after authentication is passed through, from the said security policy information of the database of said managing virtual machines, obtain the access rights of said guest virtual machine, and send to said monitor of virtual machine other guest virtual machines;
Said monitor of virtual machine is further used for, and allows or do not allow the visit of said guest virtual machine to other guest virtual machines by received access rights.
A kind of access control method of dummy machine system is provided with a virtual machine as managing virtual machines in dummy machine system, all the other virtual machines are as guest virtual machine; Be provided with access control module in the managing virtual machines; The access control proxy module is set in the monitor of virtual machine; Said method also comprises:
Said guest virtual machine sends access request to monitor of virtual machine;
Said access control proxy module obtains the access request of guest virtual machine, and said access request is forwarded to access control module;
After said access control module receives the access request of said customer account management virtual machine,, and the access control result is sent to the monitor of virtual machine kernel to the guest virtual machine control that conducts interviews.
Preferably, store the client virtual machine information in the database of said managing virtual machines; Wherein, said guest virtual machine information comprises guest virtual machine sign, security policy information;
Said access request comprises resource access request, visits other guest virtual machine requests.
Preferably, said to the guest virtual machine control that conducts interviews, for:
When said access request was resource access request, said access control module carried out authentication, mandate to guest virtual machine;
After authentication was passed through, said access control module obtained the corresponding resource access authority of said guest virtual machine from the said security policy information of the database of said managing virtual machines, and sends to said monitor of virtual machine kernel;
Said method also comprises:
Said monitor of virtual machine kernel is said guest virtual machine management and Resources allocation by received resource access authority.
Preferably, said to the guest virtual machine control that conducts interviews, for:
When said access request was other guest virtual machine requests of visit, said access control module carried out authentication, mandate to guest virtual machine;
After authentication was passed through, said access control module obtained the access rights of said guest virtual machine to other guest virtual machines from the said security policy information of the database of said managing virtual machines, and sent to said monitor of virtual machine kernel;
Said method also comprises:
Said monitor of virtual machine kernel allows or does not allow the visit of said guest virtual machine to other guest virtual machines by received access rights.
The present invention is through being divided into virtual machine managing virtual machines and guest virtual machine; And the access control proxy module is set in monitor of virtual machine; Like this; Monitor of virtual machine is forwarded to managing virtual machines with resource access request after receiving the resource access request of guest virtual machine or visiting other guest virtual machine requests, guest virtual machine is carried out operations such as authentication, mandate by managing virtual machines; And allow other client computer are conducted interviews through the back in authentication; Or from being that guest virtual machine is confirmed corresponding resource access authority according to security policy information etc., and send to monitor of virtual machine, by monitor of virtual machine guest virtual machine is carried out corresponding resource access management etc.Technical scheme of the present invention neither increases the scale of monitor of virtual machine; Do not reduce the security of monitor of virtual machine; Can realize again the virtual machine control that conducts interviews; Control the visit of virtual machine effectively, prevent security threats such as the communication between attack, the virtual machine, denial of service between the virtual machine in the dummy machine system physical resource.
Description of drawings
Fig. 1 is the composition structural representation of dummy machine system of the present invention;
Fig. 2 is the process flow diagram of virtual machine method of the present invention;
Fig. 3 is the composition structural representation of managing virtual machines of the present invention.
Embodiment
Basic thought of the present invention does; Through virtual machine being divided into managing virtual machines and guest virtual machine; And the access control proxy module is set in monitor of virtual machine, like this, after monitor of virtual machine receives the resource access request of guest virtual machine or visits other guest virtual machine requests; Resource access request is forwarded to managing virtual machines; Guest virtual machine is carried out operations such as Certificate Authority by managing virtual machines, and allow other client computer are conducted interviews through the back in authentication, or from confirm the resource access authority of correspondence for guest virtual machine according to security policy information etc.; And send to monitor of virtual machine, by monitor of virtual machine guest virtual machine is carried out corresponding resource access management etc.
In dummy machine system, monitor of virtual machine is responsible for the management of physical resource.Virtual machine need could be visited physical resource through monitor of virtual machine.Monitor of virtual machine provides the physical resource access request according to virtual machine, calls corresponding physical resource, distributes to virtual machine and uses.
Monitor of virtual machine has vital role in dummy machine system.Can realize access control through monitor of virtual machine, prevent the safety problem that occurs in the dummy machine system effectively, for example problems such as attack between the virtual machine, communication, resource occupation virtual machine visit physical resource.
Yet along with increasing of virtual machine function, the code size of monitor of virtual machine is increasing, and the safety problem of monitor of virtual machine is more and more.Because monitor of virtual machine is in the critical role of dummy machine system, its safety problem is brought very big potential safety hazard to dummy machine system.
Therefore,, can guarantee the safety of dummy machine system again, when considering, should consider to adopt and to reduce method the monitor of virtual machine security threat to dummy machine system increase security mechanism in order to reduce the safety problem of monitor of virtual machine.
Below, through technical scheme of the present invention is set forth further, specify the present invention and how to overcome the problems referred to above.
Fig. 1 is for the composition structural representation of dummy machine system of the present invention, and is as shown in Figure 1, comprises plural virtual machine and monitor of virtual machine; A virtual machine is set as managing virtual machines in said plural virtual machine, all the other virtual machines are as guest virtual machine; Comprise access control module and database in the managing virtual machines; Be provided with access control proxy module and kernel in the said monitor of virtual machine; Wherein, access control module carries out authentication operations such as authentication, mandate to said guest virtual machine; Database is used to store guest virtual machine identification information, security policy information.Among the present invention, authentication mainly is that the identity of guest virtual machine is carried out authentication, adopts existing authentication mode to get final product, because authentication mode is not to realize emphasis of the present invention, also is to realize easily, and repeating no more here, it realizes details.
Guest virtual machine is further used for resource access request is sent to the access control proxy module; Perhaps; Resource access request is sent to monitor of virtual machine (guest virtual machine needn't be concerned about whether there is the access control proxy module), by asking that the control agent module obtains this resource access request; The access control proxy module is forwarded to access control module with resource access request; Access control module carries out authentication, mandate to guest virtual machine; And after the guest virtual machine authentication is passed through; From the security policy information of database, obtain the corresponding resource access authority of said guest virtual machine; And sending to said monitor of virtual machine kernel, the monitor of virtual machine kernel is said guest virtual machine management and Resources allocation by received resource access authority.Among the present invention; Store the CAMEL-Subscription-Information of guest virtual machine in the security policy information; Promptly store to the signatory authority of the resource access of guest virtual machine; Like allocated bandwidth, information such as the concrete resource type of visit, this security policy information are specifically confirmed by the concrete CAMEL-Subscription-Information of guest virtual machine and operator.
Among the present invention; Guest virtual machine also can be sent to the access request to other guest virtual machines the access control proxy module; Perhaps; To be sent to monitor of virtual machine to the access request of other guest virtual machines, obtain this access request other guest virtual machines by the access control proxy module.The access request that the access control proxy module will be somebody's turn to do other guest virtual machines is forwarded to access control module; Access control module carries out authentication, mandate to guest virtual machine; And after the guest virtual machine authentication is passed through; According to obtaining the access rights of said guest virtual machine in the security policy information, and send to said monitor of virtual machine kernel virtual machine watch-dog and allow or do not allow of the visit of said guest virtual machine other guest virtual machines to other client computer.
Below further introduce dummy machine system of the present invention in detail.
Dummy machine system of the present invention is through the visit of managing virtual machines control guest virtual machine to physical resource, and the communication between the guest virtual machine.
In dummy machine system, start a managing virtual machines.Managing virtual machines is responsible for the control that conducts interviews of guest virtual machine visit physical resource.In managing virtual machines, be provided with access control module and DBM.Access control module is responsible for completion and the guest virtual machine request is carried out work such as authentication, mandate.Information such as data-base recording guest virtual machine ID, security strategy.Guest virtual machine has only the authentication through managing virtual machines, after the access control such as mandate, could visit physical resource.
In monitor of virtual machine, dispose access control agency (being called the access control proxy module).The access control agency is owing to only do agency's use; Therefore do not relate to concrete application processes; Therefore have the lighter characteristics of burden,, the processing burden of monitor of virtual machine is further alleviated through the access control proxy module is set; And the deployment of access control proxy module in monitor of virtual machine can not influence the monitor of virtual machine security.The access control agency catches the access request of guest virtual machine to physical resource, and access request is forwarded to managing virtual machines.The access control module of managing virtual machines carries out authentication, mandate to guest virtual machine; And after the guest virtual machine authentication is passed through; From the security policy information of database, obtain the corresponding resource access authority of said guest virtual machine; And sending to said monitor of virtual machine kernel, the monitor of virtual machine kernel is said guest virtual machine management and Resources allocation by received resource access authority.
Among the present invention, so-called physical resource comprises disk, flash disk, internal memory, network interface card, CPU etc.
Fig. 2 is the process flow diagram of virtual machine method of the present invention, and as shown in Figure 2, among the figure, the label of each step is corresponding with the label shown in Fig. 1, characterize between each unit or unit and network element and the network element alternately; Virtual machine method of the present invention specifically may further comprise the steps:
Step 1, guest virtual machine sends resource access request (physical resource access request) to monitor of virtual machine;
Step 2, the access control proxy module in the monitor of virtual machine is caught resource access request, and resource access request is forwarded to managing virtual machines;
Step 3; Access control module in the managing virtual machines is to the guest virtual machine authentication; And the client virtual identity is carried out authentication according to guest virtual machine identification information (carrying) by resource access request; And from the security policy information of database, obtain the corresponding resource access authority of guest virtual machine through the back, and send to the monitor of virtual machine kernel in authentication;
After step 4, monitor of virtual machine kernel are obtained guest virtual machine resource access authority information, management and distribution physical resource; Here, the monitor of virtual machine kernel mainly carries out resources allocation etc. according to guest virtual machine resource access authority information, is different guest virtual machines and distributes authority corresponding physical resource signatory with it, realizes the resource management to this guest virtual machine.
Step 5, monitor of virtual machine are obtained guest virtual machine can accessed resources information;
Step 6, the monitor of virtual machine kernel sends guest virtual machine with physical resource information;
Step 7, guest virtual machine visit respective physical resource.
The virtual machine access control mechanisms that the present invention proposes; Neither increase the code size of monitor of virtual machine; Can not reduce the security of monitor of virtual machine yet; Can realize again the control that conducts interviews of guest virtual machine visit physical resource has been prevented security threats such as the communication between attack, the virtual machine, denial of service between the virtual machine in the dummy machine system effectively.
Fig. 3 is the composition structural representation of managing virtual machines of the present invention, and as shown in Figure 3, managing virtual machines of the present invention comprises access control module and database; Wherein,
Access control module is used for guest virtual machine is carried out authentication, mandate;
Database is used to store guest virtual machine identification information, security policy information.
Said access control module is further used for; After the resource access request of the guest virtual machine that receives the monitor of virtual machine forwarding; Said guest virtual machine is carried out authentication, mandate; And after said guest virtual machine authentication is passed through; From the said security policy information of said database, obtaining the corresponding resource access authority of said guest virtual machine, send to said monitor of virtual machine, is said guest virtual machine management and Resources allocation by said monitor of virtual machine by received resource access authority
The present invention has also put down in writing a kind of monitor of virtual machine, includes kernel, and said monitor of virtual machine also comprises the access control proxy module, is used to receive the resource access request of guest virtual machine, and is forwarded to managing virtual machines.
Aforementioned monitor of virtual machine and managing virtual machines shown in Figure 3 are applied in the dummy machine system shown in Figure 1.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.

Claims (10)

1. the access control system of a dummy machine system is characterized in that, a virtual machine is set as managing virtual machines in dummy machine system, and all the other virtual machines are as guest virtual machine; Said device also comprises access control module and access control proxy module, wherein,
Said access control module is arranged in the managing virtual machines, is used for the guest virtual machine control that conducts interviews;
Said access control proxy module is arranged in the monitor of virtual machine, is used to receive the access request of guest virtual machine, and said access request is forwarded to said access control module.
2. system according to claim 1 is characterized in that, stores the client virtual machine information in the database of said managing virtual machines; Wherein, said guest virtual machine information comprises guest virtual machine sign, security policy information.
3. system according to claim 1 and 2 is characterized in that, said access request comprises resource access request, visits other guest virtual machine requests.
4. system according to claim 3; It is characterized in that; When said guest virtual machine access request was resource access request, said access control module was further used for said guest virtual machine is carried out authentication, mandate, and after said guest virtual machine authentication is passed through; From said security policy information, obtain the corresponding resource access authority of said guest virtual machine, send to said monitor of virtual machine.
5. system according to claim 4 is characterized in that said monitor of virtual machine is further used for, and is said guest virtual machine management and Resources allocation according to received resource access authority.
6. system according to claim 3 is characterized in that, when said guest virtual machine access request was other guest virtual machine requests of visit, said access control module was further used for said guest virtual machine is carried out authentication, mandate; And after authentication is passed through, from the said security policy information of the database of said managing virtual machines, obtain the access rights of said guest virtual machine, and send to said monitor of virtual machine other guest virtual machines;
Said monitor of virtual machine is further used for, and allows or do not allow the visit of said guest virtual machine to other guest virtual machines by received access rights.
7. the access control method of a dummy machine system is characterized in that, a virtual machine is set as managing virtual machines in dummy machine system, and all the other virtual machines are as guest virtual machine; Be provided with access control module in the managing virtual machines; The access control proxy module is set in the monitor of virtual machine; Said method also comprises:
Said guest virtual machine sends access request to monitor of virtual machine;
Said access control proxy module obtains the access request of guest virtual machine, and said access request is forwarded to access control module;
After said access control module receives the access request of said customer account management virtual machine,, and the access control result is sent to the monitor of virtual machine kernel to the guest virtual machine control that conducts interviews.
8. method according to claim 7 is characterized in that, stores the client virtual machine information in the database of said managing virtual machines; Wherein, said guest virtual machine information comprises guest virtual machine sign, security policy information;
Said access request comprises resource access request, visits other guest virtual machine requests.
9. method according to claim 8 is characterized in that, and is said to the guest virtual machine control that conducts interviews, for:
When said access request was resource access request, said access control module carried out authentication, mandate to guest virtual machine;
After authentication was passed through, said access control module obtained the corresponding resource access authority of said guest virtual machine from the said security policy information of the database of said managing virtual machines, and sends to said monitor of virtual machine kernel;
Said method also comprises:
Said monitor of virtual machine kernel is said guest virtual machine management and Resources allocation by received resource access authority.
10. method according to claim 8 is characterized in that, and is said to the guest virtual machine control that conducts interviews, for:
When said access request was other guest virtual machine requests of visit, said access control module carried out authentication, mandate to guest virtual machine;
After authentication was passed through, said access control module obtained the access rights of said guest virtual machine to other guest virtual machines from the said security policy information of the database of said managing virtual machines, and sent to said monitor of virtual machine kernel;
Said method also comprises:
Said monitor of virtual machine kernel allows or does not allow the visit of said guest virtual machine to other guest virtual machines by received access rights.
CN2011100755328A 2011-03-28 2011-03-28 Access control method and system for virtual machine system Pending CN102707985A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2011100755328A CN102707985A (en) 2011-03-28 2011-03-28 Access control method and system for virtual machine system
PCT/CN2011/081078 WO2012129904A1 (en) 2011-03-28 2011-10-20 Access control method and system for virtual machine system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100755328A CN102707985A (en) 2011-03-28 2011-03-28 Access control method and system for virtual machine system

Publications (1)

Publication Number Publication Date
CN102707985A true CN102707985A (en) 2012-10-03

Family

ID=46900804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100755328A Pending CN102707985A (en) 2011-03-28 2011-03-28 Access control method and system for virtual machine system

Country Status (2)

Country Link
CN (1) CN102707985A (en)
WO (1) WO2012129904A1 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929690A (en) * 2012-11-07 2013-02-13 曙光云计算技术有限公司 Method and device for access control of virtual machines
CN103020501A (en) * 2012-11-14 2013-04-03 曙光云计算技术有限公司 Access control method and access control device of user data
CN103458003A (en) * 2013-08-15 2013-12-18 中电长城网际系统应用有限公司 Access control method and system of self-adaptation cloud computing environment virtual security domain
CN103701822A (en) * 2013-12-31 2014-04-02 曙光云计算技术有限公司 Access control method
CN103870749A (en) * 2014-03-20 2014-06-18 中国科学院信息工程研究所 System and method for implementing safety monitoring of virtual machine system
CN104484219A (en) * 2014-11-24 2015-04-01 北京奇虎科技有限公司 Strategy issuing method and device in virtual platform
CN104808997A (en) * 2015-05-08 2015-07-29 精航伟泰测控仪器(北京)有限公司 Development system for supporting industrial intelligent control product based on model design
CN104901923A (en) * 2014-03-04 2015-09-09 杭州华三通信技术有限公司 Virtual machine access device and method
CN104951694A (en) * 2014-03-24 2015-09-30 华为技术有限公司 Isolation method and apparatus for management virtual machine
CN105162788A (en) * 2015-09-17 2015-12-16 深圳市深信服电子科技有限公司 Network permission control system and method
CN105303102A (en) * 2015-11-03 2016-02-03 浪潮电子信息产业股份有限公司 Secure access method for virtual machine and virtual machine system
CN105491061A (en) * 2015-12-30 2016-04-13 中电长城网际系统应用有限公司 Access control system and method
CN105592088A (en) * 2015-12-24 2016-05-18 北京奇虎科技有限公司 Virtual machine flow monitoring method and device, and terminal
CN106648832A (en) * 2016-12-09 2017-05-10 武汉烽火信息集成技术有限公司 Virtual machine resource utilization improving device and method thereof
CN107636672A (en) * 2015-06-02 2018-01-26 华为技术有限公司 Method in electronic equipment and electronic equipment
CN108521397A (en) * 2018-02-09 2018-09-11 华为技术有限公司 A kind of method and system accessing resource service
CN108833332A (en) * 2018-04-11 2018-11-16 广东省卫生厅政务服务中心 Multi-tenant access control method based on hypervisor
CN108875357A (en) * 2017-12-20 2018-11-23 北京安天网络安全技术有限公司 A kind of program starting method, apparatus, electronic equipment and storage medium
CN109324873A (en) * 2018-09-21 2019-02-12 郑州云海信息技术有限公司 The equipment and storage medium for virtualizing method for managing security, running kernel-driven
CN109358949A (en) * 2018-10-18 2019-02-19 郑州云海信息技术有限公司 A kind of safe controlled device of virtual machine system
CN111209088A (en) * 2020-01-21 2020-05-29 湖南麒麟信安科技有限公司 Agent-free virtual machine peripheral sealing control method, system and medium
CN113157396A (en) * 2021-04-27 2021-07-23 科东(广州)软件科技有限公司 Virtualization service system and method
CN116483505A (en) * 2023-05-08 2023-07-25 江苏云之遥信息科技有限公司 Intelligent multifunctional cloud desktop system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104702566B (en) * 2013-12-06 2021-08-06 苏州海博智能系统有限公司 Authorized use method and device of virtual equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1936845A (en) * 2005-09-19 2007-03-28 联想(北京)有限公司 Method and apparatus for dynamic distribution of virtual machine system input-output apparatus
CN1953391A (en) * 2005-10-20 2007-04-25 联想(北京)有限公司 Computer management system and computer management method
US7380049B2 (en) * 2005-09-06 2008-05-27 Intel Corporation Memory protection within a virtual partition
CN101452397A (en) * 2008-11-27 2009-06-10 上海交通大学 Forced access control method and apparatus in virtual environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7380049B2 (en) * 2005-09-06 2008-05-27 Intel Corporation Memory protection within a virtual partition
CN1936845A (en) * 2005-09-19 2007-03-28 联想(北京)有限公司 Method and apparatus for dynamic distribution of virtual machine system input-output apparatus
CN1953391A (en) * 2005-10-20 2007-04-25 联想(北京)有限公司 Computer management system and computer management method
CN101452397A (en) * 2008-11-27 2009-06-10 上海交通大学 Forced access control method and apparatus in virtual environment

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929690A (en) * 2012-11-07 2013-02-13 曙光云计算技术有限公司 Method and device for access control of virtual machines
CN103020501A (en) * 2012-11-14 2013-04-03 曙光云计算技术有限公司 Access control method and access control device of user data
CN103020501B (en) * 2012-11-14 2017-02-15 无锡城市云计算中心有限公司 Access control method and access control device of user data
CN103458003A (en) * 2013-08-15 2013-12-18 中电长城网际系统应用有限公司 Access control method and system of self-adaptation cloud computing environment virtual security domain
CN103458003B (en) * 2013-08-15 2016-11-16 中电长城网际系统应用有限公司 A kind of self adaptation cloud computing environment virtual secure domain browsing control method and system
CN103701822A (en) * 2013-12-31 2014-04-02 曙光云计算技术有限公司 Access control method
US10270782B2 (en) 2014-03-04 2019-04-23 Hewlett Packard Enterprise Development Lp Virtual desktopaccess control
CN104901923A (en) * 2014-03-04 2015-09-09 杭州华三通信技术有限公司 Virtual machine access device and method
CN104901923B (en) * 2014-03-04 2018-12-25 新华三技术有限公司 A kind of virtual machine access mechanism and method
CN103870749A (en) * 2014-03-20 2014-06-18 中国科学院信息工程研究所 System and method for implementing safety monitoring of virtual machine system
CN104951694A (en) * 2014-03-24 2015-09-30 华为技术有限公司 Isolation method and apparatus for management virtual machine
US9971623B2 (en) 2014-03-24 2018-05-15 Huawei Technologies Co., Ltd. Isolation method for management virtual machine and apparatus
CN104951694B (en) * 2014-03-24 2018-04-10 华为技术有限公司 A kind of partition method and device for managing virtual machine
CN104484219A (en) * 2014-11-24 2015-04-01 北京奇虎科技有限公司 Strategy issuing method and device in virtual platform
CN104808997A (en) * 2015-05-08 2015-07-29 精航伟泰测控仪器(北京)有限公司 Development system for supporting industrial intelligent control product based on model design
CN107636672A (en) * 2015-06-02 2018-01-26 华为技术有限公司 Method in electronic equipment and electronic equipment
CN105162788A (en) * 2015-09-17 2015-12-16 深圳市深信服电子科技有限公司 Network permission control system and method
CN105162788B (en) * 2015-09-17 2019-07-26 深信服科技股份有限公司 The control system and method for network legal power
CN105303102A (en) * 2015-11-03 2016-02-03 浪潮电子信息产业股份有限公司 Secure access method for virtual machine and virtual machine system
CN105592088A (en) * 2015-12-24 2016-05-18 北京奇虎科技有限公司 Virtual machine flow monitoring method and device, and terminal
CN105491061A (en) * 2015-12-30 2016-04-13 中电长城网际系统应用有限公司 Access control system and method
CN106648832B (en) * 2016-12-09 2020-01-14 武汉烽火信息集成技术有限公司 Device and method for improving resource utilization rate of virtual machine
CN106648832A (en) * 2016-12-09 2017-05-10 武汉烽火信息集成技术有限公司 Virtual machine resource utilization improving device and method thereof
CN108875357A (en) * 2017-12-20 2018-11-23 北京安天网络安全技术有限公司 A kind of program starting method, apparatus, electronic equipment and storage medium
CN108875357B (en) * 2017-12-20 2020-05-12 北京安天网络安全技术有限公司 Program starting method and device, electronic equipment and storage medium
CN108521397A (en) * 2018-02-09 2018-09-11 华为技术有限公司 A kind of method and system accessing resource service
CN108521397B (en) * 2018-02-09 2021-02-12 华为技术有限公司 Method and system for accessing resource service
CN108833332A (en) * 2018-04-11 2018-11-16 广东省卫生厅政务服务中心 Multi-tenant access control method based on hypervisor
CN109324873A (en) * 2018-09-21 2019-02-12 郑州云海信息技术有限公司 The equipment and storage medium for virtualizing method for managing security, running kernel-driven
CN109358949A (en) * 2018-10-18 2019-02-19 郑州云海信息技术有限公司 A kind of safe controlled device of virtual machine system
CN111209088A (en) * 2020-01-21 2020-05-29 湖南麒麟信安科技有限公司 Agent-free virtual machine peripheral sealing control method, system and medium
CN111209088B (en) * 2020-01-21 2023-08-29 湖南麒麟信安科技股份有限公司 Agent-free virtual machine peripheral sealing control method, system and medium
CN113157396A (en) * 2021-04-27 2021-07-23 科东(广州)软件科技有限公司 Virtualization service system and method
CN116483505A (en) * 2023-05-08 2023-07-25 江苏云之遥信息科技有限公司 Intelligent multifunctional cloud desktop system
CN116483505B (en) * 2023-05-08 2024-03-19 江苏云之遥信息科技有限公司 Intelligent multifunctional cloud desktop system

Also Published As

Publication number Publication date
WO2012129904A1 (en) 2012-10-04

Similar Documents

Publication Publication Date Title
CN102707985A (en) Access control method and system for virtual machine system
CN102811239B (en) A kind of dummy machine system and its method of controlling security
US20190097807A1 (en) Network access control based on distributed ledger
US9076013B1 (en) Managing requests for security services
US9177132B2 (en) Capturing data parameters in templates in a networked computing environment
US10242221B1 (en) System and method for automatically securing sensitive data in public cloud using a serverless architecture
US10237245B2 (en) Restricting guest instances in a shared environment
US9679119B2 (en) Software utilization privilege brokering in a networked computing environment
US20140380310A1 (en) Sharing usb key by multiple virtual machines located at different hosts
US9270703B1 (en) Enhanced control-plane security for network-accessible services
US20120102572A1 (en) Node controller for an endpoint in a cloud computing environment
CN102411693A (en) Inherited Product Activation For Virtual Machines
US20140059229A1 (en) Remote service for executing resource allocation analyses for computer network facilities
Rastogi et al. Cloud computing implementation: key issues and solutions
CN109284839A (en) Mobile operation management platform safe operation and big data application system under cloud environment
US9710292B2 (en) Allowing management of a virtual machine by multiple cloud providers
CN104301289B (en) Equipment for safety information interaction
CN105184154A (en) System and method for providing cryptogrammic operation service in virtualized environment
US20140351409A1 (en) Monitoring client information in a shared environment
Arunarani et al. FFBAT: A security and cost‐aware workflow scheduling approach combining firefly and bat algorithms
TW201439917A (en) Expansion of services for a virtual data center guest
US20120323821A1 (en) Methods for billing for data storage in a tiered data storage system
WO2017107792A1 (en) Data information processing method, and data storage system
US9838430B1 (en) Temporarily providing a software product access to a resource
US9253056B2 (en) System to enhance performance, throughput and reliability of an existing cloud offering

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20121003

RJ01 Rejection of invention patent application after publication