CN111897621A - Virtual machine migration method, device, equipment, system and storage medium - Google Patents

Virtual machine migration method, device, equipment, system and storage medium Download PDF

Info

Publication number
CN111897621A
CN111897621A CN201910371285.2A CN201910371285A CN111897621A CN 111897621 A CN111897621 A CN 111897621A CN 201910371285 A CN201910371285 A CN 201910371285A CN 111897621 A CN111897621 A CN 111897621A
Authority
CN
China
Prior art keywords
virtual machine
target
physical machine
trusted
machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910371285.2A
Other languages
Chinese (zh)
Inventor
吴晓昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910371285.2A priority Critical patent/CN111897621A/en
Publication of CN111897621A publication Critical patent/CN111897621A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/4557Distribution of virtual machine instances; Migration and load balancing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Abstract

The embodiment of the application provides a virtual machine migration method, a virtual machine migration device, a virtual machine migration equipment, a virtual machine migration system and a storage medium. The method comprises the steps of maintaining a coupling relation between security parameters required by a target virtual machine and hardware trusted modules on physical machines before and after the migration of the target virtual machine, or remotely authenticating the physical machines before and after the migration of the target virtual machine to realize the remote calling of the target virtual machine to the hardware trusted modules on a source physical machine before and after the migration of the target virtual machine, or deploying a hardware trusted cluster and cluster management equipment in a cloud service system to perform centralized management and resource allocation on trusted hardware in the cloud service system, so that the credibility and the availability of the security parameters required by the target virtual machine are ensured under the condition that the target virtual machine migrates, and further, the credibility of a virtual environment in the cloud service system is maintained under the condition that the virtual machine migrates.

Description

Virtual machine migration method, device, equipment, system and storage medium
Technical Field
The present application relates to the field of trusted computing technologies, and in particular, to a virtual machine migration method, apparatus, device, system, and storage medium.
Background
With the development of cloud computing technology, cloud service systems are more and more widely applied.
The cloud service system comprises a physical environment constructed by physical machines, and a plurality of virtual machines can be run on the physical machines based on virtualization technology under the support of the physical environment, so that required computing resources are provided for users through the virtual environment constructed by the virtual machines.
Due to the variability of user requirements, virtual machine migration is often required to be performed on a cloud service system, however, when the virtual machine needs to be migrated, the credibility of a virtual environment is destroyed, and a security risk is brought.
Disclosure of Invention
Aspects of the present disclosure provide a method, an apparatus, a device, a system, and a storage medium for migrating a virtual machine, so as to maintain credibility of a virtual environment in a cloud service system when the virtual machine migrates.
The embodiment of the application provides a virtual machine migration method, which comprises the following steps:
migrating a target virtual machine on a source physical machine to a target physical machine, wherein a virtual trusted module corresponding to the target virtual machine is configured on the source physical machine;
acquiring security parameters required by the target virtual machine according to a coupling relation between the virtual trusted module and a hardware trusted module on the source physical machine;
and sending the security parameters to the target physical machine so that the target physical machine can support the target virtual machine in a trusted manner through a hardware trusted module on the target physical machine based on the security parameters.
An embodiment of the present application further provides a virtual machine migration method, including:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and configuring a virtual trusted module for the target virtual machine on the target physical machine;
receiving security parameters corresponding to the target virtual machine transmitted by the source physical machine, and configuring the security parameters into the virtual trusted module;
and establishing a coupling relation between the virtual trusted module and a hardware trusted module on the target physical machine so as to utilize the hardware trusted module to perform trusted support on the target virtual machine based on the security parameters.
An embodiment of the present application further provides a virtual machine migration apparatus, including:
the virtual machine management module is used for migrating a target virtual machine on a source physical machine to a target physical machine, and a virtual trusted module corresponding to the target virtual machine is configured on the source physical machine;
the control module is used for acquiring security parameters required by the target virtual machine according to a coupling relation between the virtual trusted module and a hardware trusted module on the source physical machine;
and the communication component is used for sending the security parameters to the target physical machine so that the target physical machine can support the target virtual machine in a trusted manner through a hardware trusted module on the target physical machine based on the security parameters.
An embodiment of the present application further provides a virtual machine migration apparatus, including:
the virtual machine management module is used for deploying a target virtual machine migrated from a source physical machine on a target physical machine and configuring a virtual trusted module for the target virtual machine on the target physical machine;
the communication component is used for receiving the security parameters corresponding to the target virtual machine transmitted by the source physical machine and configuring the security parameters into the virtual trusted module;
and the control module is used for creating a coupling relation between the virtual trusted module and a hardware trusted module on the target physical machine so as to utilize the hardware trusted module to perform trusted support on the target virtual machine based on the security parameters.
The embodiment of the application also provides a physical machine, which comprises a hardware trusted module, a memory, a processor and a communication component;
the memory is to store one or more computer instructions;
the processor is coupled with the hardware trusted module, the memory, and the communication component for executing the one or more computer instructions for:
migrating a target virtual machine on the physical machine to a target physical machine, wherein a virtual trusted module corresponding to the target virtual machine is configured on the physical machine;
acquiring security parameters required by the target virtual machine according to a coupling relation between the virtual trusted module and a hardware trusted module on the physical machine;
and sending the security parameters to the target physical machine through the communication component, so that the target physical machine can support the target virtual machine in a trusted manner through a hardware trusted module on the target physical machine based on the security parameters.
The embodiment of the application also provides a physical machine, which comprises a hardware trusted module, a memory, a processor and a communication component;
the memory is to store one or more computer instructions;
the processor is coupled with the hardware trusted module, the memory, and the communication component for executing the one or more computer instructions for:
deploying a target virtual machine migrated from a source physical machine on the physical machine, and configuring a virtual trusted module for the target virtual machine on the physical machine;
receiving security parameters corresponding to the target virtual machine transmitted by the source physical machine, and configuring the security parameters into the virtual trusted module;
and creating a coupling relation between the virtual trusted module and the hardware trusted module so as to utilize the hardware trusted module to perform trusted support on the target virtual machine based on the security parameters.
An embodiment of the present application further provides a virtual machine migration method, including:
migrating a target virtual machine on a source physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine for accessing a hardware trusted module on the source physical machine to the target physical machine so as to enable the target virtual machine to remotely access the hardware trusted module on the source physical machine;
if a remote access request transmitted by the target physical machine is received, authenticating the remote access request based on authentication parameters contained in the remote access request;
and if the remote access request passes the authentication, establishing remote communication connection with the target physical machine so as to perform trusted support on the target virtual machine through a hardware trusted module on the source physical machine.
An embodiment of the present application further provides a virtual machine migration method, including:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and acquiring an authentication parameter used by the target virtual machine to access a hardware trusted module on the source physical machine;
generating a remote access request according to the authentication parameters, and sending the remote access request to the source physical machine;
and if the remote access request passes the authentication of the source physical machine, remotely calling a hardware trusted module on the source physical machine to perform trusted support on the target virtual machine.
An embodiment of the present application further provides a virtual machine migration apparatus, including:
the virtual machine management module is used for migrating a target virtual machine on a source physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine for accessing a hardware trusted module on the source physical machine to the target physical machine so as to enable the target virtual machine to remotely access the hardware trusted module on the source physical machine;
the authentication module is used for authenticating the remote access request based on the authentication parameters contained in the remote access request if the remote access request transmitted by the target physical machine is received;
and the communication module is used for establishing remote communication connection with the target physical machine if the remote access request passes the authentication so as to perform trusted support on the target virtual machine through a hardware trusted module on the source physical machine.
An embodiment of the present application further provides a virtual machine migration apparatus, including:
the virtual machine management module is used for deploying a target virtual machine migrated from a source physical machine on a target physical machine and acquiring authentication parameters used by the target virtual machine to access a hardware trusted module on the source physical machine;
the authentication module is used for generating a remote access request according to the authentication parameters;
the communication module is used for sending the remote access request to the source physical machine;
and the control module is used for remotely calling a hardware trusted module on the source physical machine to perform trusted support on the target virtual machine if the remote access request passes the authentication of the source physical machine.
The embodiment of the application also provides a physical machine, which comprises a hardware trusted module, a memory, a processor and a communication component;
the memory is to store one or more computer instructions;
the processor is coupled with the hardware trusted module, the memory, and the communication component for executing the one or more computer instructions for:
migrating a target virtual machine on a source physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine for accessing a hardware trusted module on the source physical machine to the target physical machine so as to enable the target virtual machine to remotely access the hardware trusted module on the source physical machine;
if a remote access request transmitted by the target physical machine is received, authenticating the remote access request based on authentication parameters contained in the remote access request;
and if the remote access request passes the authentication, establishing remote communication connection with the target physical machine so as to perform trusted support on the target virtual machine through a hardware trusted module on the source physical machine.
The embodiment of the application also provides a physical machine, which comprises a hardware trusted module, a memory, a processor and a communication component;
the memory is to store one or more computer instructions;
the processor is coupled with the hardware trusted module, the memory, and the communication component for executing the one or more computer instructions for:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and acquiring an authentication parameter used by the target virtual machine to access a hardware trusted module on the source physical machine;
generating a remote access request according to the authentication parameters, and sending the remote access request to the source physical machine;
and if the remote access request passes the authentication of the source physical machine, remotely calling a hardware trusted module on the source physical machine to perform trusted support on the target virtual machine.
An embodiment of the present application further provides a virtual machine migration method, including:
receiving a remote access request transmitted by a target physical machine where a target virtual machine is located after migration, wherein the remote access request comprises an authentication parameter used by the target virtual machine to access a trusted hardware cluster;
authenticating the remote access request based on the authentication parameters included in the remote access request;
and if the remote access request passes the authentication, accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware, so as to perform trusted support on the target virtual machine through the target trusted hardware.
An embodiment of the present application further provides a virtual machine migration method, including:
migrating a target virtual machine on a source physical machine to a target physical machine;
and sending the authentication parameters used by the target virtual machine for accessing the trusted hardware cluster to the target physical machine so that the target virtual machine can remotely access the trusted hardware cluster.
An embodiment of the present application further provides a virtual machine migration method, including:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and acquiring authentication parameters used by the target virtual machine for accessing a trusted hardware cluster;
generating a remote access request according to the authentication parameters, and sending the remote access request to cluster control equipment;
and if the remote access request passes the authentication of the cluster control equipment, remotely calling the trusted hardware cluster to perform trusted support on the target virtual machine.
An embodiment of the present application further provides a virtual machine migration apparatus, including:
the communication module is used for receiving a remote access request transmitted by a target physical machine where a target virtual machine is located after migration, wherein the remote access request comprises an authentication parameter used by the target virtual machine to access a trusted hardware cluster;
the authentication module is used for authenticating the remote access request based on the authentication parameters contained in the remote access request;
and the control module is used for accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware if the remote access request passes the authentication, so as to perform trusted support on the target virtual machine through the target trusted hardware.
An embodiment of the present application further provides a virtual machine migration apparatus, including:
the virtual machine management module is used for migrating a target virtual machine on the source physical machine to a target physical machine;
and the communication module is used for sending the authentication parameters used by the target virtual machine for accessing the trusted hardware cluster to the target physical machine so as to enable the target virtual machine to remotely access the trusted hardware cluster.
An embodiment of the present application further provides a virtual machine migration apparatus, including:
the virtual machine management module is used for deploying a target virtual machine migrated from a source physical machine on a target physical machine and acquiring authentication parameters used by the target virtual machine for accessing a trusted hardware cluster;
the authentication module is used for generating a remote access request according to the authentication parameters and sending the remote access request to the cluster control equipment;
and the control module is used for remotely calling the trusted hardware cluster to perform trusted support on the target virtual machine if the remote access request passes the authentication of the cluster control equipment.
An embodiment of the present application further provides a virtual machine migration system, including: the system comprises a source physical machine, a target physical machine, a trusted hardware cluster and cluster control equipment;
the source physical machine is used for migrating a target virtual machine to a target physical machine and sending authentication parameters used by the target virtual machine for accessing a trusted hardware cluster to the target physical machine;
the target physical machine is used for deploying the target virtual machine and acquiring authentication parameters used by the target virtual machine for accessing the trusted hardware cluster; generating a remote access request according to the authentication parameters, and sending the remote access request to the cluster control equipment; if the remote access request passes the authentication of the cluster control equipment, remotely calling the trusted hardware cluster to perform trusted support on the target virtual machine;
the cluster control equipment is used for receiving a remote access request transmitted by the target physical machine; authenticating the remote access request based on the authentication parameters included in the remote access request; and if the remote access request passes the authentication, accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware, so as to perform trusted support on the target virtual machine through the target trusted hardware.
The embodiment of the application also provides cluster control equipment, which comprises a memory, a processor and a communication component;
the memory is to store one or more computer instructions;
the processor is coupled with the memory and the communication component for executing the one or more computer instructions for:
receiving a remote access request transmitted by a target physical machine where a target virtual machine is located after migration through the communication assembly, wherein the remote access request comprises an authentication parameter used by the target virtual machine to access a trusted hardware cluster;
authenticating the remote access request based on the authentication parameters included in the remote access request;
and if the remote access request passes the authentication, accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware, so as to perform trusted support on the target virtual machine through the target trusted hardware.
An embodiment of the present application further provides a physical machine, including: a memory, a processor, and a communications component;
the memory is to store one or more computer instructions;
the processor is coupled with the memory and the communication component for executing the one or more computer instructions for:
migrating a target virtual machine on a source physical machine to a target physical machine;
and sending the authentication parameters used by the target virtual machine for accessing the trusted hardware cluster to the target physical machine through the communication component so that the target virtual machine can remotely access the trusted hardware cluster.
An embodiment of the present application further provides a physical machine, including: a memory, a processor, and a communications component;
the memory is to store one or more computer instructions;
the processor is coupled with the memory and the communication component for executing the one or more computer instructions for:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and acquiring authentication parameters used by the target virtual machine for accessing a trusted hardware cluster;
generating a remote access request according to the authentication parameters, and sending the remote access request to cluster control equipment through the communication assembly;
and if the remote access request passes the authentication of the cluster control equipment, remotely calling the trusted hardware cluster to perform trusted support on the target virtual machine.
An embodiment of the present application further provides a virtual machine migration method, including:
receiving a migration request, wherein the migration request comprises migrating a target virtual machine on a current physical machine;
determining a target physical machine based on the service type code operated by the target virtual machine;
migrating a target virtual machine on a current physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine to access a hardware trusted module on the current physical machine to the target physical machine so that the target virtual machine can remotely access the hardware trusted module on the current physical machine.
An embodiment of the present application further provides a virtual machine migration apparatus, including:
the system comprises a communication module, a migration module and a migration module, wherein the communication module is used for receiving a migration request, and the migration request comprises the migration of a target virtual machine on a current physical machine;
the virtual machine management module is used for determining a target physical machine based on the service type code operated by the target virtual machine;
migrating a target virtual machine on a current physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine to access a hardware trusted module on the current physical machine to the target physical machine so that the target virtual machine can remotely access the hardware trusted module on the current physical machine.
The embodiment of the application also provides a physical machine, which comprises a hardware trusted module, a memory, a processor and a communication component;
the memory is to store one or more computer instructions;
the processor is coupled with the hardware trusted module, the memory, and the communication component for executing the one or more computer instructions for:
receiving a migration request, wherein the migration request comprises migrating a target virtual machine on the physical machine;
determining a target physical machine based on the service type code operated by the target virtual machine;
migrating the target virtual machine to a target physical machine, and sending authentication parameters used by the target virtual machine for accessing a hardware trusted module on the physical machine to the target physical machine so that the target virtual machine can remotely access the hardware trusted module on the physical machine.
Embodiments of the present application also provide a computer-readable storage medium storing computer instructions that, when executed by one or more processors, cause the one or more processors to perform the aforementioned virtual machine migration method.
In the embodiment of the application, the remote calling of the target virtual machine to the hardware trusted module on the source physical machine before and after the migration of the target virtual machine is realized by maintaining the coupling relationship between the security parameters required by the target virtual machine and the hardware trusted module on the physical machine before and after the migration of the target virtual machine, or the centralized management and resource allocation of the trusted hardware in the cloud service system are performed by deploying the hardware trusted cluster and the cluster control device in the cloud service system, so that the credibility and the availability of the security parameters required by the target virtual machine are ensured under the condition that the target virtual machine migrates, and further, the credibility of the virtual environment in the cloud service system is maintained under the condition that the virtual machine migrates.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic structural diagram of a virtual machine migration system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a virtual machine migration method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a virtual machine migration apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a physical machine according to an embodiment of the present application;
fig. 5 is a schematic flowchart of another virtual machine migration method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another virtual machine migration apparatus according to an embodiment of the present application;
FIG. 7 is a schematic diagram of another physical machine according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of a virtual machine migration system according to another embodiment of the present application;
fig. 9 is a schematic flowchart of a virtual machine migration method according to another embodiment of the present application;
fig. 10 is a schematic structural diagram of a virtual machine migration apparatus according to another embodiment of the present application;
fig. 11 is a schematic structural diagram of a physical machine according to another embodiment of the present application;
fig. 12 is a schematic flowchart of another virtual machine migration method according to another embodiment of the present application;
fig. 13 is a schematic structural diagram of another virtual machine migration apparatus according to another embodiment of the present application;
FIG. 14 is a block diagram of another physical machine according to another embodiment of the present application;
fig. 15 is a schematic structural diagram of a virtual machine migration system according to yet another embodiment of the present application;
fig. 16 is a flowchart illustrating a virtual machine migration method according to yet another embodiment of the present application;
fig. 17 is a schematic structural diagram of a virtual machine migration apparatus according to yet another embodiment of the present application;
fig. 18 is a schematic structural diagram of a cluster control device according to yet another embodiment of the present application;
fig. 19 is a flowchart illustrating another virtual machine migration method according to yet another embodiment of the present application;
fig. 20 is a schematic structural diagram of another virtual machine migration apparatus according to yet another embodiment of the present application;
fig. 21 is a schematic structural diagram of a physical machine according to another embodiment of the present application;
fig. 22 is a schematic flowchart of a virtual machine migration method according to another embodiment of the present application;
fig. 23 is a schematic structural diagram of another virtual machine migration apparatus according to another embodiment of the present application;
FIG. 24 is a block diagram of another physical machine according to yet another embodiment of the present application;
fig. 25 is a schematic flowchart of another virtual machine migration method according to another embodiment of the present application;
fig. 26 is a schematic structural diagram of another virtual machine migration apparatus according to another embodiment of the present application;
fig. 27 is a schematic structural diagram of another physical machine according to another embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
At present, due to the variability of user requirements, virtual machine migration is often required to be performed on a cloud service system, however, when the virtual machine needs to be migrated, the credibility of a virtual environment is destroyed, and a security risk is brought. To address the problems with the prior art, in some embodiments of the present application: the method comprises the steps of remotely calling a hardware trusted module on a source physical machine before and after migration of a target virtual machine by the target virtual machine through maintaining a coupling relation between security parameters required by the target virtual machine and the hardware trusted module on the physical machine before and after the migration of the target virtual machine, or remotely authenticating the physical machine before and after the migration of the target virtual machine, or centrally managing and allocating trusted hardware in a cloud service system through deploying a hardware trusted cluster and cluster control equipment in the cloud service system, so that the credibility and the availability of the security parameters required by the target virtual machine are ensured under the condition that the target virtual machine migrates, and further, the credibility of a virtual environment in the cloud service system is ensured under the condition that the virtual machine migrates.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of a virtual machine migration system according to an embodiment of the present application. As shown in fig. 1, the system includes: a source physical machine 10 and a destination physical machine 11.
For convenience of describing the process of virtual machine migration, in this embodiment, the physical machines before and after the virtual machine migration, that is, the source physical machine and the destination physical machine, are distinguished from each other in terms of names. It should be understood that the source physical machine and the destination physical machine may be any physical machine in the cloud service system, and the target virtual machine mentioned in the following text may also be any virtual machine in the cloud service system, and in response, the physical machine where the target virtual machine is located before migration is referred to as the source physical machine, and the physical machine where the target virtual machine is located after migration is referred to as the destination physical machine. For this reason, the description will not be repeated hereinafter.
In this embodiment, the hardware trusted module 12 may be configured on both the source physical machine 10 and the destination physical machine 11. The hardware Trusted Module 12 includes, but is not limited to, TPM (Trusted Platform Module) or TCM (Trusted cryptography Module). The hardware trusted module 12 may be mounted on a motherboard of the source physical machine or the destination physical machine in the form of a chip, and of course, the present embodiment does not limit the hardware connection manner between the hardware trusted module and the source physical machine or the destination physical machine.
In this embodiment, both the source physical machine 10 and the destination physical machine 11 may run an application program for managing virtualization so as to manage a virtual environment in the cloud service system, and the application program for managing virtualization may serve as a medium for interaction between the virtual environment and the physical environment in the cloud service system.
In this embodiment, the source physical machine 10 and the destination physical machine 11 may both run on a plurality of virtual machines 13, and the source physical machine 10 and the destination physical machine 11 may both configure a virtual trusted module 14 for the plurality of virtual machines 13 running thereon. In practical applications, the configuration of the virtual trusted module can be realized by running the above application program for managing virtualization. The trusted support capability that the virtual trusted module 14 can provide to the virtual machine 13 may be consistent with the trusted support capability that the hardware trusted module 12 can provide to the physical machine.
The following will use the target virtual machine as an example to perform a detailed description of the virtual machine migration scheme, and it should be understood that the target virtual machine may be any virtual machine that needs to be migrated in the cloud service system.
Based on this, in this embodiment, when the target virtual machine on the source physical machine is migrated to the destination physical machine, the virtual trusted module configured for the target virtual machine on the source physical machine may be migrated to the destination physical machine.
On the source physical machine side, a target virtual machine on the source physical machine may be migrated to a destination physical machine. In practical applications, the foregoing application program for managing virtualization may be run in the source physical machine to perform processing such as snapshot and transfer of the target virtual machine, so as to implement migration of the target virtual machine.
On the side of the destination physical machine, the target virtual machine migrated from the source physical machine may be deployed on the destination physical machine, and a virtual trusted module may be configured for the target virtual machine on the destination physical machine. Based on the current virtualization technology, different operating systems can be configured with virtual trusted modules by using different schemes, which are not described in detail herein.
The migration process of the target virtual machine and the migration process of the virtual trusted module corresponding to the target virtual machine may be independent of each other, the order of the two processes is not limited in this embodiment, and the two processes may be executed synchronously or, of course, asynchronously.
In this embodiment, the security parameters under the virtual trusted module configured for the target virtual machine on the source physical machine are migrated to the destination physical machine. Security parameters include, but are not limited to, metrics, keys, and the like, which are parameters required for trusted support.
On one side of the source physical machine, the security parameters required by the target virtual machine can be obtained according to the coupling relation between the virtual trusted module and the hardware trusted module on the source physical machine.
The virtual trusted module and the hardware trusted module have a coupling relation, which means that the virtual trusted module can call the trusted support capability of the hardware trusted module. Based on the coupling relation between the two, when a trusted support requirement occurs in the target virtual machine, the target virtual machine can initiate the calling of the virtual trusted module of the target virtual machine, and the virtual trusted module can call the trusted support capability of the hardware trusted module based on the coupling relation, so that the hardware trusted module can be used as a trusted root to expand the trusted state to the virtual trusted module, and the credibility of the virtual trusted module on the trusted support of the target virtual machine can be ensured, thereby realizing the trusted support of the target virtual machine.
For example, the virtual trusted module may invoke the hardware trusted module to encrypt, protect, or verify security parameters under the virtual trusted module, etc. through the aforementioned application program managing virtualization.
In practical application, the hardware trusted module on the source physical machine can be called to decrypt the encrypted security parameters according to the coupling relationship between the virtual trusted module and the hardware trusted module on the source physical machine, so as to obtain the security parameters.
Due to the fact that encryption rules of hardware trusted modules on a source physical machine and a destination physical machine are different and the like, the problem that the security parameters cannot be decrypted and cannot be used can be caused by directly transferring the encrypted security parameters on the source physical machine to the destination physical machine.
After the security parameters required by the virtual machine are obtained, the security parameters can be sent to the target physical machine.
In some practical applications, the security parameters are snapshot and the snapshot is sent to the destination physical machine through the network. In the network transmission process, the security parameters are in a plaintext state, so that in order to ensure the security of the security parameters, a trusted network can be adopted for transmission.
And at the side of the target physical machine, receiving the security parameters corresponding to the target virtual machine transmitted by the source physical machine, and configuring the security parameters into the virtual trusted module.
In some practical applications, a virtual storage space may be configured for the virtual trusted module on the destination physical machine, and the security parameters may be stored in the virtual storage space. Wherein the virtual storage space may be mapped to a physical storage space on the destination physical machine. That is, the security parameters required by the target virtual machine may be stored in the memory space provided by the destination physical machine, but independently outside the memory space of the hardware trusted module. The method is particularly suitable for a scene of simultaneously carrying out trusted support on a plurality of virtual machines on the target physical machine, and because the storage space of the hardware trusted module of the target physical machine is limited, the trusted support of the hardware trusted module of the target physical machine on the plurality of virtual machines running on the target physical machine can be realized by utilizing the storage space provided by the target physical machine and expanding the trusted state of the hardware trusted module to the virtual storage space of the virtual trusted module.
As mentioned above, the trusted support capability provided by the virtual trusted module and the hardware trusted module can be kept consistent, and therefore, on the destination physical machine side, the virtual storage space of the virtual trusted module can be divided into vPCR (virtual platform configuration Registers) and general Registers, consistent with the hardware trusted module. Accordingly, the security parameters transmitted by the source physical machine may be stored in the corresponding location of the virtual memory space according to the parameter type, for example, the metric value may be stored in the vPCR.
On the side of the destination physical machine, a coupling relation between the virtual trusted module and a hardware trusted module on the destination physical machine can be created, so that the target virtual machine is trusted and supported by the hardware trusted module based on the security parameters.
In some practical applications, the creating of the coupling relationship may specifically be adding the target virtual machine and the virtual trusted module thereof to a trusted support list corresponding to the hardware trusted module of the target physical machine. The trusted support list may be maintained by an application on the destination physical machine that manages virtualization, based on which the application managing virtualization may access control various access requests to the hardware trusted module. Of course, in this embodiment, creating the coupling relationship is not limited to the trusted support list.
The trusted support of the target virtual machine by the hardware trusted module is realized by using the characteristics of key management, configuration management and the like of the hardware trusted module and based on the security parameters required by the target virtual machine, and the functions of integrity authentication of the target virtual machine, prevention of unauthorized software modification, user identity authentication, digital signature, comprehensive encryption of a virtual hard disk, erasability and the like are completed. And will not be described in detail herein.
In addition, on the side of the destination physical machine, the hardware trusted module on the destination physical machine can be called to encrypt the security parameters stored in the virtual storage space based on the coupling relationship between the virtual trusted module and the hardware trusted module on the destination physical machine. Thus, the credibility of the security parameters required by the target virtual machine can be ensured.
In this embodiment, on the side of the source physical machine, after the virtual trusted module corresponding to the target virtual machine migrates, at least one of the following operations may be further performed to release the coupling relationship between the virtual trusted module corresponding to the target virtual machine and the hardware trusted module of the source physical machine:
deleting a virtual trusted module corresponding to the target virtual machine;
deleting the target virtual machine from a trusted support list corresponding to the hardware trusted module; or
The hardware trusted module controlling the source physical machine ceases trusted support of the target virtual machine.
Of course, the present embodiment is not limited thereto.
In this embodiment, when the virtual machine is migrated, the security parameters required by the virtual machine are also migrated to the destination physical machine, so that after the virtual machine is migrated to the destination physical machine, the trusted support can be provided for the virtual machine on the destination physical machine based on the security parameters required by the virtual machine by using the hardware trusted module of the destination physical machine. Therefore, in the embodiment, after the virtual machine is migrated, the credibility of the virtual environment in the cloud service system can be continuously maintained.
Fig. 2 is a flowchart illustrating a virtual machine migration method according to an embodiment of the present application. As shown in fig. 2, the method may be applied to the source physical machine side in the foregoing virtual machine migration system, and the method includes:
200. migrating a target virtual machine on a source physical machine to a target physical machine, wherein a virtual trusted module corresponding to the target virtual machine is configured on the source physical machine;
201. acquiring security parameters required by a target virtual machine according to a coupling relation between a virtual trusted module and a hardware trusted module on a source physical machine;
202. and sending the security parameters to the target physical machine so that the target physical machine can support the target virtual machine in a trusted manner through a hardware trusted module on the target physical machine based on the security parameters.
In an alternative embodiment, step 201 includes:
and calling the hardware trusted module on the source physical machine to decrypt the encrypted security parameters according to the coupling relation between the virtual trusted module and the hardware trusted module on the source physical machine to obtain the security parameters, wherein the encrypted security parameters are configured in the virtual trusted module corresponding to the target virtual machine.
In an alternative embodiment, step 202 comprises:
carrying out snapshot on the security parameters;
and sending the snapshot to the target physical machine through the trusted network.
In an optional embodiment, the method further comprises at least one of:
deleting a virtual trusted module corresponding to the target virtual machine;
deleting the target virtual machine from a trusted support list corresponding to the hardware trusted module; or
The control hardware trusted module ceases trusted support of the target virtual machine.
It should be noted that, for the technical details in the embodiments of the virtual machine migration method applicable to the source physical machine side, reference may be made to the foregoing description on the technical solution for the source physical machine side in the virtual machine migration system, and for the sake of brevity, details are not described here, but this should not cause a loss of the scope of the present application.
Fig. 3 is a schematic structural diagram of a virtual machine migration apparatus according to an embodiment of the present disclosure. As shown in fig. 3, the apparatus includes:
the virtual machine management module 30 is configured to migrate a target virtual machine on a source physical machine to a destination physical machine, where a virtual trusted module corresponding to the target virtual machine is configured on the source physical machine;
the control module 31 is configured to obtain a security parameter required by the target virtual machine according to a coupling relationship between the virtual trusted module and a hardware trusted module on the source physical machine;
and the communication module 32 is configured to send the security parameters to the destination physical machine, so that the destination physical machine performs trusted support on the target virtual machine through a hardware trusted module thereon based on the security parameters.
In an optional embodiment, the control module 31 is specifically configured to:
and calling the hardware trusted module on the source physical machine to decrypt the encrypted security parameters according to the coupling relation between the virtual trusted module and the hardware trusted module on the source physical machine to obtain the security parameters, wherein the encrypted security parameters are configured in the virtual trusted module corresponding to the target virtual machine.
In an optional embodiment, the communication module 32 is specifically configured to:
carrying out snapshot on the security parameters;
and sending the snapshot to the target physical machine through the trusted network.
In an alternative embodiment, the virtual machine management module 30 may be further configured to perform at least one of the following operations:
deleting a virtual trusted module corresponding to the target virtual machine;
deleting the target virtual machine from a trusted support list corresponding to the hardware trusted module; or
The control hardware trusted module ceases trusted support of the target virtual machine.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the virtual machine migration apparatus described above may be referred to the foregoing description of the technical solution for the source physical machine side in the virtual machine migration system, which should not cause a loss of the protection scope of the present application.
The internal functions and structures of the virtual machine migration apparatus are described above, and as shown in fig. 4, in practice, the virtual machine migration apparatus may be deployed in a physical machine, and the physical machine may include: a hardware trusted module 40, a memory 41, a processor 42 and a communication component 43.
A processor 42, coupled to the hardware trusted module 40, the memory 41 and the communication component 43, for executing computer programs in the memory for:
migrating a target virtual machine on a physical machine to a target physical machine, wherein a virtual trusted module corresponding to the target virtual machine is configured on the physical machine;
acquiring security parameters required by a target virtual machine according to a coupling relation between the virtual trusted module and a hardware trusted module 40 on the physical machine;
the security parameters are sent to the destination physical machine through the communication component 43, so that the destination physical machine can support the target virtual machine in a trusted manner through the hardware trusted module thereon based on the security parameters.
In an alternative embodiment, processor 42 is specifically configured to:
and calling the hardware trusted module on the source physical machine to decrypt the encrypted security parameters according to the coupling relation between the virtual trusted module and the hardware trusted module on the source physical machine to obtain the security parameters, wherein the encrypted security parameters are configured in the virtual trusted module corresponding to the target virtual machine.
In an alternative embodiment, processor 42 is specifically configured to:
carrying out snapshot on the security parameters;
and sending the snapshot to the target physical machine through the trusted network.
In an alternative embodiment, processor 42 may be further configured to perform at least one of the following:
deleting a virtual trusted module corresponding to the target virtual machine;
deleting the target virtual machine from a trusted support list corresponding to the hardware trusted module; or
The control hardware trusted module ceases trusted support of the target virtual machine.
Further, as shown in fig. 4, the physical machine further includes: a display 44, a power supply component 45, an audio component 46, and the like. Only some of the components are schematically shown in fig. 4, and it is not meant that the physical machine includes only the components shown in fig. 4.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the physical machine described above may be referred to the foregoing description of the technical solution for the source physical machine side in the virtual machine migration system, which is not described in detail herein, but should not cause a loss of the scope of the present application.
Accordingly, the present application also provides a computer-readable storage medium storing computer instructions that, when executed by one or more processors, cause the one or more processors to perform a virtual machine migration method performed by the aforementioned physical machine.
Fig. 5 is a flowchart illustrating a virtual machine migration method according to an embodiment of the present application. As shown in fig. 6, the method may be applied to the destination physical machine side in the foregoing virtual machine migration system, and the method includes:
500. deploying a target virtual machine migrated from a source physical machine on a target physical machine, and configuring a virtual trusted module for the target virtual machine on the target physical machine;
501. receiving security parameters corresponding to a target virtual machine transmitted by a source physical machine, and configuring the security parameters into a virtual trusted module;
502. and establishing a coupling relation between the virtual trusted module and a hardware trusted module on the target physical machine so as to utilize the hardware trusted module to perform trusted support on the target virtual machine based on the security parameters.
In an alternative embodiment, step 501 comprises:
configuring a virtual storage space for the virtual trusted module on the target physical machine, wherein the virtual storage space is mapped to a physical storage space on the target physical machine;
and storing the security parameters into the virtual storage space.
In an optional embodiment, the method further comprises:
and calling the hardware trusted module on the target physical machine to encrypt the security parameters stored in the virtual storage space based on the coupling relation between the virtual trusted module and the hardware trusted module on the target physical machine.
It should be noted that, for the foregoing technical details in the embodiments of the virtual machine migration method applicable to the destination physical machine side, reference may be made to the foregoing description of the technical solution for the destination physical machine side in the virtual machine migration system, and for brevity, details are not described here, but this should not cause a loss of the scope of the present application.
Fig. 6 is a schematic structural diagram of a virtual machine migration apparatus according to an embodiment of the present disclosure. As shown in fig. 6, the apparatus includes:
the virtual machine management module 60 is configured to deploy the target virtual machine migrated from the source physical machine on the target physical machine, and configure a virtual trusted module for the target virtual machine on the target physical machine;
the communication module 61 is configured to receive the security parameters corresponding to the target virtual machine transmitted by the source physical machine, and configure the security parameters into the virtual trusted module;
and the control module 62 is configured to create a coupling relationship between the virtual trusted module and a hardware trusted module on the destination physical machine, so as to perform trusted support on the target virtual machine by using the hardware trusted module based on the security parameter.
In an optional embodiment, the communication module 61 is specifically configured to:
configuring a virtual storage space for the virtual trusted module on the target physical machine, wherein the virtual storage space is mapped to a physical storage space on the target physical machine;
and storing the security parameters into the virtual storage space.
In an alternative embodiment, the control module 62 is further configured to:
and calling the hardware trusted module on the target physical machine to encrypt the security parameters stored in the virtual storage space based on the coupling relation between the virtual trusted module and the hardware trusted module on the target physical machine.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the virtual machine migration apparatus described above may be referred to the foregoing description of the technical solution for the destination physical machine side in the virtual machine migration system, and this should not cause a loss of the protection scope of the present application.
The internal functions and structures of the virtual machine migration apparatus are described above, and as shown in fig. 7, in practice, the virtual machine migration apparatus may be deployed in a physical machine, and the physical machine may include: a hardware trusted module 70, a memory 71, a processor 72 and a communication component 73.
A processor 72, coupled to the hardware trusted module 70, the memory 71 and the communication component 73, for executing computer programs in the memory for:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and configuring a virtual trusted module for the target virtual machine on the target physical machine;
receiving security parameters corresponding to a target virtual machine transmitted by a source physical machine, and configuring the security parameters into a virtual trusted module;
and establishing a coupling relation between the virtual trusted module and a hardware trusted module on the target physical machine so as to utilize the hardware trusted module to perform trusted support on the target virtual machine based on the security parameters.
In an alternative embodiment, processor 72 is specifically configured to:
configuring a virtual storage space for the virtual trusted module on the target physical machine, wherein the virtual storage space is mapped to a physical storage space on the target physical machine;
and storing the security parameters into the virtual storage space.
In an alternative embodiment, processor 72 is further configured to:
and calling the hardware trusted module on the target physical machine to encrypt the security parameters stored in the virtual storage space based on the coupling relation between the virtual trusted module and the hardware trusted module on the target physical machine.
Further, as shown in fig. 7, the physical machine further includes: a display 74, power components 75, audio components 76, and the like. Only some of the components are schematically shown in fig. 7, and it is not meant that the physical machine includes only the components shown in fig. 7.
It should be noted that, for the sake of brevity, the technical details in the embodiments of the physical machine described above may be referred to the foregoing description of the technical solution for the destination physical machine side in the virtual machine migration system, and this should not cause a loss of the protection scope of the present application.
Accordingly, the present application also provides a computer-readable storage medium storing computer instructions that, when executed by one or more processors, cause the one or more processors to perform a virtual machine migration method performed by the aforementioned physical machine.
Fig. 8 is a schematic structural diagram of a virtual machine migration system according to another embodiment of the present application. As shown in fig. 8, the system includes a source physical machine 80 and a destination physical machine 81.
In this embodiment, both the source physical machine 80 and the destination physical machine 81 may be configured with a hardware trusted module 82. The hardware Trusted Module includes, but is not limited to, TPM (Trusted Platform Module) or TCM (Trusted cryptography Module). The hardware trusted module may be assembled on a motherboard of the source physical machine or the destination physical machine in a chip form, and of course, the present embodiment does not limit a hardware connection manner between the hardware trusted module and the source physical machine or the destination physical machine.
In this embodiment, both the source physical machine 80 and the destination physical machine 81 may run an application program for managing virtualization so as to manage a virtual environment in the cloud service system, and the application program for managing virtualization may serve as a medium for interaction between the virtual environment and the physical environment in the cloud service system.
In this embodiment, a plurality of virtual machines 83 may be run on both the source physical machine 80 and the destination physical machine 81. The security parameters required by each virtual machine may be stored in a hardware trusted module on the physical machine in which it resides. Security parameters include, but are not limited to, metrics, keys, and the like, which are parameters required for trusted support.
The following will use the target virtual machine as an example to perform a detailed description of the virtual machine migration scheme, and it should be understood that the target virtual machine may be any virtual machine that needs to be migrated in the cloud service system.
On one side of the source physical machine, a target virtual machine on the source physical machine can be migrated to a target physical machine; and sending the authentication parameters used by the hardware trusted module on the target virtual machine access source physical machine to the target physical machine. In this embodiment, the authentication parameter used by the hardware trusted module on the target virtual machine access source physical machine may be in the form of a certificate, a key, or other parameters, and the parameter form of the authentication parameter is not limited in this embodiment.
In one implementation, a snapshot may be performed on a target virtual machine, where the snapshot includes an authentication parameter used by a hardware trusted module on a target virtual machine access source physical machine; and sending the snapshot to the destination physical machine.
In this implementation manner, the authentication parameter used by the hardware trusted module on the target virtual machine access source physical machine may be used as virtual machine information in the virtual machine migration process, and included in the snapshot of the virtual machine, so that when the target virtual machine is deployed on the target physical machine side, the authentication parameter may be obtained.
In another implementation, the authentication parameters used by the hardware trusted module on the target virtual machine access source physical machine may be snapshot, and the snapshot may be sent to the target physical machine.
In this implementation, a separate snapshot may be made for authentication parameters used by a hardware trusted module on the target virtual machine access source physical machine, and the snapshot operation may be independent of the snapshot operation on the virtual machine. Thus, when receiving the snapshot of the authentication parameter, the destination physical machine side can obtain the authentication parameter.
On the side of the destination physical machine, the target virtual machine migrated from the source physical machine can be deployed on the destination physical machine, and the authentication parameters used by the hardware trusted module of the target virtual machine accessing the source physical machine are obtained. Wherein, the deployment process of the target virtual machine on the target physical machine is not described in detail.
As described above, based on different sending modes adopted by the source physical machine side for the authentication parameters used by the hardware trusted module on the target virtual machine access source physical machine, the target physical machine may obtain the authentication parameters used by the hardware trusted module on the target virtual machine access source physical machine through different approaches.
On the side of the target physical machine, a remote access request can be generated according to authentication parameters used by a hardware trusted module on the target virtual machine access source physical machine, and the remote access request is sent to the side of the source physical machine. For example, a certificate used by the hardware trusted module on the target virtual machine access source physical machine may be included in the remote access request.
In practical application, when a trusted support requirement occurs on a target virtual machine, a service use request can be initiated to a management virtual application program on the target physical machine, and the management virtual application program can generate a remote access request according to an authentication parameter used by a hardware trusted module on a target virtual machine access source physical machine and send the remote access request to the management virtual application program on the source physical machine, so that the management virtual application program on the source physical machine can authenticate the remote access request.
On the source physical machine side, if a remote access request transmitted by a destination physical machine is received, the remote access request can be authenticated based on the authentication parameters contained in the remote access request.
On the side of the source physical machine, authentication parameters used by a hardware trusted module on the target virtual machine access source physical machine are stored. Based on this, in practical applications, the application program managing virtualization on the source physical machine may determine whether to pass authentication for the remote access request by determining whether authentication parameters used by a hardware trusted module on the target virtual machine, which is stored on the source physical machine side, accessing the source physical machine are matched with authentication parameters included in the remote access request.
On the side of the source physical machine, if the remote access request transmitted by the destination physical machine is confirmed to pass the authentication, the remote communication connection can be established with the destination physical machine.
The step of establishing the remote communication connection refers to establishing a service channel supported by credibility. Through the remote communication connection, the hardware trusted module on the source physical machine opens the service authority supported by the trust for the target virtual machine on the target physical machine. In particular, trusted support may be provided for a target virtual machine by a hardware trusted module based on security parameters required by the target virtual machine stored thereon.
The trusted support is provided for the target virtual machine through the hardware trusted module, and the trusted support is characterized in that the integrity authentication of the target virtual machine, the unauthorized software modification prevention, the user identity authentication, the digital signature, the comprehensive encryption of the virtual hard disk, the complete erasing and writing and other functions are completed based on the security parameters required by the target virtual machine by utilizing the characteristics of key management, configuration management and the like of the hardware trusted module. And will not be described in detail herein.
Based on the above, on the side of the destination physical machine, if the remote access request passes the authentication of the source physical machine, the hardware trusted module on the source physical machine can be remotely called to perform trusted support on the target virtual machine.
In practical application, when a trusted support requirement occurs on the target virtual machine, the trusted support requirement of the target virtual machine can be sent to the hardware trusted module on the source physical machine through the virtual application program on the target physical machine and the virtual application program on the source physical machine based on the remote communication channel, so as to remotely call the hardware trusted module on the source physical machine, and further obtain the trusted support of the hardware trusted module on the source physical machine. The remote communication connection may be a continuous connection channel, or may be a connection channel that is conducted as needed, which is not limited in this embodiment.
In this embodiment, when the target virtual machine is migrated, based on the authentication parameter used by the hardware trusted module on the target virtual machine access source physical machine, the target virtual machine can remotely call the hardware trusted module on the source physical machine, so that trusted support for the migrated target virtual machine is realized through the hardware trusted module on the source physical machine. Therefore, in this embodiment, it is not necessary to migrate the security parameters required for trusted support of the target virtual machine, and after the target virtual machine is migrated, availability of data related to the target virtual machine under the hardware trusted module on the source physical machine can be ensured in a remote access manner, so that security risks in the migration process of data such as the security parameters required for trusted support of the target virtual machine can be avoided.
In the above or the following embodiments, at the destination physical machine side, the identity information of the destination physical machine may also be configured into the remote access request, so that the source physical machine performs transmission-side identity authentication on the remote access request.
The identity information of the destination physical machine may be information that can uniquely identify the identity of the destination physical machine, such as an ID and a MAC address of the destination physical machine, which is not limited in this embodiment.
On the side of the source physical machine, when the operation of migrating the target virtual machine to the target physical machine is executed, the identity information of the target physical machine to which the target virtual machine is migrated can be recorded, so that the identity authentication of the transmitter can be performed on the received remote access request subsequently.
And associating the target virtual machine, the target physical machine and the authentication parameters corresponding to the target virtual machine through the identity information of the target physical machine. Therefore, on one side of the source physical machine, the authentication parameters can be authenticated, and the identity authentication can be performed on the transmitter sending the remote access request, so that abnormal calling of a hardware trusted module on the source physical machine can be effectively avoided, and the credibility of the target virtual machine is further ensured.
In the above or below embodiments, on the source physical machine side, a trusted authentication request for the target virtual machine may be sent to the remote authentication center in a case where the target virtual machine is run on the source physical machine for the first time; and if the authentication passing notification returned by the remote authentication center is received, configuring the authentication parameters used by the hardware trusted module on the access source physical machine for the target virtual machine.
The remote authentication center is a trusted authentication party independent of the source physical machine and the target physical machine, and basic measurement values corresponding to all virtual machines in the cloud computing platform can be stored on the remote authentication center. Trusted state includes, but is not limited to, whether trusted, a description of the reason for trust, the time of occurrence of the trusted authentication, etc. The remote authentication center may return the trusted state to the source physical machine.
Accordingly, the source physical machine can configure, based on the trusted state of the target virtual machine returned by the remote authentication center, the authentication parameters used by the hardware trusted module on the access source physical machine for the target virtual machine to access the hardware trusted module on the source physical machine based on the authentication parameters, under the condition that the target virtual machine is determined to be trusted.
In practical applications, on the source physical machine side, the authentication parameter may manage virtual unfair program management on the source physical machine. Of course, this embodiment is not limited thereto.
Fig. 9 is a flowchart illustrating a virtual machine migration method according to another embodiment of the present application. As shown in fig. 9, the method may be applied to the source physical machine side in the virtual machine migration system shown in fig. 7, and the method includes:
900. migrating a target virtual machine on a source physical machine to a target physical machine, and sending authentication parameters used by a hardware trusted module of the target virtual machine accessed to the source physical machine to the target physical machine so as to enable the target virtual machine to remotely access the hardware trusted module of the source physical machine;
901. if a remote access request transmitted by a target physical machine is received, authenticating the remote access request based on authentication parameters contained in the remote access request;
902. and if the remote access request passes the authentication, establishing remote communication connection with the target physical machine so as to perform trusted support on the target virtual machine through a hardware trusted module on the source physical machine.
In an alternative embodiment, step 900 includes:
carrying out snapshot on the target virtual machine, wherein the snapshot comprises authentication parameters used by a hardware trusted module on the target virtual machine access source physical machine;
and sending the snapshot to the destination physical machine.
In an optional embodiment, the remote access request further includes identity information of the destination physical machine, and the method further includes:
according to the identity information of the target physical machine contained in the remote access request, carrying out identity verification of a transmission party on the remote access request;
and if the remote access request is confirmed to pass the identity verification of the transmission party, performing the operation of establishing the remote communication connection with the target physical machine.
In an optional embodiment, the method further comprises:
under the condition that the target virtual machine runs on the source physical machine for the first time, sending a trusted authentication request aiming at the target virtual machine to a remote authentication center;
and if the authentication passing notification returned by the remote authentication center is received, configuring the authentication parameters used by the hardware trusted module on the access source physical machine for the target virtual machine.
It should be noted that, for the technical details in the embodiments of the virtual machine migration method applicable to the source physical machine side, reference may be made to the foregoing description on the technical solution for the source physical machine side in the virtual machine migration system, and for the sake of brevity, details are not described here, but this should not cause a loss of the scope of the present application.
Fig. 10 is a schematic structural diagram of a virtual machine migration apparatus according to another embodiment of the present application. As shown in fig. 10, the apparatus comprises:
the virtual machine management module 100 is configured to migrate a target virtual machine on a source physical machine to a destination physical machine, and send an authentication parameter used by a hardware trusted module on the source physical machine accessed by the target virtual machine to the destination physical machine, so that the target virtual machine can remotely access the hardware trusted module on the source physical machine;
the authentication module 101 is configured to authenticate a remote access request based on an authentication parameter included in the remote access request if the remote access request transmitted by a destination physical machine is received;
the communication module 102 is configured to establish a remote communication connection with the destination physical machine if the remote access request passes the authentication, so as to perform trusted support on the target virtual machine through a hardware trusted module on the source physical machine.
In an optional embodiment, the virtual machine management module 100 is specifically configured to:
carrying out snapshot on the target virtual machine, wherein the snapshot comprises authentication parameters used by a hardware trusted module on the target virtual machine access source physical machine;
and sending the snapshot to the destination physical machine.
In an optional embodiment, the remote access request further includes identity information of the destination physical machine, and the authentication module 101 is further configured to:
according to the identity information of the target physical machine contained in the remote access request, carrying out identity verification of a transmission party on the remote access request;
and if the remote access request is confirmed to pass the identity verification of the transmission party, performing the operation of establishing the remote communication connection with the target physical machine.
In an optional embodiment, the virtual machine management module 100 is further configured to:
under the condition that the target virtual machine runs on the source physical machine for the first time, sending a trusted authentication request aiming at the target virtual machine to a remote authentication center;
and if the authentication passing notification returned by the remote authentication center is received, configuring the authentication parameters used by the hardware trusted module on the access source physical machine for the target virtual machine.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the virtual machine migration apparatus described above may be referred to the foregoing description of the technical solution for the source physical machine side in the virtual machine migration system, which should not cause a loss of the protection scope of the present application.
The internal functions and structures of the virtual machine migration apparatus are described above, and as shown in fig. 11, in practice, the virtual machine migration apparatus may be deployed in a physical machine, and the physical machine may include: a hardware trusted module 110, a memory 111, a processor 112, and a communication component 113.
A processor 112, coupled to the hardware trusted module 110, the memory 111, and the communication component 113, for executing computer programs in the memory for:
migrating a target virtual machine on a source physical machine to a target physical machine, and sending authentication parameters used by a hardware trusted module of the target virtual machine accessed to the source physical machine to the target physical machine through a communication component 113 so as to enable the target virtual machine to remotely access the hardware trusted module of the source physical machine;
if a remote access request transmitted by a target physical machine is received, authenticating the remote access request based on authentication parameters contained in the remote access request;
and if the remote access request passes the authentication, establishing remote communication connection with the target physical machine so as to perform trusted support on the target virtual machine through a hardware trusted module on the source physical machine.
In an alternative embodiment, the processor 112 is migrating a target virtual machine on a source physical machine to a destination physical machine; when the authentication parameters used by the hardware trusted module on the target virtual machine access source physical machine are sent to the target physical machine, the authentication parameters are used for:
carrying out snapshot on the target virtual machine, wherein the snapshot comprises authentication parameters used by a hardware trusted module on the target virtual machine access source physical machine;
and sending the snapshot to the destination physical machine.
In an optional embodiment, the remote access request further includes identity information of the destination physical machine, and the processor 112 is further configured to:
according to the identity information of the target physical machine contained in the remote access request, carrying out identity verification of a transmission party on the remote access request;
and if the remote access request is confirmed to pass the identity verification of the transmission party, performing the operation of establishing the remote communication connection with the target physical machine.
In an alternative embodiment, the processor 112 is further configured to:
under the condition that the target virtual machine runs on the source physical machine for the first time, sending a trusted authentication request aiming at the target virtual machine to a remote authentication center;
and if the authentication passing notification returned by the remote authentication center is received, configuring the authentication parameters used by the hardware trusted module on the access source physical machine for the target virtual machine.
Further, as shown in fig. 11, the physical machine further includes: display 114, power supply component 115, audio component 116, and the like. Only some of the components are schematically shown in fig. 11, and it is not meant that the physical machine includes only the components shown in fig. 11.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the physical machine described above may be referred to the foregoing description of the technical solution for the source physical machine side in the virtual machine migration system, which is not described in detail herein, but should not cause a loss of the scope of the present application.
Accordingly, the present application also provides a computer-readable storage medium storing computer instructions that, when executed by one or more processors, cause the one or more processors to perform a virtual machine migration method performed by the aforementioned physical machine.
Fig. 12 is a flowchart illustrating another virtual machine migration method according to another embodiment of the present application. As shown in fig. 12, the method may be applied to the destination physical machine side in the foregoing virtual machine migration system, and the method includes:
120. deploying a target virtual machine migrated from a source physical machine on a target physical machine, and acquiring an authentication parameter used by a hardware trusted module of the target virtual machine accessed to the source physical machine;
121. generating a remote access request according to the authentication parameters, and sending the remote access request to the source physical machine;
122. and if the remote access request passes the authentication of the source physical machine, remotely calling a hardware trusted module on the source physical machine to perform trusted support on the target virtual machine.
In an optional embodiment, the method further comprises:
and configuring the identity information of the destination physical machine into the remote access request so as to carry out transmission party identity verification on the remote access request by the source physical machine.
It should be noted that, for the foregoing technical details in the embodiments of the virtual machine migration method applicable to the destination physical machine side, reference may be made to the foregoing description of the technical solution for the destination physical machine side in the virtual machine migration system, and for brevity, details are not described here, but this should not cause a loss of the scope of the present application.
Fig. 13 is a schematic structural diagram of another virtual machine migration apparatus according to another embodiment of the present application. As shown in fig. 13, the apparatus includes:
the virtual machine management module 130 is configured to deploy a target virtual machine migrated from a source physical machine on a target physical machine, and obtain an authentication parameter used by a hardware trusted module of the target virtual machine accessing the source physical machine;
the authentication module 131 is configured to generate a remote access request according to the authentication parameter;
a communication module 132 for sending a remote access request to the source physical machine;
and the control module 133 is configured to, if the remote access request passes the authentication of the source physical machine, remotely call a hardware trusted module on the source physical machine to perform trusted support on the target virtual machine.
In an optional embodiment, the authentication module 131 is further configured to:
and configuring the identity information of the destination physical machine into the remote access request so as to carry out transmission party identity verification on the remote access request by the source physical machine.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the virtual machine migration apparatus described above may be referred to the foregoing description of the technical solution for the destination physical machine side in the virtual machine migration system, and this should not cause a loss of the protection scope of the present application.
The internal functions and structures of the virtual machine migration apparatus are described above, and as shown in fig. 14, in practice, the virtual machine migration apparatus may be deployed in a physical machine, and the physical machine may include: hardware trusted module 140, memory 141, processor 142, and communications component 143.
A processor 142, coupled to hardware trusted module 140, memory 141, and communication component 143, for executing computer programs in the memory for:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and acquiring an authentication parameter used by a hardware trusted module of the target virtual machine accessed to the source physical machine;
generating a remote access request according to the authentication parameters, and sending the remote access request to the source physical machine;
and if the remote access request passes the authentication of the source physical machine, remotely calling a hardware trusted module on the source physical machine to perform trusted support on the target virtual machine.
In an alternative embodiment, processor 142 is further configured to:
and configuring the identity information of the destination physical machine into the remote access request so as to carry out transmission party identity verification on the remote access request by the source physical machine.
Further, as shown in fig. 14, the physical machine further includes: display 144, power supply 145, audio 146, and other components. Only some of the components are schematically shown in fig. 14, and it is not meant that the physical machine includes only the components shown in fig. 14.
It should be noted that, for the sake of brevity, the technical details in the embodiments of the physical machine described above may be referred to the foregoing description of the technical solution for the destination physical machine side in the virtual machine migration system, and this should not cause a loss of the protection scope of the present application.
Accordingly, the present application also provides a computer-readable storage medium storing computer instructions that, when executed by one or more processors, cause the one or more processors to perform a virtual machine migration method performed by the aforementioned physical machine.
Fig. 15 is a schematic structural diagram of a virtual machine migration system according to an embodiment of friendship of the present application. As shown in fig. 15, the system includes: source physical machine 150, destination physical machine 151, trusted hardware cluster 152, and cluster control device 155. Cluster control device 155 may communicate with source physical machine 150, destination physical machine 151, and trusted hardware cluster 153.
It should be noted that, in this embodiment, for convenience of describing the migration process of the virtual machine, in the cloud service system, a combination of several participants involved in the migration process of a single virtual machine is referred to as a virtual machine migration system. It should be understood that, in this embodiment, the source physical machine 150 or the destination physical machine 151 may be any physical machine in the cloud service system, and the trusted hardware cluster 152 may also provide trusted support for other physical machines or virtual machines in the cloud service system.
The Trusted hardware cluster 152 may include at least one Trusted hardware 153, and the Trusted hardware in the Trusted hardware cluster 152 includes but is not limited to a TPM (Trusted Platform Module) or a TCM (Trusted cryptography Module). In addition, an access control program can be run in the cluster control device to perform access control on the trusted hardware cluster.
The trusted hardware 153 in the trusted hardware cluster 152 may provide trusted support for each physical machine or virtual machine in the cloud service system, and security parameters required by each physical machine or virtual machine in the trusted support process may be stored in the trusted hardware cluster. Security parameters include, but are not limited to, metrics, keys, and the like, which are parameters required for trusted support.
A plurality of virtual machines 154 may be run on the source physical machine 150 or the destination physical machine 151, and a detailed description of a virtual machine migration scheme will be described below by taking a target virtual machine as an example, it should be understood that the target virtual machine may be any virtual machine that needs to be migrated in the cloud service system.
In this embodiment, on the source physical machine side, the target virtual machine on the source physical machine may be migrated to the destination physical machine, and the authentication parameter used by the target virtual machine to access the trusted hardware cluster is sent to the destination physical machine. In this embodiment, the authentication parameter used by the target virtual machine to access the trusted hardware cluster may be in the form of a certificate, a key, or other parameters, and the parameter form of the authentication parameter is not limited in this embodiment.
In one implementation, a snapshot may be performed on a target virtual machine, where the snapshot includes authentication parameters used by the target virtual machine to access a trusted hardware cluster; and sending the snapshot to the destination physical machine.
In this implementation manner, the authentication parameter used by the target virtual machine accessing the trusted hardware cluster may be used as virtual machine information in the virtual machine migration process, and included in the snapshot of the virtual machine, so that when the target virtual machine is deployed on the side of the target physical machine, the authentication parameter may be obtained.
In another implementation, the authentication parameters used by the target virtual machine to access the trusted hardware cluster may be snapshot, and the snapshot may be sent to the target physical machine.
In this implementation, a separate snapshot may be taken of authentication parameters used by the target virtual machine to access the trusted hardware cluster, which may be independent of the snapshot operations on the virtual machine. Thus, when receiving the snapshot of the authentication parameter, the destination physical machine side can obtain the authentication parameter.
On the side of the destination physical machine, the target virtual machine migrated from the source physical machine can be deployed on the destination physical machine, and the authentication parameters used by the target virtual machine to access the trusted hardware cluster are obtained. Wherein, the deployment process of the target virtual machine on the target physical machine is not described in detail.
As described above, based on different sending modes adopted by the source physical machine side for the authentication parameters used by the target virtual machine to access the trusted hardware cluster, the target physical machine may obtain the authentication parameters used by the target virtual machine to access the trusted hardware cluster through different approaches.
And at the side of the target physical machine, a remote access request can be generated according to the authentication parameters, and the remote access request is sent to the trusted hardware cluster. For example, the credentials used by the target virtual machine to access the trusted hardware cluster may be included in the remote access request.
In practical application, when a trusted support requirement occurs on a target virtual machine, a service use request can be initiated to a virtual management application program on the target physical machine, and the virtual management application program can generate a remote access request according to an authentication parameter used by the target virtual machine to access a trusted hardware cluster and send the remote access request to cluster control equipment so that an access control program running on the cluster control equipment can authenticate the remote access request.
And on one side of the cluster control equipment, receiving a remote access request transmitted by a target physical machine where the target virtual machine is located after migration, and authenticating the remote access request based on authentication parameters contained in the remote access request.
On the cluster control device side, authentication parameters used by the target virtual machine to access the trusted hardware cluster can be saved. Based on this, in practical applications, the access control program on the cluster control device may determine whether to pass the authentication for the remote access request by judging whether the authentication parameter used by the target virtual machine stored on the cluster control device side to access the trusted hardware cluster matches the authentication parameter included in the remote access request.
On one side of the cluster control equipment, if the remote access request passes the authentication, according to the preset incidence relation between the virtual machine and the trusted hardware, the target virtual machine is accessed into the target trusted hardware associated with the target virtual machine in the trusted hardware cluster, so that the target virtual machine is supported in a trusted manner through the target trusted hardware.
The step of accessing the target virtual machine to the target trusted hardware refers to establishing a service channel for calling the target trusted hardware by the target virtual machine. Accordingly, if the remote access request transmitted by the destination physical machine passes the authentication, the target trusted hardware in the trusted hardware cluster will open the service authority supported by the trust for the target virtual machine. Specifically, the cluster control device may invoke the target trusted hardware to provide trusted support for the target virtual machine based on the security parameters required by the target virtual machine stored in the target trusted hardware, when receiving the remote access request corresponding to the target virtual machine.
In this embodiment, invoking the target trusted hardware to perform trusted support on the target virtual machine means that the integrity authentication of the target virtual machine, the prevention of unauthorized software modification, user identity authentication, digital signature, the comprehensive encryption of the virtual hard disk, the complete erasure and the like are completed based on the security parameters required by the target virtual machine by using the characteristics of key management, configuration management and the like of the target trusted hardware. And will not be described in detail herein.
In this embodiment, the cluster control device may pre-configure, according to the service capability of each trusted hardware in the trusted hardware cluster, a virtual machine that can be supported by each trusted hardware, so as to create a preset association relationship between the virtual machine and the trusted hardware. Therefore, the cluster control equipment side can reasonably distribute the trusted resources based on the resource use request so as to improve the utilization efficiency of the trusted resources.
Based on the preset incidence relation between the virtual machine and the trusted hardware, the cluster control equipment side can determine the target trusted hardware corresponding to the target virtual machine according to the incidence relation before and after the target virtual machine is migrated, and can distribute the trusted support requirement caused by the target virtual machine to the target trusted hardware.
Based on the above, on the side of the target physical machine, if the remote access request passes the authentication of the trusted hardware cluster, the trusted hardware cluster is remotely called to perform trusted support on the target virtual machine.
Specifically, when a trusted support requirement occurs on the target virtual machine, the remote access request may be transmitted to the cluster control device through the target physical machine, and the cluster control device may allocate the remote access request to target trusted hardware corresponding to the target virtual machine, and respond to the remote access request through the target trusted hardware.
In the embodiment, the trusted hardware cluster and the cluster control device are deployed in the cloud service system, so that the trusted hardware in the cloud service system can be centrally managed and used, and the trusted resources in the cloud service system can be more conveniently subjected to resource allocation and access control. Therefore, under the condition that the target virtual machine in the cloud service system is migrated, the migration of security parameters required by the trusted support of the target virtual machine is not needed, and the availability of data related to the target virtual machine in the trusted hardware cluster can be ensured after the migration of the target virtual machine in a remote access mode, so that the security risk existing in the migration process of the data such as the security parameters required by the trusted support of the target virtual machine can be avoided.
In the above or following embodiments, on the source physical machine side, a migration notification of the target virtual machine may also be sent to the cluster control device.
On the cluster control device side, when receiving a migration notification of the target virtual machine sent by the source physical machine where the target virtual machine is located before migration, the cluster control device may stop responding to a remote access request corresponding to the target virtual machine, which is sent by the source physical machine subsequently.
In some implementations, the remote access request corresponding to the target virtual machine sent by the source physical machine may be stopped from responding by performing transmitter identity verification on a subsequently received remote access request corresponding to the target virtual machine. In this regard, at the source physical machine side, identity information of the destination physical machine may be configured into the remote access request. The identity information of the destination physical machine may be information that can uniquely identify the identity of the destination physical machine, such as an ID and a MAC address of the destination physical machine, which is not limited in this embodiment.
Based on the above, at the side of the cluster control device, the identity verification of the transmission party can be performed on the remote access request according to the information of the target physical machine contained in the migration notification of the target virtual machine; and if the remote access request is confirmed to pass the identity verification of the transmission party, executing the operation of accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to the preset association relationship between the virtual machine and the trusted hardware.
And associating the target virtual machine, the target physical machine and the authentication parameters corresponding to the target virtual machine through the identity information of the target physical machine. Therefore, on one side of the cluster control equipment, the authentication parameters can be authenticated, and the identity authentication can be performed on a transmitter transmitting the remote access request, so that abnormal calling of a trusted hardware cluster can be effectively avoided, and the credibility of the target virtual machine is further ensured.
In the above or below embodiments, on the source physical machine side, a trusted authentication request for the target virtual machine may be sent to the remote authentication center in a case where the target virtual machine is run on the source physical machine for the first time; and if the authentication passing notification returned by the remote authentication center is received, configuring authentication parameters used for accessing the trusted hardware cluster for the target virtual machine.
The remote authentication center is a trusted authentication party independent of the source physical machine, the target physical machine and the trusted hardware cluster, and basic measurement values corresponding to all virtual machines in the cloud computing platform can be stored on the remote authentication center. Trusted state includes, but is not limited to, whether trusted, a description of the reason for trust, the time of occurrence of the trusted authentication, etc. The remote authentication center may return the trusted state to the managing virtual application on the source physical machine.
Accordingly, the application program for managing the virtualization on the source physical machine can configure the authentication parameters used for accessing the trusted hardware cluster for the target virtual machine based on the trusted state of the target virtual machine returned by the remote authentication center under the condition that the target virtual machine is determined to be trusted, so that the target virtual machine can access the trusted hardware cluster based on the authentication parameters.
In practical applications, on the source hypervisor side, the authentication parameters may be managed by an application program on the source hypervisor that manages the virtualization. Of course, this embodiment is not limited thereto.
Fig. 16 is a flowchart illustrating a virtual machine migration method according to yet another embodiment of the present application. As shown in fig. 16, the method may be applied to the cluster control device side in the virtual machine migration system shown in fig. 15, and the method includes:
160. receiving a remote access request transmitted by a target physical machine where a target virtual machine is located after migration, wherein the remote access request comprises an authentication parameter used by the target virtual machine to access a trusted hardware cluster;
161. authenticating the remote access request based on the authentication parameters contained in the remote access request;
162. and if the remote access request passes the authentication, accessing the target virtual machine into target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware, so as to perform trusted support on the target virtual machine through the target trusted hardware.
In an optional embodiment, the method further comprises:
and if receiving a migration notification of the target virtual machine sent by the source physical machine where the target virtual machine is located before migration, stopping responding to a remote access request corresponding to the target virtual machine and sent by the source physical machine subsequently.
In an optional embodiment, the migration notification of the target virtual machine includes information of the destination physical machine, and the method further includes:
according to the information of the target physical machine contained in the migration notification of the target virtual machine, carrying out identity verification of a transmission party on the remote access request;
and if the remote access request is confirmed to pass the identity verification of the transmission party, executing the operation of accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to the preset association relationship between the virtual machine and the trusted hardware.
In an optional embodiment, the method further comprises:
and configuring virtual machines which can be supported by the trusted hardware according to the service capability of the trusted hardware in the trusted hardware cluster so as to create a preset incidence relation between the virtual machines and the trusted hardware.
In an alternative embodiment, a single trusted hardware may support one or more virtual machines.
It should be noted that, for the technical details in the embodiments of the virtual machine migration method applicable to the trusted hardware cluster side, reference may be made to the foregoing description on the technical solution for the trusted hardware cluster side in the virtual machine migration system, and for the sake of brevity, details are not described here, but this should not cause a loss of the scope of protection of the present application.
Fig. 17 is a schematic structural diagram of a virtual machine migration apparatus according to yet another embodiment of the present application. As shown in fig. 17, the apparatus comprises:
the communication module 171 is configured to receive a remote access request transmitted by a destination physical machine where the target virtual machine is located after migration, where the remote access request includes an authentication parameter used by the target virtual machine to access the trusted hardware cluster;
an authentication module 172, configured to authenticate the remote access request based on an authentication parameter included in the remote access request;
the control module 173 is configured to, if the remote access request passes the authentication, access the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware, so as to perform trusted support on the target virtual machine through the target trusted hardware.
In an alternative embodiment, control module 173 is further configured to:
and if receiving a migration notification of the target virtual machine sent by the source physical machine where the target virtual machine is located before migration, stopping responding to a remote access request corresponding to the target virtual machine and sent by the source physical machine subsequently.
In an alternative embodiment, the target virtual machine migrated notification includes information of the destination physical machine, and the control module 173 is further configured to:
according to the information of the target physical machine contained in the migration notification of the target virtual machine, carrying out identity verification of a transmission party on the remote access request;
and if the remote access request is confirmed to pass the identity verification of the transmission party, executing the operation of accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to the preset association relationship between the virtual machine and the trusted hardware.
In an alternative embodiment, the control module 173 is further configured to:
and configuring virtual machines which can be supported by the trusted hardware according to the service capability of the trusted hardware in the trusted hardware cluster so as to create a preset incidence relation between the virtual machines and the trusted hardware.
In an alternative embodiment, a single trusted hardware may support one or more virtual machines.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the virtual machine migration apparatus described above may be referred to the foregoing description of the technical solution for the trusted hardware cluster side in the virtual machine migration system, which should not cause a loss of the protection scope of the present application.
As shown in fig. 18, in practice, the virtual machine migration apparatus may be deployed in a cluster control device, and the cluster control device may include: memory 181, processor 182, and communications component 183;
a processor 182 coupled to the memory 181 and the communication component 183 for executing computer programs in the memory 181 for:
receiving a remote access request transmitted by a target physical machine where a target virtual machine is located after migration through a communication component, wherein the remote access request comprises an authentication parameter used by the target virtual machine to access a trusted hardware cluster;
authenticating the remote access request based on the authentication parameters contained in the remote access request;
and if the remote access request passes the authentication, accessing the target virtual machine into target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware, so as to perform trusted support on the target virtual machine through the target trusted hardware.
In an alternative embodiment, the processor 182 is further configured to:
and if receiving a migration notification of the target virtual machine sent by the source physical machine where the target virtual machine is located before migration, stopping responding to a remote access request corresponding to the target virtual machine and sent by the source physical machine subsequently.
In an alternative embodiment, the target virtual machine migrated notification includes information of the destination physical machine, and the processor 182 is further configured to:
according to the information of the target physical machine contained in the migration notification of the target virtual machine, carrying out identity verification of a transmission party on the remote access request;
and if the remote access request is confirmed to pass the identity verification of the transmission party, executing the operation of accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to the preset association relationship between the virtual machine and the trusted hardware.
In an alternative embodiment, the processor 182 is further configured to:
and configuring virtual machines which can be supported by the trusted hardware according to the service capability of the trusted hardware in the trusted hardware cluster so as to create a preset incidence relation between the virtual machines and the trusted hardware.
In an alternative embodiment, a single trusted hardware may support one or more virtual machines.
Further, as shown in fig. 18, the cluster control device further includes: power supply components 184, and the like. Only some of the components are shown schematically in fig. 18, and it is not meant that the trusted hardware cluster includes only the components shown in fig. 18.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the cluster control apparatus described above may be referred to the foregoing description of the technical solution for the cluster control apparatus side in the virtual machine migration system, which is not described in detail herein, but this should not cause a loss of the scope of the present application.
Accordingly, the present application also provides a computer-readable storage medium storing computer instructions that, when executed by one or more processors, cause the one or more processors to perform a virtual machine migration method performed by the aforementioned physical machine.
Fig. 19 is a flowchart illustrating another virtual machine migration method according to another embodiment of the present application. As shown in fig. 19, the method may be applied to the source physical machine side in the virtual machine migration system shown in fig. 15, and the method includes:
190. migrating a target virtual machine on a source physical machine to a target physical machine;
191. and sending the authentication parameters used by the target virtual machine to access the trusted hardware cluster to the target physical machine so that the target virtual machine can remotely access the trusted hardware cluster.
In an optional embodiment, the method further comprises:
and sending a migration notification of the target virtual machine to the cluster control equipment, so that the cluster control equipment stops responding to a remote access request which is subsequently sent by the source physical machine and corresponds to the target virtual machine.
In an optional embodiment, the method further comprises:
and configuring the information of the target physical machine into the migration notification of the target virtual machine, wherein the information of the target physical machine is used for carrying out transmission party identity verification on a subsequent remote access request corresponding to the target virtual machine.
In an optional embodiment, the method further comprises:
under the condition that the target virtual machine runs on the source physical machine for the first time, sending a trusted authentication request aiming at the target virtual machine to a remote authentication center;
and if the authentication passing notification returned by the remote authentication center is received, configuring authentication parameters used for accessing the trusted hardware cluster for the target virtual machine.
It should be noted that, for the technical details in the embodiments of the virtual machine migration method applicable to the source physical machine side, reference may be made to the foregoing description on the technical solution for the source physical machine side in the virtual machine migration system, and for the sake of brevity, details are not described here, but this should not cause a loss of the scope of the present application.
Fig. 20 is a schematic structural diagram of another virtual machine migration apparatus according to yet another embodiment of the present application. As shown in fig. 20, the apparatus comprises:
a virtual machine management module 200, configured to migrate a target virtual machine on a source physical machine to a destination physical machine;
the communication module 201 is configured to send an authentication parameter used by the target virtual machine accessing the trusted hardware cluster to the target physical machine, so that the target virtual machine remotely accesses the trusted hardware cluster.
In an optional embodiment, the communication module 201 is further configured to:
and sending a migration notification of the target virtual machine to the cluster control equipment, so that the cluster control equipment stops responding to a remote access request which is subsequently sent by the source physical machine and corresponds to the target virtual machine.
In an optional embodiment, the communication module 201 is further configured to:
and configuring the information of the target physical machine into the migration notification of the target virtual machine, wherein the information of the target physical machine is used for carrying out transmission party identity verification on a subsequent remote access request corresponding to the target virtual machine.
In an optional embodiment, the communication module 201 is further configured to:
under the condition that the target virtual machine runs on the source physical machine for the first time, sending a trusted authentication request aiming at the target virtual machine to a remote authentication center;
the virtual machine management module 200 is further configured to:
and if the authentication passing notification returned by the remote authentication center is received, configuring authentication parameters used for accessing the trusted hardware cluster for the target virtual machine.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the virtual machine migration apparatus described above may be referred to the foregoing description of the technical solution for the source physical machine side in the virtual machine migration system, which should not cause a loss of the protection scope of the present application.
The internal functions and structures of the virtual machine migration apparatus are described above, and as shown in fig. 21, in practice, the virtual machine migration apparatus may be deployed in a physical machine, and the physical machine may include: memory 210, processor 211, and communication component 212.
A processor 211, coupled to the memory 210 and the communication component 212, for executing computer programs in the memory 210 for:
migrating a target virtual machine on a source physical machine to a target physical machine;
and sending the authentication parameters used by the target virtual machine to access the trusted hardware cluster to the target physical machine through the communication component so that the target virtual machine can remotely access the trusted hardware cluster.
In an alternative embodiment, the processor 102 is further configured to:
and sending a migration notification of the target virtual machine to the cluster control equipment, so that the cluster control equipment stops responding to a remote access request which is subsequently sent by the source physical machine and corresponds to the target virtual machine.
In an alternative embodiment, the processor 102 is further configured to:
and configuring the information of the target physical machine into the migration notification of the target virtual machine, wherein the information of the target physical machine is used for carrying out transmission party identity verification on a subsequent remote access request corresponding to the target virtual machine.
In an alternative embodiment, the processor 102 is further configured to:
under the condition that the target virtual machine runs on the source physical machine for the first time, sending a trusted authentication request aiming at the target virtual machine to a remote authentication center;
and if the authentication passing notification returned by the remote authentication center is received, configuring authentication parameters used for accessing the trusted hardware cluster for the target virtual machine.
Further, as shown in fig. 21, the physical machine further includes: display 213, power components 214, audio components 215, and the like. Only some of the components are schematically shown in fig. 21, and it is not meant that the physical machine includes only the components shown in fig. 21.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the physical machine described above may be referred to the foregoing description of the technical solution for the source physical machine side in the virtual machine migration system, which is not described in detail herein, but should not cause a loss of the scope of the present application.
Accordingly, the present application also provides a computer-readable storage medium storing computer instructions that, when executed by one or more processors, cause the one or more processors to perform a virtual machine migration method performed by the aforementioned physical machine.
Fig. 22 is a flowchart illustrating a virtual machine migration method according to another embodiment of the present application. As shown in fig. 22, the method may be applied to the destination physical machine side in the virtual machine migration system shown in fig. 15, and the method includes:
220. deploying a target virtual machine migrated from a source physical machine on a target physical machine, and acquiring authentication parameters used by the target virtual machine to access a trusted hardware cluster;
221. generating a remote access request according to the authentication parameters, and sending the remote access request to the cluster control equipment;
222. and if the remote access request passes the authentication of the cluster control equipment, remotely calling the trusted hardware cluster to perform trusted support on the target virtual machine.
In an optional embodiment, the method further comprises:
and configuring the identity information of the target physical machine into the remote access request so as to carry out transmission party identity verification on the remote access request by the cluster control equipment.
It should be noted that, for the foregoing technical details in the embodiments of the virtual machine migration method applicable to the destination physical machine side, reference may be made to the foregoing description of the technical solution for the destination physical machine side in the virtual machine migration system, and for brevity, details are not described here, but this should not cause a loss of the scope of the present application.
Fig. 23 is a schematic structural diagram of another virtual machine migration apparatus according to another embodiment of the present application. As shown in fig. 23, the apparatus includes:
the virtual machine management module 230 is configured to deploy a target virtual machine migrated from a source physical machine on a target physical machine, and obtain an authentication parameter used by the target virtual machine to access a trusted hardware cluster;
the authentication module 231 is configured to generate a remote access request according to the authentication parameter, and send the remote access request to the cluster control device;
and the control module 232 is configured to remotely call the trusted hardware cluster to perform trusted support on the target virtual machine if the remote access request passes authentication of the cluster control device.
In an optional embodiment, the authentication module 121 is further configured to:
and configuring the identity information of the target physical machine into the remote access request so as to carry out transmission party identity verification on the remote access request by the cluster control equipment.
It should be noted that, for the sake of brevity, details of the technical details in the embodiments of the virtual machine migration apparatus described above may be referred to the foregoing description of the technical solution for the destination physical machine side in the virtual machine migration system, and this should not cause a loss of the protection scope of the present application.
The internal functions and structures of the virtual machine migration apparatus are described above, and as shown in fig. 24, in practice, the virtual machine migration apparatus may be deployed in a physical machine, and the physical machine may include: memory 240, processor 241, and communication component 242.
A processor 241, coupled to the memory 240 and the communication component 242, for executing the computer programs in the memory 240 for:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and acquiring authentication parameters used by the target virtual machine to access a trusted hardware cluster;
generating a remote access request according to the authentication parameters, and sending the remote access request to the cluster control equipment through the communication assembly;
and if the remote access request passes the authentication of the cluster control equipment, remotely calling the trusted hardware cluster to perform trusted support on the target virtual machine.
In an alternative embodiment, the processor 241 is further configured to:
and configuring the identity information of the target physical machine into the remote access request so as to carry out transmission party identity verification on the remote access request by the cluster control equipment.
Further, as shown in fig. 24, the physical machine further includes: display 243, power components 244, audio components 245, and the like. Only some of the components are schematically shown in fig. 24, and it is not meant that the physical machine includes only the components shown in fig. 24.
It should be noted that, for the sake of brevity, the technical details in the embodiments of the physical machine described above may be referred to the foregoing description of the technical solution for the destination physical machine side in the virtual machine migration system, and this should not cause a loss of the protection scope of the present application.
Accordingly, the present application also provides a computer-readable storage medium storing computer instructions that, when executed by one or more processors, cause the one or more processors to perform a virtual machine migration method performed by the aforementioned physical machine.
Fig. 25 is a flowchart illustrating a virtual machine migration method according to another embodiment of the present application. As shown in fig. 25, the method is applicable to the current physical machine in the foregoing virtual machine migration system, and the method includes:
250. receiving a migration request, wherein the migration request comprises migrating a target virtual machine on a current physical machine;
251. determining a target physical machine based on the service type code operated by the target virtual machine;
252. migrating a target virtual machine on a current physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine to access a hardware trusted module on the current physical machine to the target physical machine so that the target virtual machine can remotely access the hardware trusted module on the current physical machine.
In step 252, reference may be made to the related description in the embodiment corresponding to fig. 8, which is not described herein again. In addition, in this embodiment, on the basis of the determination scheme of the destination physical machine provided in steps 250-251, other technical details in the embodiment corresponding to fig. 8 may be applied to this embodiment, which is not described herein again.
In this embodiment, when a migration request for a target virtual machine on a current physical machine is received, a service type code run by the target virtual machine may be obtained. The service type code can be used to characterize the type of service running on the target virtual machine. In this embodiment, the form of the service type code is not limited, for example, the service type code may be a string of arabic numerals, and of course, may also be a combination of letters and numbers, and the like.
Therefore, the type of the service operated on the target virtual machine can be determined based on the service type code operated by the target virtual machine, and the target physical machine is further determined. The determined target physical machine can ensure that the target virtual machine continues to support the original service running after the target virtual machine is migrated. In this embodiment, the service type code includes, but is not limited to, an e-commerce code or a financial code.
If the service type code operated by the target virtual machine belongs to the electric business code, the first physical machine corresponding to the electric business code can be determined as the target physical machine.
And if the service type code operated by the target virtual machine belongs to the financial service code, determining the second physical machine corresponding to the financial service code as the target physical machine.
In addition, in consideration of the fact that different trusted services are required by different service types, in this embodiment, the hardware trusted module on the current physical machine may support the service type operated by the target virtual machine.
If the service type code operated by the target virtual machine belongs to the e-commerce service code, the hardware trusted module on the current physical machine can adopt a TPM module.
If the service type code operated by the target virtual machine belongs to the financial service code, the current hardware trusted module on the physical machine can adopt the TPCM module.
Of course, these are merely exemplary, and the present embodiment is not limited thereto.
In this embodiment, the target physical machine is selected based on the service type code operated by the target virtual machine, so that the original service of the target virtual machine can be normally operated after the target virtual machine is migrated, and after the target virtual machine is migrated, a hardware trusted module on the current physical machine can be continuously used to provide trusted service for the target virtual machine, so as to ensure the credibility of the target virtual machine.
Fig. 26 is a schematic structural diagram of another virtual machine migration apparatus according to another embodiment of the present application. As shown in fig. 26, the apparatus includes:
a communication module 260, configured to receive a migration request, where the migration request includes migrating a target virtual machine on a current physical machine;
the virtual machine management module 261 is configured to determine a target physical machine based on a service type code run by the target virtual machine;
migrating a target virtual machine on a current physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine to access a hardware trusted module on the current physical machine to the target physical machine so that the target virtual machine can remotely access the hardware trusted module on the current physical machine.
In an alternative embodiment, the service type coding comprises: an e-commerce service code;
the virtual machine management module 261, when determining the destination physical machine, is configured to: determining a first physical machine corresponding to the e-commerce code;
the hardware trusted module comprises: a TPM module.
In an alternative embodiment, the service type coding comprises: coding the financial service;
the virtual machine management module 261, when determining the destination physical machine, is configured to: determining a second physical machine corresponding to the financial service code;
the hardware trusted module comprises: a TPCM module.
It should be noted that, the technical details in the embodiments of the virtual machine migration apparatus described above may refer to the related description in the corresponding embodiment of fig. 25, and for the sake of brevity, the details are not described herein in detail, but this should not cause a loss of the scope of the present application.
The internal functions and structures of the virtual machine migration apparatus are described above, and as shown in fig. 27, in practice, the virtual machine migration apparatus may be deployed in a physical machine, and the physical machine may include: memory 270, processor 271, and communications component 272.
A processor 271, coupled to the memory 270 and the communication component 272, for executing computer programs in the memory 270 for:
receiving a migration request, wherein the migration request comprises migrating a target virtual machine on a current physical machine;
determining a target physical machine based on the service type code operated by the target virtual machine;
migrating a target virtual machine on a current physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine to access a hardware trusted module on the current physical machine to the target physical machine so that the target virtual machine can remotely access the hardware trusted module on the current physical machine.
In an alternative embodiment, the service type coding comprises: an e-commerce service code;
processor 271, in determining the destination physical machine, is configured to: determining a first physical machine corresponding to the e-commerce code;
the hardware trusted module comprises: a TPM module.
In an alternative embodiment, the service type coding comprises: coding the financial service;
processor 271, in determining the destination physical machine, is configured to: determining a second physical machine corresponding to the financial service code;
the hardware trusted module comprises: a TPCM module.
Further, as shown in fig. 27, the physical machine further includes: a display 273, a power component 274, an audio component 275, and the like. Only some of the components are schematically shown in fig. 27, and it is not meant that the physical machine includes only the components shown in fig. 27.
It should be noted that the technical details of the embodiments of the physical machine described above can be referred to the related description of the corresponding embodiment of fig. 25, and the details are not described herein for brevity, but this should not cause a loss of the scope of the present application.
Accordingly, the present application also provides a computer-readable storage medium storing computer instructions that, when executed by one or more processors, cause the one or more processors to perform a virtual machine migration method performed by the aforementioned physical machine.
The memories of fig. 4, 7, 11, 14, 18, 21, 24 and 27, among others, are used to store computer programs and may be configured to store various other data to support operations on the physical machines. Examples of such data include instructions for any application or method operating on the physical machine, contact data, phonebook data, messages, pictures, videos, and so forth. The memory may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The communication components of fig. 4, 7, 11, 14, 18, 21, 24, and 27 are configured to facilitate wired or wireless communication between the device in which the communication component is located and other devices. The device in which the communication component is located may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component may be implemented based on Near Field Communication (NFC) technology, Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, or other technology to facilitate short-range communications.
The displays in fig. 4, 7, 11, 14, 21, 24 and 27 include screens, which may include Liquid Crystal Displays (LCDs) and Touch Panels (TPs), among others. If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
The power supply components of fig. 4, 7, 11, 14, 18, 21, 24 and 27, among others, provide power to the various components of the device in which the power supply components are located. The power components may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the device in which the power component is located.
The audio components in fig. 4, 7, 11, 14, 21, 24 and 27 may be configured to output and/or input audio signals. For example, the audio component includes a Microphone (MIC) configured to receive an external audio signal when the device in which the audio component is located is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in a memory or transmitted via a communication component. In some embodiments, the audio assembly further comprises a speaker for outputting audio signals.
It should be noted that the execution subjects of the steps of the methods provided in the above embodiments may be the same device, or different devices may be used as the execution subjects of the methods. In addition, in some of the flows described in the above embodiments and the drawings, a plurality of operations are included in a specific order, but it should be clearly understood that the operations may be executed out of the order presented herein or in parallel, and the order of the operations is merely used for distinguishing various operations, and the order itself does not represent any execution order. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (45)

1. A virtual machine migration method is characterized by comprising the following steps:
migrating a target virtual machine on a source physical machine to a target physical machine, wherein a virtual trusted module corresponding to the target virtual machine is configured on the source physical machine;
acquiring security parameters required by the target virtual machine according to a coupling relation between the virtual trusted module and a hardware trusted module on the source physical machine;
and sending the security parameters to the target physical machine so that the target physical machine can support the target virtual machine in a trusted manner through a hardware trusted module on the target physical machine based on the security parameters.
2. The method according to claim 1, wherein the obtaining security parameters required by the target virtual machine according to the coupling relationship existing between the virtual trusted module and the hardware trusted module on the source physical machine comprises:
and calling the hardware trusted module on the source physical machine to decrypt the encrypted security parameters according to the coupling relationship between the virtual trusted module and the hardware trusted module on the source physical machine to obtain the security parameters, wherein the encrypted security parameters are configured in the virtual trusted module corresponding to the target virtual machine.
3. The method of claim 1, wherein sending the security parameters to the destination physical machine comprises:
carrying out snapshot on the security parameters;
and sending the snapshot to the target physical machine through a trusted network.
4. The method of claim 1, further comprising at least one of:
deleting the virtual trusted module corresponding to the target virtual machine;
deleting the target virtual machine from a trusted support list corresponding to the hardware trusted module; or
Controlling the hardware trusted module to stop trusted support of the target virtual machine.
5. A virtual machine migration method is characterized by comprising the following steps:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and configuring a virtual trusted module for the target virtual machine on the target physical machine;
receiving security parameters corresponding to the target virtual machine transmitted by the source physical machine, and configuring the security parameters into the virtual trusted module;
and establishing a coupling relation between the virtual trusted module and a hardware trusted module on the target physical machine so as to utilize the hardware trusted module to perform trusted support on the target virtual machine based on the security parameters.
6. The method of claim 5, wherein the configuring the security parameters into the virtual trusted module comprises:
configuring a virtual storage space for the virtual trusted module on the destination physical machine, wherein the virtual storage space is mapped to a physical storage space on the destination physical machine;
and storing the security parameters into the virtual storage space.
7. The method of claim 6, further comprising:
and calling the hardware trusted module on the target physical machine to encrypt the security parameters stored in the virtual storage space based on the coupling relation between the virtual trusted module and the hardware trusted module on the target physical machine.
8. A virtual machine migration apparatus, comprising:
the virtual machine management module is used for migrating a target virtual machine on a source physical machine to a target physical machine, and a virtual trusted module corresponding to the target virtual machine is configured on the source physical machine;
the control module is used for acquiring security parameters required by the target virtual machine according to a coupling relation between the virtual trusted module and a hardware trusted module on the source physical machine;
and the communication component is used for sending the security parameters to the target physical machine so that the target physical machine can support the target virtual machine in a trusted manner through a hardware trusted module on the target physical machine based on the security parameters.
9. A virtual machine migration apparatus, comprising:
the virtual machine management module is used for deploying a target virtual machine migrated from a source physical machine on a target physical machine and configuring a virtual trusted module for the target virtual machine on the target physical machine;
the communication component is used for receiving the security parameters corresponding to the target virtual machine transmitted by the source physical machine and configuring the security parameters into the virtual trusted module;
and the control module is used for creating a coupling relation between the virtual trusted module and a hardware trusted module on the target physical machine so as to utilize the hardware trusted module to perform trusted support on the target virtual machine based on the security parameters.
10. A physical machine comprising a hardware trusted module, a memory, a processor, and a communications component;
the memory is to store one or more computer instructions;
the processor is coupled with the hardware trusted module, the memory, and the communication component for executing the one or more computer instructions for:
migrating a target virtual machine on the physical machine to a target physical machine, wherein a virtual trusted module corresponding to the target virtual machine is configured on the physical machine;
acquiring security parameters required by the target virtual machine according to a coupling relation between the virtual trusted module and a hardware trusted module on the physical machine;
and sending the security parameters to the target physical machine through the communication component, so that the target physical machine can support the target virtual machine in a trusted manner through a hardware trusted module on the target physical machine based on the security parameters.
11. A physical machine comprising a hardware trusted module, a memory, a processor, and a communications component;
the memory is to store one or more computer instructions;
the processor is coupled with the hardware trusted module, the memory, and the communication component for executing the one or more computer instructions for:
deploying a target virtual machine migrated from a source physical machine on the physical machine, and configuring a virtual trusted module for the target virtual machine on the physical machine;
receiving security parameters corresponding to the target virtual machine transmitted by the source physical machine, and configuring the security parameters into the virtual trusted module;
and creating a coupling relation between the virtual trusted module and the hardware trusted module so as to utilize the hardware trusted module to perform trusted support on the target virtual machine based on the security parameters.
12. A virtual machine migration method is characterized by comprising the following steps:
migrating a target virtual machine on a source physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine for accessing a hardware trusted module on the source physical machine to the target physical machine so as to enable the target virtual machine to remotely access the hardware trusted module on the source physical machine;
if a remote access request transmitted by the target physical machine is received, authenticating the remote access request based on authentication parameters contained in the remote access request;
and if the remote access request passes the authentication, establishing remote communication connection with the target physical machine so as to perform trusted support on the target virtual machine through a hardware trusted module on the source physical machine.
13. The method of claim 12, wherein migrating the target virtual machine on the source physical machine to the destination physical machine; sending authentication parameters used by the target virtual machine to access the hardware trusted module on the source physical machine to the target physical machine, wherein the authentication parameters comprise:
carrying out snapshot on the target virtual machine, wherein the snapshot comprises an authentication parameter used by the target virtual machine to access a hardware trusted module on the source physical machine;
and sending the snapshot to the target physical machine.
14. The method of claim 12, wherein the remote access request further includes identity information of the destination physical machine, the method further comprising:
according to the identity information of the target physical machine contained in the remote access request, carrying out identity verification on a transmission party of the remote access request;
and if the remote access request is confirmed to pass the identity verification of the transmission party, executing the operation of establishing the remote communication connection with the target physical machine.
15. The method of claim 12, further comprising:
sending a trusted authentication request for the target virtual machine to a remote authentication center under the condition that the target virtual machine runs on the source physical machine for the first time;
and if receiving an authentication passing notice returned by the remote authentication center, configuring authentication parameters used by a hardware trusted module accessed to the source physical machine for the target virtual machine.
16. A virtual machine migration method is characterized by comprising the following steps:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and acquiring an authentication parameter used by the target virtual machine to access a hardware trusted module on the source physical machine;
generating a remote access request according to the authentication parameters, and sending the remote access request to the source physical machine;
and if the remote access request passes the authentication of the source physical machine, remotely calling a hardware trusted module on the source physical machine to perform trusted support on the target virtual machine.
17. The method of claim 16, further comprising:
and configuring the identity information of the target physical machine into the remote access request, wherein the identity information of the target physical machine is used for the source physical machine to carry out transmission party identity verification on the remote access request.
18. A virtual machine migration apparatus, comprising:
the virtual machine management module is used for migrating a target virtual machine on a source physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine for accessing a hardware trusted module on the source physical machine to the target physical machine so as to enable the target virtual machine to remotely access the hardware trusted module on the source physical machine;
the authentication module is used for authenticating the remote access request based on the authentication parameters contained in the remote access request if the remote access request transmitted by the target physical machine is received;
and the communication module is used for establishing remote communication connection with the target physical machine if the remote access request passes the authentication so as to perform trusted support on the target virtual machine through a hardware trusted module on the source physical machine.
19. A virtual machine migration apparatus, comprising:
the virtual machine management module is used for deploying a target virtual machine migrated from a source physical machine on a target physical machine and acquiring authentication parameters used by the target virtual machine to access a hardware trusted module on the source physical machine;
the authentication module is used for generating a remote access request according to the authentication parameters;
the communication module is used for sending the remote access request to the source physical machine;
and the control module is used for remotely calling a hardware trusted module on the source physical machine to perform trusted support on the target virtual machine if the remote access request passes the authentication of the source physical machine.
20. A physical machine comprising a hardware trusted module, a memory, a processor, and a communications component;
the memory is to store one or more computer instructions;
the processor is coupled with the hardware trusted module, the memory, and the communication component for executing the one or more computer instructions for:
migrating a target virtual machine on the physical machine to a target physical machine, and sending authentication parameters used by a hardware trusted module of the target virtual machine accessing the physical machine to the target physical machine so as to enable the target virtual machine to remotely access the hardware trusted module on the physical machine;
if a remote access request transmitted by the target physical machine is received, authenticating the remote access request based on authentication parameters contained in the remote access request;
and if the remote access request passes the authentication, establishing remote communication connection with the target physical machine so as to perform trusted support on the target virtual machine through a hardware trusted module on the source physical machine.
21. A physical machine comprising a hardware trusted module, a memory, a processor, and a communications component;
the memory is to store one or more computer instructions;
the processor is coupled with the hardware trusted module, the memory, and the communication component for executing the one or more computer instructions for:
deploying a target virtual machine migrated from a source physical machine on the physical machine, and acquiring an authentication parameter used by the target virtual machine to access a hardware trusted module on the source physical machine;
generating a remote access request according to the authentication parameters, and sending the remote access request to the source physical machine;
and if the remote access request passes the authentication of the source physical machine, remotely calling a hardware trusted module on the source physical machine to perform trusted support on the target virtual machine.
22. A virtual machine migration method is characterized by comprising the following steps:
receiving a remote access request transmitted by a target physical machine where a target virtual machine is located after migration, wherein the remote access request comprises an authentication parameter used by the target virtual machine to access a trusted hardware cluster;
authenticating the remote access request based on the authentication parameters included in the remote access request;
and if the remote access request passes the authentication, accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware, so as to perform trusted support on the target virtual machine through the target trusted hardware.
23. The method of claim 22, further comprising:
and if a target virtual machine migration notification sent by the source physical machine where the target virtual machine is located before migration is received, stopping responding to a remote access request corresponding to the target virtual machine and sent by the source physical machine subsequently.
24. The method of claim 22, wherein the target virtual machine migrated notification includes information of the destination physical machine, the method further comprising:
according to the information of the target physical machine contained in the migration notification of the target virtual machine, carrying out identity verification of a transmission party on the remote access request;
and if the remote access request is confirmed to pass identity verification of a transmission party, executing the operation of accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to the preset association relationship between the virtual machine and the trusted hardware.
25. The method of claim 22, further comprising:
and configuring virtual machines which can be supported by the trusted hardware according to the service capability of the trusted hardware in the trusted hardware cluster so as to create the incidence relation between the preset virtual machines and the trusted hardware.
26. The method of claim 25, wherein a single trusted hardware can support one or more virtual machines.
27. A virtual machine migration method is characterized by comprising the following steps:
migrating a target virtual machine on a source physical machine to a target physical machine;
and sending the authentication parameters used by the target virtual machine for accessing the trusted hardware cluster to the target physical machine so that the target virtual machine can remotely access the trusted hardware cluster.
28. The method of claim 27, further comprising:
sending a migration notification of a target virtual machine to the cluster control device, so that the cluster control device stops responding to a remote access request which is subsequently sent by the source physical machine and corresponds to the target virtual machine.
29. The method of claim 27, further comprising:
and configuring the information of the target physical machine into the migration notification of the target virtual machine, wherein the information of the target physical machine is used for carrying out transmission party identity verification on a subsequent remote access request corresponding to the target virtual machine.
30. The method of claim 27, further comprising:
sending a trusted authentication request for the target virtual machine to a remote authentication center under the condition that the target virtual machine runs on the source physical machine for the first time;
and if receiving an authentication passing notice returned by the remote authentication center, configuring authentication parameters used for accessing the trusted hardware cluster for the target virtual machine.
31. A virtual machine migration method is characterized by comprising the following steps:
deploying a target virtual machine migrated from a source physical machine on a target physical machine, and acquiring authentication parameters used by the target virtual machine for accessing a trusted hardware cluster;
generating a remote access request according to the authentication parameters, and sending the remote access request to cluster control equipment;
and if the remote access request passes the authentication of the cluster control equipment, remotely calling the trusted hardware cluster to perform trusted support on the target virtual machine.
32. The method of claim 30, further comprising:
and configuring the identity information of the target physical machine into the remote access request so that the cluster control equipment can carry out transmission party identity verification on the remote access request.
33. A virtual machine migration apparatus, comprising:
the communication module is used for receiving a remote access request transmitted by a target physical machine where a target virtual machine is located after migration, wherein the remote access request comprises an authentication parameter used by the target virtual machine to access a trusted hardware cluster;
the authentication module is used for authenticating the remote access request based on the authentication parameters contained in the remote access request;
and the control module is used for accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware if the remote access request passes the authentication, so as to perform trusted support on the target virtual machine through the target trusted hardware.
34. A virtual machine migration apparatus, comprising:
the virtual machine management module is used for migrating a target virtual machine on the source physical machine to a target physical machine;
and the communication module is used for sending the authentication parameters used by the target virtual machine for accessing the trusted hardware cluster to the target physical machine so as to enable the target virtual machine to remotely access the trusted hardware cluster.
35. A virtual machine migration apparatus, comprising:
the virtual machine management module is used for deploying a target virtual machine migrated from a source physical machine on a target physical machine and acquiring authentication parameters used by the target virtual machine for accessing a trusted hardware cluster;
the authentication module is used for generating a remote access request according to the authentication parameters and sending the remote access request to the cluster control equipment;
and the control module is used for remotely calling the trusted hardware cluster to perform trusted support on the target virtual machine if the remote access request passes the authentication of the cluster control equipment.
36. A virtual machine migration system, comprising: the system comprises a source physical machine, a target physical machine, a trusted hardware cluster and cluster control equipment;
the source physical machine is used for migrating a target virtual machine to a target physical machine and sending authentication parameters used by the target virtual machine for accessing a trusted hardware cluster to the target physical machine;
the target physical machine is used for deploying the target virtual machine and acquiring authentication parameters used by the target virtual machine for accessing the trusted hardware cluster; generating a remote access request according to the authentication parameters, and sending the remote access request to the cluster control equipment; if the remote access request passes the authentication of the cluster control equipment, remotely calling the trusted hardware cluster to perform trusted support on the target virtual machine;
the cluster control equipment is used for receiving a remote access request transmitted by the target physical machine; authenticating the remote access request based on the authentication parameters included in the remote access request; and if the remote access request passes the authentication, accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware, so as to perform trusted support on the target virtual machine through the target trusted hardware.
37. A cluster control device comprising a memory, a processor, and a communication component;
the memory is to store one or more computer instructions;
the processor is coupled with the memory and the communication component for executing the one or more computer instructions for:
receiving a remote access request transmitted by a target physical machine where a target virtual machine is located after migration through the communication assembly, wherein the remote access request comprises an authentication parameter used by the target virtual machine to access a trusted hardware cluster;
authenticating the remote access request based on the authentication parameters included in the remote access request;
and if the remote access request passes the authentication, accessing the target virtual machine to target trusted hardware associated with the target virtual machine in the trusted hardware cluster according to a preset association relationship between the virtual machine and the trusted hardware, so as to perform trusted support on the target virtual machine through the target trusted hardware.
38. A physical machine, comprising: a memory, a processor, and a communications component;
the memory is to store one or more computer instructions;
the processor is coupled with the memory and the communication component for executing the one or more computer instructions for:
migrating the target virtual machine on the physical machine to a target physical machine;
and sending the authentication parameters used by the target virtual machine for accessing the trusted hardware cluster to the target physical machine through the communication component so that the target virtual machine can remotely access the trusted hardware cluster.
39. A physical machine, comprising: a memory, a processor, and a communications component;
the memory is to store one or more computer instructions;
the processor is coupled with the memory and the communication component for executing the one or more computer instructions for:
deploying a target virtual machine migrated from a source physical machine on the physical machine, and acquiring authentication parameters used by the target virtual machine for accessing a trusted hardware cluster;
generating a remote access request according to the authentication parameters, and sending the remote access request to cluster management equipment through the communication assembly;
and if the remote access request passes the authentication of the cluster management equipment, remotely calling the trusted hardware cluster to perform trusted support on the target virtual machine.
40. A virtual machine migration method is characterized by comprising the following steps:
receiving a migration request, wherein the migration request comprises migrating a target virtual machine on a current physical machine;
determining a target physical machine based on the service type code operated by the target virtual machine;
migrating a target virtual machine on a current physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine to access a hardware trusted module on the current physical machine to the target physical machine so that the target virtual machine can remotely access the hardware trusted module on the current physical machine.
41. The method of claim 41, wherein:
the service type coding comprises: an e-commerce service code;
the determination destination physical machine includes: determining a first physical machine corresponding to the e-commerce code;
the hardware trusted module comprises: a TPM module.
42. The method of claim 41, wherein:
the service type coding comprises: coding the financial service;
the determination destination physical machine includes: determining a second physical machine corresponding to the financial service code;
the hardware trusted module comprises: a TPCM module.
43. A virtual machine migration apparatus, comprising:
the system comprises a communication module, a migration module and a migration module, wherein the communication module is used for receiving a migration request, and the migration request comprises the migration of a target virtual machine on a current physical machine;
the virtual machine management module is used for determining a target physical machine based on the service type code operated by the target virtual machine;
migrating a target virtual machine on a current physical machine to a target physical machine, and sending authentication parameters used by the target virtual machine to access a hardware trusted module on the current physical machine to the target physical machine so that the target virtual machine can remotely access the hardware trusted module on the current physical machine.
44. A physical machine comprising a hardware trusted module, a memory, a processor, and a communications component;
the memory is to store one or more computer instructions;
the processor is coupled with the hardware trusted module, the memory, and the communication component for executing the one or more computer instructions for:
receiving a migration request, wherein the migration request comprises migrating a target virtual machine on the physical machine;
determining a target physical machine based on the service type code operated by the target virtual machine;
migrating the target virtual machine to a target physical machine, and sending authentication parameters used by the target virtual machine for accessing a hardware trusted module on the physical machine to the target physical machine so that the target virtual machine can remotely access the hardware trusted module on the physical machine.
45. A computer-readable storage medium storing computer instructions, which when executed by one or more processors, cause the one or more processors to perform the virtual machine migration method of any one of claims 1-7, 12-17, 22-32, or 40-42.
CN201910371285.2A 2019-05-06 2019-05-06 Virtual machine migration method, device, equipment, system and storage medium Pending CN111897621A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910371285.2A CN111897621A (en) 2019-05-06 2019-05-06 Virtual machine migration method, device, equipment, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910371285.2A CN111897621A (en) 2019-05-06 2019-05-06 Virtual machine migration method, device, equipment, system and storage medium

Publications (1)

Publication Number Publication Date
CN111897621A true CN111897621A (en) 2020-11-06

Family

ID=73169465

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910371285.2A Pending CN111897621A (en) 2019-05-06 2019-05-06 Virtual machine migration method, device, equipment, system and storage medium

Country Status (1)

Country Link
CN (1) CN111897621A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883369A (en) * 2021-03-25 2021-06-01 中国科学院信息工程研究所 Credible virtualization system
CN113965340A (en) * 2021-08-30 2022-01-21 广东南方通信建设有限公司 Cross-platform data migration method, system and readable medium
WO2023078129A1 (en) * 2021-11-03 2023-05-11 阿里巴巴(中国)有限公司 Hardware performance acquisition method, and device, system and storage medium
WO2023087938A1 (en) * 2021-11-19 2023-05-25 阿里云计算有限公司 Data processing method, programmable network card device, physical server, and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100268812A1 (en) * 2009-04-16 2010-10-21 Dell Products, Lp System and Method of Migrating Virtualized Environments
CN102163266A (en) * 2010-02-17 2011-08-24 微软公司 Securely move virtual machines between host servers
US20120159634A1 (en) * 2010-12-15 2012-06-21 International Business Machines Corporation Virtual machine migration
CN102741820A (en) * 2010-02-08 2012-10-17 微软公司 Background migration of virtual storage
CN102763098A (en) * 2009-12-14 2012-10-31 思杰系统有限公司 Methods and systems for communicating between trusted and non-trusted virtual machines
US20130007735A1 (en) * 2011-07-01 2013-01-03 V3 Systems, Inc. Virtual machine allocation internal and external to physical environment
CN103139221A (en) * 2013-03-07 2013-06-05 中国科学院软件研究所 Dependable virtual platform and construction method thereof, data migration method among platforms
CN103617070A (en) * 2013-11-27 2014-03-05 华为技术有限公司 Virtual machine migration method and device
CN103812862A (en) * 2014-01-23 2014-05-21 厦门密安信息技术有限责任公司 Dependable security cloud computing composition method
CN104036386A (en) * 2014-06-12 2014-09-10 长沙麓云信息科技有限公司 Point of sale (POS) machine credible trading system and method based on virtual platform
CN105183546A (en) * 2015-08-12 2015-12-23 北京因特信安软件科技有限公司 Secure virtual machine migration method based on trustworthy resource pool
US20170155662A1 (en) * 2015-12-01 2017-06-01 France Brevets Location based trusted computing nodes in a cloud computing architecture
CN107465689A (en) * 2017-09-08 2017-12-12 大唐高鸿信安(浙江)信息科技有限公司 The key management system and method for virtual credible platform module under cloud environment
CN109684044A (en) * 2019-01-03 2019-04-26 北京工业大学 The binding method of virtual machine and vTPCM during static migrating

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100268812A1 (en) * 2009-04-16 2010-10-21 Dell Products, Lp System and Method of Migrating Virtualized Environments
CN102763098A (en) * 2009-12-14 2012-10-31 思杰系统有限公司 Methods and systems for communicating between trusted and non-trusted virtual machines
CN102741820A (en) * 2010-02-08 2012-10-17 微软公司 Background migration of virtual storage
CN102163266A (en) * 2010-02-17 2011-08-24 微软公司 Securely move virtual machines between host servers
US20120159634A1 (en) * 2010-12-15 2012-06-21 International Business Machines Corporation Virtual machine migration
US20130007735A1 (en) * 2011-07-01 2013-01-03 V3 Systems, Inc. Virtual machine allocation internal and external to physical environment
CN103139221A (en) * 2013-03-07 2013-06-05 中国科学院软件研究所 Dependable virtual platform and construction method thereof, data migration method among platforms
CN103617070A (en) * 2013-11-27 2014-03-05 华为技术有限公司 Virtual machine migration method and device
CN103812862A (en) * 2014-01-23 2014-05-21 厦门密安信息技术有限责任公司 Dependable security cloud computing composition method
CN104036386A (en) * 2014-06-12 2014-09-10 长沙麓云信息科技有限公司 Point of sale (POS) machine credible trading system and method based on virtual platform
CN105183546A (en) * 2015-08-12 2015-12-23 北京因特信安软件科技有限公司 Secure virtual machine migration method based on trustworthy resource pool
US20170155662A1 (en) * 2015-12-01 2017-06-01 France Brevets Location based trusted computing nodes in a cloud computing architecture
CN107465689A (en) * 2017-09-08 2017-12-12 大唐高鸿信安(浙江)信息科技有限公司 The key management system and method for virtual credible platform module under cloud environment
CN109684044A (en) * 2019-01-03 2019-04-26 北京工业大学 The binding method of virtual machine and vTPCM during static migrating

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
沈晴霓;: "虚拟可信平台技术现状与发展趋势", 信息网络安全, no. 04, 10 April 2010 (2010-04-10) *
陈福伟;李健;: "虚拟机动态迁移远程属性证明", 网络安全技术与应用, no. 01, 15 January 2014 (2014-01-15) *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883369A (en) * 2021-03-25 2021-06-01 中国科学院信息工程研究所 Credible virtualization system
CN113965340A (en) * 2021-08-30 2022-01-21 广东南方通信建设有限公司 Cross-platform data migration method, system and readable medium
WO2023078129A1 (en) * 2021-11-03 2023-05-11 阿里巴巴(中国)有限公司 Hardware performance acquisition method, and device, system and storage medium
WO2023087938A1 (en) * 2021-11-19 2023-05-25 阿里云计算有限公司 Data processing method, programmable network card device, physical server, and storage medium

Similar Documents

Publication Publication Date Title
US11381396B2 (en) System, apparatus and method for migrating a device having a platform group
KR101894232B1 (en) Method and apparatus for cloud-assisted cryptography
US20190215157A1 (en) Information storage method, device, and computer-readable storage medium
US20230344647A1 (en) Systems and methods for providing authentication to a plurality of devices
CN111897621A (en) Virtual machine migration method, device, equipment, system and storage medium
US11596008B2 (en) System, method and computer program product for secure Bluetooth cryptography in a virtual mobile device platform
CN105027107A (en) Secure virtual machine migration
US11240043B1 (en) Issuance of certificates for secure enterprise wireless network access
CN109450620B (en) Method for sharing security application in mobile terminal and mobile terminal
CN111901285B (en) Credibility verification method, system, equipment and storage medium
CN109347839B (en) Centralized password management method and device, electronic equipment and computer storage medium
US10045212B2 (en) Method and apparatus for providing provably secure user input/output
US20210135870A1 (en) Secure distribution networks
CN109960935B (en) Method, device and storage medium for determining trusted state of TPM (trusted platform Module)
CN113766496A (en) Cross-platform binding method and system of intelligent equipment and related equipment
CN112422475B (en) Service authentication method, device, system and storage medium
CN115118426A (en) Data processing method, device and equipment of block chain system and storage medium
CN112118210B (en) Authentication key configuration method, device, system and storage medium
CN115208555A (en) Gateway negotiation method, device and storage medium
US10459722B2 (en) Device, system, and method for secure supervisor system calls
CN112015524A (en) Workflow deployment method, equipment, system and storage medium
CN111240868B (en) Instance processing and calling method, device, system and storage medium
CN116755842B (en) Identity verification system deployment method, device, equipment and storage medium
CN114301710B (en) Method for determining whether message is tampered, secret pipe platform and secret pipe system
CN115118427A (en) Data transmission method, device and equipment of block chain system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination