WO2014079009A1 - 虚拟机的管理控制方法及装置、系统 - Google Patents

虚拟机的管理控制方法及装置、系统 Download PDF

Info

Publication number
WO2014079009A1
WO2014079009A1 PCT/CN2012/085008 CN2012085008W WO2014079009A1 WO 2014079009 A1 WO2014079009 A1 WO 2014079009A1 CN 2012085008 W CN2012085008 W CN 2012085008W WO 2014079009 A1 WO2014079009 A1 WO 2014079009A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual machine
platform
request message
security control
party trusted
Prior art date
Application number
PCT/CN2012/085008
Other languages
English (en)
French (fr)
Inventor
叶思海
施迅
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2012/085008 priority Critical patent/WO2014079009A1/zh
Priority to JP2015543228A priority patent/JP6114832B2/ja
Priority to CN201280003455.8A priority patent/CN103843303B/zh
Priority to EP12888666.0A priority patent/EP2913956B1/en
Priority to ES12888666.0T priority patent/ES2619957T3/es
Publication of WO2014079009A1 publication Critical patent/WO2014079009A1/zh
Priority to US14/720,245 priority patent/US9698988B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Definitions

  • the present invention relates to communication technologies, and in particular, to a management and control method, apparatus, and system for a virtual machine. Background technique
  • the cloud computing platform can effectively provide large-scale computing resources to users in the form of reliable virtual machines by effectively integrating various interconnected computing resources and achieving multi-level virtualization and abstraction.
  • cloud computing platforms In addition to providing reliable security technologies to prevent security attacks between networks and virtual machines, cloud computing platforms must also ensure the trust of the cloud computing platform itself and the various applications of users, thus avoiding users with trade secrets. Leakage of privacy data and code, etc.
  • the security technologies provided by the existing cloud computing platforms include: virtual machine user authentication technology, or malware protection technology, or data leakage prevention (DLP) technology.
  • DLP data leakage prevention
  • the virtual machine user identity authentication technology cannot solve the security threat caused by the privileges of the cloud computing platform administrator; for example, the malware protection technology can only Anti-security software recognizes malware and Trojans, and there is a possibility of missing judgments; for example, data leakage prevention technology only supports limited operating systems or applications, cannot support 64-bit windows and linux, etc., or does not apply to more than cloud Tenant scenarios, which cannot control the data transmission leakage between virtual machines, or are opaque to users, affect the efficiency of information sharing in the enterprise.
  • the invention provides a management and control method, device and system for a virtual machine, which can improve the security problem of the security technology provided by the existing cloud computing platform.
  • the present invention provides a management control method for a virtual machine, including:
  • the security control platform receives the request message of the virtual machine from the user terminal forwarded by the management platform, where the request message for starting the virtual machine includes the identifier and user information of the virtual machine to be enabled; and the third-party trusted platform is called to determine the startup.
  • the request message of the virtual machine is the root of the user terminal Initiated by an authorized user instruction;
  • the user information is authenticated, and based on the successful authentication, the third-party trusted platform is invoked to decapsulate the virtual machine that needs to be enabled.
  • the third-party trusted platform is invoked, and determining that the request message for starting the virtual machine is initiated by the user terminal according to an authorized user instruction, including:
  • Determining that the request message for starting the virtual machine is initiated by the user terminal according to an authorized user instruction, if it is determined that the request message for starting the virtual machine is encrypted by a key provided by the third-party trusted platform to the authorized user. And invoking the key provided by the third-party trusted platform to the authorized user to decrypt the request message for starting the virtual machine.
  • the third-party trusted platform is invoked, and determining that the request message for starting the virtual machine is initiated by the user terminal according to an authorized user instruction, including:
  • the public key of the third-party trusted platform is invoked to decrypt the request message of the startup virtual machine
  • the third-party trusted platform is invoked, and determining that the request message for starting the virtual machine is initiated by the user terminal according to an authorized user instruction, including:
  • the security control platform invokes the third-party trusted platform to generate data encrypted by a key of the third-party trusted platform;
  • the decrypted data is the same as the encrypted data, determining that the request message to start the virtual machine is initiated by the user terminal according to an authorized user instruction.
  • the method includes:
  • the security control platform invokes the third-party trusted platform to perform integrity check on the virtual machine
  • the virtual machine is enabled if the integrity check value is consistent with the integrity check value of the virtual machine saved by the security control platform.
  • the security control platform detects, by the virtual machine monitor, that the virtual machine is installed with a new application
  • Determining that the new application is installed by the user terminal according to an authorized user instruction invoking the third-party trusted platform to perform integrity verification on the virtual machine, and updating the virtual machine saved by the security control platform Integrity check value.
  • the security control platform Receiving, by the security control platform, a virtual machine integrity check request message sent by the management platform, where the virtual machine integrity check request message is sent by the user terminal to the management platform, the virtual machine integrity
  • the verification request message includes an identifier of the virtual machine that needs integrity verification; and the third-party trusted platform is invoked to perform integrity verification on the virtual machine;
  • the integrity check value comparison result is sent to the management platform, so that the management platform sends the integrity check value comparison result to the user terminal.
  • the security control platform detects, by the virtual machine monitor, other virtual machines to the virtual An access request for virtual storage data in the machine, obtaining an identifier of another virtual machine that initiates the access request and an identifier of the application;
  • the third-party trusted platform is invoked to decrypt the virtual storage data in the virtual machine;
  • the decrypted virtual storage data is sent to other virtual machines that initiate the access request.
  • the request message for starting the virtual machine further includes an encapsulation key of the virtual machine that needs to be enabled;
  • the authenticating the user information, after the authentication succeeds, includes:
  • the security control platform decapsulates the virtual machine corresponding to the identifier of the virtual machine by using the encapsulation key of the virtual machine to be enabled included in the request message of the startup virtual machine.
  • the security control platform includes a trusted software service domain TSD, and the third-party trusted platform includes a trusted platform module TPM and a trusted cryptographic module TCM.
  • the present invention provides a security control platform, including:
  • a receiving module configured to receive, by the management platform, a request message for starting a virtual machine from the user terminal, where the request message for starting the virtual machine includes an identifier of the virtual machine to be enabled and user information;
  • a determining module configured to: after the receiving module receives the request message from the user terminal to start the virtual machine, invoke the third-party trusted platform to determine that the request message for starting the virtual machine is the user terminal according to the authorized user instruction Initiated
  • a decapsulation module configured to: after the determining module determines that the request message for starting the virtual machine is initiated by the user terminal according to an authorized user instruction, after authenticating the user information, calling the third-party trusted platform Decapsulate the virtual machine that needs to be enabled.
  • the present invention provides a management control system for a virtual machine, including the above security control platform.
  • a fourth aspect of the present invention provides a security control platform, including a processor.
  • the processor performs the following steps: receiving a request message from a user terminal to start a virtual machine forwarded by a management platform, and requesting to start a virtual machine
  • the message includes the identifier of the virtual machine to be enabled and the user information; the third-party trusted platform is called to determine that the request message for starting the virtual machine is initiated by the user terminal according to the authorized user instruction; after the user information is authenticated successfully, the message is invoked.
  • the third-party trusted platform decapsulates the virtual machine that needs to be enabled.
  • the security control platform when the security control platform receives the request message for enabling the virtual machine after the key encrypted by the third-party trusted platform from the user terminal, the security control platform first invokes the third party.
  • the decryption function of the letter platform decrypts the request message for enabling the virtual machine, obtains the user information contained in the request message for enabling the virtual machine, and the identifier of the virtual machine to be enabled. Further, the user information is authenticated, and after the authentication succeeds, The decryption function of the third-party trusted platform is called again to decapsulate the virtual machine that needs to be enabled, so as to ensure that other user terminals (including the management platform) cannot obtain the secret of the third-party trusted platform that encrypts the request message for enabling the virtual machine.
  • the key does not obtain the encapsulation key of the third-party trusted platform that encapsulates and encrypts the virtual machine. That is, only the user can enable the virtual machine of the user, thereby improving the security of the management control of the virtual machine, thereby improving the security.
  • FIG. 1 is a schematic flowchart of a method for managing and controlling a virtual machine according to an embodiment of the present invention
  • FIG. 2 is a system architecture diagram of an application of a management method for a virtual machine shown in FIG. 1
  • FIG. 4 is a schematic flowchart of a management method for a virtual machine according to another embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of a security control platform according to another embodiment of the present invention; ;
  • FIG. 6 is a schematic structural diagram of another embodiment of the security control platform provided by the embodiment shown in FIG. 5.
  • FIG. 7 is another schematic structural diagram of the security control platform provided by the embodiment shown in FIG. detailed description
  • the security control platform includes a trusted software service domain (TSD), and the security control platform is a module that provides a trusted security service, and the deployment form may be a software module or a
  • TSD trusted software service domain
  • the security control platform is used to invoke the first virtual machine when the user terminal starts the protected virtual machine of the user.
  • the three-party trusted platform completes the authentication of the user information, prevents the unauthorized user (including the administrator) from starting the protected virtual machine of the user, and the security control platform is also used to preset the security control policy table of the protected virtual machine.
  • the security control platform is also used to preset an access control policy table of the protected virtual machine to authorize which other virtual machines and their applications can access the Virtual storage data in a protected virtual machine.
  • the third-party trusted platform includes a Trusted Platform Module (TPM) or a Trusted Cryptography Module (TCM), and the deployment form may be a server installed on the cloud computing platform.
  • TPM Trusted Platform Module
  • TCM Trusted Cryptography Module
  • the data of the self and the cloud computing platform are not illegally attacked, providing a basic root of trust and security functions for the cloud computing platform.
  • FIG. 1 is a schematic flowchart of a method for managing and managing a virtual machine according to an embodiment of the present invention. As shown in FIG. 1, the management method for a virtual machine in this embodiment may include:
  • the security control platform receives the request message of the virtual machine from the user terminal forwarded by the management platform, and the request message for starting the virtual machine includes the identifier of the virtual machine to be enabled and the user information.
  • FIG. 2 is a system architecture diagram of an application of a management control method for a virtual machine according to an embodiment of the present invention. As shown in FIG. 2, the components of the application system shown in FIG. 2 are described as follows:
  • the hardware layer may be a physical host including a CPU, a memory, and a network resource.
  • the physical host has a TPM chip, and the physical host including the TPM chip constitutes a third-party trusted platform according to the embodiment of the present invention.
  • VMM Virtual Machine Monitor
  • Management Domain It is the administrator and controller of other virtual machines. It is a privileged virtual machine with the privilege of operating input/output resources. It can directly access physical hardware and is responsible for accepting management commands from the management system.
  • API application programming interface
  • the machine monitor interacts to manage other user virtual machines (VMs).
  • TSD Trusted Software Service Domain
  • Virtual Machine A protected, non-privileged virtual machine that is provided to authorized users, runs the guest operating system, and is a private, secure container or trusted space for the user.
  • UE User Equipment Any terminal device that can access the virtual machine of the authorized user for accessing the cloud computing platform.
  • the user terminal sends a request message for starting the virtual machine to the management platform, and the request message for starting the virtual machine includes There is user information and the ID of the virtual machine that needs to be enabled, where.
  • the user information includes, but is not limited to, the identification ID of the user terminal, the user account, the password, the dynamic password, and the like.
  • the request message for starting the virtual machine may be encrypted by using a key of a third-party trusted platform, as shown in FIG.
  • the key of the third-party trusted platform may be a private universal serial bus (USB) key or smart card provided by the third-party trusted platform to the user, only authorized The user can use the private key to encrypt the request message for starting the virtual machine, and the management platform and other users cannot use the key.
  • USB universal serial bus
  • the user terminal may digitally sign the request message for starting the virtual machine according to the key set by the authorized user instruction, and then use the trusted third party.
  • the platform's public key encryption initiates the virtual machine's request message.
  • the management platform after receiving the request message for starting the virtual machine sent by the user terminal, the management platform identifies whether the user terminal that sends the request message for starting the virtual machine is the user who subscribes to the trusted service, and if so, the virtual device is started.
  • the request message of the machine is sent to the security control platform; since the request message for starting the virtual machine is encrypted by the key of the third-party trusted platform, the management platform cannot obtain the key of the third-party trusted platform, thereby ensuring Enable the security and trustworthiness of virtual machines and solve the security threats caused by the privileges of cloud computing platform administrators.
  • the request message sent by the user terminal to the startup virtual machine of the security control platform by the management platform may be unencrypted, in order to ensure that the virtual operation is enabled.
  • the security control platform can invoke the encryption function of the third-party trusted platform, generate a data encrypted by the key of the third-party trusted platform, and the security control platform sends the encrypted data to the management platform through the management platform.
  • the user terminal decrypts the encrypted data by using a private key (such as a USB key or a smart card) provided by the third-party trusted platform to the user, and sends the decrypted data to the security control platform, and the security control platform compares Whether the decrypted data is the same as the encrypted data.
  • the request message for starting the virtual machine is initiated by the authorized user, because the private USB key or smart card can only be used by the authorized user himself, the management platform and other users. It is impossible to obtain a private USB key or smart card of an authorized user, thereby ensuring the security and credibility of the enabled virtual machine.
  • the security control platform invokes the The decryption function of the third-party trusted platform decrypts the request message for starting the virtual machine, that is, decrypts the request message for starting the virtual machine by using the private key provided by the third-party trusted platform to the user, after decryption, security
  • the control platform can obtain the user information contained in the request message for starting the virtual machine and the identifier of the virtual machine that needs to be enabled.
  • step 101 the user terminal digitally signs the request message for starting the virtual machine according to the key set by the authorized user instruction, and then starts using the public key encryption of the third-party trusted platform.
  • the security control platform also needs to invoke the decryption function of the third-party trusted platform to decrypt the request message for starting the virtual machine, that is, using the public key of the third-party trusted platform (for example, the root secret) The key) decrypts the request message for starting the virtual machine.
  • the security control platform may determine to start according to the digital signature information in the request message of the startup virtual machine.
  • the request message of the virtual machine is sent by the user terminal according to the authorized user instruction, which ensures the security credibility of the enabled virtual machine; after decryption, the security control platform obtains the user information contained in the request message for starting the virtual machine and the virtual information to be enabled.
  • the logo of the machine is the authorized user instruction, which ensures the security credibility of the enabled virtual machine; after decryption, the security control platform obtains the user information contained in the request message for starting the virtual machine and the virtual information to be enabled.
  • the logo of the machine is the logo of the machine.
  • the security control platform in order to ensure the security credibility of the virtual machine is enabled, after the security control platform obtains the user information, the information of the authorized user is authenticated to ensure that the authorized user himself activates the virtual machine.
  • the virtual machine to be enabled in order to ensure the security credibility of the virtual machine to be enabled, is encrypted by the encapsulation key (or root key) of the third-party trusted platform. It is thus possible to determine that the virtual machine that needs to be enabled is an absolutely private secure container or trusted space for the user.
  • the security control platform needs to invoke the decryption function of the third-party trusted platform to decapsulate the virtual machine corresponding to the identifier of the virtual machine, that is, using a third-party trusted platform.
  • the virtual machine is decapsulated by the encapsulation key provided by the virtual machine that needs to be enabled or the root key of the third-party trusted platform.
  • the security control platform directly uses the encapsulation key after authenticating the user information. Start the encapsulation key contained in the request message of the virtual machine and decapsulate the virtual machine that needs to be enabled.
  • the security control platform may invoke the third-party trusted platform to perform integrity on the decapsulated virtual machine. Verify, for example, verifying at least one of the virtual machine operating system or the registry or system directory or login log; if the integrity check value of the current checksum and the integrity check value of the virtual machine saved by the security control platform Inconsistent, the operating environment of the virtual machine changes.
  • the security control platform can restrict the virtual machine from being enabled, for example, restricting the virtual machine's access to key data and outgoing rights.
  • the user terminal inputs the recovery password or contacts the service provider for processing and other information. If the integrity check value is consistent with the integrity check value of the virtual machine saved by the security control platform, it indicates that the operating environment of the virtual machine has not changed, the virtual machine is secure and trusted, and the virtual machine.
  • the embodiment of the present invention firstly invokes the decryption function of the third-party trusted platform by receiving the decryption function of the third-party trusted platform after receiving the request message of the virtual machine encrypted by the third-party trusted platform from the user terminal forwarded by the management platform. Enable the virtual machine's request message to decrypt, obtain the user information contained in the request message for enabling the virtual machine, and the identifier of the virtual machine to be enabled. Further, authenticate the user information, and after the authentication succeeds, call the third party trusted again.
  • the decryption function of the platform decapsulates the virtual machines that need to be enabled to ensure that other user terminals (including the management platform) cannot obtain the key of the third-party trusted platform that encrypts the request message for enabling the virtual machine, and cannot obtain the key.
  • the encapsulation key of the third-party trusted platform that encapsulates and encrypts the virtual machine, that is, only the authorized user can enable the virtual machine of the authorized user, thereby improving the security of the management control of the virtual machine. Thereby improving the security of the cloud computing platform.
  • FIG. 3 is a schematic flowchart of a method for managing and managing a virtual machine according to another embodiment of the present invention; further extending on the basis of the method embodiment shown in FIG. 1 and the application system shown in FIG. 2, when an authorized user is enabled through a user terminal
  • the security control platform can invoke a third-party trusted platform.
  • the virtual machine performs integrity check.
  • the specific implementation process is shown in Figure 3. It includes:
  • the security control platform detects that the virtual machine is installed with a new application through the virtual machine monitor.
  • a new application is installed in the virtual machine while the virtual machine is running.
  • the virtual machine monitor can detect that the virtual machine is installed with a new one.
  • the application and obtain the identity of the newly installed application, the virtual machine monitor informs the security control platform of the identity of the newly installed application.
  • 302. Determine that the new application is installed by the user terminal according to an authorized user instruction.
  • 303. Call a third-party trusted platform to perform integrity check on the virtual machine, and update an integrity check value of the virtual machine saved by the security control platform.
  • the user terminal may preset a security control policy table of the user-protected virtual machine on the security control platform according to the authorized user command.
  • Table 1 is a security control policy table applied in the embodiment of the present invention. It should be noted that, in practical applications, there are multiple security control policy tables of the protected virtual machines in the security control platform, as shown in Table 1, the virtual machine identifiers are used to represent the corresponding virtual machines in the security control policy table.
  • the security control policy entry for example, adds an identifier of an application that is pre-authorized to be installed in the virtual machine 1 to a security control policy table corresponding to the virtual machine, such as an application 1 identifier and an application 2 identifier.
  • the virtual machine 3 identification application 5 identifies the application 6 identifier.
  • the security control platform detects that the virtual machine installs a new application through the virtual machine monitor, it queries the security control corresponding to the virtual machine according to the identifier of the newly installed application. a policy table, if it is determined that the security control policy table corresponding to the virtual machine includes the identifier of the newly installed application, determining that the new application is installed by the user terminal according to an authorized user instruction, and calling a third party
  • the trusted platform performs integrity check on the virtual machine, and updates the integrity check value of the virtual machine saved by the security control platform to the integrity check value of the current check.
  • the authorized user can install a new application in the virtual machine through the user terminal, specifically
  • the user terminal can send a request to install a new application to the security control platform through the management platform according to the authorized user instruction.
  • the request for installing the new application is encrypted by a key of a third-party trusted platform, and the third-party trusted platform is encrypted.
  • the key may be a private Universal Serial Bus (USB) key or smart card provided by the third-party trusted platform to the user terminal, and only the user can use the private key pair to install the new application. Requesting encryption, the key is not available to the management platform and other users.
  • USB Universal Serial Bus
  • the security control platform invokes the decryption function of the third-party trusted platform to decrypt the request to install the new application, that is, decrypts the request to install the new application by using the key provided by the third-party trusted platform to the user. And determining that the new application is installed by the user terminal according to an authorized user instruction, and invoking a third-party trusted platform to perform integrity verification on the virtual machine, and completing the virtual machine saved by the security control platform.
  • the checksum value is updated to the integrity check value of the current check.
  • the user terminal may sign a request for installing a new application according to a key set by an authorized user instruction, and then use a third party.
  • the public key of the trusted platform encrypts the request to install a new application.
  • the security control platform also needs to invoke the decryption function of the third-party trusted platform to decrypt the request to install the new application, that is, to use the public key of the third-party trusted platform (for example, the root secret) The key) decrypts the request to install the new application.
  • the digital signature information of the authorized user is pre-stored in the security control platform, and the security control platform can determine the digital signature information in the request for installing the new application.
  • the request to install a new application is sent by the user terminal according to the authorized user command, which ensures the security credibility of installing a new application.
  • the request for installing the new application sent by the user terminal to the security control platform by the management platform is not encrypted, and the security control platform is installed to ensure that the new application is installed by the user terminal according to the authorized user instruction.
  • the encryption function of the third-party trusted platform can be invoked to generate a data encrypted by the key of the third-party trusted platform, and the security control platform sends the encrypted data to the user terminal through the management platform, and the user terminal utilizes the third party.
  • the private key (such as a USB Key or smart card) provided by the letter platform decrypts the encrypted data, and sends the decrypted data to the security control platform.
  • the security control platform compares the decrypted data with the encrypted data. The data is the same.
  • the authorized user of the virtual machine can initiate an integrity check of the virtual machine through the user terminal, specifically, the user.
  • the terminal sends a virtual machine integrity check request message to the management platform, where the virtual machine integrity check request message includes an identifier of the virtual machine that needs integrity check; the management platform forwards the virtual machine integrity check request message
  • the security control platform receives the virtual machine integrity check request message sent by the management platform, the third-party trusted platform may be invoked to perform integrity check on the virtual machine;
  • the verification value is compared with the integrity check value of the virtual machine saved by the security control platform; further, if the integrity check value of the virtual machine is found to be changed after the comparison, the unauthorized application is newly installed according to the log. .
  • the security control platform feeds back the integrity check value comparison result to the user terminal through the management platform, so that the user terminal uninstalls the unauthorized application according to the integrity check value comparison result or restores the virtual machine through the system restore operation.
  • the security control platform does not perform integrity verification on the virtual machine, and the integrity check value of the virtual machine is not refreshed. Therefore, even if unauthorized malware is installed in the virtual machine, because of the new installation The software does not pass the integrity check of the security control platform.
  • the security control platform can restrict the access and outgoing rights of the virtual machine with the malware installed to the critical data. Therefore, for any application with an unauthorized installation installed (including malware) virtual machine, the security control platform can limit the virtual machine's access to key data and outgoing permissions, and solve the malware protection technology can only prevent malware and Trojans that can be recognized by security software. Sexual problem.
  • the security application platform detects that the virtual machine installs a new application, if the security control policy table corresponding to the virtual machine includes the identifier of the new application, the third party is invoked.
  • the trusted platform performs integrity check on the virtual machine, and updates the integrity check value of the virtual machine saved by the security control platform, so that the newly installed application in the virtual machine is not a preset security control.
  • the application in the policy table does not perform integrity check on the virtual machine, so that only the application that the user can authorize can be installed and run in the virtual machine, otherwise the security check platform integrity check will not be passed.
  • the security control platform can limit the virtual machine's access to key data and the outgoing rights, thus ensuring the security of the protected user virtual machine, improving the security of the virtual machine's management control, and thus improving the cloud computing platform. safety.
  • FIG. 4 is a schematic flowchart of a method for managing and controlling a virtual machine according to another embodiment of the present invention; further extending on the basis of the method embodiment shown in FIG. 1 and the application system shown in FIG. 2, when an authorized user is enabled through a user terminal
  • the virtual machine is running, when the virtual machine is running, when the application from the other virtual machine requests to access the data in the virtual storage of the virtual machine, in order to ensure the security of the data in the virtual storage in the virtual machine of the authorized user
  • the other virtual machines and their applications are authenticated and authenticated through the security control platform, and after the verification is successful, the third-party trusted platform is called to decrypt the data in the virtual storage of the virtual machine.
  • the specific implementation process is as shown in FIG. 4 . , including:
  • the security control platform detects, by the virtual machine monitor, an access request of another virtual machine to virtual storage data in the virtual machine, and obtains an identifier of another virtual machine that initiates the access request, and the other virtual machine. The identity of the application.
  • the virtual machine monitors Through the information flow tracking in the virtual machine, the identifiers of other virtual machines that initiate the request access are obtained. It should be noted that, in actual applications, the request is generally initiated by an application in another virtual machine. Therefore, the virtual machine is used. The monitor passes the information in the virtual machine Flow tracking can also get the identity of the application in the other virtual machine that initiated the request access. The virtual machine monitor sends the acquired identifiers of other virtual machines and the identifiers of applications in other virtual machines to the security control platform.
  • the access control policy table of the virtual machine includes an identifier of another virtual machine that initiates the access request and an identifier of an application in the other virtual machine, invoke the third-party trusted platform to decrypt the Virtually store data in a virtual machine.
  • the user terminal may preset an access control policy table of the user-protected virtual machine on the security control platform according to the authorized user command.
  • Table 2 is an access control policy table applied in the embodiment of the present invention. It is noted that, in an actual application, the access control policy table of multiple protected virtual machines exists in the security control platform, as shown in Table 2, the virtual machine identifier is used to indicate the access control of the corresponding virtual machine in the access control policy table.
  • the policy entry for example, the access control policy table stores the access control policy entries corresponding to the virtual machine 1 and the virtual machine 2, for example, the other virtual machine 3 identifiers and other virtual machine 4 identifiers that can access the virtual machine 1 are pre-authorized. And the application 1 identifier and the application 2 identifier in the other virtual machine 3, and the application 3 identifier and the application 4 identifier in the virtual machine 4 are added to the security control policy table entry corresponding to the virtual machine 1.
  • the security control platform queries the access control policy table corresponding to the virtual machine according to the identifier of the other virtual machine that initiates the access request and the identifier of the application in the other virtual machine, and if the access control policy table of the virtual machine is determined Determining an identifier of another virtual machine that initiates the access request and an identifier of an application in the other virtual machine, and determining another virtual machine that initiates the access request and The application is pre-authorized, and the third-party trusted platform is invoked to decrypt the virtual storage data in the virtual machine.
  • the virtual storage data in the virtual machine is encrypted by the encapsulation key of the third-party trusted platform, thereby ensuring storage in the virtual machine.
  • the space for virtual storage of data is an absolutely private, secure container or space for the user. Therefore, after the authorization verification of the virtual machine and the application that initiates the access request is successful, the security control platform invokes a third-party trusted platform to decapsulate the virtual storage data in the virtual machine, that is, using a third party.
  • the encapsulation key of the virtual storage data in the virtual machine or the root key of the third-party trusted platform decapsulates the virtual storage data in the virtual machine.
  • the security control platform queries the access control policy table corresponding to the virtual machine according to the obtained identifier of the other virtual machine that initiates the access request and the identifier of the application, and if the virtual machine is determined.
  • the access control policy table does not include the identifier of the obtained other virtual machine, or contains the identifier of the obtained other virtual machine, but does not include the identifier of the acquired application, and determines that the access request is unauthorized.
  • the security control platform prohibits other virtual machines from accessing the virtual storage data in the virtual machine, or only sends the undecrypted data virtual storage data to the virtual machine that initiated the access request.
  • the virtual storage data in the above virtual machine includes data stored in the virtual storage in the virtual machine and memory data in the virtual machine.
  • the access control policy table corresponding to the user virtual machine includes the initiator.
  • the identifier of the other virtual machine that accesses the request and the identifier of the application the third-party trusted platform is invoked to decrypt the virtual storage data in the user virtual machine, and the decrypted data is sent to the other requesting the access request. virtual machine. Therefore, it is ensured that other user terminals (including the management platform) cannot obtain the encapsulation key of the third-party trusted platform that encapsulates and encrypts the virtual storage data in the user virtual machine, that is, only the virtual machine or application authorized by the user can access.
  • Virtual storage data in the user virtual machine otherwise the security control platform may limit other virtual machines and applications authorized by the user to access the virtual storage data in the user virtual machine.
  • Q. Ensuring the security of virtual storage data in the protected user virtual machine improves the security of the virtual machine's management control, thereby improving the security of the cloud computing platform.
  • the security control platform of the embodiment supports all operating systems or applications, and is applicable to a multi-tenant application scenario in the cloud, and can effectively control data transmission leakage between virtual machines.
  • FIG. 5 is a schematic structural diagram of a security control platform according to another embodiment of the present invention. As shown in FIG. 5, the method includes:
  • the receiving module 51 is configured to receive, by the management platform, a request message for starting a virtual machine from the user terminal, where the request message for starting the virtual machine includes an identifier of the virtual machine to be enabled and user information.
  • the determining module 52 is configured to: after the receiving module receives the request message from the user terminal to start the virtual machine, invoke the third-party trusted platform to determine that the request message for starting the virtual machine is the user terminal according to the authorized user Initiated by the instruction;
  • the decapsulation module 53 is configured to: after the determining module determines that the request message for starting the virtual machine is initiated by the user terminal according to the authorized user instruction, after the user information is successfully authenticated, the third party is trusted.
  • the platform decapsulates the virtual machine that needs to be enabled.
  • the determining module 52 is specifically configured to: if it is determined that the request message for starting the virtual machine is encrypted by a key provided by the third-party trusted platform to the authorized user, determining the startup The request message of the virtual machine is initiated by the user terminal according to the authorized user instruction, and the requesting message sent by the third-party trusted platform to the authorized user is used to decrypt the request message of the startup virtual machine.
  • the determining module 52 is specifically configured to: if it is determined that the request message for starting the virtual machine is encrypted by the public key of the third-party trusted platform, invoke the third-party trusted platform. Decrypting the request message for starting the virtual machine; obtaining digital signature information of the request message for starting the virtual machine, if determining the obtained digital signature information and the authorization previously saved by the security control platform If the digital signature information of the user is consistent, determining that the request message for starting the virtual machine is initiated by the user terminal according to an authorized user instruction.
  • the determining module 52 is specifically configured to invoke the third-party trusted platform to generate data encrypted by a key of the third-party trusted platform; and pass the encrypted data through the Transmitting the management platform to the user terminal, so that the user terminal utilizes the The private data provided by the three-party trusted platform to the authorized user decrypts the encrypted data, and returns the decrypted data to the security control platform; if the decrypted data and the encrypted data are determined If yes, it is determined that the request message for starting the virtual machine is initiated by the user terminal according to an authorized user instruction.
  • FIG. 6 is a schematic structural diagram of another embodiment of the security control platform provided by the embodiment shown in FIG. 5;
  • the verification module 54 is configured to invoke the third-party trusted platform to perform integrity verification on the virtual machine.
  • a restriction enabling module 55 configured to perform, if the integrity check value is performed on the virtual machine, the integrity check value and the integrity check of the virtual machine saved by the security control platform If the values are inconsistent, the encapsulation module is enabled to decapsulate the virtual machine that needs to be enabled; the enabling module 56 is configured to perform integrity verification on the virtual machine, if the integrity is complete. The check value is consistent with the integrity check value of the virtual machine saved by the security control platform, and the decapsulation module is enabled to decapsulate the virtual machine that needs to be enabled.
  • FIG. 7 is still another structural diagram of the security control platform provided by the embodiment shown in FIG. 5;
  • the monitoring module 57 is configured to detect, by the virtual machine monitor, that the virtual machine is installed with a new application
  • the verification module 54 is further configured to: if the monitoring module detects that the virtual machine is installed with a new application, if it is determined that the new application is the user If the terminal is installed according to the authorized user instruction, the third-party trusted platform is invoked to perform integrity verification on the virtual machine, and the integrity check value of the virtual machine saved by the security control platform is updated.
  • the receiving module 51 is further configured to receive a virtual machine integrity check request message sent by the management platform, where the virtual machine integrity check request message is sent by the user terminal to the
  • the virtual machine integrity check request message sent by the management platform includes an identifier of the virtual machine that needs integrity verification;
  • the verification module 54 is further configured to invoke the third-party trusted platform to perform the virtual machine on the basis of the virtual machine integrity verification request message received by the receiving module. Integrity check
  • the security control platform further includes:
  • the comparison module 58 is configured to perform, on the basis of the integrity check of the virtual machine by the verification module, the integrity check value and the integrity check value of the virtual machine saved by the security control platform. Performing a comparison; sending the integrity check value comparison result to the management platform, so that the management platform sends the integrity check value comparison result to the user terminal.
  • the monitoring module 57 is further configured to detect, by the virtual machine monitor, an access request of the other virtual machine to the virtual storage data in the virtual machine, and obtain another virtuality that initiates the access request. Identification of the machine and the identity of the application;
  • the decapsulation module 53 is further configured to: if the monitoring module detects an access request of the virtual machine to the virtual storage data in the virtual machine, if it is determined that the access control policy entry of the virtual machine includes the And obtaining the identifiers of the other virtual machines and the identifiers of the applications, and calling the third-party trusted platform to decrypt the virtual storage data in the virtual machine; and sending the decrypted virtual storage data to the other device that initiates the access request virtual machine.
  • the request message for starting the virtual machine further includes the encapsulation key of the virtual machine to be enabled
  • the decapsulation module 53 is further configured to decapsulate the virtual machine by using a package key included in the request message of the startup virtual machine, on the basis of the request message for starting the virtual machine received by the receiving module. Identify the corresponding virtual machine.
  • the security control platform includes a trusted software service domain TSD, and the third-party trusted platform includes a trusted platform module TPM and a trusted cryptographic module TCM.
  • the virtual storage data in the above virtual machine includes data stored in the virtual storage in the virtual machine and memory data in the virtual machine.
  • the access control policy table corresponding to the user virtual machine includes the initiator.
  • the identifier of the other virtual machine that accesses the request and the identifier of the application the third-party trusted platform is invoked to decrypt the virtual storage data in the user virtual machine, and the decrypted data is sent to the other requesting the access request. virtual machine. Therefore, it is ensured that other user terminals (including the management platform) cannot obtain the encapsulation key of the third-party trusted platform that encapsulates and encrypts the virtual storage data in the user virtual machine, that is, only the virtual machine or application authorized by the user can access.
  • the security control platform can limit Other virtual machines and applications authorized by the user access the virtual storage data in the user virtual machine to ensure the security of the virtual storage data in the protected user virtual machine, thereby improving the security of the virtual machine management control, thereby improving The security of the cloud computing platform.
  • the security control platform of the embodiment supports all operating systems or applications, and is applicable to a multi-tenant application scenario in the cloud, and can effectively control data transmission leakage between virtual machines.
  • Another embodiment of the present invention further provides a security control platform, including a processor; when the processor is running, the following steps are performed:
  • the third-party trusted platform is invoked to decapsulate the virtual machine that needs to be enabled.
  • the processor further performs the following steps:
  • Determining that the request message for starting the virtual machine is initiated by the user terminal according to an authorized user instruction, if it is determined that the request message for starting the virtual machine is encrypted by a key provided by the third-party trusted platform to the authorized user. And invoking the key provided by the third-party trusted platform to the authorized user to decrypt the request message for starting the virtual machine.
  • the processor further performs the following steps:
  • the public key of the third-party trusted platform is invoked to decrypt the request message of the startup virtual machine; And determining, by the digital signature information of the request message of the virtual machine, if the obtained digital signature information is consistent with the digital signature information of the authorized user saved in advance by the security control platform, determining the request for starting the virtual machine
  • the message is initiated by the user terminal according to an authorized user instruction.
  • the processor further performs the following steps:
  • the decrypted data is the same as the encrypted data, and it is determined that the request message for starting the virtual machine is initiated by the user terminal according to an authorized user instruction.
  • the processor further performs the following steps:
  • the virtual machine is enabled if the integrity check value is consistent with the integrity check value of the virtual machine saved by the security control platform.
  • the processor further performs the following steps:
  • the processor further performs the following steps:
  • the integrity check value comparison result is sent to the management platform, so that the management platform sends the integrity check value comparison result to the user terminal.
  • the processor further performs the following steps:
  • the virtual machine monitor detecting, by the virtual machine monitor, an access request of the virtual machine to the virtual storage data in the virtual machine, and acquiring an identifier of the other virtual machine that initiates the access request and an identifier of the application; If it is determined that the access control policy entry of the virtual machine includes the identifier of the obtained other virtual machine and the identifier of the application, the third-party trusted platform is invoked to decrypt the virtual storage data in the virtual machine; The subsequent virtual storage data is sent to other virtual machines that initiated the access request.
  • the request message for starting the virtual machine further includes an encapsulation key of the virtual machine that needs to be enabled
  • the processor also performs the following steps:
  • the access control policy table corresponding to the user virtual machine includes the initiator.
  • the identifier of the other virtual machine that accesses the request and the identifier of the application the third-party trusted platform is invoked to decrypt the virtual storage data in the user virtual machine, and the decrypted data is sent to the other requesting the access request. virtual machine. Therefore, it is ensured that other user terminals (including the management platform) cannot obtain the encapsulation key of the third-party trusted platform that encapsulates and encrypts the virtual storage data in the user virtual machine, that is, only the virtual machine or application authorized by the user can access.
  • Virtual storage data in the user virtual machine otherwise the security control platform can restrict other virtual machines and applications authorized by the user to access the virtual storage data in the user virtual machine, and ensure the security of the virtual storage data in the protected user virtual machine. , improve the security of the virtual machine's management control, thereby improving the security of the cloud computing platform.
  • the security control platform includes, in addition to the processor, a memory, a communication interface, and a communication bus, wherein the processor is connected to the memory through a communication bus, and the security control platform communicates with other network elements through the communication interface.
  • the security control platform of the embodiment supports all operating systems or applications, and is applicable to a multi-tenant application scenario in the cloud, and can effectively control data transmission leakage between virtual machines.
  • Another embodiment of the present invention further provides a management control system for a virtual machine, including the security control platform described in the foregoing embodiment shown in any one of FIG. 5-7, wherein the details of the security control platform refer to FIG. 5 The related description in any of the illustrated embodiments is omitted.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not executed.
  • the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical, mechanical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
  • the above software functional units are stored in a storage medium and include a number of instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform some of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a USB flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. Medium.

Abstract

本发明实施例提供虚拟机的管理控制方法及装置、系统。本发明实施例的安全控制平台接收管理平台转发的来自用户终端的启动虚拟机的请求消息,所述启动虚拟机的请求消息中包括需要启用的虚拟机的标识和用户信息;调用第三方可信平台确定所述启动虚拟机的请求消息是所述用户终端根据授权用户指令发起的;认证所述用户信息,在认证成功的基础上,调用所述第三方可信平台解封装所述需要启用的虚拟机。确保其他用户终端(包括管理平台)获取不到第三方可信平台的密钥,提高了虚拟机的管理控制的安全性,从而也提高了云计算平台的安全性。

Description

虚拟机的管理控制方法及装置、 系统
技术领域
本发明涉及通信技术, 尤其涉及虚拟机的管理控制方法及装置、 系统。 背景技术
云计算平台通过将各种互联的计算资源进行有效整合并实现多层次的虚 拟化与抽象, 可以有效地将大规模的计算资源以可靠虚拟机的形式提供给用 户。 云计算平台除了必须提供可靠的安全保障技术以防止来自网络和虚拟机 之间的安全攻击, 还必须确保云计算平台自身, 以及用户的各种应用的可信 性, 从而避免包含商业机密的用户隐私数据和代码的泄露等。
现有的云计算平台提供的安全保障技术例如包括: 虚拟机用户身份认证 技术, 或者恶意软件防护技术, 或者数据泄露防护 ( Data leakage prevention, DLP )技术等。
然而基于现有的云计算平台提供的安全保障技术存在诸多问题, 例如, 虚拟机用户身份认证技术无法解决云计算平台管理员的特权带来的安全威胁 问题; 又例如, 恶意软件防护技术只能防安全软件可识别的恶意软件和木马, 存在漏判的可能性; 又例如, 数据泄漏防护技术仅支持有限的操作系统或应 用, 无法支持 64位 windows和 linux等, 或者不适用于云中多租户的场景, 无法 控制虚拟机之间的数据传输泄漏, 又或者对用户不透明, 在企业内影响信息 共享效率。
因此, 现有的云计算平台提供的安全保障技术存在安全性较低的问题。 发明内容
本发明提供虚拟机的管理控制方法及装置、 系统, 可以改善现有的云计 算平台提供的安全保障技术安全性较低的问题。
第一方面, 本发明提供了一种虚拟机的管理控制方法, 包括:
安全控制平台接收管理平台转发的来自用户终端的启动虚拟机的请求消 息,所述启动虚拟机的请求消息中包括需要启用的虚拟机的标识和用户信息; 调用第三方可信平台确定所述启动虚拟机的请求消息是所述用户终端根 据授权用户指令发起的;
认证所述用户信息, 在认证成功的基础上, 调用所述第三方可信平台解 封装所述需要启用的虚拟机。
基于第一方面, 在第一种可能的实施方式中, 调用第三方可信平台, 确 定所述启动虚拟机的请求消息是所述用户终端根据授权用户指令发起的, 包 括:
若确定所述启动虚拟机的请求消息是经过所述第三方可信平台提供给授 权用户的密钥加密的, 则确定所述启动虚拟机的请求消息为所述用户终端根 据授权用户指令发起的, 并调用所述第三方可信平台提供给所述授权用户的 密钥对所述启动虚拟机的请求消息进行解密。
基于第一方面, 在第二种可能的实施方式中, 调用第三方可信平台, 确 定所述启动虚拟机的请求消息是所述用户终端根据授权用户指令发起的, 包 括:
若确定所述启动虚拟机的请求消息是经过所述第三方可信平台的公钥加 密的, 则调用所述第三方可信平台的公钥对所述启动虚拟机的请求消息进行 解密;
获取所述启动虚拟机的请求消息的数字签名信息, 若确定所述获取的数 字签名信息与所述安全控制平台预先保存的授权用户的数字签名信息一致, 则确定所述启动虚拟机的请求消息为所述用户终端根据授权用户指令发起 的。
基于第一方面, 在第三种可能的实施方式中, 调用第三方可信平台, 确 定所述启动虚拟机的请求消息是所述用户终端根据授权用户指令发起的, 包 括:
所述安全控制平台调用所述第三方可信平台生成经过所述第三方可信平 台的密钥加密后的数据;
将所述加密后的数据通过所述管理平台发送给所述用户终端, 以使所述 用户终端利用所述第三方可信平台向授权用户提供的私有密钥对所述加密后 的数据进行解密, 并向所述安全控制平台返回解密后的数据;
若确定所述解密后的数据与所述加密后的数据相同, 则确定所述启动虚 拟机的请求消息是所述用户终端根据授权用户指令发起的。
基于第一方面的第一、 第二和第三种可能的实施方式, 在第四种可能的 实施方式中, 所述调用所述第三方可信平台解封装所述需要启用的虚拟机之 后, 包括:
所述安全控制平台调用所述第三方可信平台对所述虚拟机进行完整性校 验;
若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 不一致, 则限制启用所述虚拟机;
若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 一致, 则启用所述虚拟机。
基于第一方面的第一、 第二和第三种可能的实施方式, 在第五种可能的 实施方式中, 所述调用所述第三方可信平台解封装所述需要启用的虚拟机之 后, 包括:
所述安全控制平台通过虚拟机监控器检测到所述虚拟机安装了新的应用 程序;
确定所述新的应用程序是所述用户终端根据授权用户指令安装的; 调用所述第三方可信平台对所述虚拟机进行完整性校验, 更新所述安全 控制平台保存的所述虚拟机的完整性校验值。
基于第一方面的第一、 第二和第三种可能的实施方式, 在第六种可能的 实施方式中, 所述调用所述第三方可信平台解封装所述需要启用的虚拟机之 后, 包括:
所述安全控制平台接收所述管理平台发送的虚拟机完整性校验请求消 息,所述虚拟机完整性校验请求消息为所述用户终端向所述管理平台发送的, 所述虚拟机完整性校验请求消息中包含需要完整性校验的虚拟机的标识; 调用所述第三方可信平台对所述虚拟机进行完整性校验;
将完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 进行比较;
将完整性校验值比较结果发送给所述管理平台 , 以使所述管理平台将所 述完整性校验值比较结果发送给所述用户终端。
基于第一方面的第一、 第二和第三种可能的实施方式, 在第七种可能的 实施方式中, 所述调用所述第三方可信平台解封装所述需要启用的虚拟机之 后, 包括:
所述安全控制平台通过所述虚拟机监控器检测到其他虚拟机对所述虚拟 机中虚拟存储数据的访问请求, 获取发起所述访问请求的其他虚拟机的标识 和应用程序的标识;
若确定所述虚拟机的访问控制策略表项中包含所述获取的其他虚拟机的 标识和应用程序的标识, 则调用所述第三方可信平台解密所述虚拟机中虚拟 存储数据;
将解密后的所述虚拟存储数据发送给发起所述访问请求的其他虚拟机。 基于第一方面, 在第八种可能的实施方式中, 所述启动虚拟机的请求消 息中还包括所述需要启用的虚拟机的封装密钥;
所述认证所述用户信息, 在认证成功的基础上之后, 包括:
所述安全控制平台利用所述启动虚拟机的请求消息中包含的所述需要启 用的虚拟机的封装密钥, 解封装所述虚拟机的标识对应的虚拟机。
所述安全控制平台包括可信软件服务域 TSD, 所述第三方可信平台包括 可信赖平台模块 TPM和可信密码模块 TCM。
第二方面, 本发明提供了一种安全控制平台, 包括:
接收模块, 用于接收管理平台转发的来自用户终端的启动虚拟机的请求 消息, 所述启动虚拟机的请求消息中包括需要启用的虚拟机的标识和用户信 息;
确定模块, 用于在所述接收模块接收到来自用户终端的启动虚拟机的请 求消息的基础上, 调用第三方可信平台确定所述启动虚拟机的请求消息是所 述用户终端根据授权用户指令发起的;
解封装模块, 用于在所述确定模块确定所述启动虚拟机的请求消息是所 述用户终端根据授权用户指令发起的基础上, 认证所述用户信息成功之后, 调用所述第三方可信平台解封装所述需要启用的虚拟机。
第三方面, 本发明提供一种虚拟机的管理控制系统, 包括上述安全控制 平台。
第四方面, 本发明提供一种安全控制平台, 包括处理器; 所述处理器运 行时执行如下步骤: 接收管理平台转发的来自用户终端的启动虚拟机的请求 消息, 所述启动虚拟机的请求消息中包括需要启用的虚拟机的标识和用户信 息; 调用第三方可信平台确定所述启动虚拟机的请求消息是所述用户终端根 据授权用户指令发起的; 认证所述用户信息成功之后, 调用所述第三方可信 平台解封装所述需要启用的虚拟机。 由上述技术方案可知, 本发明实施例通过安全控制平台在接收到管理平 台转发的来自用户终端的经过第三方可信平台的密钥加密后的启用虚拟机的 请求消息时, 首先调用第三方可信平台的解密功能对启用虚拟机的请求消息 进行解密, 获取启用虚拟机的请求消息中包含的用户信息和需要启用的虚拟 机的标识, 进一步, 对用户信息进行认证, 并在认证成功之后, 再次调用第 三方可信平台的解密功能对需要启用的虚拟机进行解封装, 从而确保其他用 户终端 (包括管理平台)获取不到对启用虚拟机的请求消息进行加密的第三 方可信平台的密钥, 也获取不到对虚拟机进行封装加密的第三方可信平台的 封装密钥, 即只有用户本人才能启用该用户的虚拟机, 提高了虚拟机的管理 控制的安全性, 从而也提高了云计算平台的安全性。 附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实 施例或现有技术描述中所需要使用的附图作一简单地介绍, 显而易见地, 下 面描述中的附图是本发明的一些实施例。
图 1为本发明一实施例提供的虚拟机的管理控制方法的流程示意图; 图 2为图 1所示虚拟机的管理控制方法实施例应用的系统架构图; 图 3为本发明另一实施例提供的虚拟机的管理控制方法的流程示意图; 图 4为本发明另一实施例提供的虚拟机的管理控制方法的流程示意图; 图 5为本发明另一实施例提供的安全控制平台的结构示意图;
图 6为图 5所示实施例提供的安全控制平台的又一种结构示意图; 图 7为图 5所示实施例提供的安全控制平台的又一种结构示意图。 具体实施方式
为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本发 明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。
在本发明各实施例中,安全控制平台包括可信软件服务域 (Trusted Service Domain, TSD), 安全控制平台是提供可信安全服务的模块, 其部署形式可以 是一个软件模块、 或是一台物理主机, 或是一台虚拟机, 本发明对此不作限 定, 安全控制平台用于在用户终端启动该用户的受保护的虚拟机时, 调用第 三方可信平台来完成对用户信息的认证, 防止非授权用户 (包括管理员) 启 动该用户的受保护的虚拟机, 安全控制平台还用于预设受保护的虚拟机的安 全控制策略表, 用以授权哪些应用程序能够安装到该受保护的虚拟机中, 安 全控制平台还用于预设受保护的虚拟机的访问控制策略表, 用以授权哪些其 他虚拟机及其应用程序可以访问该受保护的虚拟机中的虚拟存储数据。
在本发明各实施例中, 第三方可信平台包括可信赖平台模块 (Trusted Platform Module, TPM )或可信密码模块(Trusted Cryptography Module, TCM ) ,其部署形式可以是一块安装在云计算平台服务器主板上的硬件芯片, 由于第三方可信平台是一个以安全保密功能为特色的嵌入式计算系统, 在物 理安全方面具有防攻击、 防墓改、 防探测的能力, 可以保证第三方可信平台 自身以及云计算平台数据不被非法攻击, 为云计算平台提供基础的信任根和 安全功能支撑。
图 1为本发明一实施例提供的虚拟机的管理控制方法的流程示意图, 如 图 1所示, 本实施例的虚拟机的管理控制方法可以包括:
101、安全控制平台接收管理平台转发的来自用户终端的启动虚拟机的请 求消息, 所述启动虚拟机的请求消息中包括需要启用的虚拟机的标识和用户 信息。
图 2为本发明实施例所示虚拟机的管理控制方法应用的系统架构图,如图 2所示, 如下对图 2所示应用系统的各组成部分进行说明:
硬件层 (Hardware Layer)可以是包含 CPU、 内存、 网络资源的物理主机, 该物理主机带有 TPM芯片, 包含 TPM芯片的物理主机构成本发明实施例所述 的第三方可信平台。
虚拟机监控器 (Virtual Machine Monitor, VMM): 介于硬件层和操作系统 之间, 负责为上层运行的操作系统提供虚拟化的硬件资源, 管理和分配虚拟 化的硬件资源, 确保上层虚拟机之间的相互隔离。
管理平台(Manage Domain): 是其它虚拟机的管理者和控制者, 是一个特 权虚拟机, 拥有操作输入 /输出资源的特权, 可直接访问物理硬件, 并负责接 受管理系统的管理指令, 与虚拟机监控器提供的应用程序编程接口 ( Application Programming Interface , API ) 交互, 实现对其它用户虚拟机 ( Virtual Machine, VM ) 的管理。 可信软件服务域 (TSD) 为本发明实施例所述的安全控制平台。
虚拟机(Virtual Machine, VM ) : 是提供给授权用户使用的受保护的非 特权虚拟机, 运行着客户操作系统, 对用户而言是一个私有的安全容器或可 信空间。
用户终端 (User Equipment, UE): 可以为接入云计算平台访问该授权用户 的虚拟机的任一终端设备。
基于图 2所示系统, 若授权用户通过用户终端想启用自己受保护的虚拟 机( Virtual Machine, VM ) , 用户终端向管理平台发送启动虚拟机的请求消 息, 该启动虚拟机的请求消息中包含有用户信息和需要启用的虚拟机的标识 ID, 其中。 用户信息包括但不限于用户终端的标识 ID、 用户账号、 密码、 动 态口令等信息。
在本发明的一个可选实施方式中, 为了保证启用虚拟机的安全可信, 上 述启动虚拟机的请求消息可以是经过第三方可信平台的密钥进行加密的, 如 图 2所示的 keyl为第三方可信平台的密钥,该第三方可信平台的密钥可以是第 三方可信平台向用户提供的私有通用串行总线 ( Universal Serial BUS , USB ) 密钥 Key或智能卡,只有授权用户本人才能使用该私有的密钥对启动虚拟机的 请求消息进行加密, 管理平台和其他用户都无法使用该密钥。
在本发明的一个可选实施方式中, 为了保证启用虚拟机的安全可信, 用 户终端可以根据授权用户指令设定的密钥对启动虚拟机的请求消息进行数字 签名, 再使用第三方可信平台的公钥加密启动虚拟机的请求消息。
如图 2所示, 管理平台接收到用户终端发送的启动虚拟机的请求消息之 后, 管理平台识别发送启动虚拟机的请求消息的用户终端是否为签约可信服 务的用户, 若是, 则将启动虚拟机的请求消息发送给安全控制平台; 由于该 启动虚拟机的请求消息是经过第三方可信平台的密钥进行加密的, 管理平台 获取不到该第三方可信平台的密钥, 从而可以保证启用虚拟机的安全可信, 解决云计算平台管理员的特权带来的安全威胁问题。
102、调用第三方可信平台确定所述启动虚拟机的请求消息是所述用户终 端根据授权用户指令发起的。
在本发明的一个可选实施方式中, 用户终端通过管理平台发送给安全控 制平台的启动虚拟机的请求消息可以是没有经过加密的, 为了保证启用虚拟 机的安全可信, 安全控制平台可以调用第三方可信平台的加密功能, 产生一 个利用第三方可信平台的密钥加密后的数据, 安全控制平台将该加密后的数 据通过管理平台发送给用户终端, 用户终端利用第三方可信平台向用户提供 的私有密钥 (例如 USB Key或智能卡)对该加密后的数据进行解密, 并将解 密后的数据发送给安全控制平台, 安全控制平台比较解密后的数据是否与加 密后的数据相同, 如果相同, 则确定该启动虚拟机的请求消息是授权用户启 动的, 因为私有 USB Key或智能卡只能是授权用户本人才能使用, 管理平台 和其他用户都无法获取授权用户的私有 USB Key或智能卡, 从而保证启用虚 拟机的安全可信。
在本发明的一个可选实施方式中, 若步骤 101中, 上述启动虚拟机的请求 消息是用户终端利用第三方可信平台提供给用户的私有密钥进行加密的, 则 安全控制平台调用所述第三方可信平台的解密功能对启动虚拟机的请求消息 进行解密, 也就是说, 利用第三方可信平台向该用户提供的私有密钥对启动 虚拟机的请求消息进行解密, 解密之后, 安全控制平台可以获取启动虚拟机 的请求消息中包含的用户信息和需要启用的虚拟机的标识。
在本发明的一个可选实施方式中, 若步骤 101 中, 用户终端根据授权用 户指令设定的密钥对启动虚拟机的请求消息进行数字签名, 再使用第三方可 信平台的公钥加密启动虚拟机的请求消息, 则安全控制平台也需要调用所述 第三方可信平台的解密功能对启动虚拟机的请求消息进行解密, 也就是说, 利用第三方可信平台的公钥 (例如根密钥)对启动虚拟机的请求消息进行解 密, 进一步地, 例如, 安全控制平台中预先保存的授权用户的数字签名信息, 安全控制平台可以根据启动虚拟机的请求消息中的数字签名信息, 确定启动 虚拟机的请求消息是该用户终端根据授权用户指令发送的, 保证了启用虚拟 机的安全可信性; 解密之后, 安全控制平台获取启动虚拟机的请求消息中包 含的用户信息和需要启用的虚拟机的标识。
103、 认证所述用户信息, 在认证成功的基础上, 调用所述第三方可信平 台解封装所述需要启用的虚拟机。
在本发明的一个可选实施方式中, 为了保证启用虚拟机的安全可信性, 安全控制平台获取用户信息之后, 对该授权用户的信息进行认证, 以确保授 权用户本人启用虚拟机。 在本发明的一个可选实施方式中, 为了保证需要启用的虚拟机的安全可 信性, 需要启用的虚拟机是经过第三方可信平台的封装密钥 (或者根密钥) 进行加密的, 从而可以确定需要启用的虚拟机对用户而言是一个绝对私有的 安全容器或可信空间。 因此, 安全控制平台获取需要启用的虚拟机的标识之 后, 需要调用所述第三方可信平台的解密功能解封装所述虚拟机的标识对应 的虚拟机, 也就是说, 利用第三方可信平台向该需要启用的虚拟机提供的封 装密钥或第三方可信平台的根密钥对该虚拟机进行解封装。
在本发明的一个可选实施方式中, 上述步骤 101 中, 若启动虚拟机的请 求消息中还包括需要启用的虚拟机的封装密钥; 则安全控制平台认证用户信 息成功之后, 直接利用所述启动虚拟机的请求消息中包含的封装密钥, 解封 装需要启用的虚拟机。
在本发明的一个可选实施方式中, 为了保证虚拟机的安全可信性, 解封 装需要启用的虚拟机之后, 安全控制平台可以调用第三方可信平台对解封装 后的虚拟机进行完整性校验, 例如校验虚拟机操作系统或注册表或系统目录 或登录日志中的至少一项; 若当前校验的完整性校验值与安全控制平台保存 的该虚拟机的完整性校验值不一致, 则说明该虚拟机的运行环境发生改变, 为了保证虚拟机的安全可信, 安全控制平台可以限制启用该虚拟机, 例如限 制该虚拟机对关键数据的访问和外发权限, 还可以提示用户终端输入恢复密 码或联系服务商处理等信息。 若完整性校验值与所述安全控制平台保存的所 述虚拟机的完整性校验值一致, 则说明该虚拟机的运行环境没有发生改变, 该虚拟机是安全可信, 启用所述虚拟机。
本发明实施例通过安全控制平台在接收到管理平台转发的来自用户终端 的经过第三方可信平台的密钥加密后的启用虚拟机的请求消息时, 首先调用 第三方可信平台的解密功能对启用虚拟机的请求消息进行解密, 获取启用虚 拟机的请求消息中包含的用户信息和需要启用的虚拟机的标识, 进一步, 对 用户信息进行认证, 并在认证成功之后, 再次调用第三方可信平台的解密功 能对需要启用的虚拟机进行解封装, 从而确保其他用户终端 (包括管理平台 ) 获取不到对启用虚拟机的请求消息进行加密的第三方可信平台的密钥, 也获 取不到对虚拟机进行封装加密的第三方可信平台的封装密钥, 即只有授权用 户本人才能启用该授权用户的虚拟机, 提高了虚拟机的管理控制的安全性, 从而也提高了云计算平台的安全性。
图 3为本发明另一实施例提供的虚拟机的管理控制方法的流程示意图; 在图 1所示方法实施例和图 2所示应用系统的基础上的进一步扩展, 当授权 用户通过用户终端启用自己的虚拟机之后, 在该虚拟机运行时, 若运行环境 发生变化, 例如, 该虚拟机安装了新的应用程序, 为了实现虚拟机的安全运 行, 安全控制平台可以调用第三方可信平台对该虚拟机进行完整性检查, 具 体实现过程如图 3所示, 包括:
301、 安全控制平台通过虚拟机监控器检测到虚拟机安装了新的应用程 序。
当授权用户通过用户终端启用自己的虚拟机之后, 在该虚拟机运行时, 在该虚拟机中安装了新的应用程序, 如图 2所示, 虚拟机监控器可以检测到 虚拟机安装了新的应用程序, 并获取该新安装的应用程序的标识, 虚拟机监 控器将该新安装的应用程序的标识告知安全控制平台。
302、 确定所述新的应用程序是所述用户终端根据授权用户指令安装的。 303、 调用第三方可信平台对所述虚拟机进行完整性校验, 更新所述安全 控制平台保存的所述虚拟机的完整性校验值。
在本发明的一个可选实施方式中, 用户终端可以根据授权用户指令在安 全控制平台预设该用户受保护的虚拟机的安全控制策略表, 表 1为本发明实 施例应用的安全控制策略表, 需要说明的是, 在实际应用中, 安全控制平台 中存在多个受保护的虚拟机的安全控制策略表, 如表 1所示, 虚拟机标识用 以表示安全控制策略表中对应虚拟机的安全控制策略表项, 例如, 将预先授 权可以安装到虚拟机 1 中的应用程序的标识添加到该虚拟机对应的安全控制 策略表中, 例如应用程序 1标识和应用程序 2标识。
Figure imgf000011_0001
虚拟机 3标识 应用程序 5标识 应用程序 6标识 当安全控制平台通过虚拟机监控器检测到虚拟机安装了新的应用程序 时, 根据新安装的应用程序的标识, 查询该虚拟机对应的安全控制策略表, 若确定该虚拟机对应的安全控制策略表中包括所述新安装的应用程序的标 识, 则确定所述新的应用程序是所述用户终端根据授权用户指令安装的, 并 调用第三方可信平台对该虚拟机进行完整性校验, 将安全控制平台保存的该 虚拟机的完整性校验值更新为当前校验的完整性校验值。
在本发明的一个可选实施方式中, 当授权用户通过用户终端启用自己的 虚拟机之后, 在该虚拟机运行时, 授权用户可以通过用户终端在自己的虚拟 机中安装新的应用程序, 具体实现时, 用户终端可以根据授权用户指令, 通 过管理平台向安全控制平台发送安装新的应用程序的请求。
例如, 为了确保所述新的应用程序是所述用户终端根据授权用户指令安 装的, 上述安装新的应用程序的请求是经过第三方可信平台的密钥进行加密 的, 该第三方可信平台的密钥可以是第三方可信平台向用户终端提供的私有 通用串行总线(Universal Serial BUS, USB ) 密钥 Key或智能卡, 只有用户 本人才能使用该私有的密钥对安装新的应用程序的请求进行加密, 管理平台 和其他用户都无法使用该密钥。
安全控制平台调用第三方可信平台的解密功能对安装新的应用程序的请 求进行解密, 也就是说, 利用第三方可信平台向该用户提供的密钥对安装新 的应用程序的请求进行解密, 则确定所述新的应用程序是所述用户终端根据 授权用户指令安装的, 并调用第三方可信平台对该虚拟机进行完整性校验, 并将安全控制平台保存的该虚拟机的完整性校验值更新为当前校验的完整性 校验值。
又例如, 为了确保所述新的应用程序是所述用户终端根据授权用户指令 安装的, 用户终端可以根据授权用户指令设定的密钥对安装新的应用程序的 请求进行签名,再使用第三方可信平台的公钥加密安装新的应用程序的请求。
安全控制平台也需要调用所述第三方可信平台的解密功能对安装新的应 用程序的请求进行解密, 也就是说, 利用第三方可信平台的公钥 (例如根密 钥)对安装新的应用程序的请求进行解密, 进一步地, 例如, 安全控制平台 中预先保存授权用户的数字签名信息, 安全控制平台可以根据安装新的应用 程序的请求中的数字签名信息, 确定安装新的应用程序的请求是该用户终端 根据授权用户指令发送的, 保证了安装新的应用程序的安全可信性。
又例如, 用户终端通过管理平台发送给安全控制平台的安装新的应用程 序的请求是没有经过加密的, 为了确保所述新的应用程序是所述用户终端根 据授权用户指令安装的,安全控制平台可以调用第三方可信平台的加密功能, 产生一个利用第三方可信平台的密钥加密后的数据, 安全控制平台将该加密 后的数据通过管理平台发送给用户终端, 用户终端利用第三方可信平台向用 户提供的私有密钥 (例如 USB Key或智能卡 )对该加密后的数据进行解密, 并将解密后的数据发送给安全控制平台, 安全控制平台比较解密后的数据是 否与加密后的数据相同, 如果相同, 则确定该安装新的应用程序的请求是授 权用户启动的, 因为私有 USB Key或智能卡只能是授权用户本人才能使用, 管理平台和其他用户都无法获取授权用户的私有 USB Key或智能卡, 从而保 证安装新的应用程序的安全可信。
在本发明的一个可选实施方式中, 当虚拟机启用之后, 在该虚拟机运行 时, 该虚拟机的授权用户随时可以通过用户终端发起对该虚拟机进行完整性 校验, 具体为, 用户终端向管理平台发送虚拟机完整性校验请求消息, 所述 虚拟机完整性校验请求消息中包含需要完整性校验的虚拟机的标识; 管理平 台将该虚拟机完整性校验请求消息转发给安全控制平台, 安全控制平台接收 所述管理平台发送的虚拟机完整性校验请求消息之后, 可以调用第三方可信 平台对该虚拟机进行完整性校验; 将当前校验的完整性校验值与安全控制平 台保存的该虚拟机的完整性校验值进行比较; 进一步地, 比较后如果发现该 虚拟机的完整性校验值发生改变,根据日志发现新安装了非授权的应用程序。 安全控制平台通过管理平台将完整性校验值比较结果反馈给用户终端 , 以使 用户终端根据完整性校验值比较结果卸载掉该非授权应用程序或通过系统还 原操作恢复该虚拟机。
本实施例中, 若在虚拟机中安装非授权的应用程序, 例如恶意软件, 安 全控制平台不会对该虚拟机进行完整性校验, 也就不会刷新该虚拟机的完整 性校验值, 因此, 即使在虚拟机中安装非授权的恶意软件, 因为新安装的恶 意软件不会通过安全控制平台的完整性校验, 安全控制平台可以限制该安装 有恶意软件的虚拟机对关键数据的访问和外发权限, 因此, 对于任一安装有 非授权安装的应用程序 (包括恶意软件) 的虚拟机, 安全控制平台可以限制 该虚拟机对关键数据的访问和外发权限,解决了恶意软件防护技术只能防安 全软件可识别的恶意软件和木马, 存在漏判可能性的问题。
本发明实施例通过安全控制平台在监测到虚拟机安装了新的应用程序 时, 若确定所述虚拟机对应的安全控制策略表中包括所述新的应用程序的标 识, 则调用所述第三方可信平台对所述虚拟机进行完整性校验, 更新所述安 全控制平台保存的所述虚拟机的完整性校验值, 可以实现当虚拟机中新安装 的应用程序不是预设的安全控制策略表中的应用程序, 则不对该虚拟机进行 完整性校验, 从而可以保证只有用户授权可以安装的应用程序才能在虚拟机 中安装和运行, 否则不会通过安全控制平台完整性校验, 安全控制平台可以 限制该虚拟机对关键数据的访问和外发权限, 因此可以确保受保护的用户虚 拟机的运行安全, 提高了虚拟机的管理控制的安全性, 从而也提高了云计算 平台的安全性。
图 4为本发明另一实施例提供的虚拟机的管理控制方法的流程示意图; 在图 1所示方法实施例和图 2所示应用系统的基础上的进一步扩展, 当授权 用户通过用户终端启用自己的虚拟机之后, 在该虚拟机运行时, 来自其他虚 拟机中的应用程序请求访问该虚拟机的虚拟存储内的数据时, 为了确保授权 用户的虚拟机中的虚拟存储内的数据安全, 通过安全控制平台对其他虚拟机 及其应用程序进行授权验证, 并在验证成功之后, 才调用第三方可信平台对 该虚拟机的虚拟存储内的数据进行解密, 具体实现过程如图 4所示, 包括:
401、所述安全控制平台通过所述虚拟机监控器检测到其他虚拟机对所述 虚拟机中虚拟存储数据的访问请求, 获取发起所述访问请求的其他虚拟机的 标识及所述其他虚拟机中应用程序的标识。
如图 2所示, 当授权用户通过用户终端启用自己的虚拟机之后, 在该虚 拟机运行时, 来自其他虚拟机请求访问该授权用户的虚拟机中的虚拟存储内 的数据时, 虚拟机监控器通过该虚拟机内的信息流跟踪, 获取发起请求访问 的其他虚拟机的标识, 需要说明的是, 在实际应用中, 一般是通过其他虚拟 机中的应用程序发起请求访问, 因此, 虚拟机监控器通过该虚拟机内的信息 流跟踪还可以获取发起请求访问的其他虚拟机中的应用程序的标识。 虚拟机 监控器将获取的其他虚拟机的标识及其他虚拟机中的应用程序的标识发送给 安全控制平台。
402、若确定所述虚拟机的访问控制策略表中包含发起所述访问请求的其 他虚拟机的标识及所述其他虚拟机中应用程序的标识, 则调用所述第三方可 信平台解密所述虚拟机中虚拟存储数据。
在本发明的一个实施方式中, 用户终端可以根据授权用户指令在安全控 制平台预设该用户受保护的虚拟机的访问控制策略表, 表 2为本发明实施例 应用的访问控制策略表, 需要说明的是, 在实际应用中, 安全控制平台中存 在多个受保护的虚拟机的访问控制策略表, 如表 2所示, 虚拟机标识用以表 示访问控制策略表中对应虚拟机的访问控制策略表项, 例如, 访问控制策略 表存有虚拟机 1和虚拟机 2对应的访问控制策略表项, 例如, 将预先授权可 以访问虚拟机 1的其他虚拟机 3标识和其他虚拟机 4标识, 以及其他虚拟机 3 中的应用程序 1标识和应用程序 2标识, 以及他虚拟机 4中的应用程序 3 标识和应用程序 4标识添加到与该虚拟机 1对应的安全控制策略表项中。
Figure imgf000015_0001
安全控制平台根据发起所述访问请求的其他虚拟机的标识及所述其他虚 拟机中应用程序的标识, 查询该虚拟机对应的访问控制策略表, 若确定所述 虚拟机的访问控制策略表中包含发起所述访问请求的其他虚拟机的标识及所 述其他虚拟机中应用程序的标识, 则确定发起所述访问请求的其他虚拟机及 其应用程序是预先经过授权的, 调用所述第三方可信平台解密所述虚拟机中 虚拟存储数据。
在本发明的一个实施方式中, 为了保证虚拟机中虚拟存储数据的安全, 虚拟机中虚拟存储数据是经过第三方可信平台的封装密钥进行加密的, 从而 可以确保虚拟机中用以存储的虚拟存储数据的空间对用户而言是一个绝对私 有的安全的容器或空间。 因此, 安全控制平台在对发起所述访问请求的虚拟 机及其应用程序进行授权验证成功之后, 调用第三方可信平台解封装所述虚 拟机中虚拟存储数据, 也就是说, 利用第三方可信平台对该虚拟机中虚拟存 储数据进行密钥封装时的封装密钥或第三方可信平台的根密钥对该虚拟机中 虚拟存储数据进行解封装。
403、将解密后的所述虚拟存储数据发送给发起所述访问请求的其他虚拟 机。
在本发明的一个实施方式中, 安全控制平台根据获取的发起所述访问请 求的其他虚拟机的标识及其应用程序的标识 , 查询该虚拟机对应的访问控制 策略表, 若确定所述虚拟机的访问控制策略表中不包含所述获取的其他虚拟 机的标识, 或者包含所述获取的其他虚拟机的标识, 但不包含所述获取的应 用程序的标识, 则确定所述访问请求是非授权的, 安全控制平台禁止其他虚 拟机对该虚拟机中虚拟存储数据的访问, 或只发送未解密的数据虚拟存储数 据给发起所述访问请求的虚拟机。
上述虚拟机中的虚拟存储数据包括该虚拟机中的虚拟存储器中存储的数 据和该虚拟机中的内存数据。
本发明实施例通过安全控制平台在监测到其他虚拟机及其应用程序对受 保护的用户虚拟机中的虚拟存储数据的访问请求时, 若确定用户虚拟机对应 的访问控制策略表中包括发起所述访问请求的其他虚拟机的标识及其应用程 序的标识, 则调用所述第三方可信平台对用户虚拟机中的虚拟存储数据进行 解密, 并将解密后的数据发送给发起访问请求的其他虚拟机。 从而确保其他 用户终端 (包括管理平台 )获取不到对该用户虚拟机中的虚拟存储数据进行 封装加密的第三方可信平台的封装密钥, 即只有用户授权的虚拟机或应用程 序才可以访问用户虚拟机中的虚拟存储数据, 否则安全控制平台可以限制 经用户授权的其他虚拟机和应用程序对该用户虚拟机中的虚拟存储数据访 问, 确保受保护的用户虚拟机中虚拟存储数据的安全, 提高了虚拟机的管理 控制的安全性, 从而也提高了云计算平台的安全性。
另外, 本实施例的安全控制平台支持所有操作系统或应用, 适用于云 中多租户的应用场景, 能够对虚拟机之间的数据传输泄漏进行有效的控 制。
图 5为本发明另一实施例提供的安全控制平台的结构示意图; 如图 5所 示, 包括:
接收模块 51 , 用于接收管理平台转发的来自用户终端的启动虚拟机的请 求消息, 所述启动虚拟机的请求消息中包括需要启用的虚拟机的标识和用户 信息;
确定模块 52 , 用于在所述接收模块接收到来自用户终端的启动虚拟机的 请求消息的基础上, 调用第三方可信平台确定所述启动虚拟机的请求消息是 所述用户终端根据授权用户指令发起的;
解封装模块 53 , 用于在所述确定模块确定所述启动虚拟机的请求消息是 所述用户终端根据授权用户指令发起的基础上,认证所述用户信息成功之后, 调用所述第三方可信平台解封装所述需要启用的虚拟机。
在本发明的一个实施方式中, 确定模块 52, 具体用于若确定所述启动虚 拟机的请求消息是经过所述第三方可信平台提供给授权用户的密钥加密的, 则确定所述启动虚拟机的请求消息为所述用户终端根据授权用户指令发起 的, 并调用所述第三方可信平台提供给所述授权用户的密钥对所述启动虚拟 机的请求消息进行解密。
在本发明的一个实施方式中, 确定模块 52, 具体用于若确定所述启动虚 拟机的请求消息是经过所述第三方可信平台的公钥加密的, 则调用所述第三 方可信平台的公钥对所述启动虚拟机的请求消息进行解密; 获取所述启动虚 拟机的请求消息的数字签名信息, 若确定所述获取的数字签名信息与所述安 全控制平台预先保存的所述授权用户的数字签名信息一致, 则确定所述启动 虚拟机的请求消息为所述用户终端根据授权用户指令发起的。
在本发明的一个实施方式中, 确定模块 52, 具体用于调用所述第三方可 信平台生成经过所述第三方可信平台的密钥加密后的数据; 将所述加密后的 数据通过所述管理平台发送给所述用户终端, 以使所述用户终端利用所述第 三方可信平台向授权用户提供的私有密钥对所述加密后的数据进行解密, 并 向所述安全控制平台返回解密后的数据; 若确定所述解密后的数据与所述加 密后的数据相同, 则确定所述启动虚拟机的请求消息是所述用户终端根据授 权用户指令发起的。
图 6为图 5所示实施例提供的安全控制平台的又一种结构示意图; 如图
6所示, 还包括:
校验模块 54, 用于调用所述第三方可信平台对所述虚拟机进行完整性校 验;
限制启用模块 55 , 用于在所述校验模块对所述虚拟机进行完整性校验的 基础上, 若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校 验值不一致, 则限制启用所述解封装模块解封装所述需要启用的虚拟机; 启用模块 56, 用于在所述校验模块对所述虚拟机进行完整性校验的基础 上 , 若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 一致, 则启用所述解封装模块解封装所述需要启用的虚拟机。
图 7为图 5所示实施例提供的安全控制平台的又一种结构示意图; 如图
7所示, 还包括:
监测模块 57 , 用于通过虚拟机监控器检测到所述虚拟机安装了新的应用 程序;
在本发明的一个实施方式中, 校验模块 54, 还用于在所述监测模块检测 到所述虚拟机安装了新的应用程序的基础上, 若确定所述新的应用程序是所 述用户终端根据授权用户指令安装的, 则调用所述第三方可信平台对所述虚 拟机进行完整性校验, 更新所述安全控制平台保存的所述虚拟机的完整性校 验值。
在本发明的一个实施方式中, 接收模块 51 , 还用于接收所述管理平台发 送的虚拟机完整性校验请求消息, 所述虚拟机完整性校验请求消息为所述用 户终端向所述管理平台发送的, 所述虚拟机完整性校验请求消息中包含需要 完整性校验的虚拟机的标识;
在本发明的一个实施方式中, 校验模块 54, 还用于在所述接收模块接收 的虚拟机完整性校验请求消息的基础上, 调用所述第三方可信平台对所述虚 拟机进行完整性校验; 在本发明的一个实施方式中, 安全控制平台还包括:
比较模块 58 , 用于在所述校验模块对所述虚拟机进行完整性校验的基础 上 , 将完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 进行比较; 将完整性校验值比较结果发送给所述管理平台, 以使所述管理平 台将所述完整性校验值比较结果发送给所述用户终端。
在本发明的一个实施方式中, 监测模块 57, 还用于通过所述虚拟机监控 器检测到其他虚拟机对所述虚拟机中虚拟存储数据的访问请求, 获取发起所 述访问请求的其他虚拟机的标识和应用程序的标识;
解封装模块 53, 还用于在所述监测模块检测到其他虚拟机对所述虚拟机 中虚拟存储数据的访问请求的基础上, 若确定所述虚拟机的访问控制策略表 项中包含所述获取的其他虚拟机的标识和应用程序的标识, 则调用所述第三 方可信平台解密所述虚拟机中虚拟存储数据; 将解密后的所述虚拟存储数据 发送给发起所述访问请求的其他虚拟机。
在本发明的一个实施方式中, 若上述启动虚拟机的请求消息中还包括所 述需要启用的虚拟机的封装密钥; 贝 'J
解封装模块 53 , 还用于在所述接收模块接收的所述启动虚拟机的请求消 息的基础上, 利用所述启动虚拟机的请求消息中包含的封装密钥, 解封装所 述虚拟机的标识对应的虚拟机。
其中, 所述安全控制平台包括可信软件服务域 TSD, 所述第三方可信平 台包括可信赖平台模块 TPM和可信密码模块 TCM。
上述虚拟机中的虚拟存储数据包括该虚拟机中的虚拟存储器中存储的数 据和该虚拟机中的内存数据。
本发明实施例通过安全控制平台在监测到其他虚拟机及其应用程序对受 保护的用户虚拟机中的虚拟存储数据的访问请求时, 若确定用户虚拟机对应 的访问控制策略表中包括发起所述访问请求的其他虚拟机的标识及其应用程 序的标识, 则调用所述第三方可信平台对用户虚拟机中的虚拟存储数据进行 解密, 并将解密后的数据发送给发起访问请求的其他虚拟机。 从而确保其他 用户终端 (包括管理平台 )获取不到对该用户虚拟机中的虚拟存储数据进行 封装加密的第三方可信平台的封装密钥, 即只有用户授权的虚拟机或应用程 序才可以访问用户虚拟机中的虚拟存储数据, 否则安全控制平台可以限制 经用户授权的其他虚拟机和应用程序对该用户虚拟机中的虚拟存储数据访 问, 确保受保护的用户虚拟机中虚拟存储数据的安全, 提高了虚拟机的管理 控制的安全性, 从而也提高了云计算平台的安全性。
另外, 本实施例的安全控制平台支持所有操作系统或应用, 适用于云中 多租户的应用场景, 能够对虚拟机之间的数据传输泄漏进行有效的控制。
本发明另一实施例还提供一种安全控制平台, 包括处理器; 所述处理器 运行时执行如下步骤:
接收管理平台转发的来自用户终端的启动虚拟机的请求消息, 所述启动 虚拟机的请求消息中包括需要启用的虚拟机的标识和用户信息;
调用第三方可信平台确定所述启动虚拟机的请求消息是所述用户终端根 据授权用户指令发起的;
认证所述用户信息成功之后, 调用所述第三方可信平台解封装所述需要 启用的虚拟机。
在第一种可能的实现方式中, 所述处理器还执行如下步骤:
若确定所述启动虚拟机的请求消息是经过所述第三方可信平台提供给授 权用户的密钥加密的, 则确定所述启动虚拟机的请求消息为所述用户终端根 据授权用户指令发起的, 并调用所述第三方可信平台提供给所述授权用户的 密钥对所述启动虚拟机的请求消息进行解密。
在第二种可能的实现方式中, 所述处理器还执行如下步骤:
若确定所述启动虚拟机的请求消息是经过所述第三方可信平台的公钥加 密的, 则调用所述第三方可信平台的公钥对所述启动虚拟机的请求消息进行 解密; 获取所述启动虚拟机的请求消息的数字签名信息, 若确定所述获取的 数字签名信息与所述安全控制平台预先保存的所述授权用户的数字签名信息 一致, 则确定所述启动虚拟机的请求消息为所述用户终端根据授权用户指令 发起的。
在第三种可能的实现方式中, 所述处理器还执行如下步骤:
调用所述第三方可信平台生成经过所述第三方可信平台的密钥加密后的 数据; 将所述加密后的数据通过所述管理平台发送给所述用户终端, 以使所 述用户终端利用所述第三方可信平台向授权用户提供的私有密钥对所述加密 后的数据进行解密, 并向所述安全控制平台返回解密后的数据; 若确定所述 解密后的数据与所述加密后的数据相同, 则确定所述启动虚拟机的请求消息 是所述用户终端根据授权用户指令发起的。
基于第一、 第二和第三种可能的实现方式, 在第四种可能的实现方式中, 所述处理器还执行如下步骤:
调用所述第三方可信平台对所述虚拟机进行完整性校验;
若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 不一致, 则限制启用所述虚拟机;
若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 一致, 则启用所述虚拟机。
基于第一、 第二和第三种可能的实现方式, 在第五种可能的实现方式中, 所述处理器还执行如下步骤:
通过虚拟机监控器检测到所述虚拟机安装了新的应用程序, 获取新的应 用程序的标识;
若确定所述新的应用程序是所述用户终端根据授权用户指令安装的, 则 调用所述第三方可信平台对所述虚拟机进行完整性校验, 更新所述安全控制 平台保存的所述虚拟机的完整性校验值。
基于第一、 第二和第三种可能的实现方式, 在第六种可能的实现方式中, 所述处理器还执行如下步骤:
接收所述管理平台发送的虚拟机完整性校验请求消息, 所述虚拟机完整 性校验请求消息为所述用户终端向所述管理平台发送的, 所述虚拟机完整性 校验请求消息中包含需要完整性校验的虚拟机的标识;
调用所述第三方可信平台对所述虚拟机进行完整性校验;
将完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 进行比较;
将完整性校验值比较结果发送给所述管理平台, 以使所述管理平台将所 述完整性校验值比较结果发送给所述用户终端。
基于第一、 第二和第三种可能的实现方式, 在第七种可能的实现方式中, 所述处理器还执行如下步骤:
通过所述虚拟机监控器检测到其他虚拟机对所述虚拟机中虚拟存储数据 的访问请求,获取发起所述访问请求的其他虚拟机的标识和应用程序的标识; 若确定所述虚拟机的访问控制策略表项中包含所述获取的其他虚拟机的 标识和应用程序的标识, 则调用所述第三方可信平台解密所述虚拟机中虚拟 存储数据; 将解密后的所述虚拟存储数据发送给发起所述访问请求的其他虚 拟机。
在第八种可能的实现方式中, 所述启动虚拟机的请求消息中还包括所述 需要启用的虚拟机的封装密钥;
所述处理器还执行如下步骤:
利用所述启动虚拟机的请求消息中包含的封装密钥, 解封装所述虚拟机 的标识对应的虚拟机。
本发明实施例通过安全控制平台在监测到其他虚拟机及其应用程序对受 保护的用户虚拟机中的虚拟存储数据的访问请求时, 若确定用户虚拟机对应 的访问控制策略表中包括发起所述访问请求的其他虚拟机的标识及其应用程 序的标识, 则调用所述第三方可信平台对用户虚拟机中的虚拟存储数据进行 解密, 并将解密后的数据发送给发起访问请求的其他虚拟机。 从而确保其他 用户终端 (包括管理平台 )获取不到对该用户虚拟机中的虚拟存储数据进行 封装加密的第三方可信平台的封装密钥, 即只有用户授权的虚拟机或应用程 序才可以访问用户虚拟机中的虚拟存储数据, 否则安全控制平台可以限制 经用户授权的其他虚拟机和应用程序对该用户虚拟机中的虚拟存储数据访 问, 确保受保护的用户虚拟机中虚拟存储数据的安全, 提高了虚拟机的管理 控制的安全性, 从而也提高了云计算平台的安全性。
具体地, 安全控制平台除了包括处理器之外, 还包括存储器、 通信接口 和通信总线, 其中, 处理器通过通信总线与存储器连接, 所述安全控制平台 通过通信接口与其他网元通信。
另外, 本实施例的安全控制平台支持所有操作系统或应用, 适用于云中 多租户的应用场景, 能够对虚拟机之间的数据传输泄漏进行有效的控制。
本发明另一实施例还提供一种虚拟机的管理控制系统, 包括上述图 5-7 任一项所示实施例中所述的安全控制平台, 其中, 安全控制平台的详细内容 参考图 5-7任一项所示实施例中的相关描述, 不再赘述。
所属领域的技术人员可以清楚地了解到, 为描述的方便和简洁, 上述描 述的系统, 装置和单元的具体工作过程, 可以参考前述方法实施例中的对应 过程, 在此不再赘述。
在本申请所提供的几个实施例中, 应该理解到, 所揭露的系统, 装置和 方法, 可以通过其它的方式实现。 例如, 以上所描述的装置实施例仅仅是示 意性的, 例如, 所述单元的划分, 仅仅为一种逻辑功能划分, 实际实现时可 以有另外的划分方式, 例如多个单元或组件可以结合或者可以集成到另一个 系统, 或一些特征可以忽略, 或不执行。 另一点, 所显示或讨论的相互之间 的耦合或直接耦合或通信连接可以是通过一些接口, 装置或单元的间接耦合 或通信连接, 可以是电性, 机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的, 作 为单元显示的部件可以是或者也可以不是物理单元, 即可以位于一个地方, 或者也可以分布到多个网络单元上。 可以根据实际的需要选择其中的部分或 者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中, 也可以是各个单元单独物理存在, 也可以两个或两个以上单元集成在一个单 元中。 上述集成的单元既可以釆用硬件的形式实现, 也可以釆用硬件加软件 功能单元的形式实现。
上述以软件功能单元的形式实现的集成的单元, 可以存储在一个计算机 可读取存储介质中。 上述软件功能单元存储在一个存储介质中, 包括若干指 令用以使得一台计算机设备(可以是个人计算机, 服务器, 或者网络设备等) 执行本发明各个实施例所述方法的部分步骤。 而前述的存储介质包括: U盘、 移动硬盘、 只读存储器(Read-Only Memory, 简称 ROM )、 随机存取存储器 ( Random Access Memory, 简称 RAM )、磁碟或者光盘等各种可以存储程序 代码的介质。
最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而非对其 限制; 尽管参照前述实施例对本发明进行了详细的说明, 本领域的普通技术 人员应当理解: 其依然可以对前述各实施例所记载的技术方案进行修改, 或 者对其中部分技术特征进行等同替换; 而这些修改或者替换, 并不使相应技 术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims

权 利 要求 书
1、 一种虚拟机的管理控制方法, 其特征在于, 包括:
安全控制平台接收管理平台转发的来自用户终端的启动虚拟机的请求消 息,所述启动虚拟机的请求消息中包括需要启用的虚拟机的标识和用户信息; 调用第三方可信平台确定所述启动虚拟机的请求消息是所述用户终端根 据授权用户指令发起的;
认证所述用户信息, 在认证成功的基础上, 调用所述第三方可信平台解 封装所述需要启用的虚拟机。
2、 根据权利要求 1所述的方法, 其特征在于, 所述调用第三方可信平台 确定所述启动虚拟机的请求消息是所述用户终端根据授权用户指令发起的, 包括:
若确定所述启动虚拟机的请求消息是经过所述第三方可信平台提供给授 权用户的密钥加密的, 则确定所述启动虚拟机的请求消息为所述用户终端根 据授权用户指令发起的, 并调用所述第三方可信平台提供给所述授权用户的 密钥对所述启动虚拟机的请求消息进行解密。
3、 根据权利要求 1所述的方法, 其特征在于, 所述调用第三方可信平台 确定所述启动虚拟机的请求消息是所述用户终端根据授权用户指令发起的, 包括:
若确定所述启动虚拟机的请求消息是经过所述第三方可信平台的公钥加 密的, 则调用所述第三方可信平台的公钥对所述启动虚拟机的请求消息进行 解密;
获取所述启动虚拟机的请求消息的数字签名信息, 若确定所述获取的数 字签名信息与所述安全控制平台预先保存的授权用户的数字签名信息一致, 则确定所述启动虚拟机的请求消息为所述用户终端根据授权用户指令发起 的。
4、 根据权利要求 1所述的方法, 其特征在于, 所述调用第三方可信平台 确定所述启动虚拟机的请求消息是所述用户终端根据授权用户指令发起的, 包括:
所述安全控制平台调用所述第三方可信平台生成经过所述第三方可信平 台的密钥加密后的数据; 将所述加密后的数据通过所述管理平台发送给所述用户终端, 以使所述 用户终端利用所述第三方可信平台向授权用户提供的私有密钥对所述加密后 的数据进行解密, 并向所述安全控制平台返回解密后的数据;
若确定所述解密后的数据与所述加密后的数据相同, 则确定所述启动虚 拟机的请求消息是所述用户终端根据授权用户指令发起的。
5、 根据权利要求 1-4任一项所述的方法, 其特征在于, 所述调用所述第 三方可信平台解封装所述需要启用的虚拟机之后, 包括:
所述安全控制平台调用所述第三方可信平台对所述虚拟机进行完整性校 验;
若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 不一致, 则限制启用所述虚拟机;
若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 一致, 则启用所述虚拟机。
6、 根据权利要求 1-4任一项所述的方法, 其特征在于, 所述调用所述第 三方可信平台解封装所述需要启用的虚拟机之后, 包括:
所述安全控制平台通过虚拟机监控器检测到所述虚拟机安装了新的应用 程序;
确定所述新的应用程序是所述用户终端根据授权用户指令安装的; 调用所述第三方可信平台对所述虚拟机进行完整性校验, 更新所述安全 控制平台保存的所述虚拟机的完整性校验值。
7、 根据权利要求 1-4任一项所述的方法, 其特征在于, 所述调用所述第 三方可信平台解封装所述需要启用的虚拟机之后, 包括:
所述安全控制平台接收所述管理平台发送的虚拟机完整性校验请求消 息,所述虚拟机完整性校验请求消息为所述用户终端向所述管理平台发送的, 所述虚拟机完整性校验请求消息中包含需要完整性校验的虚拟机的标识; 调用所述第三方可信平台对所述虚拟机进行完整性校验;
将完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 进行比较;
将完整性校验值比较结果发送给所述管理平台 , 以使所述管理平台将所 述完整性校验值比较结果发送给所述用户终端。
8、 根据权利要求 1-4任一项所述的方法, 其特征在于, 所述调用所述第 三方可信平台解封装所述需要启用的虚拟机之后, 包括:
所述安全控制平台通过所述虚拟机监控器检测到其他虚拟机对所述虚拟 机中虚拟存储数据的访问请求, 获取发起所述访问请求的其他虚拟机的标识 和应用程序的标识;
若确定所述虚拟机的访问控制策略表项中包含所述获取的其他虚拟机的 标识和应用程序的标识, 则调用所述第三方可信平台解密所述虚拟机中虚拟 存储数据;
将解密后的所述虚拟存储数据发送给发起所述访问请求的其他虚拟机。
9、 根据权利要求 1所述的方法, 其特征在于, 所述启动虚拟机的请求消 息中还包括所述需要启用的虚拟机的封装密钥;
所述认证所述用户信息, 在认证成功的基础上之后, 包括:
所述安全控制平台利用所述启动虚拟机的请求消息中包含的所述需要启 用的虚拟机的封装密钥, 解封装所述虚拟机的标识对应的虚拟机。
10、 根据权利要求 1-9 中任一项所述的方法, 其特征在于, 所述安全控 制平台包括可信软件服务域 TSD, 所述第三方可信平台包括可信赖平台模块 TPM和可信密码模块 TCM。
11、 一种安全控制平台, 其特征在于, 包括:
接收模块, 用于接收管理平台转发的来自用户终端的启动虚拟机的请求 消息, 所述启动虚拟机的请求消息中包括需要启用的虚拟机的标识和用户信 息;
确定模块, 用于在所述接收模块接收到来自用户终端的启动虚拟机的请 求消息的基础上, 调用第三方可信平台确定所述启动虚拟机的请求消息是所 述用户终端根据授权用户指令发起的;
解封装模块, 用于在所述确定模块确定所述启动虚拟机的请求消息是所 述用户终端根据授权用户指令发起的基础上, 认证所述用户信息成功之后, 调用所述第三方可信平台解封装所述需要启用的虚拟机。
12、根据权利要求 11所述的安全控制平台,其特征在于,所述确定模块, 具体用于若确定所述启动虚拟机的请求消息是经过所述第三方可信平台提供 给授权用户的密钥加密的, 则确定所述启动虚拟机的请求消息为所述用户终 端根据授权用户指令发起的, 并调用所述第三方可信平台提供给所述授权用 户的密钥对所述启动虚拟机的请求消息进行解密。
13、根据权利要求 11所述的安全控制平台,其特征在于,所述确定模块, 具体用于若确定所述启动虚拟机的请求消息是经过所述第三方可信平台的公 钥加密的, 则调用所述第三方可信平台的公钥对所述启动虚拟机的请求消息 进行解密; 获取所述启动虚拟机的请求消息的数字签名信息, 若确定所述获 取的数字签名信息与所述安全控制平台预先保存的授权用户的数字签名信息 一致, 则确定所述启动虚拟机的请求消息为所述用户终端根据授权用户指令 发起的。
14、根据权利要求 11所述的安全控制平台,其特征在于,所述确定模块, 具体用于调用所述第三方可信平台生成经过所述第三方可信平台的密钥加密 后的数据; 将所述加密后的数据通过所述管理平台发送给所述用户终端, 以 使所述用户终端利用所述第三方可信平台向授权用户提供的私有密钥对所述 加密后的数据进行解密, 并向所述安全控制平台返回解密后的数据; 若确定 所述解密后的数据与所述加密后的数据相同, 则确定所述启动虚拟机的请求 消息是所述用户终端根据授权用户指令发起的。
15、 根据权利要求 11-14任一项所述的安全控制平台, 其特征在于, 还 包括:
校验模块,用于调用所述第三方可信平台对所述虚拟机进行完整性校验; 限制启用模块, 用于在所述校验模块对所述虚拟机进行完整性校验的基 础上, 若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验 值不一致, 则限制启用所述虚拟机;
启用模块,用于在所述校验模块对所述虚拟机进行完整性校验的基础上, 若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值一 致, 则启用所述虚拟机。
16、 根据权利要求 11-14任一项所述的安全控制平台, 其特征在于, 还 包括:
监测模块, 用于通过虚拟机监控器检测到所述虚拟机安装了新的应用程 序;
所述校验模块, 还用于在所述监测模块检测到所述虚拟机安装了新的应 用程序的基础上, 若确定所述新的应用程序是所述用户终端根据授权用户指 令安装的, 则调用所述第三方可信平台对所述虚拟机进行完整性校验, 更新 所述安全控制平台保存的所述虚拟机的完整性校验值。
17、 根据权利要求 11-14任一项所述的安全控制平台, 其特征在于, 所 述接收模块, 还用于接收所述管理平台发送的虚拟机完整性校验请求消息, 所述虚拟机完整性校验请求消息为所述用户终端向所述管理平台发送的, 所 述虚拟机完整性校验请求消息中包含需要完整性校验的虚拟机的标识;
所述校验模块, 还用于在所述接收模块接收的虚拟机完整性校验请求消 息的基础上, 调用所述第三方可信平台对所述虚拟机进行完整性校验;
还包括:
比较模块,用于在所述校验模块对所述虚拟机进行完整性校验的基础上, 将完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值进行 比较; 将完整性校验值比较结果发送给所述管理平台, 以使所述管理平台将 所述完整性校验值比较结果发送给所述用户终端。
18、 根据权利要求 11-14任一项所述的安全控制平台, 其特征在于, 所 述监测模块, 还用于通过所述虚拟机监控器检测到其他虚拟机对所述虚拟机 中虚拟存储数据的访问请求, 获取发起所述访问请求的其他虚拟机的标识和 应用程序的标识;
所述解封装模块, 还用于在所述监测模块检测到其他虚拟机对所述虚拟 机中虚拟存储数据的访问请求的基础上, 若确定所述虚拟机的访问控制策略 表项中包含所述获取的其他虚拟机的标识和应用程序的标识, 则调用所述第 三方可信平台解密所述虚拟机中虚拟存储数据; 将解密后的所述虚拟存储数 据发送给发起所述访问请求的其他虚拟机。
19、 根据权利要求 11所述的安全控制平台, 其特征在于, 所述启动虚拟 机的请求消息中还包括所述需要启用的虚拟机的封装密钥;
所述解封装模块, 还用于在所述接收模块接收的所述启动虚拟机的请求 消息的基础上, 利用所述启动虚拟机的请求消息中包含的所述需要启用的虚 拟机的封装密钥, 解封装所述虚拟机的标识对应的虚拟机。
20、 根据权利要求 11-19 中任一项所述的安全控制平台, 其特征在于, 所述安全控制平台包括可信软件服务域 TSD。
21、 一种虚拟机的管理控制系统, 其特征在于, 包括:
如权利要求 11-20任一项所述的安全控制平台。
22、 一种安全控制平台, 其特征在于, 包括处理器; 所述处理器运行时 执行如下步骤:
接收管理平台转发的来自用户终端的启动虚拟机的请求消息, 所述启动 虚拟机的请求消息中包括需要启用的虚拟机的标识和用户信息;
调用第三方可信平台确定所述启动虚拟机的请求消息是所述用户终端根 据授权用户指令发起的;
认证所述用户信息成功之后 , 调用所述第三方可信平台解封装所述需要 启用的虚拟机。
23、 根据权利要求 22所述的安全控制平台, 其特征在于, 所述处理器还 执行如下步骤:
若确定所述启动虚拟机的请求消息是经过所述第三方可信平台提供给授 权用户的密钥加密的, 则确定所述启动虚拟机的请求消息为所述用户终端根 据授权用户指令发起的, 并调用所述第三方可信平台提供给所述授权用户的 密钥对所述启动虚拟机的请求消息进行解密。
24、 根据权利要求 22所述的安全控制平台, 其特征在于, 所述处理器还 执行如下步骤:
若确定所述启动虚拟机的请求消息是经过所述第三方可信平台的公钥加 密的, 则调用所述第三方可信平台的公钥对所述启动虚拟机的请求消息进行 解密; 获取所述启动虚拟机的请求消息的数字签名信息, 若确定所述获取的 数字签名信息与所述安全控制平台预先保存的授权用户的数字签名信息一 致, 则确定所述启动虚拟机的请求消息为所述用户终端根据授权用户指令发 起的。
25、 根据权利要求 22所述的安全控制平台, 其特征在于, 所述处理器还 执行如下步骤:
调用所述第三方可信平台生成经过所述第三方可信平台的密钥加密后的 数据; 将所述加密后的数据通过所述管理平台发送给所述用户终端, 以使所 述用户终端利用所述第三方可信平台向授权用户提供的私有密钥对所述加密 后的数据进行解密, 并向所述安全控制平台返回解密后的数据; 若确定所述 解密后的数据与所述加密后的数据相同, 则确定所述启动虚拟机的请求消息 是所述用户终端根据授权用户指令发起的。
26、 根据权利要求 22-25任一项所述的安全控制平台, 其特征在于, 所 述处理器还执行如下步骤:
调用所述第三方可信平台对所述虚拟机进行完整性校验;
若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 不一致, 则限制启用所述虚拟机;
若完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 一致, 则启用所述虚拟机。
27、 根据权利要求 22-25任一项所述的安全控制平台, 其特征在于, 所 述处理器还执行如下步骤:
通过虚拟机监控器检测到所述虚拟机安装了新的应用程序;
若确定所述新的应用程序是所述用户终端根据授权用户指令安装的, 则 调用所述第三方可信平台对所述虚拟机进行完整性校验, 更新所述安全控制 平台保存的所述虚拟机的完整性校验值。
28、 根据权利要求 22-25任一项所述的安全控制平台, 其特征在于, 所 述处理器还执行如下步骤:
接收所述管理平台发送的虚拟机完整性校验请求消息, 所述虚拟机完整 性校验请求消息为所述用户终端向所述管理平台发送的, 所述虚拟机完整性 校验请求消息中包含需要完整性校验的虚拟机的标识;
调用所述第三方可信平台对所述虚拟机进行完整性校验;
将完整性校验值与所述安全控制平台保存的所述虚拟机的完整性校验值 进行比较;
将完整性校验值比较结果发送给所述管理平台 , 以使所述管理平台将所 述完整性校验值比较结果发送给所述用户终端。
29、 根据权利要求 22-25任一项所述的安全控制平台, 其特征在于, 所 述处理器还执行如下步骤:
通过所述虚拟机监控器检测到其他虚拟机对所述虚拟机中虚拟存储数据 的访问请求 ,获取发起所述访问请求的其他虚拟机的标识和应用程序的标识; 若确定所述虚拟机的访问控制策略表项中包含所述获取的其他虚拟机的 标识和应用程序的标识, 则调用所述第三方可信平台解密所述虚拟机中虚拟 存储数据; 将解密后的所述虚拟存储数据发送给发起所述访问请求的其他虚 拟机。
30、 根据权利要求 22所述的安全控制平台, 其特征在于, 所述启动虚拟 机的请求消息中还包括所述需要启用的虚拟机的封装密钥;
所述处理器还执行如下步骤:
利用所述启动虚拟机的请求消息中包含的所述需要启用的虚拟机的封装 密钥, 解封装所述虚拟机的标识对应的虚拟机。
PCT/CN2012/085008 2012-11-22 2012-11-22 虚拟机的管理控制方法及装置、系统 WO2014079009A1 (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
PCT/CN2012/085008 WO2014079009A1 (zh) 2012-11-22 2012-11-22 虚拟机的管理控制方法及装置、系统
JP2015543228A JP6114832B2 (ja) 2012-11-22 2012-11-22 仮想マシンのための管理制御方法、装置及びシステム
CN201280003455.8A CN103843303B (zh) 2012-11-22 2012-11-22 虚拟机的管理控制方法及装置、系统
EP12888666.0A EP2913956B1 (en) 2012-11-22 2012-11-22 Management control method and device for virtual machines
ES12888666.0T ES2619957T3 (es) 2012-11-22 2012-11-22 Procedimiento y dispositivo de control de gestión para máquinas virtuales
US14/720,245 US9698988B2 (en) 2012-11-22 2015-05-22 Management control method, apparatus, and system for virtual machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/085008 WO2014079009A1 (zh) 2012-11-22 2012-11-22 虚拟机的管理控制方法及装置、系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/720,245 Continuation US9698988B2 (en) 2012-11-22 2015-05-22 Management control method, apparatus, and system for virtual machine

Publications (1)

Publication Number Publication Date
WO2014079009A1 true WO2014079009A1 (zh) 2014-05-30

Family

ID=50775392

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/085008 WO2014079009A1 (zh) 2012-11-22 2012-11-22 虚拟机的管理控制方法及装置、系统

Country Status (6)

Country Link
US (1) US9698988B2 (zh)
EP (1) EP2913956B1 (zh)
JP (1) JP6114832B2 (zh)
CN (1) CN103843303B (zh)
ES (1) ES2619957T3 (zh)
WO (1) WO2014079009A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104935583A (zh) * 2015-05-29 2015-09-23 四川长虹电器股份有限公司 一种云端服务平台、信息处理方法及数据处理系统
CN105184164A (zh) * 2015-09-08 2015-12-23 成都博元科技有限公司 一种数据处理方法
US9917811B2 (en) 2015-10-09 2018-03-13 International Business Machines Corporation Security threat identification, isolation, and repairing in a network
US10367647B2 (en) 2014-05-08 2019-07-30 Huawei Technologies Co., Ltd. Certificate acquiring method and device
CN113448681A (zh) * 2020-03-27 2021-09-28 支付宝(杭州)信息技术有限公司 一种虚拟机监控器公钥的注册方法、设备和存储介质
CN115964714A (zh) * 2022-06-22 2023-04-14 北京冲量在线科技有限公司 基于可信平台控制模块(tpcm)和安全虚拟机的gpu可信执行环境系统

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2997692A1 (en) * 2013-05-13 2016-03-23 Telefonaktiebolaget LM Ericsson (publ) Procedure for platform enforced secure storage in infrastructure clouds
DE102014204417A1 (de) * 2014-03-11 2015-09-17 Siemens Aktiengesellschaft Vorrichtung und Verfahren zum Detektieren einer Manipulation an einem Programmcode
CN105450406B (zh) 2014-07-25 2018-10-02 华为技术有限公司 数据处理的方法和装置
KR102028197B1 (ko) * 2015-02-11 2019-10-04 한국전자통신연구원 하드웨어 보안 모듈, 상기 하드웨어 보안 모듈에 저장된 무결성 검증 값을 업데이트하는 방법, 상기 하드웨어 보안 모듈을 이용하여 단말에 저장된 프로그램을 업데이트하는 방법
US10230529B2 (en) * 2015-07-31 2019-03-12 Microsft Technology Licensing, LLC Techniques to secure computation data in a computing environment
CN105208017B (zh) * 2015-09-07 2019-01-04 四川神琥科技有限公司 一种存储器信息获取方法
CN105306433B (zh) * 2015-09-10 2019-04-19 深信服科技股份有限公司 一种访问虚拟机服务器的方法和装置
CN106656915A (zh) * 2015-10-30 2017-05-10 深圳市中电智慧信息安全技术有限公司 基于可信计算的云安全服务器
US10027661B2 (en) * 2015-11-05 2018-07-17 International Business Machines Corporation Biometric virtual machine image administration
CN105450638A (zh) * 2015-11-10 2016-03-30 中国电子科技集团公司第三十研究所 一种虚拟机安全控制方法、管理方法及系统和管理系统
US10146936B1 (en) * 2015-11-12 2018-12-04 EMC IP Holding Company LLC Intrusion detection for storage resources provisioned to containers in multi-tenant environments
CN105389513B (zh) * 2015-11-26 2018-10-12 华为技术有限公司 一种虚拟可信平台模块vTPM的可信执行方法和装置
CN107133520B (zh) * 2016-02-26 2021-05-14 华为技术有限公司 云计算平台的可信度量方法和装置
US10412191B1 (en) 2016-03-30 2019-09-10 Amazon Technologies, Inc. Hardware validation
KR101882685B1 (ko) 2016-07-29 2018-08-24 주식회사 스패로우 클라우드 기반의 서비스 제공 방법
WO2018027586A1 (zh) 2016-08-09 2018-02-15 华为技术有限公司 云计算系统中虚拟机访问物理服务器的方法、装置和系统
US10379894B1 (en) * 2016-09-27 2019-08-13 Amazon Technologies, Inc. Lineage-based trust for virtual machine images
CN107959567B (zh) * 2016-10-14 2021-07-27 阿里巴巴集团控股有限公司 数据存储方法、数据获取方法、装置及系统
CN106354550A (zh) * 2016-11-01 2017-01-25 广东浪潮大数据研究有限公司 一种保护虚拟机安全的方法、装置及系统
US10270692B1 (en) * 2016-11-10 2019-04-23 Juniper Networks, Inc. Establishing a connection to multiple network devices using a single internet protocol (IP) address
CN108268303A (zh) * 2017-01-03 2018-07-10 北京润信恒达科技有限公司 一种操作请求方法、装置及系统
US11126706B2 (en) 2017-03-07 2021-09-21 Huawei Technologies Co., Ltd. Hypervisor measurement agent
US10567360B2 (en) * 2017-06-29 2020-02-18 Vmware, Inc. SSH key validation in a hyper-converged computing environment
CN108255723B (zh) * 2018-01-15 2021-05-04 中科软评科技(北京)有限公司 用于软件检测的方法和装置以及计算机可读存储介质
US11218324B2 (en) * 2018-04-05 2022-01-04 Ares Technologies, Inc. Systems and methods authenticating a digitally signed assertion using verified evaluators
US10320569B1 (en) * 2018-04-05 2019-06-11 HOTYB, Inc. Systems and methods for authenticating a digitally signed assertion using verified evaluators
US11316692B2 (en) 2018-08-13 2022-04-26 Ares Technologies, Inc. Systems, devices, and methods for selecting a distributed framework
US11695783B2 (en) * 2018-08-13 2023-07-04 Ares Technologies, Inc. Systems, devices, and methods for determining a confidence level associated with a device using heuristics of trust
US11824882B2 (en) * 2018-08-13 2023-11-21 Ares Technologies, Inc. Systems, devices, and methods for determining a confidence level associated with a device using heuristics of trust
US11379263B2 (en) 2018-08-13 2022-07-05 Ares Technologies, Inc. Systems, devices, and methods for selecting a distributed framework
US10826943B2 (en) 2018-08-21 2020-11-03 At&T Intellectual Property I, L.P. Security controller
US11240040B2 (en) * 2018-10-09 2022-02-01 Ares Technologies, Inc. Systems, devices, and methods for recording a digitally signed assertion using an authorization token
US11153098B2 (en) 2018-10-09 2021-10-19 Ares Technologies, Inc. Systems, devices, and methods for recording a digitally signed assertion using an authorization token
US11580321B2 (en) 2019-04-08 2023-02-14 Ares Technologies, Inc. Systems, devices, and methods for machine learning using a distributed framework
US11323425B2 (en) * 2019-09-18 2022-05-03 Lenovo Global Technology (United States) Inc. Systems and methods for selecting cryptographic settings based on computing device location
CN110659471A (zh) * 2019-09-23 2020-01-07 江苏恒宝智能系统技术有限公司 一种云环境中的身份认证登录方法
CN112073235B (zh) * 2020-09-03 2021-07-27 北京中关村软件园发展有限责任公司 一种虚拟机多功能互助系统
US11595212B2 (en) * 2020-10-13 2023-02-28 EMC IP Holding Company LLC Secure approval chain for runtime protection
CN112433822A (zh) * 2020-12-07 2021-03-02 北京远为软件有限公司 基于三权分立的跨域网络终端虚拟机的实现方法
US11526599B2 (en) * 2021-04-19 2022-12-13 International Business Machines Corporation Clustered application policy generation
CN113408007A (zh) * 2021-06-23 2021-09-17 航天科工智能运筹与信息安全研究院(武汉)有限公司 一种雾节点初始态可信度量的方法
CN114357434A (zh) * 2021-11-03 2022-04-15 统信软件技术有限公司 基于虚拟机的操作系统授权方法、装置、系统及计算设备
CN114629726A (zh) * 2022-04-26 2022-06-14 深信服科技股份有限公司 一种云管理方法、装置、设备、系统及可读存储介质
CN116501448B (zh) * 2023-06-21 2023-09-01 内江师范学院 一种应用于多虚拟机的容器封装方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101188624A (zh) * 2007-12-07 2008-05-28 华中科技大学 基于虚拟机的网格中间件系统
CN102202046A (zh) * 2011-03-15 2011-09-28 北京邮电大学 面向网络化操作系统的可信任虚拟运行平台
CN102291452A (zh) * 2011-08-09 2011-12-21 北京星网锐捷网络技术有限公司 基于云策略的虚拟机管理方法、云管理服务器及云系统

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2372593B (en) * 2001-02-23 2005-05-18 Hewlett Packard Co Electronic communication
GB2378272A (en) * 2001-07-31 2003-02-05 Hewlett Packard Co Method and apparatus for locking an application within a trusted environment
JP4094560B2 (ja) * 2004-01-23 2008-06-04 株式会社エヌ・ティ・ティ・データ リソース分割サーバ及びリソース分割サーバプログラム
JP2007226277A (ja) * 2004-04-02 2007-09-06 Matsushita Electric Ind Co Ltd 仮想マシン改ざん検査方法、および仮想マシン改ざん検査装置
US7590867B2 (en) 2004-06-24 2009-09-15 Intel Corporation Method and apparatus for providing secure virtualization of a trusted platform module
US7529946B2 (en) * 2005-06-16 2009-05-05 Microsoft Corporation Enabling bits sealed to an enforceably-isolated environment
US8090919B2 (en) * 2007-12-31 2012-01-03 Intel Corporation System and method for high performance secure access to a trusted platform module on a hardware virtualization platform
US20080148061A1 (en) * 2006-12-19 2008-06-19 Hongxia Jin Method for effective tamper resistance
JP2008176506A (ja) * 2007-01-17 2008-07-31 Hitachi Ltd 情報処理装置、情報処理方法、および管理サーバ
CN101533434B (zh) * 2009-04-10 2012-05-30 武汉大学 面向敏感数据防泄漏的可信虚拟机远程验证方法
US8700893B2 (en) * 2009-10-28 2014-04-15 Microsoft Corporation Key certification in one round trip
WO2011116459A1 (en) * 2010-03-25 2011-09-29 Enomaly Inc. System and method for secure cloud computing
WO2011141579A2 (en) * 2010-05-14 2011-11-17 Gemalto Sa System and method for providing security for cloud computing resources using portable security devices
WO2011152910A1 (en) * 2010-06-02 2011-12-08 Vmware, Inc. Securing customer virtual machines in a multi-tenant cloud
JP5501276B2 (ja) * 2011-03-18 2014-05-21 株式会社エヌ・ティ・ティ・データ 仮想マシン配置装置、仮想マシン配置方法、仮想マシン配置プログラム
WO2012148324A1 (en) * 2011-04-26 2012-11-01 Telefonaktiebolaget Lm Ericsson (Publ) Secure virtual machine provisioning
TW201335787A (zh) * 2012-02-23 2013-09-01 Hon Hai Prec Ind Co Ltd 虛擬機安全操作系統及方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101188624A (zh) * 2007-12-07 2008-05-28 华中科技大学 基于虚拟机的网格中间件系统
CN102202046A (zh) * 2011-03-15 2011-09-28 北京邮电大学 面向网络化操作系统的可信任虚拟运行平台
CN102291452A (zh) * 2011-08-09 2011-12-21 北京星网锐捷网络技术有限公司 基于云策略的虚拟机管理方法、云管理服务器及云系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2913956A4 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10367647B2 (en) 2014-05-08 2019-07-30 Huawei Technologies Co., Ltd. Certificate acquiring method and device
CN104935583A (zh) * 2015-05-29 2015-09-23 四川长虹电器股份有限公司 一种云端服务平台、信息处理方法及数据处理系统
CN105184164A (zh) * 2015-09-08 2015-12-23 成都博元科技有限公司 一种数据处理方法
CN105184164B (zh) * 2015-09-08 2017-11-24 成都博元科技有限公司 一种数据处理方法
US9917811B2 (en) 2015-10-09 2018-03-13 International Business Machines Corporation Security threat identification, isolation, and repairing in a network
US9923867B2 (en) 2015-10-09 2018-03-20 International Business Machines Corporation Security threat identification, isolation, and repairing in a network
CN113448681A (zh) * 2020-03-27 2021-09-28 支付宝(杭州)信息技术有限公司 一种虚拟机监控器公钥的注册方法、设备和存储介质
CN113448681B (zh) * 2020-03-27 2024-05-03 支付宝(杭州)信息技术有限公司 一种虚拟机监控器公钥的注册方法、设备和存储介质
CN115964714A (zh) * 2022-06-22 2023-04-14 北京冲量在线科技有限公司 基于可信平台控制模块(tpcm)和安全虚拟机的gpu可信执行环境系统
CN115964714B (zh) * 2022-06-22 2024-01-26 北京冲量在线科技有限公司 一种gpu可信执行环境系统

Also Published As

Publication number Publication date
ES2619957T3 (es) 2017-06-27
EP2913956B1 (en) 2017-01-04
JP2016506107A (ja) 2016-02-25
CN103843303B (zh) 2017-03-29
US9698988B2 (en) 2017-07-04
EP2913956A4 (en) 2015-11-04
CN103843303A (zh) 2014-06-04
JP6114832B2 (ja) 2017-04-12
US20150256341A1 (en) 2015-09-10
EP2913956A1 (en) 2015-09-02

Similar Documents

Publication Publication Date Title
US9698988B2 (en) Management control method, apparatus, and system for virtual machine
JP5635539B2 (ja) リモートプリブート認証
EP3326103B1 (en) Technologies for trusted i/o for multiple co-existing trusted execution environments under isa control
US8856544B2 (en) System and method for providing secure virtual machines
US9819496B2 (en) Method and system for protecting root CA certificate in a virtualization environment
EP2065800B1 (en) Remote provisioning utilizing device identifier
EP2973171B1 (en) Context based switching to a secure operating system environment
US9124640B2 (en) Systems and methods for implementing computer security
CA2982539C (en) Method of operating a computing device, computing device and computer program
JP6735872B2 (ja) コンピュータシステム及びコンピュータシステムを初期化する方法
US9524394B2 (en) Method and apparatus for providing provably secure user input/output
WO2013097209A1 (zh) 一种加密方法、解密方法和相关装置及系统
WO2015117523A1 (zh) 访问控制方法及装置
Mannan et al. Unicorn: Two-factor attestation for data security
CN112765637A (zh) 数据处理方法、密码服务装置和电子设备
Bugiel et al. TruWalletM: Secure web authentication on mobile platforms
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
US10771249B2 (en) Apparatus and method for providing secure execution environment for mobile cloud
WO2019109942A1 (zh) 建立虚拟网络功能实例的方法和装置
KR101107056B1 (ko) 클라우드 컴퓨팅 환경에서 가상 머신의 보안 정보 처리 방법
CN109891823B (zh) 用于凭证加密的方法、系统以及非暂态计算机可读介质
González et al. A practical hardware-assisted approach to customize trusted boot for mobile devices
TWI773146B (zh) 計算裝置及包含有用於經授權應用程式所作bios動作請求之指令的非暫時性有形電腦可讀媒體
CN111147252B (zh) 一种云环境可信连接方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12888666

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2015543228

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2012888666

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2012888666

Country of ref document: EP