WO2016112605A1 - Four-layer computing virtualization method and device - Google Patents

Four-layer computing virtualization method and device Download PDF

Info

Publication number
WO2016112605A1
WO2016112605A1 PCT/CN2015/078634 CN2015078634W WO2016112605A1 WO 2016112605 A1 WO2016112605 A1 WO 2016112605A1 CN 2015078634 W CN2015078634 W CN 2015078634W WO 2016112605 A1 WO2016112605 A1 WO 2016112605A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual
layer
disk
application
virtual volume
Prior art date
Application number
PCT/CN2015/078634
Other languages
French (fr)
Chinese (zh)
Inventor
张维加
Original Assignee
张维加
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 张维加 filed Critical 张维加
Publication of WO2016112605A1 publication Critical patent/WO2016112605A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Definitions

  • the invention belongs to the technical field of cross-device computer system and security virtualization, and can be used for protecting equipment and information security and realizing rapid cross-device use of applications, protecting information security of mobile devices, and realizing application service through network (Software) As a service, abbreviated SaaS), and permission control for virtualized applications.
  • Mobile devices and mobile storage devices have rapidly gained popularity in recent years, but there are several serious problems, mainly security issues, slow speed issues, and how to implement cloud applications across devices, especially how to implement private clouds.
  • Encryption technology ensures that only those who have the key can operate on the file.
  • some manufacturers have developed mobile storage devices with security measures such as fingerprint identification and encrypted partitioning. If they are accidentally lost, ordinary people may not be able to directly access the data, but for professionals, these data security measures It is easy to be broken.
  • password cracking technology whether you use Word, WPS and other password functions to set passwords, or use encryption software to encrypt files, folders or even entire files, it is possible to crack passwords, but the length of time .
  • the two basic elements of encryption technology are encryption algorithms and encryption keys. Encryption can be divided into symmetric encryption and asymmetric encryption according to whether the sender/receiver encryption key/decryption key are the same. Symmetric encryption Confidential, it means that the sender and receiver use the same key to encrypt and decrypt the data.
  • Symmetric encryption Confidential, it means that the sender and receiver use the same key to encrypt and decrypt the data.
  • the security of symmetric encryption depends on the security of the key. As long as the key is secure, even if the opponent knows that the ciphertext and encryption algorithm can obtain the plaintext without the key. It is worth noting that there are two criteria for the security of encryption. It is generally considered that as long as the time taken to crack the key exceeds the validity period of the encrypted information itself or the cost of cracking the ciphertext exceeds the value of the secret text, then The encryption algorithm can be considered safe.
  • Access control Generally, it needs to be combined with identity authentication. The basic idea of the access control mechanism is to give the file and management personnel the corresponding authority. Only the permission to operate the file can operate the file. Access control technology is an indispensable part of information security technology. The basic idea of access control technology is to control user access to resources according to the permissions owned by users. Access control technology can be roughly divided into a flat structure and a hierarchical structure. The characteristics of the flat structure are that the user rights and resources are directly related. The characteristics of the hierarchical structure are that the user rights and resources do not directly cope with each other.
  • the slow speed here mainly refers to the problem that the mobile device is slow after carrying the virtualization work.
  • the mobile device itself is not fast, and the speed of the connection interface with the computer is also normal. Virtualization will cause further slowdown in speed, which will inevitably have a big impact on the user experience.
  • each application runs with the hardware of the virtual machine, and for a virtual machine running on a higher configuration of dual-core 2G memory, the hardware setting is generally not higher than half of the host computer, that is, single core. 1G memory (otherwise the host computer will get stuck), then you can imagine that on such a poor performance virtual machine, What program is enough to run? What speed will these programs be?
  • Microsoft's Windows 8 Enterprise Edition features Windows to Go, which allows enterprise-class users to create USB-based systems, but the speed of the device is so high that the cost of implementation is actually high.
  • Cloud computing is the product of the integration of traditional computer technology and network technology such as grid computing, distributed computing, virtualization, parallel computing, utility computing, load balancing, and network storage.
  • the purpose of cloud computing is to integrate multiple low-cost computing entities into a powerful "cost-effective" computer application system through the network, and distribute this powerful computing power to advanced business models such as SaaS, PaaS, IaaS, and MSP. In the hands of end users. This feature is often referred to as the use of IT infrastructure like hydropower.
  • the first is cloud storage.
  • Apple iCloud, Google, Amazon Cloud Drive, Windows Live SkyDrive and Dropbox have introduced large-capacity storage space.
  • the size of the cloud storage area G and the network transmission speed calculated in M per second are still insufficient. Or this may be due to the inevitable result of the development speed of the hardware storage and transmission interface is faster than the development speed of the network environment, but it is undeniable that cloud storage is much more convenient in file interaction and fault maintenance than using local storage. , so it is an effective and reliable supplement to local storage.
  • the second phase of cloud computing has entered one of the latest topics, the cloud application phase.
  • the cloud application phase In recent years, a number of well-known VMware, ChromeOS, VMforce and other cloud computing applications have made great contributions to the development of cloud applications.
  • the speed of a typical wide-area LAN can support online play, online editing of documents, and even online mini-games, but it is impossible to do more practical work and entertainment.
  • the speed of the network cannot support playing large 3D games online or performing Matlab work program operations. It is true that the speed of the network will develop, but it is undeniable that the complexity and computational complexity of programs and games grows faster.
  • the security of the application is also a problem.
  • Security issues are often the most common obstacle when organizations consider deploying cloud applications. According to IDC's survey, 90% of companies believe that security is the biggest obstacle to deploying the cloud.
  • the cloud mode must first provide users with a secure service. This means that the platform on which the application resides must first be a secure platform and a platform that can be trusted, and the user will choose to transfer the application to the cloud.
  • Personal cloud computing is an extension of cloud computing in the personal field. It is Internet-centric personal information processing, which organizes, stores, distributes and re-processes various personal information through the Internet. Like all "clouds," a personal cloud consists of servers, terminals, applications, and personal information. Personal cloud computing has the same characteristics as general cloud computing, such as sharing, random access, and extensibility.
  • the present invention proposes a method for implementing computational virtualization using a four-layer structure, which is established.
  • Four independent virtualization layers namely the mobile system layer, the virtual volume encryption layer, the virtual application layer, and the cache layer, obtain a fast and shutdown system layer by loading the read-only mirror system into the Ramdisk to start the operation.
  • the program is not installed at the system layer, but by virtualizing the application environment to the inside of the virtual disk and extracting the program. Need the Library and the registry to implement the virtual application.
  • the virtual application layer is nested in the virtual volume encryption layer.
  • the virtual volume encryption layer and the mobile system layer exist directly on the network or the mobile storage device. The two are stored separately and are not included.
  • the disk that is extracted from the runtime to the memory virtualization is accelerated as a cache. See Figure 1.
  • the device does not install an operating system. Instead, take a separate system layer of the mobile, provide only the system kernel environment, do not install the application, restore it after shutdown or exit.
  • the mobile system layer can be implemented by a read-only mirror system.
  • the runtime is loaded into Ramdisk.
  • the virtual volume encryption layer is implemented by creating a virtual volume and controlling its access. When the system accesses the encryption layer, the volume file is mapped to a disk partition in the system.
  • the application layer is implemented by virtual machine or virtualized application environment and extracting the library runtime and registry required by the program, so that the programs deployed at the application layer can be used across systems. It can also be implemented via USB boot.
  • the device does not directly use the physical disk, but through the virtual disk, the computing and application are based on the virtual disk. All I/O operations flowing into and out of the virtual disk are controlled by the client.
  • the virtual volume (virtual disk) encryption layer adopts a multi-user different permission key. Each user has a client's account and password. The client applies different passwords and permissions for different users. The rights include access to different files. Permissions, IP bindings, usage counts, modification permissions, copy permissions, usage expiration dates, etc.
  • the virtual volume encryption layer can have multiple modes for different needs, and the virtual volume encryption layer is required for high performance requirements and general security protection requirements.
  • the single-pass authentication mode is used to verify the key when the user accesses the virtual volume. After passing the file, the volume file is directly mapped to the disk partition in the system, and the read-write authentication is no longer performed. For high security protection needs, performance is sacrificed properly.
  • the virtual volume encryption layer uses the read-write authentication mode.
  • the data is decrypted when passing the virtual disk driver, and the file is in clear text.
  • the form is submitted to the user; when the user writes the file, the virtual disk driver encrypts the data and passes it to the device driver, and the final data is stored in ciphertext as a virtual volume on the physical disk.
  • the device's application deployment is also based on a virtual application layer. Different from the virtual machine, this virtual application layer is not virtual hardware, and no virtual system.
  • the application virtual mode is to run the application across the device by virtualizing the application environment, redirecting the registry and the library file.
  • the virtual application layer relies on the mobile system layer to provide the system, and relies on the virtual disk layer to authenticate and decrypt the loaded virtual disk as a carrier, and the application layer stores the inside of the virtual volume.
  • This virtual mode is based on the application, and the internal call relationship of the application is self-contained. Therefore, for the virtual application layer program, in order to obtain a faster speed effect, it is convenient to use part of the memory virtualization to accelerate the disk for caching. Different from the cache in the general computing device, the user does not need to accumulate the data and the frequency of use. Since the application has been completely virtualized, the runtime can directly extract the application to the memory ramdisk or to the high-speed flash memory. Direct fast cache.
  • the storage device used may be any mobile device, or may have a USB interface, so that it can be connected to the computer by USB protocol, or can have a wireless network card, so as to be able to connect with the computer by wireless protocol, such as home network storage.
  • the main advantage of the solution of the present invention is that a low-cost, low-threshold virtualized application device with good performance, convenient use, comprehensive security permissions, and high privacy can work across devices.
  • a storage device can be implemented by the solution.
  • the system kernel runs from memory, and the speed is fast.
  • the virtual machine architecture is not used, the hardware configuration and resources such as the CPU processor are not pre-empted, and the application program can also enjoy the complete operation.
  • the host computer hardware configuration due to the extraction of a separate application layer, cache acceleration, the virtualized application can be run faster.
  • Security permissions are comprehensive: Since the application layer is placed inside the virtual volume encryption layer, all permission controls can be implemented through the virtual volume encryption layer. For example, different passwords and permissions are applied for different users, and the permissions include access rights to different files, IP binding, usage times, modification rights, copy rights, usage expiration dates, and the like.
  • the system layer is a read-only image. It is loaded into memory and runs without any trace after shutdown.
  • the application layer runs in the virtual volume encryption layer. All running traces are in the virtual volume encryption layer. After leaving and exiting, there is no trace left. On the host.
  • the device has three working modes: first, direct access to the system layer, suitable for system recovery and emergency use; second, accessing the system layer, accessing the encryption layer from the system layer, if necessary, accessing the application layer, suitable for mobile work Third, do not access the system layer, connect to other computers, such as through the network to other computers, access the encryption layer from the HOST computer system, identity authentication and then access according to the permissions of the corresponding identity Application layer, suitable for software service, and enterprise cloud.
  • the four levels have a nested combination of structures, such as the virtual application layer is in the virtual volume encryption layer, and the virtual volume encryption layer is stored separately from the mobile system layer.
  • the virtual application layer is not a clone of virtual machine technology, but a redesigned virtualization structure. It has no virtual hardware, no virtual system layer, but a mobile image system. The virtual disk layer has been replaced, and the virtual application support capability is better after replacement, which is better than the virtual machine. The speed is also faster.
  • the system kernel runs from memory, which is fast; secondly, it does not pre-empt hardware configuration and resources such as CPU processor, and does not require the virtual machine to wait for boot. The application can also enjoy the complete host computer hardware configuration.
  • Extracting separate application layers for cache acceleration allows you to run virtualized applications faster. In the past, the industry generally believed that virtual machines slow down the running speed of programs. This view also hindered the development of mobile application devices.
  • the four-layer virtualization method is used instead of the virtual machine to support the speed problem.
  • the virtual computing method achieves smooth and fast operation on some old machines with insufficient hardware resources running traditional virtual machines, such as the 256MB memory Pentium Tualatin machine. The effect that I dare not expect.
  • this solution unexpectedly solves the problem of porting programs and SaaS based on the network.
  • Migration problem In the traditional virtual machine technology, the application needs to be copied into the virtual machine and installed into the virtual machine, and has a dependency relationship with the virtual machine, which is not easy to be transplanted, and is free from this in the virtual application layer of the solution.
  • Dependency The problem of providing SaaS based on the network: Even in today's high-speed network, the virtual machine is still unable to load and run through the network, and the virtual application in this solution is self-contained, and the user can access the virtual volume encryption layer through the Internet. Log in to the client through the network and load the virtual application. And this kind of SaaS does not damage the server-side system, similar to the P2P distribution application.
  • the virtual disk layer is not a clone of the original virtual disk technology, in order to achieve permission control and at the same time let The virtual application runs freely and has been redesigned to greatly improve security control capabilities and application operational capabilities.
  • the virtual volume itself is encrypted, and it is not decrypted after the identity authentication, but only manages the I/O through the client control. It still cannot directly access the client. After the client checks the identity by the key, the virtual disk is opened, but the virtual disk is not decrypted.
  • the user must perform all file operations and application startup operations through the client, and set the I/O permission limit on the client, such as giving different permissions to different users, such as copying, not deleting, etc., to implement the permission control.
  • the cache layer in this solution is essentially copy and redirection, and the part of the virtual application layer that is being used to virtualize the self-contained application.
  • Common file extraction is transferred to the memory virtual disk and redirected to increase the speed of the application, in units of applications.
  • the hardware itself is based on a flash disk with a USB interface and a Wifi network card that can be connected to a typical computer or mobile device via USB or wireless sharing.
  • the four-layer virtualization implementation is divided into a boot partition (USB-HDD partition) and a writable storage partition (generally removable disk type) by mass production work on the flash memory, and the boot partition is started.
  • a boot partition USB-HDD partition
  • writable storage partition generally removable disk type
  • the runtime loads the mirror system into the memory Ramdisk, and stores a virtual volume in the storage partition.
  • the virtual machine is installed in the virtual volume (or established).
  • the virtual volume folder stores an authenticated client. When the user runs the client and is authenticated by the key, the virtual volume is loaded as a disk Y shared on the network, but does not support direct access. Need to be accessed via a resource manager within the client that is specifically made for this virtual volume.
  • the resource manager in the client can open the virtual machine program, as well as the control panel program for the installation and management of the virtualized application, which is responsible for the installation, uninstallation, management, directory indexing, and operation of the application.
  • These virtualized applications can be run directly by simply clicking from the control panel, because the registry and environment files and library files needed for their operation are already stored in the virtual volume, pointing directly when the program is called. Files to these virtual volumes.
  • the sample device also supports a fast running mode, which can be selected by the user.
  • the implementation mode is as follows: after the control panel is started, the memory virtualization operation is performed at the same time, and a part of the memory is divided into a virtual disk Ramdisk.
  • the program since the program has been virtualized, it contains the registry and environment files and library files needed for its operation, so it can be extracted into the above-mentioned memory virtual disk.
  • This one-step loading will cause the application to start on the sample device to be slow, but will run very fast after being loaded into the memory virtual disk.
  • Memory is volatile, so Save the cached content in the ramdisk to the image file before the computer is shut down, place it in the storage partition, and load it the next time it is booted.
  • this mode In addition to the ability to set whether the virtual application is running in cache mode, you can also set which cache mode to run in the control panel. In addition to the above modes, there is a flash acceleration mode. Separate a portion of the flash memory into a .dat-terminated packet. If you set it to run in flash-accelerated cache mode in the previous step, the application running from the virtual application layer will be redirected to the .dat data according to the mode cache. package. However, due to the characteristics of the flash memory and the interface speed limit, this mode generally does not extract the entire application after opening, but redirects small files and random files.
  • the computer can boot the mirrored operating system in the sample device to Ramdisk via USB.
  • this system layer is completely read-only, but this does not affect our daily work.
  • the mirror system runs in memory not only completely read-only, it does not infect viruses or leave traces, and the memory speed is fast.
  • the mirroring system accesses the storage partition of the sample device, and can access the client program of the virtual volume encryption layer, run the client program, authenticate the password, obtain the authority of the corresponding key user, and load the virtual volume encryption layer into the network disk Y. .
  • the network disk Y is not allowed to be directly accessed by the resource manager.
  • the user accesses the resources through the client, and opens the application layer's control panel program, from which the program list is viewed, and the application is run. All the work that the local operating system can do can be done in the layered mode of the sample device, except that all changes to the application and workspace, such as saving data, setting preferences, installing new programs, etc.
  • the application layer is completed, and the file operations are completed at the virtual volume encryption layer, leaving no trace on the machine after the shutdown is exited.
  • This mode is mainly used to complete some customer service work, mobile engineers, maintenance anti-virus work, business machine operations and carrying work space, as shown in Figure 2.
  • the computer can discover the sample device in the network device, present as a computer folder on the network, enter the network folder, and access the virtual volume encryption.
  • the client program of the layer run the client program, authenticate the password, obtain the permissions of the corresponding key user, and load the virtual volume encryption layer into the network disk Y.
  • the network disk Y is not allowed to be directly accessed by the resource manager.
  • the user accesses the resources through the client, and opens the application layer's control panel program, from which the program list is viewed, and the application is run. Multiple users can access and use different permissions.
  • Figure 1 Schematic diagram of the hierarchical structure.
  • FIG. 1 Schematic diagram of the sample device.
  • FIG. 1 Schematic diagram of the virtualized program operation in mode 2 of the sample device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A four-layer computing virtualization method and device. Four independent virtualization layers, which are respectively a mobile system layer, a virtual volume encryption layer, a virtual application layer and a cache layer, are virtualized to achieve cross-device mobile computing. A read only mirror system is loaded into a Ramdisk and started for running to obtain a system layer that can be restored quickly upon shutdown; operation is not performed on a physical disk, but instead is implemented by creating a virtual volume, verifying keys, loading the virtual volume as a virtual disk and controlling access of the virtual volume; programs are not installed in the system layer, and a virtual application is implemented by entering the virtual disk through a virtual application environment and extracting a Library and a registry required by the programs. The virtual application layer is nested inside the virtual volume encryption layer, and the virtual volume encryption layer and the mobile system layer directly exist in a network or mobile storage device and are stored separately without mutual containing. The programs inside the virtual application layer have been subjected to virtualization redirection and thus are extracted to a disk virtualized from memory as a cache for accelerated running.

Description

一种四层计算虚拟化的方法与设备Method and device for four-layer computing virtualization 技术领域Technical field
本发明属于跨设备计算机制与安防虚拟化的技术领域,可用于保护设备与信息安全并实现应用程序的快速跨设备使用,保护移动设备的信息安全,并能实现应用程序通过网络服务化(Software as a service,简写SaaS),以及虚拟化应用程序的权限控制。The invention belongs to the technical field of cross-device computer system and security virtualization, and can be used for protecting equipment and information security and realizing rapid cross-device use of applications, protecting information security of mobile devices, and realizing application service through network (Software) As a service, abbreviated SaaS), and permission control for virtualized applications.
背景技术Background technique
移动设备与移动存储设备在近年快速普及,但是存在几个严重的问题,主要的分别有安全性的问题,速度慢的问题,以及跨设备实现云应用尤其是如何实现私有云的问题。Mobile devices and mobile storage devices have rapidly gained popularity in recent years, but there are several serious problems, mainly security issues, slow speed issues, and how to implement cloud applications across devices, especially how to implement private clouds.
背景一、首先是安全性问题,及其导致的应用部署担忧。Background 1. The first is security issues and the resulting application deployment concerns.
近年来,随着随着信息技术的不断发展,各类计算机层出不穷,计算机的应用领域也深入到了社会的各个层面。根据美国康奈尔大学计算机科学系工程教授JohnHopcroft教授总结,当前计算机领域存在两个明显的趋势,分别是智能移动设备的大量使用,以及云计算的发展。然而,伴随着这两个趋势,用户终端上也就凸显出了相应的两个问题,迫切需要可靠的解决方案。移动存储设备,尤其是移动硬盘与U盘,由于其价格便宜、携带使用方便得到了广泛的应用。内网中机密数据以电子文档的形式存储在电脑上,在方便了内部人员对信息的获取、共享和传播的同时,也存在重要信息通过内部途径泄密的风险。In recent years, with the continuous development of information technology, various types of computers have emerged in an endless stream, and the application fields of computers have also penetrated into all levels of society. According to Professor John Hopcroft, professor of computer science at Cornell University in the United States, there are two obvious trends in the current computer field, namely the massive use of smart mobile devices and the development of cloud computing. However, along with these two trends, the user terminal has highlighted two corresponding problems, and a reliable solution is urgently needed. Mobile storage devices, especially mobile hard disks and USB flash drives, have been widely used due to their low price and ease of use. Confidential data in the intranet is stored on the computer in the form of electronic documents. While facilitating the acquisition, sharing and dissemination of information by internal personnel, there is also the risk that important information will be leaked through internal channels.
移动存储介质的使用者也经常忽视对移动设备的查杀毒工作,这也会给移动存储介质的安全也造成一定程度的影响。在实际的使用中,移动存储介质不可避免地会感染一些外在的计算机病毒,如果不能及时有效地查杀病毒,轻易将染毒文件在单位内计算机打开,就很容易将病毒传播到单位内部网中,影响到单位内计算机的应用操作。Users of mobile storage media often overlook the anti-virus work of mobile devices, which also has a certain degree of impact on the security of mobile storage media. In actual use, the mobile storage medium will inevitably infect some external computer viruses. If the virus cannot be detected and killed in time and effectively, and the infected file is easily opened in the unit, it is easy to spread the virus inside the unit. In the network, it affects the application operation of the computer in the unit.
为了对抗泄密和感染病毒,对移动存储介质来说,电子文件的安全保护目前主要采用内核加密、身份认证、访问控制和安全审计等技术来实现:In order to combat leaks and infections, for mobile storage media, electronic file security is currently implemented using technologies such as kernel encryption, identity authentication, access control, and security auditing:
1.加密技术,保证只有拥有密钥的人员才能对文件进行操作。一些制造商为了提高产品的技术含量,开发出具有指纹识别、加密分区等安全措施的移动存储设备,如果不慎丢失,一般人可能无法直接获取其中数据,但对专业人员来说,这些数据安全措施是容易被攻破的。随着密码破解技术的发展,不论是运用Word、WPS等自带的密码功能设置密码,还是利用加密软件对文件、文件夹甚至全盘进行加密,都有可能对密码进行破解,只是时间长短的问题。1. Encryption technology ensures that only those who have the key can operate on the file. In order to improve the technical content of products, some manufacturers have developed mobile storage devices with security measures such as fingerprint identification and encrypted partitioning. If they are accidentally lost, ordinary people may not be able to directly access the data, but for professionals, these data security measures It is easy to be broken. With the development of password cracking technology, whether you use Word, WPS and other password functions to set passwords, or use encryption software to encrypt files, folders or even entire files, it is possible to crack passwords, but the length of time .
加密技术的两个基本元素是加密算法和加密密钥。加密按照发送方/接收方的加密密钥/解密密钥是否相同可以将加密技术分为对称加密和非对称加密。对称加密也称为私钥加 密,它是指发送方、接收方采用相同的密钥对数据进行加密、解密。对称加密的安全性取决于密钥的安全性,只要密钥是安全的那么即使对手知道了密文和加密算法在没有密钥的情况下也不可能获得明文。值得注意的是加密方式的安全性判别有两个标准,通常可以认为只要破解密钥所花费的时间超过了加密信息本身的有效期或者破解密文所花费的成本超过了密文本身的价值,那么可以认为该加密算法就是安全的。The two basic elements of encryption technology are encryption algorithms and encryption keys. Encryption can be divided into symmetric encryption and asymmetric encryption according to whether the sender/receiver encryption key/decryption key are the same. Symmetric encryption Confidential, it means that the sender and receiver use the same key to encrypt and decrypt the data. The security of symmetric encryption depends on the security of the key. As long as the key is secure, even if the opponent knows that the ciphertext and encryption algorithm can obtain the plaintext without the key. It is worth noting that there are two criteria for the security of encryption. It is generally considered that as long as the time taken to crack the key exceeds the validity period of the encrypted information itself or the cost of cracking the ciphertext exceeds the value of the secret text, then The encryption algorithm can be considered safe.
2.访问控制。一般需要和身份认证相结合,访问控制机制的基本思想是对文件和管理人员赋予相应的权限,只有具备对文件操作的权限才能对文件进行操作。访问控制技术是信息安全技术中不可或缺的一环,访问控制技术的基本思想是根据用户所拥有的权限来控制用户对资源的访问。访问控制技术大体上可以分为扁平化结构和层次化结构,扁平化结构的特点是用户权限和资源直接关联,层次化结构的特点是用户权限和资源之间并不直接祸合。2. Access control. Generally, it needs to be combined with identity authentication. The basic idea of the access control mechanism is to give the file and management personnel the corresponding authority. Only the permission to operate the file can operate the file. Access control technology is an indispensable part of information security technology. The basic idea of access control technology is to control user access to resources according to the permissions owned by users. Access control technology can be roughly divided into a flat structure and a hierarchical structure. The characteristics of the flat structure are that the user rights and resources are directly related. The characteristics of the hierarchical structure are that the user rights and resources do not directly cope with each other.
3.安全审计。只有对电子文件的操作过程进行记录才能保证在电子文件泄漏事件发生后对责任人进行处理,从而降低泄漏事故发生的概率。但是,移动存储设备的管理方面缺乏有效的管理监督机制和保密机制。3. Security audit. Only the recording of the operation process of the electronic file can ensure that the responsible person is dealt with after the electronic file leakage event, thereby reducing the probability of the leakage accident. However, the management of mobile storage devices lacks effective management oversight mechanisms and confidentiality mechanisms.
但是,这些移动设备的安全防护既会带来更高的成本,也会给移动设备方便的使用特性带来麻烦。However, the security of these mobile devices will bring higher costs and trouble for the convenient use of mobile devices.
这些安全性问题,同时也阻挠了移动设备上应用与运算的发展。许多情景下,迫切需要移动的程序运算与工作展开,但是由于严重的安全问题,而不得不作罢。一个典型的案例就是Windows to Go在许多商业公司被禁止。These security issues also hinder the development of applications and computing on mobile devices. In many scenarios, there is an urgent need for mobile program operations and work development, but due to serious security issues, they have to give up. A typical case is that Windows to Go is banned in many commercial companies.
背景二、速度慢的问题。Background 2. The problem of slow speed.
此处的速度慢主要指的是移动设备承载虚拟化工作后速度慢的问题。移动设备本身速度都不快,与计算机的连接接口的速度也一般。而虚拟化会造成速度的进一步减慢,不可避免地给用户体验带来很大的影响。The slow speed here mainly refers to the problem that the mobile device is slow after carrying the virtualization work. The mobile device itself is not fast, and the speed of the connection interface with the computer is also normal. Virtualization will cause further slowdown in speed, which will inevitably have a big impact on the user experience.
传统的虚拟机对于宿主计算机的性能有较高的需求,以致在一些老旧电脑上不足以启动运行。因为传统的虚拟机都需要占用至少一颗CPU,一部分独占内存,来虚拟出一台完整的计算机,并需要在其中安装完整的操作系统,再在其上安装操作程序,这样很耗硬件资源,很慢!Traditional virtual machines have a high demand for the performance of the host computer, so that it is not enough to start running on some old computers. Because traditional virtual machines need to occupy at least one CPU, part of the exclusive memory, to virtualize a complete computer, and need to install a complete operating system in it, and then install the operating program on it, which consumes hardware resources. very slow!
并且运行应用程序前启动虚拟机时需要进行一个很长的虚拟机开机时间,等待很久。And when you start the virtual machine before running the application, you need to start a very long virtual machine boot time, waiting for a long time.
而且每一个应用程序运行的时候使用的是虚拟机的硬件设备,而对于一个拟在双核2G内存的较高配置上运行的虚拟机,其硬件设置一般也不宜高于宿主计算机的一半即单核1G内存(否则宿主计算机会陷入卡顿),那么可以设想,在这样低劣性能的虚拟机上,能 够运行什么程序?这些程序又会是什么速度?Moreover, each application runs with the hardware of the virtual machine, and for a virtual machine running on a higher configuration of dual-core 2G memory, the hardware setting is generally not higher than half of the host computer, that is, single core. 1G memory (otherwise the host computer will get stuck), then you can imagine that on such a poor performance virtual machine, What program is enough to run? What speed will these programs be?
这就是传统虚拟机仅仅用于工控调试的原因。This is why traditional virtual machines are only used for industrial control debugging.
比如,微软的Windows 8企业版具有Windows to Go的功能,允许企业级用户创建基于USB的系统,但是对设备速度的要求非常高,使得其实现成本其实很高。For example, Microsoft's Windows 8 Enterprise Edition features Windows to Go, which allows enterprise-class users to create USB-based systems, but the speed of the device is so high that the cost of implementation is actually high.
背景三、跨设备实现云应用,尤其是如何实现私有云的问题。Background 3. Implement cloud applications across devices, especially how to implement private clouds.
早在1997年,南加州大学教授Ramnath K.Chellappa就提出了云计算的第一个学术定义,他认为“云”是一种计算模式,计算的界限是由经济合理性决定的,而不是由技术水平来决定。As early as 1997, Professor of Southern California University Ramnath K. Chellappa proposed the first academic definition of cloud computing. He believed that "cloud" is a computing model, and the boundary of calculation is determined by economic rationality, not by The level of technology is determined.
云计算是网格计算、分布式计算、虚拟化、并行计算、效用计算、负载均衡、网络存储等传统计算机技术和网络技术发展融合的产物。云计算的目的是通过网络把多个低成本的计算实体整合成一个具有强大“性价比”的计算机应用系统,并借助SaaS、PaaS、IaaS、MSP等先进的商业模式把这强大的计算能力分布到终端用户手中。这种特性经常被称为像水电一样使用IT基础设施。Cloud computing is the product of the integration of traditional computer technology and network technology such as grid computing, distributed computing, virtualization, parallel computing, utility computing, load balancing, and network storage. The purpose of cloud computing is to integrate multiple low-cost computing entities into a powerful "cost-effective" computer application system through the network, and distribute this powerful computing power to advanced business models such as SaaS, PaaS, IaaS, and MSP. In the hands of end users. This feature is often referred to as the use of IT infrastructure like hydropower.
最先是云存储。苹果iCloud,Google,亚马逊Cloud Drive,Windows Live SkyDrive和Dropbox纷纷推出了大容量的存储空间。虽然相比于目前动辄数T的本地存储空间,以及本地已经每秒数G的本地或USB传输速度,云存储的区区数G的大小和以M每秒计算的网络传输速度显得还很不足,或者说这也可能是由于硬件存储与传输接口的发展速度总是会快于网络环境发展速度造成的必然结果,但是不可否认的是,云存储在文件交互、故障维护上比用本地存储方便很多,所以是本地存储的有效可靠的补充。The first is cloud storage. Apple iCloud, Google, Amazon Cloud Drive, Windows Live SkyDrive and Dropbox have introduced large-capacity storage space. Although compared to the local storage space of the current T, and the local or USB transmission speed of the local G every second, the size of the cloud storage area G and the network transmission speed calculated in M per second are still insufficient. Or this may be due to the inevitable result of the development speed of the hardware storage and transmission interface is faster than the development speed of the network environment, but it is undeniable that cloud storage is much more convenient in file interaction and fault maintenance than using local storage. , so it is an effective and reliable supplement to local storage.
云计算的第二个阶段,就进入了目前最新的话题之一,云应用的阶段。近年来较为知名的VMware,ChromeOS,VMforce等一系列云计算应用产品,均为云应用的发展做出了较大的贡献。The second phase of cloud computing has entered one of the latest topics, the cloud application phase. In recent years, a number of well-known VMware, ChromeOS, VMforce and other cloud computing applications have made great contributions to the development of cloud applications.
但是目前云端应用的缺陷还是很明显的。举例如下。However, the shortcomings of cloud applications are still very obvious. An example is as follows.
首先,极高的服务器资源需求与技术要求,因此集中控制在少数大公司手里。比如谷歌的ChromeBook等。一般的中小企业不具备实现能力。这也使得云应用成本很高,目前不能普及。First of all, the extremely high server resource requirements and technical requirements, so centralized control in the hands of a few large companies. For example, Google's ChromeBook and so on. The average SME does not have the ability to achieve. This also makes cloud applications costly and is currently not universal.
第二,依赖于LAN的高速。与局域网不同,一般的广域的LAN的速度能够支持在线播放、在线编辑文档、甚至在线小游戏,但是无法进行更具实用性的工作与娱乐。网络的速度无法支持在线玩大型的3D游戏或者进行Matlab工作程序运算。诚然网络的速度会发展,但是不可否认的是程序与游戏的复杂性与计算量增长的更快。 Second, it depends on the high speed of the LAN. Unlike LANs, the speed of a typical wide-area LAN can support online play, online editing of documents, and even online mini-games, but it is impossible to do more practical work and entertainment. The speed of the network cannot support playing large 3D games online or performing Matlab work program operations. It is true that the speed of the network will develop, but it is undeniable that the complexity and computational complexity of programs and games grows faster.
第三,应用存在很大的局限性和兼容性。现在的Google ChromeBook像一个网络化的DOS(DiskOperation System磁盘操作系统),它的启动速度够快,但是局限太多,支持的东西太少。谷歌表示,“所有Chrome OS应用都采用Web技术”。因此Chrome OS能够支持的应用必须是可以基于Web运行的。这也就是说用户购买的实质上是一个浏览器。而微软服务器的RemoteApp和Critex主导的远程XenApp模式则存在很大的兼容性问题。Third, applications have significant limitations and compatibility. The current Google ChromeBook is like a networked DOS (DiskOperation System), which starts fast enough, but has too many limitations and supports too few things. Google said, "All Chrome OS applications use Web technology." Therefore, applications that Chrome OS can support must be web-based. This means that the user is essentially a browser. Microsoft's RemoteApp and Critex-led remote XenApp models have significant compatibility issues.
第四,用户所有数据都存储在网络上,安全性如何获得有效的保障,是一个很大的疑问。假设用户可以相信Google能够提供足够安全的环境,但一些不想置于网上的隐私应该怎么办。Fourth, all the user data is stored on the network, and how to obtain effective security is a big question. Suppose a user can believe that Google can provide a secure enough environment, but what should be done if some privacy is not placed online.
第五,不同用户间如何实现安全隔离,对于低权限低信任的用户又要如何进行权限控制。这些在传统的移动设备或者传统的虚拟机上,都是根本无法实现的。Fifth, how to achieve security isolation between different users, how to control permissions for users with low privilege and low trust. These are simply not possible on traditional mobile devices or traditional virtual machines.
不光光是对用户的权限管制与隔离,云中的应用种类多样,如何保证各种应用之间的安全隔离,同时能否及时阻止包括云内和云外的非法访问,以保证各种异构应用的安全,也是个问题。企业考虑部署云应用时,安全问题常常是最常见的障碍。根据IDC的调查,90%的企业认为安全是部署云的最大障碍。云端模式必须首先能够为用户提供安全的服务,这意味着,应用所在平台必须首先是一个安全的平台、放心的平台,用户才会选择将应用转到云端中。Not only the authority and isolation of users, but also the variety of applications in the cloud, how to ensure the security isolation between various applications, and timely prevent illegal access including cloud and cloud, to ensure various heterogeneous The security of the application is also a problem. Security issues are often the most common obstacle when organizations consider deploying cloud applications. According to IDC's survey, 90% of companies believe that security is the biggest obstacle to deploying the cloud. The cloud mode must first provide users with a secure service. This means that the platform on which the application resides must first be a secure platform and a platform that can be trusted, and the user will choose to transfer the application to the cloud.
所以,背景三问题就是,云应用必须降低成本与技术门槛,并解决安全隔离的问题,否则一般中小公司与个人无法实现云服务。要降低成本,就必须改变计算模式,否则服务方资源会限制服务的载荷。要降低技术门槛,就必须要能够实现个人云。个人云计算是云计算在个人领域的延伸,是以Internet为中心的个人信息处理,即通过Internet对个人的各种信息进行组织、存储、分发和再加工。与所有的“云”一样,个人云由服务器、终端、应用程序和个人信息组成。个人云计算具有与一般云计算相同的特征,例如共享、随意访问和可扩展。同时,它也具有与一般云计算不一样的特点,这是由个人信息的特点决定的。个人信息是私有的,对安全性要求较高。个人拥有大量的图片、视频等多媒体信息,要求存储量大并可以扩展,而对计算能力要求不强。市场调研机构Gartner预测,“个人云”在2014年将取代PC,成为网民数字生活的核心,真正进入应用驱动的时代。Therefore, the background problem is that cloud applications must lower the cost and technical threshold and solve the problem of security isolation. Otherwise, small and medium-sized companies and individuals cannot implement cloud services. To reduce costs, you must change the calculation mode, otherwise the servant resources will limit the load of the service. To lower the technology threshold, you must be able to implement a personal cloud. Personal cloud computing is an extension of cloud computing in the personal field. It is Internet-centric personal information processing, which organizes, stores, distributes and re-processes various personal information through the Internet. Like all "clouds," a personal cloud consists of servers, terminals, applications, and personal information. Personal cloud computing has the same characteristics as general cloud computing, such as sharing, random access, and extensibility. At the same time, it also has different characteristics from the general cloud computing, which is determined by the characteristics of personal information. Personal information is private and requires a high level of security. Individuals have a large amount of multimedia information such as pictures and videos, which requires a large amount of storage and can be expanded, but the computing power is not strong. Market research firm Gartner predicts that "Personal Cloud" will replace PC in 2014 and become the core of digital life for netizens, truly entering the era of application-driven.
对以上三大背景问题的总结,归纳为6个具体的目前存在与移动设备、计算虚拟化与云应用上的问题:The summary of the above three background issues is summarized into six specific problems existing in mobile devices, computing virtualization and cloud applications:
1.移动设备的数据安全问题;1. Data security issues for mobile devices;
2.移动设备的应用部署问题; 2. Application deployment of mobile devices;
3.传统虚拟化占用硬件资源;3. Traditional virtualization takes up hardware resources;
4.传统虚拟化启动时间长,运行速度慢;4. Traditional virtualization has a long startup time and slow running speed;
5.用户之间缺乏安全隔离,不同信任级别用户需要权限控制分级;5. There is no security isolation between users, and users with different trust levels need permission control grading;
6.不同应用之间缺乏隔离,需要避免可能的对系统的操作与攻击;6. Lack of isolation between different applications, need to avoid possible operations and attacks on the system;
当然,在具体的应用场合,某个具体的市场上,一般不会同时遇到上述全部问题,而是遇到其中某个问题成为重点头疼问题。可是,这些问题实际上是结构性内禀缺陷,如果有一种结构性的重建方案,能够同时解决掉上面的问题,那么,就构成一个普适通用的基本结构,可以广泛应用于移动存储设备,便携式计算与SaaS。Of course, in a specific application, in a specific market, it is generally not possible to encounter all of the above problems at the same time, but to encounter one of the problems becomes a key headache. However, these problems are actually structural flaws. If there is a structural reconstruction solution that can solve the above problems at the same time, it constitutes a universal and common basic structure, which can be widely applied to mobile storage devices. Portable computing with SaaS.
发明内容Summary of the invention
为了解决上述的安全防护和权限控制问题,并实现高性能高速度的、低成本的移动应用部署与云应用设备,本发明提出一种采用四层结构来实现计算虚拟化的方法,该方法建立四个独立的虚拟化层次,分别为移动系统层、虚拟卷加密层、虚拟应用层以及缓存层,通过将只读镜像系统载入到Ramdisk启动运行获得一个快速并关机复原的系统层,运算不经过物理磁盘而是以通过创建一个虚拟卷,经验证密钥后载入为虚拟磁盘并控制其访问实现,程序不装到系统层,而是通过虚拟化应用环境到虚拟磁盘内部并抽取程序所需的Library与注册表来实现虚拟应用。虚拟应用层嵌套于虚拟卷加密层内,虚拟卷加密层与移动系统层则直接存在于网络或移动存储设备,两者分开存储,互不包含。对于虚拟应用层内的程序,由于已经经过虚拟化重定向,运行时抽取到内存虚拟化出的磁盘作为缓存加速运行。见附图1。In order to solve the above security protection and permission control problems, and realize high performance, high speed, low cost mobile application deployment and cloud application equipment, the present invention proposes a method for implementing computational virtualization using a four-layer structure, which is established. Four independent virtualization layers, namely the mobile system layer, the virtual volume encryption layer, the virtual application layer, and the cache layer, obtain a fast and shutdown system layer by loading the read-only mirror system into the Ramdisk to start the operation. After the physical disk is created by creating a virtual volume, verifying the key and loading it into a virtual disk and controlling its access, the program is not installed at the system layer, but by virtualizing the application environment to the inside of the virtual disk and extracting the program. Need the Library and the registry to implement the virtual application. The virtual application layer is nested in the virtual volume encryption layer. The virtual volume encryption layer and the mobile system layer exist directly on the network or the mobile storage device. The two are stored separately and are not included. For programs in the virtual application layer, since the virtualized redirection has been performed, the disk that is extracted from the runtime to the memory virtualization is accelerated as a cache. See Figure 1.
为了便携式和安全抗攻击的需要,设备不安装操作系统。而是采取移动的单独系统层,仅提供系统内核环境,上面不安装应用程序,关机或退出后复原。移动系统层可以通过只读镜像系统实现,运行时载入到Ramdisk运行,虚拟卷加密层通过创建一个虚拟卷并控制其访问实现,系统访问加密层时将卷文件映射成系统中的磁盘分区,应用层通过虚拟机或虚拟化应用环境并抽取程序所需的Library运行库和注册表来实现,使得部署在应用层的程序可跨系统使用。也可以通过USB启动实现。For the sake of portability and security against attacks, the device does not install an operating system. Instead, take a separate system layer of the mobile, provide only the system kernel environment, do not install the application, restore it after shutdown or exit. The mobile system layer can be implemented by a read-only mirror system. The runtime is loaded into Ramdisk. The virtual volume encryption layer is implemented by creating a virtual volume and controlling its access. When the system accesses the encryption layer, the volume file is mapped to a disk partition in the system. The application layer is implemented by virtual machine or virtualized application environment and extracting the library runtime and registry required by the program, so that the programs deployed at the application layer can be used across systems. It can also be implemented via USB boot.
并且设备不直接使用物理磁盘,而是通过虚拟磁盘,将运算与应用程序都基于虚拟磁盘。通过客户端控制所有流入流出该虚拟磁盘的I/O操作。And the device does not directly use the physical disk, but through the virtual disk, the computing and application are based on the virtual disk. All I/O operations flowing into and out of the virtual disk are controlled by the client.
虚拟卷(虚拟磁盘)加密层采用多用户不同权限密钥的方式,每个用户有一个客户端的帐号与密码,客户端为不同用户应用不同的密码与权限,所述权限包括对不同文件的访问权限、IP的绑定、使用次数、修改权限、拷贝权限、使用截止日期等。并且,虚拟卷加密层针对不同的需求可以有多种模式,针对高性能需求与一般的安全防护需求,虚拟卷加密层 采用单次认证模式,当用户访问虚拟卷时验证密钥,通过后直接将卷文件映射成系统中的磁盘分区,不再对每次读写认证。针对高安全防护需求,适当牺牲性能,虚拟卷加密层采用每次读写认证模式,当用户从虚拟磁盘分区读取数据文件时,数据在经过虚拟磁盘驱动程序时进行解密操作,将文件以明文形式提交给用户;当用户写入文件时虚拟磁盘驱动程序对数据进行加密后传递给设备驱动程序,最终数据以密文形式存储在物理磁盘上的虚拟卷。The virtual volume (virtual disk) encryption layer adopts a multi-user different permission key. Each user has a client's account and password. The client applies different passwords and permissions for different users. The rights include access to different files. Permissions, IP bindings, usage counts, modification permissions, copy permissions, usage expiration dates, etc. Moreover, the virtual volume encryption layer can have multiple modes for different needs, and the virtual volume encryption layer is required for high performance requirements and general security protection requirements. The single-pass authentication mode is used to verify the key when the user accesses the virtual volume. After passing the file, the volume file is directly mapped to the disk partition in the system, and the read-write authentication is no longer performed. For high security protection needs, performance is sacrificed properly. The virtual volume encryption layer uses the read-write authentication mode. When the user reads the data file from the virtual disk partition, the data is decrypted when passing the virtual disk driver, and the file is in clear text. The form is submitted to the user; when the user writes the file, the virtual disk driver encrypts the data and passes it to the device driver, and the final data is stored in ciphertext as a virtual volume on the physical disk.
除了不使用物理磁盘也不安装操作系统,设备的应用程序部署也基于一个虚拟应用层。不同于虚拟机的是,这个虚拟应用层不虚拟硬件,不虚拟系统,应用虚拟采用的方式为通过虚拟化应用环境、重定向注册表与库文件的方法来跨设备运行应用程序,此时,该虚拟应用层依赖于移动系统层来提供系统,依赖于虚拟磁盘层认证解密后加载的虚拟磁盘作为载体,应用层存储与虚拟卷内部。In addition to not installing a physical disk or installing an operating system, the device's application deployment is also based on a virtual application layer. Different from the virtual machine, this virtual application layer is not virtual hardware, and no virtual system. The application virtual mode is to run the application across the device by virtualizing the application environment, redirecting the registry and the library file. The virtual application layer relies on the mobile system layer to provide the system, and relies on the virtual disk layer to authenticate and decrypt the loaded virtual disk as a carrier, and the application layer stores the inside of the virtual volume.
这种虚拟方式下是以应用为单位的,应用内部的调用关系是自我包含的。因此对于虚拟应用层的程序,为了获得更快的速度效果,可以很方便的利用部分内存虚拟化为磁盘进行缓存的办法加速。不同于一般的计算设备中的缓存,这里并不需要用户习惯数据与使用频率的积累,由于应用已经被完全虚拟化,运行时可以直接通过抽取该应用到内存ramdisk或到高速闪存的方式来进行直接快速缓存。This virtual mode is based on the application, and the internal call relationship of the application is self-contained. Therefore, for the virtual application layer program, in order to obtain a faster speed effect, it is convenient to use part of the memory virtualization to accelerate the disk for caching. Different from the cache in the general computing device, the user does not need to accumulate the data and the frequency of use. Since the application has been completely virtualized, the runtime can directly extract the application to the memory ramdisk or to the high-speed flash memory. Direct fast cache.
所述方案实际上是一套技术方案,可以应用在各类场合。比如用的存储设备可以是任何移动设备,也可以具有USB接口,从而能够与计算机以USB协议连接,也可以具有无线网卡,从而能够与计算机以无线协议连接,如家庭网络存储等。The solution is actually a set of technical solutions that can be applied to various occasions. For example, the storage device used may be any mobile device, or may have a USB interface, so that it can be connected to the computer by USB protocol, or can have a wireless network card, so as to be able to connect with the computer by wireless protocol, such as home network storage.
有益效果与发明创造性Beneficial effect and inventiveness
本发明方案的主要优点在于低成本、低门槛地实现了一个性能好、使用方便、安全权限设置全面、高度隐私的虚拟化应用设备,可以跨设备工作。The main advantage of the solution of the present invention is that a low-cost, low-threshold virtualized application device with good performance, convenient use, comprehensive security permissions, and high privacy can work across devices.
低成本、高度便携:不需要服务器。一个存储设备经过所述方案处理即可实现。Low cost, highly portable: no server required. A storage device can be implemented by the solution.
低门槛:不需要额外的技术设备。Low threshold: no additional technical equipment is required.
性能好、速度快:首先,系统内核从内存运行,速度快;其次,不采用虚拟机架构,不会预占CPU处理器等硬件配置与资源,不需要开机等待,应用程序也可以享有完整的宿主计算机硬件配置;最后,由于抽离出单独的应用层,进行缓存加速,可以较快地运行虚拟化后的应用。Good performance and fast speed: First, the system kernel runs from memory, and the speed is fast. Secondly, the virtual machine architecture is not used, the hardware configuration and resources such as the CPU processor are not pre-empted, and the application program can also enjoy the complete operation. The host computer hardware configuration; finally, due to the extraction of a separate application layer, cache acceleration, the virtualized application can be run faster.
安全权限设置全面:由于应用层放置在虚拟卷加密层内,所有的权限控制都可以通过虚拟卷加密层实现。诸如为不同用户应用不同的密码与权限,所述权限包括对不同文件的访问权限、IP的绑定、使用次数、修改权限、拷贝权限、使用截止日期等均可。 Security permissions are comprehensive: Since the application layer is placed inside the virtual volume encryption layer, all permission controls can be implemented through the virtual volume encryption layer. For example, different passwords and permissions are applied for different users, and the permissions include access rights to different files, IP binding, usage times, modification rights, copy rights, usage expiration dates, and the like.
高度隐私:系统层是只读镜像,通过载入到内存运行,关机后没有痕迹,应用层在虚拟卷加密层中运行,所有运行痕迹都在虚拟卷加密层里,关闭退出后没有残余任何痕迹在主机。Highly confidential: the system layer is a read-only image. It is loaded into memory and runs without any trace after shutdown. The application layer runs in the virtual volume encryption layer. All running traces are in the virtual volume encryption layer. After leaving and exiting, there is no trace left. On the host.
使用方便:设备具备三种工作模式:一、直接访问系统层,适用于系统恢复、应急使用;二、访问系统层后,从系统层访问加密层,如需要再访问应用层,适用于移动工作与有较高机密要求的工作;三、不访问系统层,通过连接到其他计算机,比如通过网络共享到其他计算机,从HOST计算机的系统访问加密层,身份认证后依据所对应身份的权限再访问应用层,适用于软件服务化,以及企业云等。Easy to use: The device has three working modes: first, direct access to the system layer, suitable for system recovery and emergency use; second, accessing the system layer, accessing the encryption layer from the system layer, if necessary, accessing the application layer, suitable for mobile work Third, do not access the system layer, connect to other computers, such as through the network to other computers, access the encryption layer from the HOST computer system, identity authentication and then access according to the permissions of the corresponding identity Application layer, suitable for software service, and enterprise cloud.
该发明的创造性:The inventiveness of the invention:
该发明中运用到了几项现有技术,但不是这些技术的简单组合,既在各层结构上有创造,也在现有技术的应用上有创造与修改。四个层次在结构上有嵌套组合,比如虚拟应用层在虚拟卷加密层内,而虚拟卷加密层与移动系统层分开存储等。Several prior art techniques have been used in the invention, but not a simple combination of these techniques, both in the creation of layers and in the creation and modification of prior art applications. The four levels have a nested combination of structures, such as the virtual application layer is in the virtual volume encryption layer, and the virtual volume encryption layer is stored separately from the mobile system layer.
本身在技术上也有变化与改动,首先,比如,虚拟应用层不是虚拟机技术的克隆,而是重新设计的虚拟化结构,其没有虚拟硬件,也没有虚拟系统层,而是用移动镜像系统和虚拟磁盘层做了替换,且这样替换后虚拟应用的支持能力好,比虚拟机更好。速度也更快。首先,系统内核从内存运行,速度快;其次,不会预占CPU处理器等硬件配置与资源,也不需要虚拟机的开机等待,应用程序也可以享有完整的宿主计算机硬件配置;最后,由于抽离出单独的应用层,进行缓存加速,可以较快地运行虚拟化后的应用。之前业界普遍认为虚拟机会减慢程序运行速度,这种观点也阻挠了移动应用设备的发展,在本发明中,用四层虚拟化的办法,代替虚拟机,就客服了速度问题。There are also changes and changes in technology. First, for example, the virtual application layer is not a clone of virtual machine technology, but a redesigned virtualization structure. It has no virtual hardware, no virtual system layer, but a mobile image system. The virtual disk layer has been replaced, and the virtual application support capability is better after replacement, which is better than the virtual machine. The speed is also faster. First, the system kernel runs from memory, which is fast; secondly, it does not pre-empt hardware configuration and resources such as CPU processor, and does not require the virtual machine to wait for boot. The application can also enjoy the complete host computer hardware configuration. Finally, because Extracting separate application layers for cache acceleration allows you to run virtualized applications faster. In the past, the industry generally believed that virtual machines slow down the running speed of programs. This view also hindered the development of mobile application devices. In the present invention, the four-layer virtualization method is used instead of the virtual machine to support the speed problem.
如下面的实际案例所述,该虚拟计算办法在一些硬件资源不够运行传统虚拟机的老旧机器设备上,如256MB内存的奔三图拉丁机器上,也实现了流畅快速的运行,取得了原本不敢奢望的效果。As described in the actual case below, the virtual computing method achieves smooth and fast operation on some old machines with insufficient hardware resources running traditional virtual machines, such as the 256MB memory Pentium Tualatin machine. The effect that I dare not expect.
此外,这种方案还意外地解决了程序的移植问题与基于网络提供SaaS的问题。移植问题:在传统的虚拟机技术中,应用程序需要拷贝入虚拟机后安装到虚拟机,与虚拟机存在依存关系,很不易于移植,而在本方案的虚拟应用层中就摆脱了这种依存关系。基于网络提供SaaS的问题:即使在现今的高速网络下,虚拟机仍然不可能通过网络载入运行,而本方案中的虚拟应用都是自我包含的,用户完全可以通过互联网访问虚拟卷加密层,通过网络登录客户端,载入虚拟应用。并且此种SaaS不损伤服务端的系统,类似P2P分发应用程序。In addition, this solution unexpectedly solves the problem of porting programs and SaaS based on the network. Migration problem: In the traditional virtual machine technology, the application needs to be copied into the virtual machine and installed into the virtual machine, and has a dependency relationship with the virtual machine, which is not easy to be transplanted, and is free from this in the virtual application layer of the solution. Dependency. The problem of providing SaaS based on the network: Even in today's high-speed network, the virtual machine is still unable to load and run through the network, and the virtual application in this solution is self-contained, and the user can access the virtual volume encryption layer through the Internet. Log in to the client through the network and load the virtual application. And this kind of SaaS does not damage the server-side system, similar to the P2P distribution application.
又比如,虚拟磁盘层不是原有的虚拟磁盘技术的克隆,为了实现权限控制并同时让 虚拟应用自由运行,也进行了重新设计,大大改进了安全控制能力和应用运行能力。虚拟卷本身加密,且加载时在身份认证后并不解密而是只通过客户端控制管理I/O,本身依然不能直接访问,客户端通过密钥核对身份后打开虚拟磁盘,但并不解密虚拟磁盘,使用者必须通过客户端进行所有的文件操作和应用启动操作,而在该客户端上设置I/O权限限制如给予不同用户不同权限如不能复制,不能删除等,来实现权限控制。For example, the virtual disk layer is not a clone of the original virtual disk technology, in order to achieve permission control and at the same time let The virtual application runs freely and has been redesigned to greatly improve security control capabilities and application operational capabilities. The virtual volume itself is encrypted, and it is not decrypted after the identity authentication, but only manages the I/O through the client control. It still cannot directly access the client. After the client checks the identity by the key, the virtual disk is opened, but the virtual disk is not decrypted. For the disk, the user must perform all file operations and application startup operations through the client, and set the I/O permission limit on the client, such as giving different permissions to different users, such as copying, not deleting, etc., to implement the permission control.
又比如,即使最接近传统技术的缓存层,也有所变动,本方案中的缓存层实质上是拷贝与重定向,将虚拟应用层中的正在使用的已经虚拟化可以自我包含的应用程序的部分常用文件抽取转移到内存虚拟磁盘,并重定向以提高运行速度,是以应用程序为单位进行的。For example, even if the cache layer closest to the traditional technology changes, the cache layer in this solution is essentially copy and redirection, and the part of the virtual application layer that is being used to virtualize the self-contained application. Common file extraction is transferred to the memory virtual disk and redirected to increase the speed of the application, in units of applications.
下面的具体实施方式中,将做出更详细的阐述。In the following detailed description, a more detailed explanation will be made.
具体实施方式detailed description
基于本发明所描述的方法可以创建各种形式的四层虚拟化设备,本处仅描述一个样例。硬件本身基于一个闪存磁盘,带有USB接口和Wifi网卡,能够以USB或无线分享的方式连接到一般的计算机或移动设备。四层虚拟化实现方式为:在闪存上通过量产工作划分成一个启动分区(USB-HDD分区),以及一个可写入的存储分区(一般的可移动磁盘类型),并在启动引导的分区中存储了镜像只读的系统文件,比如ISO镜像文件,运行时将该镜像系统载入内存Ramdisk运行,而在存储分区中分开存放一个虚拟卷,在虚拟卷中安装了程序虚拟机(或建立了虚拟化的程序运行环境并抽取应用程序所需的Library运行库和注册表)。虚拟卷外则是普通的存储空间。该虚拟卷文件夹外存放有身份验证的客户端,当用户运行客户端经过密钥认证后,该虚拟卷会被载入为一个共享在网络上的磁盘Y,但不支持直接访问,而是需要经由客户端内的专门为该虚拟卷制作的资源管理器访问。在该客户端内的资源管理器可以打开虚拟机程序,以及虚拟化的应用程序的安装与管理的控制面板程序,负责应用程序的安装、卸载、管理、目录索引、运行。这些虚拟化的应用程序只需从控制面板中点击就可以直接运行,因为其运行所需要的注册表和环境文件和Library库文件都已经一并存储在虚拟卷中,当程序运行调用时直接指向到这些虚拟卷内的文件。Various forms of four-layer virtualization devices can be created based on the methods described herein, and only one example is described herein. The hardware itself is based on a flash disk with a USB interface and a Wifi network card that can be connected to a typical computer or mobile device via USB or wireless sharing. The four-layer virtualization implementation is divided into a boot partition (USB-HDD partition) and a writable storage partition (generally removable disk type) by mass production work on the flash memory, and the boot partition is started. Stores a mirror-ready system file, such as an ISO image file. The runtime loads the mirror system into the memory Ramdisk, and stores a virtual volume in the storage partition. The virtual machine is installed in the virtual volume (or established). The virtualized program runtime environment and extract the Library runtime and registry required by the application). Outside the virtual volume is the normal storage space. The virtual volume folder stores an authenticated client. When the user runs the client and is authenticated by the key, the virtual volume is loaded as a disk Y shared on the network, but does not support direct access. Need to be accessed via a resource manager within the client that is specifically made for this virtual volume. The resource manager in the client can open the virtual machine program, as well as the control panel program for the installation and management of the virtualized application, which is responsible for the installation, uninstallation, management, directory indexing, and operation of the application. These virtualized applications can be run directly by simply clicking from the control panel, because the registry and environment files and library files needed for their operation are already stored in the virtual volume, pointing directly when the program is called. Files to these virtual volumes.
样品设备还支持一个快速运行模式,可以由用户选择是否开启,实现方式为:启动控制面板后,同时执行内存虚拟化操作,分割一部分内存作为虚拟磁盘Ramdisk。从控制面板点击程序运行时,由于程序已经被虚拟化处理了,包含了其运行所需的注册表和环境文件和Library库文件,所以可抽取到上述的内存虚拟磁盘中。这一步载入会导致样例设备上启动应用程序比较慢,但是载入到内存虚拟磁盘后运行速度会非常快。内存有易失性,因此, 计算机关闭前将ramdisk中的缓存内容保存到镜像文件中,放置于存储分区,下次开机时载入。The sample device also supports a fast running mode, which can be selected by the user. The implementation mode is as follows: after the control panel is started, the memory virtualization operation is performed at the same time, and a part of the memory is divided into a virtual disk Ramdisk. When the program is run from the control panel, since the program has been virtualized, it contains the registry and environment files and library files needed for its operation, so it can be extracted into the above-mentioned memory virtual disk. This one-step loading will cause the application to start on the sample device to be slow, but will run very fast after being loaded into the memory virtual disk. Memory is volatile, so Save the cached content in the ramdisk to the image file before the computer is shut down, place it in the storage partition, and load it the next time it is booted.
在控制面板中除了可以设置虚拟应用是否以缓存模式运行,还可设置以哪一种缓存模式运行,除了上述的模式外,还有闪存加速模式。分隔一部分闪存为一个.dat结尾的数据包,如果在上一步中设置了以闪存加速缓存模式运行,则从虚拟应用层运行的应用程式运行时将被按照该模式缓存重定向到该.dat数据包。但由于闪存的特性以及接口速度限制,这一模式一般开启后并不抽取整个应用,而是重定向小文件与随机文件。In addition to the ability to set whether the virtual application is running in cache mode, you can also set which cache mode to run in the control panel. In addition to the above modes, there is a flash acceleration mode. Separate a portion of the flash memory into a .dat-terminated packet. If you set it to run in flash-accelerated cache mode in the previous step, the application running from the virtual application layer will be redirected to the .dat data according to the mode cache. package. However, due to the characteristics of the flash memory and the interface speed limit, this mode generally does not extract the entire application after opening, but redirects small files and random files.
当样例设备以USB连接计算机时,该计算机能够通过USB引导载入样例设备中的镜像操作系统到Ramdisk中,当然这样这个系统层就是完全只读的,但是这并不影响我们的日常工作,因为虚拟卷文件层和应用层都已经分割出来了,镜像系统在内存中运行不但完全只读,不会感染病毒或者留下痕迹,而且内存速度快。通过该镜像系统访问样例设备的存储分区,可以访问虚拟卷加密层的客户端程序,运行客户端程序,认证密码,获得对应密钥用户的权限,并载入虚拟卷加密层为网络磁盘Y。该网络磁盘Y是不允许资源管理器直接访问的。用户通过客户端来访问其中资源,以及开启应用层的控制面板程序,从中查看程序列表,运行应用程序。所有本地的操作系统能够完成的工作都可以在样例设备的分层模式下完成,所不同的是,所有对应用程序和工作空间的修改,比如保存数据、设置偏好、安装新程序等都在应用层完成,而文件操作都在虚拟卷加密层完成,在关机退出后在本机不留下痕迹。当然,也可以直接用USB连接计算机后登录加密层后使用应用层。本模式主要适用于完成一些客户服务工作、移动工程师、维修杀毒工作、商务机要操作以及携带工作空间等,如附图2所示。When the sample device is connected to the computer via USB, the computer can boot the mirrored operating system in the sample device to Ramdisk via USB. Of course, this system layer is completely read-only, but this does not affect our daily work. Because the virtual volume file layer and the application layer have been split, the mirror system runs in memory not only completely read-only, it does not infect viruses or leave traces, and the memory speed is fast. The mirroring system accesses the storage partition of the sample device, and can access the client program of the virtual volume encryption layer, run the client program, authenticate the password, obtain the authority of the corresponding key user, and load the virtual volume encryption layer into the network disk Y. . The network disk Y is not allowed to be directly accessed by the resource manager. The user accesses the resources through the client, and opens the application layer's control panel program, from which the program list is viewed, and the application is run. All the work that the local operating system can do can be done in the layered mode of the sample device, except that all changes to the application and workspace, such as saving data, setting preferences, installing new programs, etc. The application layer is completed, and the file operations are completed at the virtual volume encryption layer, leaving no trace on the machine after the shutdown is exited. Of course, you can also use the USB to connect to the computer directly and log in to the encryption layer to use the application layer. This mode is mainly used to complete some customer service work, mobile engineers, maintenance anti-virus work, business machine operations and carrying work space, as shown in Figure 2.
当样例设备以加密的Wifi共享连接到附近的计算机时,该计算机能够在网络设备中发现到样例设备,呈现为一个网络上的计算机文件夹,进入该网络文件夹,可以访问虚拟卷加密层的客户端程序,运行客户端程序,认证密码,获得对应密钥用户的权限,并载入虚拟卷加密层为网络磁盘Y。该网络磁盘Y是不允许资源管理器直接访问的。用户通过客户端来访问其中资源,以及开启应用层的控制面板程序,从中查看程序列表,运行应用程序。多个用户能够共同访问使用,并拥有不同的权限,比如有的用户不能够复制特定文件,有的用户不能看到特定程序,有的用户如访问用户有使用时长限制等,很适合企业单位用于统一集中控制本单位的程序和文件。对于一个家庭用户,或者私人用户,也能够用于让其所有设备在一个安全隔离和安全控制的环境下共同使用应用程序、游戏等,如附图3所示。When the sample device is connected to a nearby computer with an encrypted Wifi share, the computer can discover the sample device in the network device, present as a computer folder on the network, enter the network folder, and access the virtual volume encryption. The client program of the layer, run the client program, authenticate the password, obtain the permissions of the corresponding key user, and load the virtual volume encryption layer into the network disk Y. The network disk Y is not allowed to be directly accessed by the resource manager. The user accesses the resources through the client, and opens the application layer's control panel program, from which the program list is viewed, and the application is run. Multiple users can access and use different permissions. For example, some users cannot copy specific files, some users cannot see specific programs, and some users have restrictions on the length of use of users, etc., which is suitable for business units. Control the program and documents of this unit in a unified and centralized manner. For a home user, or a private user, it can also be used to have all of its devices use applications, games, etc. in a secure isolated and securely controlled environment, as shown in Figure 3.
说明书附图说明 Description of the specification
图1.分层结构原理图。Figure 1. Schematic diagram of the hierarchical structure.
图2.样例设备的模式一下虚拟化的程序运行示意图。Figure 2. Schematic diagram of the sample device.
图3.样例设备的模式二下虚拟化的程序运行示意图。 Figure 3. Schematic diagram of the virtualized program operation in mode 2 of the sample device.

Claims (10)

  1. 一种采用四层结构来实现计算虚拟化的方法,该方法建立四个独立的虚拟化层次,分别为镜像系统层、虚拟卷加密层、虚拟应用层以及缓存层,通过独立的四个层的相互嵌套设计来实现计算的加密且弹性的虚拟化:其中镜像系统层包含至少一个镜像操作系统或USB OTG系统,包含有系统内核环境,但不安装到设备,而是直接存在存储设备上,设置为可以通过USB启动或网络启动等方式引导启动,在不使用宿主计算机系统时通过USB启动或载入到内存虚拟的Ramdisk磁盘运行,提供基本的系统内核环境,虚拟卷加密层包含加密的虚拟磁盘,也直接存在于存储设备上,但是与系统文件保持独立,且虚拟卷加密层需要核对密钥加载,加载后在计算设备中生成虚拟磁盘作为工作分区,虚拟应用层则存储于虚拟卷加密层内,但不通过虚拟机,不包含虚拟硬件与系统等,而是通过虚拟化应用环境、重定向注册表与库文件的方法来跨设备运行应用程序,虚拟应用运行时,建立缓存层映射到宿主计算机的内存或高速外设中进行缓存。A method of implementing computational virtualization using a four-layer structure, which establishes four independent virtualization layers, namely a mirroring system layer, a virtual volume encryption layer, a virtual application layer, and a cache layer, through independent four layers. Encrypted and flexible virtualization that implements nested design: the mirroring system layer contains at least one mirrored operating system or USB OTG system, including the system kernel environment, but not installed to the device, but directly on the storage device. It can be booted by USB boot or network boot, etc. It can be booted by USB or loaded into the memory virtual Ramdisk disk when not using the host computer system, providing a basic system kernel environment, and the virtual volume encryption layer contains encrypted virtual The disk also exists directly on the storage device, but is independent of the system file, and the virtual volume encryption layer needs to check the key load. After loading, the virtual disk is generated as the working partition in the computing device, and the virtual application layer is stored in the virtual volume encryption. In the layer, but not through the virtual machine, does not contain virtual hardware and systems, etc. It is to run applications across devices via virtualized application environments, libraries and registry redirection method, when a virtual application to run, the establishment of buffer layer is mapped to the host computer's memory cache or high-speed peripherals.
  2. 一种权利要求1所描述的方法,其特征在于,移动系统层通过只读镜像系统实现,运行时载入到Ramdisk运行,虚拟卷加密层通过创建一个虚拟卷,经验证密钥后载入为虚拟磁盘并控制其访问实现,并且该虚拟加密卷层只通过客户端控制管理I/O,客户端通过密钥核对身份后打开虚拟磁盘,但并不解密虚拟磁盘,使用者必须通过客户端进行所有的文件操作和应用启动操作,而在该客户端上设置I/O权限限制如给予不同用户不同权限实现权限控制,系统访问加密层时将虚拟卷文件映射成系统中的磁盘分区,应用层整体部署在虚拟磁盘层中,通过虚拟化应用环境并抽取程序所需的Library运行库和注册表来实现,使得部署在应用层的程序可跨设备使用。A method as claimed in claim 1, wherein the mobile system layer is implemented by a read-only mirroring system, and the runtime is loaded into a Ramdisk operation, and the virtual volume encryption layer is created by creating a virtual volume and verifying the key. The virtual disk controls its access implementation, and the virtual encrypted volume layer manages the I/O only through the client control. After the client checks the identity by the key, the virtual disk is opened, but the virtual disk is not decrypted, and the user must perform the client through the client. All file operations and application startup operations, and setting I/O permission restrictions on the client, such as giving different users different permissions to implement permission control, the system accesses the encryption layer to map the virtual volume file into a disk partition in the system, the application layer The overall deployment in the virtual disk layer is achieved by virtualizing the application environment and extracting the library runtime and registry required by the program, so that programs deployed at the application layer can be used across devices.
  3. 一种权利要求1所描述的方法,其特征在于,缓存层通过在外接存储设备中或虚拟卷加密层所在的存储设备中应用readyboost实现。A method as claimed in claim 1, characterized in that the cache layer is implemented by applying a readyboost in an external storage device or a storage device in which the virtual volume encryption layer is located.
  4. 一种权利要求1所描述的方法,其特征在于,虚拟卷加密层采用单次认证模式,当用户访问虚拟卷时验证密钥,通过后直接将卷文件映射成系统中的磁盘分区,不再对每次读写认证。A method as claimed in claim 1, characterized in that the virtual volume encryption layer adopts a single authentication mode, and the user verifies the key when accessing the virtual volume, and directly maps the volume file into a disk partition in the system after passing. For each read and write certification.
  5. 一种权利要求1所描述的方法,其特征在于,虚拟卷加密层采用每次读写认证模式,当用户从虚拟磁盘分区读取数据文件时,数据在经过虚拟磁盘驱动程序时进行解密操作,将文件以明文形式提交给用户;当用户写入文件时虚拟磁 盘驱动程序对数据进行加密后传递给设备驱动程序,最终数据以密文形式存储在物理磁盘上的虚拟卷。A method as claimed in claim 1, wherein the virtual volume encryption layer adopts a read-write authentication mode each time, and when the user reads the data file from the virtual disk partition, the data is decrypted when passing through the virtual disk driver. Submit the file to the user in clear text; virtual magnetic when the user writes to the file The disk driver encrypts the data and passes it to the device driver. The final data is stored in ciphertext as a virtual volume on the physical disk.
  6. 一种权利要求1所描述的方法,其特征在于,虚拟卷加密层采用多用户不同权限密钥的方式,为不同用户应用不同的密码与权限,所述权限包括对不同文件的访问权限、IP的绑定、使用次数、修改权限、拷贝权限、使用截止日期等。A method as claimed in claim 1, characterized in that the virtual volume encryption layer adopts a multi-user different authority key mode to apply different passwords and rights for different users, the rights including access rights to different files, IP Binding, usage times, modification permissions, copy permissions, usage expiration dates, etc.
  7. 一种依据权利要求1所描述的方法制造的设备,其特征在于,包含至少一个启动分区(网络启动或CDROM或USB-HDD分区等),以及至少一个可写入的存储分区(可移动磁盘类型或者本地磁盘类型),并在启动引导的分区中存储了镜像只读的系统文件,比如ISO镜像文件,运行时将该镜像系统载入内存运行,而在存储分区中分开存放一个或多个虚拟卷,在虚拟卷中安装程序虚拟机(或建立了虚拟化的程序运行环境并抽取应用程序所需的Library运行库和注册表)。Apparatus for manufacturing according to the method of claim 1 comprising at least one boot partition (network boot or CDROM or USB-HDD partition, etc.) and at least one writable storage partition (removable disk type) Or local disk type), and store the mirror read-only system file, such as the ISO image file, in the boot partition, run the image system into memory and run it, and store one or more virtual files in the storage partition. Volume, install the program virtual machine in the virtual volume (or establish a virtualized program runtime environment and extract the Library runtime and registry required by the application).
  8. 一种依据权利要求1所描述的方法制造的设备,其特征在于,设备的缓存层通过在宿主计算机中创建内存虚拟磁盘ramdisk,抽取整个正在运行的虚拟应用到该ramdisk中,并在虚拟卷加密层所在的存储设备中设置镜像文件,计算机关闭前将ramdisk中的内容同步保存到该镜像文件中,下次运行时重新载入。A device manufactured according to the method of claim 1, wherein the cache layer of the device extracts the entire running virtual application into the ramdisk by creating a memory virtual disk ramdisk in the host computer, and encrypts the virtual volume. Set the image file in the storage device where the layer is located. Save the contents of the ramdisk to the image file before the computer is shut down, and reload it the next time it runs.
  9. 一种依据权利要求1所描述的方法制造的设备,其特征在于,设备具有USB接口,能够与计算机以USB协议连接,在与计算机以USB连接后,以计算机的系统代替本身的镜像系统层作为系统内核,而以设备的虚拟卷作为磁盘,验证密钥后载入该虚拟磁盘及其中的虚拟化应用。An apparatus manufactured according to the method described in claim 1, wherein the device has a USB interface, can be connected to a computer by a USB protocol, and after being connected to the computer by USB, the system of the computer is used instead of the mirror system layer of the computer. The system kernel, with the device's virtual volume as the disk, loads the virtual disk and the virtualized application in it after verifying the key.
  10. 一种依据权利要求1所描述的方法制造的设备,其特征在于,设备具有无线网卡,能够与计算机以无线协议连接,在与计算机以无线连接后,以计算机的系统代替本身的镜像系统层作为系统内核,而以设备的虚拟卷作为磁盘,验证密钥后载入该虚拟磁盘及其中的虚拟化应用。 An apparatus manufactured according to the method described in claim 1, wherein the device has a wireless network card, is connectable to a computer by a wireless protocol, and after being wirelessly connected to the computer, replaces the mirror system layer of the computer with the system of the computer. The system kernel, with the device's virtual volume as the disk, loads the virtual disk and the virtualized application in it after verifying the key.
PCT/CN2015/078634 2015-01-13 2015-05-10 Four-layer computing virtualization method and device WO2016112605A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510013784.6A CN105844165A (en) 2015-01-13 2015-01-13 Method and device for achieving calculation virtualization by using four layers of structures
CN201510013784.6 2015-01-13

Publications (1)

Publication Number Publication Date
WO2016112605A1 true WO2016112605A1 (en) 2016-07-21

Family

ID=56405165

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/078634 WO2016112605A1 (en) 2015-01-13 2015-05-10 Four-layer computing virtualization method and device

Country Status (2)

Country Link
CN (1) CN105844165A (en)
WO (1) WO2016112605A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111506393A (en) * 2020-04-09 2020-08-07 上海舒岚网络科技有限公司 ARM-based virtualization device and use method thereof
CN112784321A (en) * 2019-11-08 2021-05-11 精品科技股份有限公司 Disk information security system
CN114884993A (en) * 2022-05-07 2022-08-09 杭州天宽科技有限公司 Virtual android system for enhancing data security

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106598653A (en) * 2016-11-24 2017-04-26 合肥中科云巢科技有限公司 Method and device used for solving boot storm of virtual machine
EP4034982A1 (en) * 2019-09-23 2022-08-03 Amazon Technologies, Inc. Cross-zone replicated block storage devices

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1700135A (en) * 2005-06-17 2005-11-23 清华大学 Virus-preventing method of network computer without local operating system
US20060080522A1 (en) * 2004-10-13 2006-04-13 Button Russell E Method, apparatus, and system for facilitating secure computing
CN101989196A (en) * 2009-08-04 2011-03-23 张济政 Mobile storage equipment-based parasitic operation system
CN103488515A (en) * 2012-12-05 2014-01-01 张维加 Equipment combining USB guide system and program virtual machine

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102214127B (en) * 2010-11-15 2013-01-09 上海安纵信息科技有限公司 Method for intensively storing and backing up data based on operating system virtualization theory
CN103002445A (en) * 2012-11-08 2013-03-27 张维加 Safe mobile electronic equipment for providing application services
CN104125251A (en) * 2013-04-26 2014-10-29 华茂云天科技(北京)有限公司 Virtualization technology-based cloud computing security terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060080522A1 (en) * 2004-10-13 2006-04-13 Button Russell E Method, apparatus, and system for facilitating secure computing
CN1700135A (en) * 2005-06-17 2005-11-23 清华大学 Virus-preventing method of network computer without local operating system
CN101989196A (en) * 2009-08-04 2011-03-23 张济政 Mobile storage equipment-based parasitic operation system
CN103488515A (en) * 2012-12-05 2014-01-01 张维加 Equipment combining USB guide system and program virtual machine

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112784321A (en) * 2019-11-08 2021-05-11 精品科技股份有限公司 Disk information security system
CN112784321B (en) * 2019-11-08 2024-03-15 精品科技股份有限公司 Disk resource security system
CN111506393A (en) * 2020-04-09 2020-08-07 上海舒岚网络科技有限公司 ARM-based virtualization device and use method thereof
CN111506393B (en) * 2020-04-09 2023-02-24 上海舒岚网络科技有限公司 ARM-based virtualization device and use method thereof
CN114884993A (en) * 2022-05-07 2022-08-09 杭州天宽科技有限公司 Virtual android system for enhancing data security
CN114884993B (en) * 2022-05-07 2023-12-22 杭州天宽科技有限公司 Virtualized android system for enhancing data security

Also Published As

Publication number Publication date
CN105844165A (en) 2016-08-10

Similar Documents

Publication Publication Date Title
US9729579B1 (en) Systems and methods for increasing security on computing systems that launch application containers
US9342705B1 (en) Systems and methods for searching shared encrypted files on third-party storage systems
Ta-Min et al. Splitting interfaces: Making trust between applications and operating systems configurable
Li et al. A trusted virtual machine in an untrusted management environment
CN104268484B (en) Data leakage prevention method under a kind of cloud environment based on virtual isolation mech isolation test
US20090276774A1 (en) Access control for virtual machines in an information system
US20080165957A1 (en) Virtualization of file system encryption
WO2016112605A1 (en) Four-layer computing virtualization method and device
Yuefa et al. Data security model for cloud computing
RU2559728C2 (en) System and method of encoding files from encrypted drive
WO2012061046A2 (en) Creating distinct user spaces through mountable file systems
CN104298472A (en) Layered computing virtualization implementing method and device
CA2759612A1 (en) Method and system for securing data
US11755753B2 (en) Mechanism to enable secure memory sharing between enclaves and I/O adapters
US11343082B2 (en) Resource sharing for trusted execution environments
Zhang et al. PALM: security preserving VM live migration for systems with VMM-enforced protection
US11741221B2 (en) Using a trusted execution environment to enable network booting
US11847253B2 (en) Efficient launching of trusted execution environments
Shen et al. Securing data services: a security architecture design for private storage cloud based on HDFS
Jung et al. Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage
Kappes et al. Multitenant access control for cloud-aware distributed filesystems
US10469457B1 (en) Systems and methods for securely sharing cloud-service credentials within a network of computing devices
US20230106455A1 (en) Efficient launching of trusted execution environments
CN105844167A (en) Method and device for achieving virtualization by nesting virtual encryption volume and virtual application
CN104298473A (en) Method and device for achieving computing virtualization by nesting virtual disk to virtual machine

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15877523

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15877523

Country of ref document: EP

Kind code of ref document: A1