WO2015070376A1 - Method and system for realizing virtualization security - Google Patents

Method and system for realizing virtualization security Download PDF

Info

Publication number
WO2015070376A1
WO2015070376A1 PCT/CN2013/086956 CN2013086956W WO2015070376A1 WO 2015070376 A1 WO2015070376 A1 WO 2015070376A1 CN 2013086956 W CN2013086956 W CN 2013086956W WO 2015070376 A1 WO2015070376 A1 WO 2015070376A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual machine
command
security
type
user
Prior art date
Application number
PCT/CN2013/086956
Other languages
French (fr)
Chinese (zh)
Inventor
施迅
叶思海
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201380004236.6A priority Critical patent/CN104169939B/en
Priority to PCT/CN2013/086956 priority patent/WO2015070376A1/en
Publication of WO2015070376A1 publication Critical patent/WO2015070376A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)

Abstract

In the method and system provided in the embodiments of the present invention, a user virtual machine receives a command from a user of a virtual machine, classifies the command according to an executive body corresponding to the command, and obtains at least one of the following: a first type of command and a second type of command, wherein the first type of command is executed by the user virtual machine, the second type of command is executed by a security virtual machine, and then the user virtual machine presents the execution results of the command to the user of the virtual machine, thereby improving the user experience while being able to realize virtualization security.

Description

一种实现虚拟化安全的方法和系统 技术领域  Method and system for realizing virtualization security
本发明实施例涉及云计算技术领域, 特别涉及一种实现虚拟化安全的 方法和系统。  The embodiments of the present invention relate to the field of cloud computing technologies, and in particular, to a method and system for implementing virtualization security.
背景技术  Background technique
云计算是计算模型的一次重要革新,通过将各种互联的计算资源进行有 效整合并实现多层次的虚拟化与抽象,从而将大规模的计算资源以可靠服务 的形式提供给用户。虚拟化技术给计算资源的共享与管理带来很多的便利之 处, 成为云计算的重要组成部分。 虚拟机监控器 (VMM, Vi r tua l Machine Moni tor )是虚拟化技术的核心, 通过对提供计算资源的服务器物理资源进 行抽象, 将中央处理器 (CPU, cent ra l proces s ing uni t ), 内存、 输入 /输 出 (I/O, input/output )等服务器物理资源转化为一组可统一管理、 灵活 调度、 动态分配的逻辑资源, 并基于这些逻辑资源在单个物理服务器上构建 多个同时运行、 相互隔离的虚拟机执行环境。  Cloud computing is an important innovation in computing models that provides large-scale computing resources to users in the form of reliable services by efficiently integrating various interconnected computing resources and enabling multi-level virtualization and abstraction. Virtualization technology brings a lot of convenience to the sharing and management of computing resources and becomes an important part of cloud computing. The virtual machine monitor (VMM, Vi r tua l Machine Moni tor) is the core of virtualization technology. By abstracting the physical resources of the server that provides computing resources, the central processor (CPU, cent ra l proces s ing uni t ) Server physical resources such as memory, input/output (I/O, input/output) are converted into a set of logical resources that can be uniformly managed, flexibly scheduled, dynamically allocated, and based on these logical resources, multiple simultaneous constructions on a single physical server A virtual machine execution environment that runs and is isolated from each other.
随着云计算应用的日益复杂, 其安全性要求也越来越高。 传统的 IT系统 是封闭的, 存在于企业内部, 对外暴露的只是网页服务器、 邮件服务器等少 数接口, 因此只需要在出口设置防火墙、 访问控制等安全措施, 就可以解决 大部分安全问题。 但在云计算环境下, 云暴露在公开的网络中, 任何一个节 点及它们的网络都可能受到攻击, 存在诸多安全隐患。 目前采用虚拟化层安 全服务技术, 由一台独立的安全虚拟机集中执行安全应用, 可避免传统安全 软件在虚拟化环境下运行带来的问题。 但是, 用户体验比较差。  As cloud computing applications become more complex, their security requirements are increasing. The traditional IT system is closed and exists inside the enterprise. Only a few interfaces such as web servers and mail servers are exposed. Therefore, only security measures such as firewall and access control can be set at the exit to solve most security problems. However, in a cloud computing environment, the cloud is exposed to the public network, and any node and their network may be attacked, and there are many security risks. At present, the virtualization layer security service technology is adopted, and a separate secure virtual machine is used to centrally execute security applications, which can avoid the problems caused by traditional security software running in a virtualized environment. However, the user experience is poor.
发明内容  Summary of the invention
本发明实施例提出了一种实现虚拟化安全的方法、 和系统, 以提高实现 虚拟化安全时用户的体验。  The embodiment of the invention provides a method and system for implementing virtualization security to improve the user experience when implementing virtualization security.
第一方面, 本发明实施例提出了一种实现虚拟化安全的方法, 所述方 法应用于包括用户虚拟机和安全虚拟机的系统, 具体包括: 所述用户虚拟机接收来自于虚拟机用户的命令; In a first aspect, the embodiment of the present invention provides a method for implementing virtualization security, where the method is applied to a system including a user virtual machine and a secure virtual machine, and specifically includes: The user virtual machine receives a command from a virtual machine user;
所述用户虚拟机根据所述命令对应的执行主体对所述命令进行分类, 得到如下至少之一: 第一类命令和第二类命令;  The user virtual machine classifies the command according to the execution body corresponding to the command, and obtains at least one of the following: a first type command and a second type command;
若得到第一类命令, 则所述用户虚拟机执行所述第一类命令, 并将所 述第一类命令的执行结果向所述虚拟机用户呈现;  If the first type of command is obtained, the user virtual machine executes the first type of command, and presents an execution result of the first type of command to the virtual machine user;
若得到第二类命令, 则所述用户虚拟机将所述第二类命令通过虚拟机 监控器发送给所述安全虚拟机; 所述安全虚拟机执行所述第二类命令, 并 将对所述第二类命令的执行结果通过所述虚拟机监控器发送给所述用户虚 拟机; 所述用户虚拟机将所述第二类命令的执行结果向所述虚拟机用户呈 现;  If the second type of command is obtained, the user virtual machine sends the second type of command to the secure virtual machine through a virtual machine monitor; the secure virtual machine executes the second type of command, and The execution result of the second type of command is sent to the user virtual machine by using the virtual machine monitor; the user virtual machine presents the execution result of the second type of command to the virtual machine user;
若得到第一类命令和第二类命令, 则所述用户虚拟机执行所述第一类 命令, 并将所述第二类命令通过虚拟机监控器发送给所述安全虚拟机; 所 述安全虚拟机执行所述第二类命令, 并将对所述第二类命令的执行结果通 过所述虚拟机监控器发送给所述用户虚拟机; 所述用户虚拟机将所述第一 类命令的执行结果和所述第二类命令的执行结果向所述虚拟机用户呈现。  If the first type of command and the second type of command are obtained, the user virtual machine executes the first type of command, and sends the second type of command to the secure virtual machine through a virtual machine monitor; The virtual machine executes the second type of command, and sends the execution result of the second type of command to the user virtual machine through the virtual machine monitor; the user virtual machine will use the first type of command The execution result and the execution result of the second type of command are presented to the virtual machine user.
结合第一方面, 在第一种可能的实现方式中, 在所述用户虚拟机上配 置有操作码与执行主体的对应关系, 根据所述命令对应的执行主体对所述 命令进行分类之前还包括:  With reference to the first aspect, in a first possible implementation manner, a correspondence between an operation code and an execution body is configured on the user virtual machine, and the execution body corresponding to the command further includes: :
所述用户虚拟机根据所述命令携带的操作码查询所述操作码与执行主 体的对应关系, 获得所述命令对应的执行主体。  The user virtual machine queries the corresponding relationship between the operation code and the execution entity according to the operation code carried by the command, and obtains an execution body corresponding to the command.
结合第一方面或第一种可能的实现方式,在第二种可能的实现方式中, 若所述命令为安全配置命令, 该方法还包括:  With reference to the first aspect or the first possible implementation manner, in a second possible implementation manner, if the command is a security configuration command, the method further includes:
所述用户虚拟机的安全轻代理根据所述第一类命令对应的执行主体对 所述第一类命令进行分类, 得到如下至少之一: 代理类命令和驱动类命令; 若得到代理类命令, 则所述安全轻代理执行所述代理类命令, 并将所 述代理类命令的执行结果向所述虚拟机用户呈现; 若得到驱动类命令, 则所述安全轻代理将所述驱动类命令发送给所述 用户虚拟机的安全驱动; 所述用户虚拟机的安全驱动执行所述驱动类命令, 并将所述驱动类命令的执行结果发送给所述安全轻代理; 所述安全轻代理 将所述驱动类命令的执行结果向所述虚拟机用户呈现; The security light agent of the user virtual machine classifies the first type of commands according to the execution entity corresponding to the first type of command, and obtain at least one of the following: a proxy class command and a driver class command; And the secure light agent executes the proxy class command, and presents an execution result of the proxy class command to the virtual machine user; If the driver class command is obtained, the secure light agent sends the driver class command to the security driver of the user virtual machine; the security driver of the user virtual machine executes the driver class command, and the driver class The execution result of the command is sent to the secure light agent; the secure light agent presents the execution result of the drive type command to the virtual machine user;
若得到代理类命令和驱动类命令, 则所述安全轻代理执行所述代理类 命令, 并将所述驱动类命令发送给所述用户虚拟机的安全驱动; 所述用户 虚拟机的安全驱动执行所述驱动类命令, 并将所述驱动类命令的执行结果 发送给所述安全轻代理; 所述安全轻代理将所述代理类命令的执行结果和 所述驱动类命令的执行结果向所述虚拟机用户呈现。  If the proxy class command and the driver class command are obtained, the secure light proxy executes the proxy class command, and sends the driver class command to the user virtual machine security driver; the user virtual machine security driver execution And driving the command to send the execution result of the driver class command to the secure light agent; the secure light agent is configured to execute the execution result of the proxy class command and the execution result of the driver class command The virtual machine user is presented.
结合第一方面、 第一方面的第一种可能或第二种可能的实现方式, 在 第三种可能的实现方式中, 若所述命令为安全配置命令, 该方法还包括: 所述安全虚拟机执行所述第二类命令之前还包括:  With the first aspect, the first possible or the second possible implementation of the first aspect, in a third possible implementation, if the command is a security configuration command, the method further includes: the security virtual Before executing the second type of commands, the machine further includes:
所述安全虚拟机的用户配置审计模块对所述第二类命令进行审计, 确 定所述第二类命令满足预先配置的安全策略。  The user configuration auditing module of the security virtual machine audits the second type of command to determine that the second type of command satisfies a pre-configured security policy.
结合第一方面或第一方面的第一种至第三种任意一种可能的实现方 式, 在第四种可能的实现方式中, 该方法还包括还包括:  With reference to the first aspect, or any one of the first to the third possible implementations of the first aspect, in a fourth possible implementation, the method further includes:
将对所述第二类命令的执行结果通过所述虚拟机监控器发送给所述用 户虚拟机之前, 所述安全虚拟机的安全功能处理模块确定所述第二类命令 的执行结果满足预先配置的通知策略。  Before the execution result of the second type of command is sent to the user virtual machine by using the virtual machine monitor, the security function processing module of the secure virtual machine determines that the execution result of the second type of command satisfies the pre-configuration Notification policy.
结合第一方面或第一方面的第一种至第四种任意一种可能的实现方 式, 在第五种可能的实现方式中, 该方法还包括还包括: 所述安全虚拟机 的轻代理检验模块将所述用户虚拟机的安全轻代理的完整性度量值和第一 正确值进行比对, 然后根据预先配置的第一校验策略对所述安全轻代理的 比对结果进行处理, 所述安全轻代理的完整性度量值是对所述安全轻代理 的度量内容进行完整性计算得来的, 所述安全轻代理的度量内容包括如下 至少之一: 所述安全轻代理在内存中的代码、 数据、 磁盘上的程序文件和 配置数据。 With reference to the first aspect, or any one of the first to fourth possible implementation manners of the first aspect, in a fifth possible implementation, the method further includes: performing a light proxy verification of the secure virtual machine The module compares the integrity metric of the security light agent of the user virtual machine with the first correct value, and then processes the comparison result of the secure light agent according to the pre-configured first verification policy, where The integrity metric of the secure light proxy is obtained by performing integrity calculation on the metric content of the secure light proxy, and the metric content of the secure light proxy includes at least one of the following: the code of the secure light proxy in memory , data, program files on disk, and Configuration Data.
结合第一方面或第一方面的第一种至第五种任意一种可能的实现方式 中, 在第六种可能的实现方式中, 该方法还包括: 所述安全虚拟机的轻代 理检验模块将所述用户虚拟机的安全驱动的完整性度量值和第二正确值进 行比对, 然后根据预先配置的第二校验策略对所述用户虚拟机的安全驱动 的比对结果进行处理, 所述安全驱动的完整性度量值是对所述用户虚拟机 的安全驱动的度量内容进行完整性计算得来的, 所述安全驱动的度量内容 包括如下至少之一: 所述用户虚拟机的安全驱动在内存中的代码、 数据、 磁盘上保存的驱动文件和配置数据。  With reference to the first aspect, or any one of the first to the fifth possible implementation manners of the first aspect, in a sixth possible implementation, the method further includes: a light proxy verification module of the secure virtual machine Comparing the security-driven integrity metric value of the user virtual machine with the second correct value, and then processing the comparison result of the security driver of the user virtual machine according to the pre-configured second verification policy. The security-driven integrity metric is obtained by performing integrity calculation on the metric content of the security driver of the user virtual machine, where the metric content of the security driver includes at least one of the following: a security driver of the user virtual machine Code, data, drive files and configuration data saved on disk.
第二方面, 本发明实施例提出了一种实现虚拟化安全的系统, 所述系 统包括用户虚拟机和安全虚拟机, 所述用户虚拟机, 用于接收来自于虚拟 机用户的命令, 根据所述命令对应的执行主体对所述命令进行分类, 得到 如下至少之一: 第一类命令和第二类命令;  In a second aspect, the embodiment of the present invention provides a system for implementing virtualization security, where the system includes a user virtual machine and a security virtual machine, where the user virtual machine is configured to receive a command from a virtual machine user, according to the The execution body corresponding to the command classifies the command, and obtain at least one of the following: a first type command and a second type command;
若得到第一类命令, 则所述用户虚拟机, 用于执行所述第一类命令, 并将所述第一类命令的执行结果向所述虚拟机用户呈现;  If the first type of command is obtained, the user virtual machine is configured to execute the first type of command, and present an execution result of the first type of command to the virtual machine user;
若得到第二类命令, 则所述用户虚拟机, 用于将所述第二类命令通过 虚拟机监控器发送给所述安全虚拟机; 所述安全虚拟机, 用于执行所述第 二类命令, 并将对所述第二类命令的执行结果通过所述虚拟机监控器发送 给所述用户虚拟机; 所述用户虚拟机, 还用于将所述第二类命令的执行结 果向所述虚拟机用户呈现;  If the second type of command is obtained, the user virtual machine is configured to send the second type of command to the secure virtual machine by using a virtual machine monitor; and the secure virtual machine is configured to execute the second type a command, and the execution result of the second type of command is sent to the user virtual machine by using the virtual machine monitor; the user virtual machine is further configured to send the execution result of the second type of command to the user Virtual machine user presentation;
若得到第一类命令和第二类命令, 则所述用户虚拟机, 用于执行所述 第一类命令, 并将所述第二类命令通过虚拟机监控器发送给所述安全虚拟 机; 所述安全虚拟机, 用于执行所述第二类命令, 并将对所述第二类命令 的执行结果通过所述虚拟机监控器发送给所述用户虚拟机; 所述用户虚拟 机, 还用于将所述第一类命令的执行结果和所述第二类命令的执行结果向 所述虚拟机用户呈现。 结合第二方面, 在第一种可能的实现方式中, 在所述用户虚拟机上配 置有操作码与执行主体的对应关系, 根据所述命令对应的执行主体对所述 命令进行分类之前, 所述用户虚拟机还用于根据所述命令携带的操作码查 询所述操作码与执行主体的对应关系, 获得所述命令对应的执行主体。 If the first type of command and the second type of command are obtained, the user virtual machine is configured to execute the first type of command, and send the second type of command to the secure virtual machine through a virtual machine monitor; The secure virtual machine is configured to execute the second type of command, and send the execution result of the second type of command to the user virtual machine by using the virtual machine monitor; the user virtual machine, And a method for presenting an execution result of the first type of command and an execution result of the second type of command to the virtual machine user. With reference to the second aspect, in a first possible implementation manner, a correspondence between an operation code and an execution body is configured on the user virtual machine, and the command is classified according to an execution body corresponding to the command. The user virtual machine is further configured to query the corresponding relationship between the operation code and the execution entity according to the operation code carried by the command, and obtain an execution body corresponding to the command.
结合第二方面或第一种可能的实现方式,在第二种可能的实现方式中, 所述用户虚拟机包括安全轻代理和安全驱动, 若所述命令为安全配置命令: 所述用户虚拟机的安全轻代理, 用于根据所述第一类命令对应的执行 主体对所述第一类命令进行分类, 得到如下至少之一: 代理类命令和驱动 类命令;  With reference to the second aspect or the first possible implementation manner, in a second possible implementation manner, the user virtual machine includes a secure light proxy and a security driver, if the command is a security configuration command: the user virtual machine The security light proxy is configured to classify the first type of commands according to an execution entity corresponding to the first type of command, and obtain at least one of the following: a proxy class command and a driver class command;
若得到代理类命令, 则所述安全轻代理, 用于执行所述代理类命令, 并将所述代理类命令的执行结果向所述虚拟机用户呈现;  If the proxy class command is obtained, the secure light proxy is configured to execute the proxy class command, and present an execution result of the proxy class command to the virtual machine user;
若得到驱动类命令, 则所述安全轻代理, 用于将所述驱动类命令发送 给所述用户虚拟机的安全驱动; 所述用户虚拟机的安全驱动, 用于执行所 述驱动类命令, 并将所述驱动类命令的执行结果发送给所述安全轻代理; 所述安全轻代理, 还用于将所述驱动类命令的执行结果向所述虚拟机用户 呈现;  If the driver class command is obtained, the secure light agent is used to send the driver class command to the user virtual machine; the user virtual machine security driver is configured to execute the driver class command. And sending the execution result of the driver class command to the secure light agent; the secure light agent is further configured to present an execution result of the driver class command to the virtual machine user;
若得到代理类命令和驱动类命令, 则所述安全轻代理, 用于执行所述 代理类命令, 并将所述驱动类命令发送给所述用户虚拟机的安全驱动; 所 述用户虚拟机的安全驱动, 用于执行所述驱动类命令, 并将所述驱动类命 令的执行结果发送给所述安全轻代理; 所述安全轻代理, 还用于将所述代 理类命令的执行结果和所述驱动类命令的执行结果向所述虚拟机用户呈 现。  If the agent class command and the driver class command are obtained, the secure light agent is configured to execute the agent class command, and send the driver class command to the user virtual machine security driver; the user virtual machine a security driver, configured to execute the driver-type command, and send an execution result of the driver-type command to the secure light agent; the secure light agent is further configured to execute an execution result of the proxy class command The execution result of the driver class command is presented to the virtual machine user.
结合第二方面、 第二方面的第一种或第二种可能的实现方式, 在第三 种可能的实现方式中, 所述安全虚拟机包括用户配置审计模块, 若所述命 令为安全配置命令, 所述安全虚拟机用于执行所述第二类命令之前, 所述 用户配置审计模块用于对所述第二类命令进行审计, 确定所述第二类命令 满足预先配置的安全策略。 With reference to the second aspect, the first or the second possible implementation manner of the second aspect, in a third possible implementation, the security virtual machine includes a user configuration auditing module, if the command is a security configuration command Before the security virtual machine is configured to execute the second type of command, the user configuration auditing module is configured to perform auditing on the second type of command, and determine the second type of command. Meet pre-configured security policies.
结合第二方面或第二方面的第一种至第三种任意一种可能的实现方 式, 在第四种可能的实现方式中, 所述安全虚拟机包括安全功能处理模块, 将对所述第二类命令的执行结果通过所述虚拟机监控器发送给所述用户虚 拟机之前, 所述安全功能处理模块用于确定所述第二类命令的执行结果满 足预先配置的通知策略。  With reference to the second aspect, or any one of the first to the third possible implementation manners of the second aspect, in a fourth possible implementation, the security virtual machine includes a security function processing module, Before the execution result of the second type of command is sent to the user virtual machine by the virtual machine monitor, the security function processing module is configured to determine that the execution result of the second type of command satisfies a pre-configured notification policy.
结合第二方面或第二方面的第一种至第四种任意一种可能的实现方 式, 在第五种可能的实现方式中, 所述安全虚拟机包括轻代理检验模块: 所述轻代理检验模块, 用于将所述用户虚拟机的安全轻代理的完整性 度量值和第一正确值进行比对, 然后根据预先配置的第一校验策略对所述 安全轻代理的比对结果进行处理, 所述安全轻代理的完整性度量值是对所 述安全轻代理的度量内容进行完整性计算得来的, 所述安全轻代理的度量 内容包括如下至少之一: 所述安全轻代理在内存中的代码、 数据、 磁盘上 的程序文件和配置数据。  With reference to the second aspect, or any one of the first to fourth possible implementation manners of the second aspect, in a fifth possible implementation, the security virtual machine includes a light proxy verification module: a module, configured to compare an integrity metric of the security light agent of the user virtual machine with a first correct value, and then process the comparison result of the secure light agent according to the pre-configured first verification policy The integrity metric of the secure light agent is calculated by performing integrity calculation on the metric content of the secure light agent, and the metric content of the secure light agent includes at least one of the following: the secure light agent is in the memory Code, data, program files on disk, and configuration data.
结合第二方面或第二方面的第一种至第五种任意一种可能的实现方式 中, 在第六种可能的实现方式中, 所述安全虚拟机的轻代理检验模块, 用 于将所述用户虚拟机的安全驱动的完整性度量值和第二正确值进行比对, 然后根据预先配置的第二校验策略对所述用户虚拟机的安全驱动的比对结 果进行处理, 所述安全驱动的完整性度量值是对所述用户虚拟机的安全驱 动的度量内容进行完整性计算得来的, 所述安全驱动的度量内容包括如下 至少之一: 所述用户虚拟机的安全驱动在内存中的代码、 数据、 磁盘上保 存的驱动文件和配置数据。  With reference to the second aspect, or any one of the first to the fifth possible implementation manners of the second aspect, in a sixth possible implementation, the light proxy verification module of the secure virtual machine is used to Comparing the security-driven integrity metric of the user virtual machine with the second correct value, and then processing the comparison result of the security driver of the user virtual machine according to the pre-configured second verification policy, the security The integrity metric of the driver is calculated by performing integrity calculation on the metric content of the security driver of the user virtual machine, and the metric content of the security driver includes at least one of the following: the security driver of the user virtual machine is in the memory The code, data, drive files and configuration data saved on the disk.
第三方面, 本发明实施例提出了一种实现虚拟化安全的系统, 包括: 处理器、 存储器和系统总线, 所述处理器和所述存储器之间通过所述 系统总线连接并完成相互间的通信;  In a third aspect, an embodiment of the present invention provides a system for implementing virtualization security, including: a processor, a memory, and a system bus, where the processor and the memory are connected through the system bus and complete each other. Communication
所述存储器, 用于存储计算机执行指令; 所述处理器, 用于运行所述计算机执行指令, 执行第一方面或第一方 面的第一种至第六种任意一种可能的实现方式。 The memory is configured to store a computer execution instruction; The processor is configured to execute the computer to execute an instruction, and perform the first aspect or any one of the first to sixth possible implementation manners of the first aspect.
第四方面, 本发明实施例提出了一种计算机程序产品, 包括存储了程 序代码的计算机可读存储介质, 所述程序代码包括的指令用于执行第一方 面或第一方面的第一种至第六种任意一种可能的实现方式。  In a fourth aspect, an embodiment of the present invention provides a computer program product, including a computer readable storage medium storing program code, where the program code includes instructions for performing the first aspect or the first aspect of the first aspect to The sixth of any possible implementation.
本发明实施例, 用户虚拟机接收来自于虚拟机用户的命令, 并根据所 述命令对应的执行主体对所述命令进行分类, 得到如下至少之一: 第一类 命令和第二类命令, 其中第一类命令由用户虚拟机执行, 第二类命令由安 全虚拟机执行, 然后由所述用户虚拟机将所述命令的执行结果向所述虚拟 机用户呈现, 因此能够在实现虚拟化安全时, 提高用户的体验。  In the embodiment of the present invention, the user virtual machine receives the command from the virtual machine user, and classifies the command according to the execution entity corresponding to the command, to obtain at least one of the following: a first type command and a second type command, where The first type of command is executed by the user virtual machine, and the second type of command is executed by the secure virtual machine, and then the execution result of the command is presented by the user virtual machine to the virtual machine user, thereby being able to implement virtualization security. , improve the user experience.
附图说明  DRAWINGS
为了更清楚地说明本发明实施例的技术方案, 下面将对现有技术或实施 例中所需要使用的图作筒单地介绍, 显而易见地, 下面描述中的图仅仅是本 发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动的 前提下, 还可以根据这些图获得其他的图。  In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the prior art or the embodiments will be briefly described below. Obviously, the drawings in the following description are only some embodiments of the present invention. For those skilled in the art, other drawings can be obtained according to these figures without any creative work.
图 1是根据本发明实施例提供的一种实现虚拟化安全的系统架构图; 图 2是根据本发明实施例提供的一种实现虚拟化安全的方法示意图; 图 3是根据本发明实施例提供的安全功能配置的流程;  1 is a system architecture diagram for implementing virtualization security according to an embodiment of the present invention; FIG. 2 is a schematic diagram of a method for implementing virtualization security according to an embodiment of the present invention; FIG. 3 is provided according to an embodiment of the present invention. The process of configuring the security function;
图 4是根据本发明实施例提供的安全功能操作的流程;  4 is a flowchart of operation of a security function according to an embodiment of the present invention;
图 5是根据本发明实施例提供的安全功能通知的流程; 图 7是实现虚拟化安全的另一系统结构图。  FIG. 5 is a flow chart of a security function notification according to an embodiment of the present invention; FIG. 7 is another system structure diagram for implementing virtualization security.
具体实施方式  detailed description
为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本发 明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描述。 本发明实施例提出了一种实现虚拟化安全的方法、 和系统, 能够保证实 现虚拟化安全的同时, 提高虚拟机用户 (筒称用户) 的体验。 The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. Embodiments of the present invention provide a method and system for implementing virtualization security, which can ensure At the same time of virtualization security, the experience of virtual machine users (called users) is improved.
本发明实施例的系统架构 构中实现。 图 1仅是示例性说明, 并不限定具体的组网方式。  The system architecture of the embodiment of the present invention is implemented. FIG. 1 is merely an exemplary illustration, and does not limit a specific networking manner.
该系统包括主机 10、 虚拟化管理服务器 20、 安全管理服务器 30和应用 管理服务器 40。  The system includes a host 10, a virtualization management server 20, a security management server 30, and an application management server 40.
主机 10是用于提供云计算中计算资源的物理服务器。 主机 10又具体包 括: Hypervisor 101、 安全虚拟机 102、 用户虚拟机 103。  The host 10 is a physical server for providing computing resources in cloud computing. The host 10 specifically includes: a hypervisor 101, a secure virtual machine 102, and a user virtual machine 103.
当然 Hypervisor 101、安全虚拟机 102和用户虚拟机 103也可以位于不 同的主机 10中, 如安全虚拟机 102和 Hypervisor 101位于主机一中, 用户 虚拟机 103位于主机二中; 或者 Hypervisor 101位于主机一中, 安全虚拟 机 102和用户虚拟机 103位于主机二中; 或者 Hypervisor 101位于主机一 中, 安全虚拟机 102位于主机二中, 用户虚拟机 103位于主机三中。 附图 1 中以 Hypervisor 101、安全虚拟机 102和用户虚拟机 103位于同一主体示例 说明。  Of course, the hypervisor 101, the secure virtual machine 102, and the user virtual machine 103 may also be located in different hosts 10. For example, the secure virtual machine 102 and the hypervisor 101 are located in the host one, the user virtual machine 103 is located in the host two; or the hypervisor 101 is located in the host one. The secure virtual machine 102 and the user virtual machine 103 are located in the host 2; or the hypervisor 101 is located in the host 1, the secure virtual machine 102 is located in the host 2, and the user virtual machine 103 is located in the host 3. In Figure 1, the Hypervisor 101, the secure virtual machine 102, and the user virtual machine 103 are located in the same main body example.
其中 Hypervisor 101, 又称虚拟机监控器(VMM, Virtual Machine Monitor), 是提供虚拟化能力的核心部件, 负责管理主机的物理资源, 将该 物理资源分配给多台虚拟机使用, 并维护虚拟机之间的逻辑资源的隔离。  The Hypervisor 101, also known as the Virtual Machine Monitor (VMM), is a core component that provides virtualization capabilities. It manages the physical resources of the host, allocates the physical resources to multiple virtual machines, and maintains virtual machines. The isolation between logical resources.
安全虚拟机 102, 用于为用户虚拟机 103提供安全防护能力, 具体包括 安全驱动 1021和安全应用程序 1022。 安全驱动 1021通过调用 Hypervisor 来收集和安全事件相关的上下文信息, 并且通过调用 Hypervisor和用户虚 拟机 103内的安全驱动 1031通信。 安全驱动 1021还可以向安全应用程序 1022提供应用编程接口 (API, Application Programming Interface ), 帮 助安全应用程序 1022访问 Hypervisor 101。 安全应用程序 1022, 由安全应 用软件厂商提供,是安全应用的执行引擎和数据库,并提供对用户虚拟机 103 内安全轻代理 1032的校验和审计功能。 用户虚拟机 1 03 , 是为用户提供计算能力的虚拟机, 可运行桌面办公、 数据执行、 服务器维护等。 用户虚拟机 103提供的功能和普通计算机类似, 具体包括安全驱动 1031和安全轻代理 1 032。 其中安全驱动 1031 , 用于监控 用户虚拟机 1 03内的安全事件, 如文件读写、 进程创建等, 然后调用 The security virtual machine 102 is configured to provide security protection capabilities for the user virtual machine 103, and specifically includes a security driver 1021 and a security application 1022. The secure driver 1021 collects context information related to security events by invoking the hypervisor and communicates with the secure driver 1031 within the user virtual machine 103 by invoking the hypervisor. The secure driver 1021 can also provide an application programming interface (API) to the security application 1022 to assist the security application 1022 in accessing the hypervisor 101. The security application 1022, provided by the security application software vendor, is the execution engine and database of the security application and provides a checksum audit function for the secure light agent 1032 within the user virtual machine 103. The user virtual machine 103 is a virtual machine that provides computing power to the user, and can run desktop office, data execution, server maintenance, and the like. The user virtual machine 103 provides functions similar to those of a general computer, and specifically includes a secure driver 1031 and a secure light agent 1 032. The security driver 1031 is configured to monitor security events in the user virtual machine 103, such as file read and write, process creation, etc., and then invoke
Hyperv i sor 101 , 将监控到的安全事件信息通知到安全虚拟机 102。 安全驱 动 1031还可以向安全轻代理 1032提供 API接口, 帮助安全轻代理 1032访 问 Hyperv i sor 101。 安全驱动 1031具体可以由安全应用软件厂商提供; 或 化平台厂商提供。 Hyperv i sor 101 notifies the monitored security event information to the secure virtual machine 102. The Secure Drive 1031 also provides an API interface to the Secure Light Agent 1032 to help the Secure Light Agent 1032 access Hyperv i sor 101. The security driver 1031 can be specifically provided by a security application software vendor; or by a platform vendor.
安全轻代理 1 032 , 也可称为 "瘦代理", 位于用户虚拟机 103内, 提供 和用户交互相关的功能,从而能够保证虚拟机用户使用安全应用程序时的体 验不变。 其他的安全功能由安全虚拟机 102提供, 并且由 Hyperv i sor 101 提供信息传输通道。 安全轻代理 1032由安全应用软件厂商提供。  The Secure Light Agent 1 032, also known as the "Thin Agent", is located in the User Virtual Machine 103 and provides functionality related to user interaction to ensure that virtual machine users experience the same when using a secure application. Other security functions are provided by the secure virtual machine 102, and the information transfer channel is provided by Hyperv i sor 101. Secure Light Agent 1032 is provided by security application software vendors.
虚拟化管理服务器 20 , 用于管理、 维护和分配虚拟化资源。 虚拟化资源 包括计算资源、 存储资源或网络资源。 虚拟化管理服务器 20可部署于服务 器或虚拟机中。  A virtualization management server 20 for managing, maintaining, and distributing virtualized resources. Virtualized resources include computing resources, storage resources, or network resources. The virtualization management server 20 can be deployed in a server or virtual machine.
安全管理服务器 30 , 用于提供安全虚拟机 102的部署、 用户虚拟机 103 内安全驱动 1 031的安装; 并且监控安全驱动 1021和安全驱动 1031的运行 状态, 接收事件、 告警信息, 保证安全驱动 1021和安全驱动 1031的可靠运 行。 安全管理服务器 30可部署于独立的服务器或虚拟机中, 也可以和虚拟 化管理服务器 20共同部署,还可以直接集成于虚拟化管理服务器 20的软件 之中。  The security management server 30 is configured to provide deployment of the secure virtual machine 102, installation of the secure driver 1 031 in the user virtual machine 103, and monitor the running status of the secure driver 1021 and the secure driver 1031, receive events and alarm information, and ensure the secure driver 1021. And the reliable operation of the safe drive 1031. The security management server 30 can be deployed in a separate server or virtual machine, or can be deployed together with the virtualization management server 20, or can be directly integrated into the software of the virtualization management server 20.
应用管理服务器 40 , 用于提供对安全应用程序 1022的管理功能, 由安 全应用软件厂商提供。 应用管理服务器 40可部署于独立的服务器或虚拟机 中, 也可以和虚拟化管理服务器 20共同部署, 或者也可以和安全管理服务 器 30共同部署。 其中包括以下模块(图中未示出): 安全应用部署 401 : 采用集中推送或客户端申请的方式, 初始安装和升 级虚拟化系统内的安全应用程序 1 022、 安全轻代理 1 032。 The application management server 40 is configured to provide management functions for the security application 1022, and is provided by the security application software vendor. The application management server 40 may be deployed in a separate server or virtual machine, may be deployed together with the virtualization management server 20, or may be deployed together with the security management server 30. It includes the following modules (not shown): Security Application Deployment 401: Initially install and upgrade the security application 1 022, Secure Light Agent 1 032 in the virtualized system by means of centralized push or client application.
集中配置 402 : 由管理员配置安全应用程序 1 022和安全轻代理 1 032的 运行和执行策略, 如资源占用策略、 周期性任务设定。  Centralized configuration 402: The administrator runs the execution and execution policies of the security application 1 022 and the secure light agent 1 032, such as resource occupancy policy and periodic task settings.
安全功能操作 403 : 由管理员指定操作对象并执行安全应用程序 1 022、 安全轻代理 1 032的功能, 如防病毒全盘扫描、 敏感数据发现。  Security Function Operation 403: The operation object is specified by the administrator and the security application 1 022, the function of the secure light agent 1 032, such as anti-virus full disk scanning and sensitive data discovery.
其中管理员为云计算系统的维护人员, 可以按照职责范围划分为系统管 理员、 安全管理员、 审计管理员等, 具有特定权限的云管理员可以在虚拟化 系统中部署和管理安全应用程序 1 022、 安全轻代理 1 032。  The administrator of the cloud computing system can be divided into system administrators, security administrators, audit administrators, etc. according to the scope of responsibility. Cloud administrators with specific permissions can deploy and manage security applications in the virtualized system. 022, safe light agent 1 032.
其中虚拟机用户, 可以通过网络连接云提供的虚拟机, 操作桌面办公、 数据执行、 服务器维护等。  The virtual machine user can connect to the virtual machine provided by the cloud through the network, and operate the desktop office, data execution, server maintenance, and the like.
用户虚拟机与安全虚拟机机具体的交互过程参见下面实施例的描述。  The specific interaction process between the user virtual machine and the secure virtual machine is described in the following embodiment.
实现虚拟化安全的方法  Ways to achieve virtualization security
下面介绍本发明实施例提供的实现虚拟化安全的方法, 该方法可以在前 述实施例的系统架构上实现。  The method for implementing virtualization security provided by the embodiment of the present invention is described below. The method may be implemented on the system architecture of the foregoing embodiment.
如图 2所示的实现虚拟化安全的方法实施例, 包括以下步骤:  An embodiment of the method for implementing virtualization security as shown in FIG. 2 includes the following steps:
1 )用户虚拟机接收来自于虚拟机用户的命令, 然后根据所述命令对应 的执行主体对该命令进行分类, 得到如下至少之一: 第一类命令和第二类 命令, 其中第一类命令由所述用户虚拟机执行, 第二类命令由安全虚拟机 执行。  1) The user virtual machine receives the command from the virtual machine user, and then classifies the command according to the execution body corresponding to the command, and obtains at least one of the following: a first type command and a second type command, wherein the first type command Executed by the user virtual machine, the second type of command is executed by the secure virtual machine.
在所述用户虚拟机上配置有操作码与执行主体的对应关系, 根据所述 命令对应的执行主体对所述命令进行分类之前还包括:  And the corresponding relationship between the operation code and the execution entity is configured on the user virtual machine, and before the classifying the command according to the execution entity corresponding to the command, the method further includes:
所述用户虚拟机根据所述命令携带的操作码查询所述操作码与执行主 体的对应关系, 获得所述命令对应的执行主体。  The user virtual machine queries the corresponding relationship between the operation code and the execution entity according to the operation code carried by the command, and obtains an execution body corresponding to the command.
若对所述命令分类后, 得到了第二类命令, 则执行下述步骤 2 ) -6 )。 若得到了第一类命令, 则所述用户虚拟机执行所述第一类命令, 并将所述 第一类命令的执行结果向所述虚拟机用户呈现。 If the second type of command is obtained after classifying the command, the following steps 2) -6) are performed. If the first type of command is obtained, the user virtual machine executes the first type of command, and the The execution results of the first type of commands are presented to the virtual machine user.
所述命令包括如下至少之一: 安全功能配置、 安全功能操作和安全功 能通知。 具体的流程参照附图 3-5的详细描述。  The command includes at least one of the following: a security function configuration, a security function operation, and a security function notification. The specific process is described in detail with reference to Figures 3-5.
2 )若得到了第二类命令, 则所述用户虚拟机将所述第二类命令发送给 Hyperv i sor。 Hyperv i sor也可以称为虚拟机监控器 (誦, Vi r tua l Machine Moni tor )。  2) If a second type of command is obtained, the user virtual machine sends the second type of command to the Hyperv i sor. Hyperv i sor can also be called a virtual machine monitor (诵, Vi r tua l Machine Moni tor ).
3 ) Hyperv i sor将该第二类命令发送给安全虚拟机, 由安全虚拟机执行 所述第二类命令。  3) The Hyperv i sor sends the second type of command to the secure virtual machine, and the second virtual machine executes the second type of command.
4 )安全虚拟机将所述第二类命令的执行结果发送给 Hyperv i sor。 所述安全虚拟机的安全功能处理模块, 可以确定所述第二类命令的执 行结果满足预先配置的通知策略下, 才把第二类命令的执行结果发送给 Hyperv i sor。  4) The secure virtual machine sends the execution result of the second type of command to the Hyperv i sor. The security function processing module of the secure virtual machine may determine that the execution result of the second type of command satisfies the pre-configured notification policy, and then sends the execution result of the second type of command to the Hypervisor.
5 ) Hyperv i sor将该第二类命令的执行结果发送给用户虚拟机。  5) Hyperv i sor sends the execution result of the second type of command to the user virtual machine.
6 )用户虚拟机将第二类命令的执行结果向虚拟机用户呈现。  6) The user virtual machine presents the execution result of the second type of command to the virtual machine user.
本实施例提供的方法, 用户虚拟机接收来自于虚拟机用户的命令, 并 根据所述命令对应的执行主体对所述命令进行分类, 得到如下至少之一: 第一类命令和第二类命令, 其中第一类命令由用户虚拟机执行, 第二类命 述虚拟机用户呈现, 因此能够通过安全虚拟机实现虚拟化安全, 同时通过 用户虚拟机提升虚拟机用户的体险。 从而通过安全虚拟机和用户虚拟机的 配合实现虚拟化安全的同时, 提升了虚拟机用户的应用体验。  In the method provided by the embodiment, the user virtual machine receives the command from the virtual machine user, and classifies the command according to the execution entity corresponding to the command, to obtain at least one of the following: a first type command and a second type command The first type of command is executed by the user virtual machine, and the second type is described by the virtual machine user. Therefore, the virtualized security can be realized by the secure virtual machine, and the physical risk of the virtual machine user is enhanced by the user virtual machine. Therefore, virtualized security is achieved through the cooperation of the secure virtual machine and the user virtual machine, and the application experience of the virtual machine user is improved.
根据来自于虚拟机用户的命令不同, 用户虚拟机通过与其他模块配合, 可以完成安全功能配置、 安全功能操作和安全功能通知等操作。 下面详细 介绍。  According to the commands from the VM users, the VMs can work with other modules to complete security function configuration, security function operations, and security function notifications. The details are described below.
如图 3所示, 是本发明实施例提供的安全功能配置的流程。  As shown in FIG. 3, it is a flow of security function configuration provided by an embodiment of the present invention.
虚拟机用户按照自己的使用习惯, 通过安全轻代理提供的软件界面对 用户虚拟机和安全虚拟机进行配置, 和传统安全软件的使用感受一致。 如 系统实施例的描述, 用户虚拟机包括安全轻代理和安全驱动; 安全虚拟机 包括安全应用程序和安全驱动。 虚拟机监控器包括虚拟化安全服务平台。 The virtual machine user according to his own usage habits, through the software interface provided by the secure light agent User virtual machines and secure virtual machines are configured to be consistent with the use of traditional security software. As described in the system embodiment, the user virtual machine includes a secure light agent and a secure driver; the secure virtual machine includes a secure application and a secure driver. The virtual machine monitor includes a virtualized security service platform.
1 )安全轻代理接收到虚拟机用户的安全功能配置后, 对该安全功能配 置进行分类, 得到第一类命令或第二类命令, 其中第一类命令由用户虚拟 机执行, 第二类命令由安全虚拟机执行。 第一类命令又具体划分为代理类 命令和驱动类命令, 其中代理类命令由用户虚拟机的安全轻代理本地保存 具体可以由安全轻代理中的用户配置模块实现上述功能。  1) After receiving the security function configuration of the virtual machine user, the security light agent classifies the security function configuration to obtain a first type command or a second type command, wherein the first type command is executed by the user virtual machine, and the second type command is executed. Executed by a secure virtual machine. The first type of command is specifically divided into a proxy class command and a driver class command, wherein the proxy class command is locally saved by the secure light proxy of the user virtual machine. The user configuration module in the secure light proxy can implement the above functions.
第一类命令中的代理类命令具体可以包括以下至少之一: 所述安全轻 代理的日志设置、 所述安全轻代理的升级设置、 和所述用户虚拟机的安全 驱动的升级设置。  The proxy class command in the first type of command may specifically include at least one of the following: a log setting of the secure light agent, an upgrade setting of the secure light agent, and an upgrade setting of a security driver of the user virtual machine.
其中安全轻代理的日志设置: 包括但不限于配置安全轻代理的日志文 件大小、 保存时间;  The log settings of the secure light agent include: but not limited to, configuring the log file size and saving time of the secure light agent;
安全轻代理的升级设置: 包括但不限于配置安全轻代理的升级周期; 用户虚拟机的安全驱动的升级设置: 包括但不限于配置用户虚拟机的 安全驱动的升级周期。  Upgrade settings for secure light agents: including but not limited to the upgrade cycle for configuring secure light agents; security driver upgrade settings for user virtual machines: including but not limited to the upgrade cycle for configuring security drives for user virtual machines.
第一类命令中的驱动类命令具体可以包括以下至少之一: 所述用户虚 拟机的安全驱动的日志设置、緩存设置、 Ema i l防护设置、 所述用户虚拟机 的安全驱动的自我防护设置、 所述安全轻代理的自我防护设置。  The driver class command in the first type of command may specifically include at least one of the following: a log setting of the security driver of the user virtual machine, a cache setting, an Ema il protection setting, a self-protection setting of the security driver of the user virtual machine, The self-protection setting of the secure light agent.
所述用户虚拟机的安全驱动的日志设置: 包括但不限于配置用户虚拟 机的安全驱动的日志文件大小、 或保存时间;  The log setting of the security driver of the user virtual machine: including but not limited to configuring the log file size of the security driver of the user virtual machine, or saving time;
緩存设置: 包括但不限于是否启用扫描结果緩存、 緩存大小或緩存文 件数量;  Cache settings: include, but are not limited to, whether to enable scan result caching, cache size, or number of cache files;
Ema i l防护设置: 包括但不限于是否启用 Ema i l防护、 附件类型、 是否 启用大量外发行为检测; 所述用户虚拟机的安全驱动的自我防护设置: 包括但不限于禁止修改 或停止安全监控功能、 对破坏行为记录日志、 临时关闭防护后自动重新开 启的时间间隔; Ema il protection settings: including but not limited to whether Ema il protection is enabled, attachment type, whether a large number of outsourcing is enabled for detection; The self-protection setting of the security driver of the user virtual machine includes: but is not limited to, prohibiting the modification or stopping of the security monitoring function, recording the log of the destruction behavior, and automatically opening the time interval after temporarily closing the protection;
所述安全轻代理的自我防护设置: 包括但不限于禁止删除或停止安全 轻代理、 对破坏行为记录日志、 临时停止安全轻代理后自动重新开启的时 间间隔。  The self-protection setting of the security light agent includes, but is not limited to, prohibiting the deletion or stopping of the security light agent, recording the log of the destruction behavior, and automatically opening the time interval after the security light agent is temporarily stopped.
第二类命令, 通过用户虚拟机的安全驱动和虚拟化安全服务平台发送 给安全虚拟机保存和执行, 具体可以包括以下至少之一: 周期性扫描设置、 过滤设置、 信任文件设置、 处理方式设置、 通知设置、 主动防御设置、 样 本设置、 所述安全虚拟机的安全应用程序的升级设置、 和所述安全虚拟机 的安全驱动的升级设置。  The second type of command is sent to the secure virtual machine for saving and executing by using the security driver of the user virtual machine and the virtualized security service platform, and may specifically include at least one of the following: periodic scan settings, filter settings, trust file settings, and processing mode settings. , notification settings, proactive defense settings, sample settings, upgrade settings for the security application of the secure virtual machine, and upgrade settings for the secure driver of the secure virtual machine.
其中周期性扫描设置: 包括但不限于系统启动时的周期性扫描配置、 特定时间点的周期性扫描配置或扫描类型, 扫描类型包括快速扫描、 全盘 扫描、 或指定扫描;  The periodic scan setting includes: but not limited to, a periodic scan configuration at system startup, a periodic scan configuration at a specific time point, or a scan type, and the scan type includes a fast scan, a full scan, or a designated scan;
过滤设置: 包括但不限于文件系统防护的文件类型、 排除路径、 实时 扫描选项、 是否扫描压缩文件及扫描深度;  Filter settings: including but not limited to file system protection file types, exclusion paths, real-time scan options, scanning of compressed files, and scan depth;
信任文件设置: 包括但不限于白名单文件、 路径、 文件大小排除; 处理方式设置: 包括但不限于发现安全风险后的自动执行操作, 比如 清除、 删除、 隔离、 日志、 是否备份、 是否停止相应的进程或服务;  Trust file settings: including but not limited to whitelist files, paths, file size exclusion; processing mode settings: including but not limited to automatic operations after detecting security risks, such as cleaning, deleting, quarantining, logging, whether to back up, whether to stop corresponding Process or service;
通知设置: 包括但不限于是否发送安全事件通知、 或是否发送执行结 果通知;  Notification settings: including but not limited to whether to send a security event notification, or whether to send an execution result notification;
主动防御设置: 包括但不限于是否启用 "启发式" 主动防御及防御级 另' J ;  Active defense settings: including but not limited to whether to enable "heuristic" active defense and defense level another 'J;
样本设置: 包括但不限于是否提交样本到安全软件厂商的云安全服务 器;  Sample setup: including but not limited to whether to submit samples to the security software vendor's cloud security server;
所述安全虚拟机的安全应用程序的升级设置: 包括但不限于配置安全 应用程序的升级周期。 由于安全应用程序可以理解为由扫描引擎和特征码 组成, 因此配置安全应用程序的升级周期, 也可以理解为配置扫描引擎升 级周期或配置特征码升级周期。 Upgrade settings for the secure application of the secure virtual machine: including but not limited to configuration security The upgrade cycle of the application. Since the security application can be understood as consisting of the scan engine and the signature, configuring the upgrade period of the security application can also be understood as configuring the scan engine upgrade period or configuring the signature upgrade period.
所述安全虚拟机的安全驱动的升级设置: 包括但不限于配置所述安全 虚拟机的安全驱动的升级周期。  The upgrade setting of the secure driver of the secure virtual machine includes, but is not limited to, an upgrade period of configuring a secure drive of the secure virtual machine.
具体的, 在所述用户虚拟机上配置有操作码与执行主体的对应关系, 如表 1所示, 当然表 1仅是示例性说明。 安全轻代理接收到虚拟机用户的 命令后, 所述用户虚拟机根据所述命令携带的操作码查询所述操作码与执 行主体的对应关系, 获得所述命令对应的执行主体。  Specifically, the corresponding relationship between the operation code and the execution body is configured on the user virtual machine, as shown in Table 1, and of course, Table 1 is merely an exemplary description. After receiving the command from the virtual machine user, the user virtual machine queries the corresponding relationship between the operation code and the execution entity according to the operation code carried by the command, and obtains the execution entity corresponding to the command.
表 1 Table 1
Figure imgf000015_0001
如表 1所示, 如果来自于虚拟机用户的命令中仅携带 0004 , 那么根据 表 1 ,所述命令的执行主体是用户虚拟机的安全驱动, 因此根据执行主体分 类后只有第一类命令的驱动类命令, 并且该驱动类命令只包括 0004。 如果 来自于虚拟机用户的命令中携带 0004、 0008和 000C, 那么根据表 1 , 0004 和 0008的执行主体是用户虚拟机的安全驱动, 000C的执行主体是安全虚拟 机, 根据执行主体分类后得到第一类命令的驱动类命令和第二类命令。
Figure imgf000015_0001
As shown in Table 1, if the command from the virtual machine user only carries 0004, then according to Table 1 shows that the execution body of the command is a security driver of the user virtual machine, so that only the driver class command of the first type command is classified according to the execution subject, and the driver class command only includes 0004. If the command from the virtual machine user carries 0004, 0008, and 000C, then the execution body according to Table 1, 0004, and 0008 is the secure driver of the user virtual machine, and the execution entity of 000C is the secure virtual machine, which is obtained according to the execution subject classification. The driver command and the second command of the first type of command.
如果得到代理类命令, 则所述安全轻代理, 用于执行所述代理类命令, 并将所述代理类命令的执行结果向所述虚拟机用户呈现。  If a proxy class command is obtained, the secure light proxy is configured to execute the proxy class command, and present an execution result of the proxy class command to the virtual machine user.
如果得到了驱动类命令或第二类命令, 则执行后续的步骤。  If a driver class command or a second class command is obtained, the subsequent steps are performed.
2 )安全轻代理将驱动类命令或第二类命令发送给用户虚拟机的安全驱 动。  2) The secure light agent sends the driver class command or the second class command to the user's virtual machine security driver.
由于安全轻代理通过操作码区分了驱动类命令和第二类命令, 则对于 驱动类命令调用安全驱动的处理接口, 对于第二类命令调用安全驱动的转 发接口。  Since the security light agent distinguishes the driver type command and the second type command by the operation code, the security driver processing interface is called for the driver type command, and the security driver forwarding interface is called for the second type command.
如果包括驱动类命令, 则用户虚拟机的安全驱动执行该驱动类命令, 并将所述驱动类命令的执行结果发送给所述安全轻代理; 所述安全轻代理, 将所述驱动类命令的执行结果向所述虚拟机用户呈现。  If the driver class command is included, the security driver of the user virtual machine executes the driver class command, and sends the execution result of the driver class command to the secure light agent; the secure light agent, the driver class command The execution result is presented to the virtual machine user.
如果还包括第二类命令, 则继续执行后续的步骤。  If a second type of command is also included, the subsequent steps are continued.
3 )用户虚拟机的安全驱动将第二类命令发送给 Hypervi sor 内的虚拟 化安全 务平台。  3) The secure driver of the user's virtual machine sends a second type of command to the virtualized security platform within Hypervi sor.
4 )虚拟化安全服务平台将第二类命令发送给安全虚拟机。  4) The virtualized security service platform sends the second type of command to the secure virtual machine.
其中虚拟化安全月良务平台,用于在 Hypervi sor建立虚拟机之间的信息 传输通道(如事件 10环机制、 内存共享、 授权机制), 将用户虚拟机内的 安全驱动监控到的安全事件(如文件读写、进程创建),传输到安全虚拟机, 由安全虚拟机执行相应的分析和处理。  The virtualization security platform is used to establish an information transmission channel between the virtual machines in Hypervi sor (such as event 10 ring mechanism, memory sharing, authorization mechanism), and security events monitored by the security driver in the user virtual machine. (such as file read and write, process creation), transferred to the secure virtual machine, the security virtual machine performs the corresponding analysis and processing.
5 )安全虚拟机内的安全驱动将第二类命令发送给安全应用程序。 具体 可以由安全应用程序的用户配置审计模块 ,对接收的第二类命令进行审计 , 确定所述第二类命令满足预先配置的安全策略时, 才执行所述第二类命令。 以表 2为例说明, 如果命令中携带的操作说明, 是 "禁用所有文件类 型", 则预先配置的安全策略, 是不允许禁用所有文件类型, 那么安全虚拟 机将不对第二类命令进行操作。 如果命令中携带的操作说明, 是进行安全 应用程序的升级设置, 表 2 没有进行说明, 那么可以理解为满足预先配置 的安全策略, 则安全虚拟机需要执行安全应用程序的升级设置。 5) The secure driver within the secure virtual machine sends a second type of command to the secure application. Specifically, the user of the security application can configure an audit module to audit the received second type of command. The second type of command is executed only when it is determined that the second type of command satisfies a pre-configured security policy. Table 2 is used as an example. If the operation description carried in the command is "Disable all file types", the pre-configured security policy does not allow all file types to be disabled. Then the secure virtual machine will not operate on the second type of commands. . If the operation instructions carried in the command are the upgrade settings of the security application, which is not described in Table 2, it can be understood that the security virtual machine needs to perform the upgrade setting of the security application to meet the pre-configured security policy.
表 2 Table 2
Figure imgf000017_0001
举例说明如下,操作码为 Q00A的命令,根据表 1 由安全虚拟机来执行。 该命令中还具体携带了 "禁用所有文件类型" 的操作说明。 根据表 2 , 安全 虚拟机的用户配置审计模块查询 "禁用所有文件类型" 对应的预先配置的 安全策略, 确定 "禁用所有文件类型" 满足预先配置的安全策略时, 才执 行该过滤设置。 操作码为 000B的命令, 根据表 1 由安全虚拟机来执行。 该 命令中还具体携带了 "跳过系统关键路径" 的操作说明。 根据表 2 , 安全虚 拟机的用户配置审计模块查询 "跳过系统关键路径" 对应的预先配置的安 全策略, 确定 "跳过系统关键路径" 满足预先配置的安全策略时, 才执行 该信任文件设置。
Figure imgf000017_0001
For example, the command with the operation code Q00A is executed by the secure virtual machine according to Table 1. The command also carries the instructions for "disable all file types". According to Table 2, the user configuration audit module of the secure virtual machine queries the pre-configured security policy corresponding to "disable all file types" and determines that "disable all file types" meets the pre-configured security policy before performing the filtering settings. The command with the operation code 000B is executed by the secure virtual machine according to Table 1. The command also carries the operating instructions of "Skip system critical path". According to Table 2, the user configuration audit module of the secure virtual machine queries the pre-configured security policy corresponding to "skip system critical path", and determines that the "skip system critical path" meets the pre-configured security policy before executing the trust file setting. .
对于存在重大安全风险的配置 (例如禁用所有文件类型、 或跳过系统 关键路径)或实际效果是关闭安全防护的配置, 安全虚拟机将提供 "缺省 防护" (指管理员配置的防护策略), 然后安全虚拟机会提示虚拟机用户进 行确认或者修改, 避免用户配置错误或病毒恶意修改配置。 安全虚拟机将对第二类命令的执行结果(成功或失败)发送给虚拟化 安全服务平台之前, 可以先确定所述第二类命令的执行结果是否满足预先 配置的通知策略。 满足预先配置的通知策略的情况下, 安全虚拟机将对第 二类命令的执行结果(成功或失败)发送给虚拟化安全服务平台。 以表 3 为例说明, 比如配置失败时, 预先配置的通知策略是 "是", 即需要将所述 第二类命令的执行结果通知用户虚拟机;假如预先配置的通知策略是 "否", 即不需要将所述第二类命令的执行结果通知用户虚拟机。 当然, 通知策略 配置为 "是" 的, 也可以直接配置为 "通知用户"。 通知策略配置为 "否" 的, 也可以直接配置为 "不通知用户"。 表 3
Figure imgf000018_0001
如果根据预先配置的通知策略, 需要通知用户。 则安全应用程序将所 述第二类命令的执行结果发送给安全虚拟机的安全驱动。
For configurations that have significant security risks (such as disabling all file types, or skipping system critical paths) or the actual effect is to turn off security protection, the secure virtual machine will provide "default protection" (refers to the protection policy configured by the administrator) Then, the secure virtual machine prompts the virtual machine user to confirm or modify it to avoid user configuration errors or malicious malicious modification of the configuration. Before the security virtual machine sends the result (success or failure) of the second type of command to the virtualization security service platform, it may first determine whether the execution result of the second type of command satisfies the pre-configured notification policy. In the case that the pre-configured notification policy is satisfied, the secure virtual machine sends the execution result (success or failure) of the second type of command to the virtualized security service platform. For example, if the configuration fails, the pre-configured notification policy is "Yes", that is, the execution result of the second type of command needs to be notified to the user virtual machine; if the pre-configured notification policy is "No", That is, the execution result of the second type of command does not need to be notified to the user virtual machine. Of course, the notification policy is configured as "yes" or it can be configured directly as "notify users." If the notification policy is configured to "No", it can also be configured directly as "Do not notify the user." table 3
Figure imgf000018_0001
If you follow the pre-configured notification policy, you need to notify the user. The security application then sends the execution result of the second type of command to the secure driver of the secure virtual machine.
6 )该安全虚拟机的安全驱动将对所述第二类命令的执行结果发送给所 述虚拟机监控器。  6) The secure driver of the secure virtual machine sends the execution result of the second type of command to the virtual machine monitor.
7 )虚拟机监控器的虚拟化安全服务平台, 将第二类命令的执行结果发 送给用户虚拟机。  7) The virtualized security service platform of the virtual machine monitor sends the execution result of the second type of command to the user virtual machine.
8 )用户虚拟机的安全驱动将第二类命令的执行结果给安全轻代理。 安全驱动可以执行完驱动类命令后, 就把驱动类命令的执行结果发送 给安全轻代理, 等收到第二类命令的执行结果后, 将第二类命令的执行结 果发送给安全轻代理; 也可以等收到第二类命令的执行结果后, 将第二类 命令的执行结果和驱动类命令的执行结果一起发送给安全轻代理。  8) The security driver of the user virtual machine gives the execution result of the second type of command to the secure light agent. After executing the driver class command, the security driver sends the execution result of the driver class command to the secure light agent. After receiving the execution result of the second type command, the execution result of the second type command is sent to the security light agent. After waiting for the execution result of the second type of command, the execution result of the second type of command is sent to the secure light agent together with the execution result of the driver type command.
9 )用户虚拟机的安全轻代理将第二类命令的执行结果向虚拟机用户呈 现。 9) The security light agent of the user virtual machine presents the execution result of the second type of command to the virtual machine user Now.
用户虚拟机可以将第一类命令的执行结果向虚拟机用户呈现, 等收到 第二类命令的执行结果后, 将第二类命令的执行结果向虚拟机用户呈现; 也可以等收到第二类命令的执行结果后, 将第二类命令的执行结果和驱动 类命令的执行结果一起向虚拟机用户呈现。  The user virtual machine may present the execution result of the first type of command to the virtual machine user, and after receiving the execution result of the second type of command, present the execution result of the second type of command to the virtual machine user; After the execution result of the second type of command, the execution result of the second type of command is presented to the virtual machine user together with the execution result of the driver type command.
本实施例提供的方法, 能够通过安全虚拟机在实现虚拟化安全功能配 时的体验。 从而通过安全虚拟机和用户虚拟机的配合实现虚拟化安全的同 时, 提升了虚拟机用户在虚拟化安全功能配置时的应用体验。  The method provided in this embodiment can implement the virtualized security function timing experience through the secure virtual machine. Therefore, the virtualized security is achieved through the cooperation of the secure virtual machine and the user virtual machine, and the application experience of the virtual machine user in the virtualization security function configuration is improved.
如图 4所示, 是本发明方法实施例提供的安全功能操作的流程。  As shown in FIG. 4, it is a flow of security function operations provided by an embodiment of the method of the present invention.
虚拟机用户按照自己的使用习惯, 通过安全轻代理提供的软件界面对 用户虚拟机和安全虚拟机进行操作, 和传统安全软件的使用感受一致。 如 系统实施例的描述, 用户虚拟机包括安全轻代理和安全驱动; 安全虚拟机 包括安全应用程序和安全驱动。 虚拟机监控器包括虚拟化安全服务平台。  Virtual machine users operate the user virtual machine and the secure virtual machine through the software interface provided by the secure light agent according to their own usage habits, which is consistent with the traditional security software. As described in the system embodiment, the user virtual machine includes a secure light agent and a secure driver; the secure virtual machine includes a secure application and a secure driver. The virtual machine monitor includes a virtualized security service platform.
1 )安全轻代理接收到虚拟机用户的安全功能操作后, 对该安全功能操 作进行分类, 得到第一类命令或第二类命令, 其中第一类命令由用户虚拟 机执行, 第二类命令由安全虚拟机执行。  1) After receiving the security function operation of the virtual machine user, the security light agent classifies the operation of the security function to obtain a first type command or a second type command, wherein the first type command is executed by the user virtual machine, and the second type command is executed. Executed by a secure virtual machine.
具体可以由安全轻代理中的安全功能操作模块实现上述功能。  Specifically, the above functions can be implemented by a security function operation module in the secure light agent.
以防病毒软件为例, 常见的第一类命令包括以下至少之一: 所述用户 虚拟机的安全轻代理的升级操作、所述用户虚拟机的安全驱动的升级操作、 查看防护状态、 查看日志、 查看统计、 查看 4艮告、 和查看被隔离的文件。  The antivirus software is used as an example. The common first type of command includes at least one of the following: an upgrade operation of the security light agent of the user virtual machine, an upgrade operation of the security driver of the user virtual machine, viewing the protection status, and viewing the log. , view statistics, view 4 reports, and view quarantined files.
其中安全轻代理的升级操作: 包括但不限于对安全轻代理的升级; 用户虚拟机的安全驱动的升级操作: 包括但不限于对用户虚拟机的安 全驱动的升级;  The upgrade operation of the security light agent: including but not limited to the upgrade of the security light agent; the security operation upgrade operation of the user virtual machine: including but not limited to the upgrade of the security driver of the user virtual machine;
查看: 包括但不限于查看防护状态、 查看日志、 查看统计、 查看 4艮告、 或查看被隔离的文件。 常见的第二类命令包括以下至少之一: 发起快速扫描、 发起全盘扫描、 发起自定义扫描、 扫描引擎的升级操作、 和特征码的升级操作。 View: Includes, but is not limited to, viewing protection status, viewing logs, viewing statistics, viewing 4 reports, or viewing quarantined files. A common second type of command includes at least one of the following: initiating a quick scan, initiating a full scan, initiating a custom scan, upgrading a scan engine, and upgrading a signature.
其中发起快速扫描: 包括但不限于快速扫描内存、 扫描特定路径、 扫 描易感染文件、 或扫描常见病毒感染位置;  Initiate a quick scan: including but not limited to quickly scanning memory, scanning for specific paths, scanning for susceptible files, or scanning for common virus infection locations;
发起全盘扫描: 包括但不限于扫描内存或全部文件;  Initiate a full scan: including but not limited to scanning memory or all files;
发起自定义扫描: 包括但不限于自定义扫描内存、 扫描指定文件、 扫 描路径;  Initiate a custom scan: including but not limited to custom scan memory, scan specified files, scan path;
安全应用程序的升级操作: 包括但不限于对安全应用程序的升级。 由 于安全应用程序可以理解为由扫描引擎和特征码组成, 因此对安全应用程 序的升级, 也可以理解为对扫描引擎的升级或对特征码的升级。  Upgrade of security applications: Includes but is not limited to upgrades to security applications. Since a security application can be understood as consisting of a scan engine and a signature, an upgrade to a secure application can also be understood as an upgrade to the scan engine or an upgrade to a signature.
具体的, 在所述用户虚拟机上配置有操作码与执行主体的对应关系, 如表 4所示, 当然表 4仅是示例性说明。 安全轻代理接收到虚拟机用户的 命令后, 所述用户虚拟机根据所述命令携带的操作码查询所述操作码与执 行主体的对应关系, 获得所述命令对应的执行主体。  Specifically, the corresponding relationship between the operation code and the execution body is configured on the user virtual machine, as shown in Table 4. Of course, Table 4 is merely an exemplary description. After receiving the command from the virtual machine user, the user virtual machine queries the corresponding relationship between the operation code and the execution entity according to the operation code carried by the command, and obtains the execution entity corresponding to the command.
表 4  Table 4
Figure imgf000020_0001
如表 4所示, 如果来自于虚拟机用户的命令中仅携带 1004 , 那么根据 表 4 ,所述命令的执行主体是安全虚拟机, 因此根据执行主体分类后只有第 二类命令。 如果来自于虚拟机用户的命令中携带 1004、 1008和 100A, 那么 根据表 4 , 1004的执行主体是安全虚拟机, 1008和 100A的执行主体是用户 虚拟机。 第一类命令是 1008和 100A, 第二类命令是 1004。
Figure imgf000020_0001
As shown in Table 4, if the command from the virtual machine user only carries 1004, then according to Table 4, the execution subject of the command is a secure virtual machine, and therefore only the second type of command is classified according to the execution subject. If the command from the virtual machine user carries 1004, 1008, and 100A, then According to Table 4, the execution entity of 1004 is a secure virtual machine, and the execution entities of 1008 and 100A are user virtual machines. The first type of command is 1008 and 100A, and the second type of command is 1004.
如果得到第一类命令, 则所述安全轻代理, 用于执行所述第一类命令, 并将所述第一类命令的执行结果向所述虚拟机用户呈现。  If the first type of command is obtained, the secure light agent is configured to execute the first type of command, and present an execution result of the first type of command to the virtual machine user.
如果得到了第二类命令, 则执行后续的步骤。  If a second type of command is obtained, the subsequent steps are performed.
2 )安全轻代理的安全功能操作模块将所述第二类命令发送给用户虚拟 机的安全驱动。  2) The security function operation module of the secure light agent sends the second type of command to the security driver of the user virtual machine.
3 )用户虚拟机的安全驱动将第二类命令发送给 Hypervi sor 内的虚拟 化安全 务平台。  3) The secure driver of the user's virtual machine sends a second type of command to the virtualized security platform within Hypervi sor.
4 )虚拟化安全服务平台将第二类命令发送给安全虚拟机。  4) The virtualized security service platform sends the second type of command to the secure virtual machine.
其中虚拟化安全月良务平台,用于在 Hypervi sor建立虚拟机之间的信息 传输通道(如事件 10环机制、 内存共享、 授权机制), 将用户虚拟机内的 安全驱动监控到的安全事件(如文件读写、进程创建),传输到安全虚拟机, 由安全虚拟机执行相应的分析和执行。  The virtualization security platform is used to establish an information transmission channel between the virtual machines in Hypervi sor (such as event 10 ring mechanism, memory sharing, authorization mechanism), and security events monitored by the security driver in the user virtual machine. (such as file read and write, process creation), transferred to the secure virtual machine, the security virtual machine performs the corresponding analysis and execution.
虚拟化安全服务平台又具体包括虚拟机监控模块。 虚拟机监控模块, 用于利用 Hypervi sor对真实物理资源和虚拟机逻辑资源的管理控制能力, 直接访问虚拟机的磁盘、 内存页、 CPU寄存器, 为安全虚拟机对安全事件的 分析和执行提供支撑信息。  The virtualized security service platform specifically includes a virtual machine monitoring module. The virtual machine monitoring module is used to utilize Hypervi sor to manage and control real physical resources and virtual machine logical resources, directly access virtual machine disks, memory pages, and CPU registers, and provide support for security virtual machine analysis and execution of security events. information.
5 )安全虚拟机内的安全驱动将第二类命令发送给安全应用程序, 具体 可以发送给安全应用程序的安全功能处理模块, 该模块根据第二类命令执 行对应的安全功能。  5) The security driver in the secure virtual machine sends the second type of command to the security application, which can be sent to the security function processing module of the security application, and the module executes the corresponding security function according to the second type of command.
其中安全功能处理模块: 接收用户虚拟机内安全驱动监控到的安全事 件或用户发起的安全操作, 调用虚拟化安全服务平台的虚拟机监控模块获 取更多的上下文信息(如文件内容、 进程的二进制映像信息), 分析安全事 件和上下文信息, 识别恶意安全事件, 再按照预设的策略执行, 如自动禁 止(隔离或删除文件)、 或提示用户并接收用户的执行选择。 以防病毒应用 为例, 传统位于用户虚拟机内的防病毒扫描引擎和病毒特征码数据库, 被 转移到了安全虚拟机内。 这里的防病毒扫描引擎和病毒特征码数据库组成 了安全虚拟机的安全应用程序。 The security function processing module: receives a security event monitored by a security driver in the user virtual machine or a user-initiated security operation, and invokes a virtual machine monitoring module of the virtualization security service platform to obtain more context information (such as file content, process binary) Image information), analyzes security events and context information, identifies malicious security events, and then performs actions according to preset policies, such as automatically disabling (quarantine or deleting files), or prompting users and receiving user execution choices. Anti-virus application As an example, the antivirus scan engine and virus signature database traditionally located in the user virtual machine are transferred to the secure virtual machine. The antivirus scan engine and virus signature database here form a secure application for a secure virtual machine.
具体地, 可以确定所述第二类命令的执行结果是否满足预先配置的通 知策略。 满足预先配置的通知策略的情况下, 安全虚拟机将对第二类命令 的执行结果(成功或失败)发送给虚拟化安全服务平台。 以表 5为例说明, 比如特征码升级时, 预先配置的通知策略是 "通知用户", 当然筒单起见, 可以直接配置通知策略是 "是", 即需要将对所述特征码升级的进度通知用 户虚拟机。 假如预先配置的通知策略是 "不通知用户", 当然筒单起见, 可 以直接配置通知策略是 "否", 即不需要将对所述特征码升级的进度通知用 户虚拟机。 表 5 中所示, 是不需要将对所述特征码升级的进度通知用户虚 拟机。  Specifically, it may be determined whether the execution result of the second type of command satisfies a pre-configured notification policy. When the pre-configured notification policy is met, the secure virtual machine sends the execution result (success or failure) of the second type of command to the virtualized security service platform. Table 5 is used as an example. For example, when the signature is upgraded, the pre-configured notification policy is "notify the user". Of course, the notification policy is "yes", that is, the progress of upgrading the signature is required. Notify the user of the virtual machine. If the pre-configured notification policy is "not notify the user", of course, the notification policy can be directly configured to be "No", that is, the user VM is not required to be notified of the progress of upgrading the signature. As shown in Table 5, it is not necessary to notify the user of the progress of the signature upgrade.
表 5  table 5
Figure imgf000022_0001
"发现病毒提示", 可能是操作码为 1001的 "快速扫描" 的执行结果, 也有可能是操作码为 1002的"全盘扫描"的执行结果,或者是操作码为 1003 的 "自定义扫描" 的执行结果。
Figure imgf000022_0001
"Discovering virus prompts" may be the result of a "quick scan" with an opcode of 1001, or a "full scan" with an opcode of 1002, or a "custom scan" with an opcode of 1003. Results of the.
"安全风险提示", 可能是操作码为 1001的 "快速扫描" 的执行过程 中产生的提示, 也有可能是操作码为 1002 的 "全盘扫描" 的执行过程中 产生的提示, 或者是操作码为 1003 的 "自定义扫描" 的执行过程中产生 的提示。 "Security Risk Prompt" may be a prompt generated during the execution of "Quick Scan" with an operation code of 1001, or it may be a prompt generated during the execution of "Full Scan" with an operation code of 1002, or the operation code is 1003 "Custom Scan" is generated during the execution Tips.
"交互式选项", 可能是操作码为 1001的 "快速扫描" 的执行过程中 产生的选项, 也有可能是操作码为 1002 的 "全盘扫描" 的执行过程中产 生的选项, 或者是操作码为 1003 的 "自定义扫描" 的执行过程中产生的 选项。  "Interactive Options" may be an option generated during the execution of "Quick Scan" with an opcode of 1001, or it may be an option generated during the execution of "Full Scan" with an opcode of 1002, or the opcode is The option generated during the execution of the 1003 "Custom Scan".
如果根据预先配置的通知策略, 需要通知虚拟机用户。 则安全应用程 序将所述第二类命令的执行结果发送给安全虚拟机的安全驱动。 这里的第 二类命令的执行结果, 包括操作的结果或操作的进度。  If you follow the pre-configured notification policy, you need to notify the virtual machine user. The security application then sends the execution result of the second type of command to the secure driver of the secure virtual machine. The execution result of the second type of command here includes the result of the operation or the progress of the operation.
6 ) 安全虚拟机将对第二类命令的执行结果发送给虚拟化安全服务平 台。  6) The secure virtual machine sends the execution result of the second type of command to the virtualized security service platform.
7 )虚拟化安全服务平台将第二类命令的执行结果发送给用户虚拟机。 7) The virtualization security service platform sends the execution result of the second type of command to the user virtual machine.
8 ) 用户虚拟机的安全驱动将第二类命令的执行结果发送给安全轻代 理。 8) The secure driver of the user virtual machine sends the execution result of the second type of command to the secure light agent.
9 )用户虚拟机的安全轻代理将第二类命令的执行结果向虚拟机用户呈 现。  9) The security light agent of the user virtual machine presents the execution result of the second type of command to the virtual machine user.
用户虚拟机可以将第一类命令的执行结果向虚拟机用户呈现, 等收到 第二类命令的执行结果后, 将第二类命令的执行结果向虚拟机用户呈现; 也可以等收到第二类命令的执行结果后, 将第二类命令的执行结果和第一 类命令的执行结果一起向虚拟机用户呈现。  The user virtual machine may present the execution result of the first type of command to the virtual machine user, and after receiving the execution result of the second type of command, present the execution result of the second type of command to the virtual machine user; After the execution result of the second type of command, the execution result of the second type of command is presented to the virtual machine user together with the execution result of the first type of command.
本实施例提供的方法, 能够通过安全虚拟机实现虚拟化安全功能操作 的体验。从而通过安全虚拟机和用户虚拟机的配合实现虚拟化安全的同时, 提升了虚拟机用户在虚拟化安全功能操作时的应用体验。  The method provided in this embodiment can implement the experience of virtualized security function operation by using a secure virtual machine. Therefore, the virtualized security is achieved through the cooperation of the secure virtual machine and the user virtual machine, and the application experience of the virtual machine user in the operation of the virtualized security function is improved.
如图 5所示, 是本发明实施例提供的安全功能通知的流程。  As shown in FIG. 5, it is a flow of a security function notification provided by an embodiment of the present invention.
除了图 3和图 4描述的将第二类命令的执行结果通知用户虚拟机外, 用户虚拟机还可以将监控到的安全事件信息转发给安全虚拟机, 由安全虚 拟机进行分析执行, 如果预先配置的策略需要向用户通知执行结果或需要 用户参与交互式选择, 则将相关信息发送到安全轻代理, 由安全轻代理呈 现给用户。 具体的流程如下: In addition to the description of the execution result of the second type of command described in FIG. 3 and FIG. 4, the user virtual machine can also forward the monitored security event information to the secure virtual machine. The computer performs analysis execution. If the pre-configured policy needs to notify the user of the execution result or requires the user to participate in the interactive selection, the relevant information is sent to the secure light agent, and presented to the user by the secure light agent. The specific process is as follows:
1 )用户虚拟机内的安全驱动监控用户虚拟机内的安全事件(如文件读 写、 进程创建等), 将安全事件信息发送给 Hyperv i sor 内的虚拟化安全服 务平台。  1) The security driver in the user virtual machine monitors security events (such as file read and write, process creation, etc.) in the user's virtual machine, and sends security event information to the virtualized security service platform in the Hypervisor.
2 )虚拟化安全服务平台将安全事件信息发送给安全虚拟机。  2) The virtualization security service platform sends security event information to the secure virtual machine.
3 )安全虚拟机内的安全驱动将安全事件信息发送给安全应用程序的安 全功能处理模块, 该模块执行事件类型对应的安全功能。 安全虚拟机接收 到安全事件或用户发起的安全操作之后, 调用虚拟化安全服务平台的虚拟 机监控模块获取更多的上下文信息(如文件内容、进程的二进制映像信息), 分析安全事件和上下文信息, 识别恶意安全事件, 再按照预设的策略执行, 如自动禁止(隔离或删除文件 )、 或提示用户并接收用户的执行选择。 如果 预先配置的通知策略需要向用户通知执行结果或需要用户参与交互式选 择, 则将执行结果或交互式选择, 发送给用户虚拟机。  3) The secure driver in the secure virtual machine sends the security event information to the security function processing module of the security application, which performs the security function corresponding to the event type. After receiving the security event or user-initiated security operation, the security virtual machine invokes the virtual machine monitoring module of the virtualized security service platform to obtain more context information (such as file content, binary image information of the process), and analyze security events and context information. Identify malicious security events and then follow the preset policies, such as automatically disabling (quarantine or deleting files), or prompting the user and receiving the user's execution choices. If the pre-configured notification policy needs to notify the user of the execution result or requires the user to participate in the interactive selection, the result or interactive selection will be sent to the user's virtual machine.
以防病毒应用, 结合表 6为例说明, 常见需要呈现给用户的信息有: 发现病毒提示: 病毒信息、 已完成的自动执行措施(删除、 隔离) 安全风险提示: 进程可疑行为 (通过启发式主动防御发现)、 可疑文件 (通过沙箱、 信誉评价发现)  For anti-virus applications, combined with Table 6 as an example, the common information that needs to be presented to users is: Virus detection: Virus information, completed automatic execution measures (delete, quarantine) Security risk tips: Process suspicious behavior (through heuristics) Active defense discovery), suspicious files (found through sandbox, reputation evaluation)
交互式选择执行措施: 向用户提示病毒、 可疑行为、 可疑文件的信息; 接收用户的执行选择(删除、 隔离、 忽略)。  Interactive selection of actions: Alert the user to viruses, suspicious behavior, suspicious files; Receive user's execution choices (delete, quarantine, ignore).
表 6 结 知内容 通知策略 (可配)  Table 6 Notification Content Notification Strategy (Available)
发现病毒提示 是  Found a virus tip
安全风险提示 是  Security risk warning
交互式选项 是 如果发现了病毒, 预先配置的通知策略是 "是", 即需要将对发现病毒 通知用户虚拟机; 假如预先配置的通知策略是 "否", 即不需要将发现病毒 通知用户虚拟机。 当然, 通知策略配置为 "是" 的, 也可以直接配置为 "通 知用户"。 通知策略配置为 "否" 的, 也可以直接配置为 "不通知用户"。 Interactive option is If a virus is found, the pre-configured notification policy is "Yes", that is, the user VM needs to be notified of the discovery virus; if the pre-configured notification policy is "No", the virus is not required to be notified to the user VM. Of course, the notification policy is configured as "yes" or it can be configured directly as "notify users." If the notification policy is configured to "No", it can also be configured directly as "Do not notify the user."
如果根据预先配置的通知策略, 需要通知虚拟机用户。 则执行后续步 骤。  If you follow the pre-configured notification policy, you need to notify the virtual machine user. Then perform the next steps.
4 )安全虚拟机将安全功能处理模块产生的通知信息发送给虚拟化安全 服务平台。  4) The secure virtual machine sends the notification information generated by the security function processing module to the virtualization security service platform.
5 ) -7 )虚拟化安全服务平台将安全功能执行过程中产生的通知信息发 送给用户虚拟机的安全驱动, 然后由用户虚拟机的安全驱动发送给安全轻 代理, 并最终呈现给虚拟机用户, 并接收用户的确认或选择。 如果需要用 户选择, 则后续执行步骤和图 4的实施例类似。  5) -7) The virtualization security service platform sends the notification information generated during the execution of the security function to the security driver of the user virtual machine, and then is sent to the secure light agent by the security driver of the user virtual machine, and finally presented to the virtual machine user. And receive confirmation or selection from the user. If user selection is required, the subsequent steps are similar to the embodiment of Figure 4.
具体的, 是由安全轻代理的安全功能通知模块, 向虚拟机用户呈现。 本实施例提供的方法, 通过安全虚拟机和用户虚拟机中各模块的配合 实现虚拟化安全功能通知的同时, 提升了虚拟机用户在安全功能通知时的 应用体验。 详细说明。  Specifically, it is presented to the virtual machine user by the security function notification module of the secure light agent. The method provided in this embodiment implements the virtualization security function notification by the cooperation of the security virtual machine and each module in the user virtual machine, and improves the application experience of the virtual machine user in the notification of the security function. Detailed description.
1 )虚拟化安全服务平台的安全保护模块周期性扫描虚拟机的磁盘和内 存, 对用户虚拟机的安全驱动进行完整性度量。 所述安全驱动的度量内容 包括如下至少之一: 所述用户虚拟机的安全驱动在内存中的代码、 数据、 磁盘上保存的驱动文件和配置数据。 完整性计算的方法包括: 使用单向密 码算法(如 HASH算法: SHA_1、 SHA-256 ; SM3算法)计算被度量内容的数 字摘要(数字指纹)。 对所述用户虚拟机的安全驱动的度量内容进行完整性 计算得到所述用户虚拟机的安全驱动的完整性度量值。 理进行完整性度量, 所述安全轻代理的度量内容包括如下至少之一: 所述 安全轻代理在内存中的代码、 数据、 磁盘上的程序文件和配置数据。 完整 性计算的方法包括: 使用单向密码算法 (如 HASH算法: SHA-1、 SHA-256; SM3算法)计算被度量内容的数字摘要(数字指纹)。 对所述安全轻代理的 度量内容进行完整性计算得到所述安全轻代理的完整性度量值。 1) The security protection module of the virtualization security service platform periodically scans the disk and memory of the virtual machine to measure the integrity of the security driver of the user virtual machine. The security-driven metric content includes at least one of the following: the user virtual machine securely drives the code, data in the memory, the driver file and the configuration data saved on the disk. The method of integrity calculation includes: using a one-way cryptographic algorithm (such as HASH algorithm: SHA_1, SHA-256; SM3 algorithm) to calculate a digital digest (digital fingerprint) of the content being measured. Performing an integrity calculation on the security-driven metric content of the user virtual machine results in a security-driven integrity metric of the user virtual machine. The integrity metric is performed, and the metric content of the secure light agent includes at least one of the following: code, data, program files on the disk, and configuration data of the secure light agent in memory. The method of integrity calculation includes: using a one-way cryptographic algorithm (such as HASH algorithm: SHA-1, SHA-256; SM3 algorithm) to calculate a digital digest (digital fingerprint) of the content being measured. Performing an integrity calculation on the metric content of the secure light agent results in an integrity metric of the secure light agent.
如果是用户虚拟机的安全驱动对安全轻代理进行的完整性度量, 则所 述用户虚拟机机的安全驱动需要将所述安全轻代理的完整性度量值发送给 所述虚拟化安全服务平台。  If the security driver of the user virtual machine performs an integrity metric to the secure light agent, the security driver of the user virtual machine needs to send the integrity metric value of the secure light agent to the virtualized security service platform.
3 )虚拟化安全服务平台将所述安全轻代理的完整性度量值或所述用户 虚拟机的安全驱动的完整性度量值发送给安全虚拟机。  3) The virtualization security service platform sends the integrity metric of the secure light agent or the security metric integrity metric of the user virtual machine to the secure virtual machine.
4 )安全虚拟机内的安全驱动将所述安全轻代理的完整性度量值或所述 用户虚拟机的安全驱动的完整性度量值发送给安全应用程序, 具体可以发 送给所述安全应用程序的轻代理校验模块。  4) The security driver in the secure virtual machine sends the integrity metric of the secure light agent or the security metric integrity metric of the user virtual machine to the security application, which may be sent to the security application. Light proxy verification module.
若轻代理校验模块接收到所述安全轻代理的完整性度量值, 则所述轻 代理检验模块将所述用户虚拟机的安全轻代理的完整性度量值和第一正确 值进行比对, 然后根据预先配置的第一校验策略对所述安全轻代理的比对 结果进行处理。 第一正确值是预先设置的、 或之前正确执行、 或集中分发 的度量值。  If the light proxy verification module receives the integrity metric of the secure light proxy, the light proxy verification module compares the integrity metric of the secure light proxy of the user virtual machine with the first correct value. The comparison result of the secure light agent is then processed according to a pre-configured first verification policy. The first correct value is a metric that is pre-set, or previously executed correctly, or distributed centrally.
预先配置的第一校验策略如表 7所示,  The pre-configured first verification strategy is shown in Table 7.
表 7  Table 7
检 ¾^明 检臉策略  Check 3⁄4^ 明
校险成功 不釆取任何措施, 继续等待下一周  School insurance success, do not take any measures, continue to wait for the next week
期的校验  Period check
检验失败 自动重新安装安全轻代理  Verification failed Automatic reinstallation of secure light agents
检验失败 自动恢复安全轻代理的默认配置  Verify failure Automatically restore the default configuration of the secure light agent
检验失败 通过安全轻代理向用户提示该安全  Inspection failure prompts the user with the security light agent
风险 如果校验成功不采取任何措施, 继续等待下一周期的校验; 如果校验 失败则根据预先配置的策略, 采取修补措施以避免安全风险, 补救措施包 括重新安装安全轻代理、 恢复安全轻代理的默认配置、 或向用户提示该安 全风险。 Risk If the verification succeeds and no action is taken, continue to wait for the next cycle of verification; if the verification fails, according to the pre-configured policy, take repair measures to avoid security risks. Remedial measures include reinstalling the secure light agent and restoring the secure light agent. The default configuration, or prompt the user for this security risk.
若若轻代理校验模块接收到包括所述用户虚拟机的安全驱动的完整性 度量值, 所述轻代理检验模块将所述用户虚拟机的安全驱动的完整性度量 值和第二正确值进行比对, 然后根据预先配置的第二校验策略对所述用户 虚拟机的安全驱动的比对结果进行处理。 具体方式与安全轻代理的校验类 似, 不再赘述。  If the light proxy verification module receives the integrity metric of the security driver including the user virtual machine, the light proxy verification module performs the security-driven integrity metric and the second correct value of the user virtual machine. The comparison then processes the comparison result of the secure driving of the user virtual machine according to the pre-configured second verification policy. The specific method is similar to the verification of the security light agent, and will not be described again.
5 )如果需要向用户提示则安全虚拟机将校验结果等提示信息发送给虚 拟化安全服务平台。  5) If prompted to the user, the secure virtual machine sends a prompt message such as the verification result to the virtualized security service platform.
6 ) -8 )校验结果等提示信息经过虚拟化安全服务平台、 用户虚拟机的 安全驱动, 最后由安全轻代理呈现给用户。 如果需要用户选择, 则后续执 行步骤和图 4描述的实施例类似。  6) -8) The verification information and other prompt information are driven by the virtualized security service platform and the user virtual machine, and finally presented to the user by the secure light agent. If a user selection is required, the subsequent execution steps are similar to the embodiment described in FIG.
本发明实施例通过轻代理校验模块, 来确保安全轻代理的安全性或用 户虚拟机的安全驱动的安全性, 解决了用户虚拟机位于不可信域内的安全 风险问题。  The embodiment of the present invention ensures the security of the secure light agent or the security of the user virtual machine through the light agent verification module, and solves the security risk problem that the user virtual machine is located in the untrusted domain.
上述流程描述了本发明实施例在各种场景下的应用, 当然并不限于这些 场景。  The foregoing process describes the application of the embodiments of the present invention in various scenarios, and is of course not limited to these scenarios.
如图 7 , 为本发明实施例提供的另一实现虚拟化安全的系统, 包括: 处理器 101、 存储器 102、 系统总线(筒称总线) 105。 处理器 101和存 储器 102之间通过系统总线 105连接并完成相互间的通信。  As shown in FIG. 7, another system for implementing virtualization security according to an embodiment of the present invention includes: a processor 101, a memory 102, and a system bus (memory bus) 105. The processor 101 and the memory 102 are connected by a system bus 105 and communicate with each other.
处理器 101可能为单核或多核中央处理单元, 或者为特定集成电路, 或 者为被配置成实施本发明实施例的一个或多个集成电路。  Processor 101 may be a single core or multi-core central processing unit, or a particular integrated circuit, or one or more integrated circuits configured to implement embodiments of the present invention.
存储器 102 可以为高速 RAM 存储器, 也可以为非易失性存储器 The memory 102 can be a high speed RAM memory or a nonvolatile memory.
( non-volat i le memory ), 例如至少一个硬盘存储器。 存储器 102用于存储计算机执行指令 1 021。 具体的, 计算机执行指令 1021中可以包括程序代码。 (non-volat i le memory ), such as at least one hard disk storage. The memory 102 is used to store computer execution instructions 1 021. Specifically, the program code may be included in the computer execution instruction 1021.
当计算机运行时, 处理器 101运行计算机执行指令 1 021 , 可以执行图 2-图 6任意之一所述的流程。  When the computer is running, the processor 101 executes the computer execution instruction 1 021, and the flow described in any one of Figures 2-6 can be performed.
本发明实施例还提供一种虚拟化安全的计算机程序产品, 包括存储了程 序代码的计算机可读存储介质, 所述程序代码包括的指令用于执行图 2-图 6 任意之一的流程。  The embodiment of the present invention further provides a virtualized and secure computer program product, comprising: a computer readable storage medium storing program code, wherein the program code comprises instructions for executing the flow of any one of Figures 2-6.
本领域普通技术人员将会理解, 本发明的各个方面、 或各个方面的可 能实现方式可以被具体实施为系统、 方法或者计算机程序产品。 因此, 本 发明的各方面、 或各个方面的可能实现方式可以采用完全硬件实施例、 完 全软件实施例 (包括固件、 驻留软件等等), 或者组合软件和硬件方面的实 施例的形式, 在这里都统称为 "电路"、 "模块" 或者 "系统"。 此外, 本发 明的各方面、或各个方面的可能实现方式可以采用计算机程序产品的形式, 计算机程序产品是指存储在计算机可读介质中的计算机可读程序代码。  Those skilled in the art will appreciate that various aspects of the invention, or possible implementations of various aspects, may be embodied as a system, method, or computer program product. Thus, aspects of the invention, or possible implementations of various aspects, may be in the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, etc.), or a combination of software and hardware aspects, They are collectively referred to herein as "circuits," "modules," or "systems." Furthermore, aspects of the invention, or possible implementations of various aspects, may take the form of a computer program product, which is a computer readable program code stored on a computer readable medium.
计算机可读介质可以是计算机可读信号介质或者计算机可读存储介 质。 计算机可读存储介质包含但不限于电子、 磁性、 光学、 电磁、 红外或 半导体系统、 设备或者装置, 或者前述的任意适当组合, 如随机存取存储 器 (RAM)、 只读存储器 (R0M)、 可擦除可编程只读存储器(EPR0M或者快闪 存储器)、 光纤、 便携式只读存储器(CD-ROM)。  The computer readable medium can be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium includes, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any suitable combination of the foregoing, such as random access memory (RAM), read only memory (ROM), Erase programmable read-only memory (EPR0M or flash memory), optical fiber, portable read-only memory (CD-ROM).
计算机中的处理器读取存储在计算机可读介质中的计算机可读程序代 码, 使得处理器能够执行在流程图中每个步骤、 或各步骤的组合中规定的 功能动作; 生成实施在框图的每一块、 或各块的组合中规定的功能动作的 装置。  The processor in the computer reads the computer readable program code stored in the computer readable medium, such that the processor can perform the functional actions specified in each step or combination of steps in the flowchart; A device that functions as specified in each block, or combination of blocks.
计算机可读程序代码可以完全在用户的计算机上执行、 部分在用户的 计算机上执行、 作为单独的软件包、 部分在用户的计算机上并且部分在远 程计算机上, 或者完全在远程计算机或者服务器上执行。 也应该注意, 在 某些替代实施方案中, 在流程图中各步骤、 或框图中各块所注明的功能可 能不按图中注明的顺序发生。 例如, 依赖于所涉及的功能, 接连示出的两 个步骤、 或两个块实际上可能被大致同时执行, 或者这些块有时候可能被 以相反顺序执行。 The computer readable program code can be executed entirely on the user's computer, partly on the user's computer, as a separate software package, partly on the user's computer and partly on the remote computer, or entirely on the remote computer or server. . Should also pay attention to In some alternative implementations, the functions noted in the various steps in the flowcharts or in the blocks in the block diagrams may not occur in the order noted in the drawings. For example, two steps, or two blocks shown in succession may be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
本领域普通技术人员可以意识到, 结合本文中所公开的实施例描述的 各示例的单元及算法步骤, 能够以电子硬件、 或者计算机软件和电子硬件 的结合来实现。 这些功能究竟以硬件还是软件方式来执行, 取决于技术方 案的特定应用和设计约束条件。 专业技术人员可以对每个特定的应用来使 用不同方法来实现所描述的功能, 但是这种实现不应认为超出本发明的范 围。  Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technology solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.

Claims

权利要求 Rights request
1、 一种实现虚拟化安全的方法, 所述方法应用于包括用户虚拟机和安 全虚拟机的系统, 其特征在于: 1. A method for realizing virtualization security. The method is applied to a system including a user virtual machine and a security virtual machine, and is characterized by:
所述用户虚拟机接收来自于虚拟机用户的命令; The user virtual machine receives commands from the virtual machine user;
所述用户虚拟机根据所述命令对应的执行主体对所述命令进行分类, 得到如下至少之一: 第一类命令和第二类命令; The user virtual machine classifies the command according to the execution subject corresponding to the command, and obtains at least one of the following: a first type of command and a second type of command;
若得到第一类命令, 则所述用户虚拟机执行所述第一类命令, 并将所 述第一类命令的执行结果向所述虚拟机用户呈现; If the first type of command is obtained, the user virtual machine executes the first type of command and presents the execution result of the first type of command to the virtual machine user;
若得到第二类命令, 则所述用户虚拟机将所述第二类命令通过虚拟机 监控器发送给所述安全虚拟机; 所述安全虚拟机执行所述第二类命令, 并 将对所述第二类命令的执行结果通过所述虚拟机监控器发送给所述用户虚 拟机; 所述用户虚拟机将所述第二类命令的执行结果向所述虚拟机用户呈 现; If the second type of command is obtained, the user virtual machine sends the second type of command to the security virtual machine through the virtual machine monitor; the security virtual machine executes the second type of command and processes all the commands. The execution result of the second type of command is sent to the user virtual machine through the virtual machine monitor; the user virtual machine presents the execution result of the second type of command to the virtual machine user;
若得到第一类命令和第二类命令, 则所述用户虚拟机执行所述第一类 命令, 并将所述第二类命令通过虚拟机监控器发送给所述安全虚拟机; 所 述安全虚拟机执行所述第二类命令, 并将对所述第二类命令的执行结果通 过所述虚拟机监控器发送给所述用户虚拟机; 所述用户虚拟机将所述第一 类命令的执行结果和所述第二类命令的执行结果向所述虚拟机用户呈现。 If the first type of command and the second type of command are obtained, the user virtual machine executes the first type of command, and sends the second type of command to the security virtual machine through the virtual machine monitor; the security virtual machine The virtual machine executes the second type of command and sends the execution result of the second type of command to the user virtual machine through the virtual machine monitor; the user virtual machine sends the execution result of the first type of command to the user virtual machine. The execution result and the execution result of the second type of command are presented to the virtual machine user.
2、 根据权利要求 1所述的方法, 其特征在于, 在所述用户虚拟机上配 置有操作码与执行主体的对应关系, 根据所述命令对应的执行主体对所述 命令进行分类之前还包括: 2. The method according to claim 1, characterized in that: a corresponding relationship between an operation code and an execution subject is configured on the user virtual machine, and before classifying the command according to the execution subject corresponding to the command, the method further includes: :
所述用户虚拟机根据所述命令携带的操作码查询所述操作码与执行主 体的对应关系, 获得所述命令对应的执行主体。 The user virtual machine queries the corresponding relationship between the operation code and the execution subject according to the operation code carried by the command, and obtains the execution subject corresponding to the command.
3、 根据权利要求 1或 2所述的方法, 其特征在于, 若所述命令为安全 配置命令, 还包括: 3. The method according to claim 1 or 2, characterized in that, if the command is a security configuration command, it also includes:
所述用户虚拟机的安全轻代理根据所述第一类命令对应的执行主体对 所述第一类命令进行分类, 得到如下至少之一: 代理类命令和驱动类命令; 若得到代理类命令, 则所述安全轻代理执行所述代理类命令, 并将所 述代理类命令的执行结果向所述虚拟机用户呈现; The security light agent of the user virtual machine executes the command according to the execution subject corresponding to the first type of command. The first type of commands is classified to obtain at least one of the following: agent type commands and driver type commands; if an agent type command is obtained, the secure light agent executes the agent type command and replaces the agent type command with The execution results are presented to the virtual machine user;
若得到驱动类命令, 则所述安全轻代理将所述驱动类命令发送给所述 用户虚拟机的安全驱动; 所述用户虚拟机的安全驱动执行所述驱动类命令, 并将所述驱动类命令的执行结果发送给所述安全轻代理; 所述安全轻代理 将所述驱动类命令的执行结果向所述虚拟机用户呈现; If the driver class command is obtained, the security light agent sends the driver class command to the security driver of the user virtual machine; the security driver of the user virtual machine executes the driver class command and sends the driver class command to the security driver of the user virtual machine. The execution result of the command is sent to the security light agent; the security light agent presents the execution result of the driver command to the virtual machine user;
若得到代理类命令和驱动类命令, 则所述安全轻代理执行所述代理类 命令, 并将所述驱动类命令发送给所述用户虚拟机的安全驱动; 所述用户 虚拟机的安全驱动执行所述驱动类命令, 并将所述驱动类命令的执行结果 发送给所述安全轻代理; 所述安全轻代理将所述代理类命令的执行结果和 所述驱动类命令的执行结果向所述虚拟机用户呈现。 If the agent type command and the driver type command are obtained, the security light agent executes the agent type command and sends the driver type command to the security driver of the user virtual machine; the security driver of the user virtual machine executes The driver class command, and sends the execution result of the driver class command to the security light agent; The security light agent sends the execution result of the agent class command and the execution result of the driver class command to the Virtual machine user presentation.
4、 根据权利要求 3所述的方法, 其特征在于, 4. The method according to claim 3, characterized in that,
所述代理类命令包括以下至少之一: 所述安全轻代理的日志设置、 所 述安全轻代理的升级设置、 和所述用户虚拟机的安全驱动的升级设置; 或 所述驱动类命令包括以下至少之一: 所述用户虚拟机的安全驱动的日 志设置、緩存设置、 Ema i l防护设置、 所述用户虚拟机的安全驱动的自我防 护设置、 所述安全轻代理的自我防护设置; 或 The agent-type commands include at least one of the following: log settings of the security light agent, upgrade settings of the security light agent, and upgrade settings of the security driver of the user virtual machine; or the driver-type commands include the following At least one of: the log settings, cache settings, email protection settings of the security driver of the user virtual machine, the self-protection settings of the security driver of the user virtual machine, the self-protection settings of the security light agent; or
所述第二类命令包括以下至少之一: 周期性扫描设置、 过滤设置、 信 任文件设置、 处理方式设置、 通知设置、 主动防御设置、 样本设置、 所述 安全虚拟机的安全应用程序的升级设置、 和所述安全虚拟机的安全驱动的 升级设置。 The second type of commands includes at least one of the following: periodic scanning settings, filtering settings, trust file settings, processing mode settings, notification settings, active defense settings, sample settings, and upgrade settings of the security application of the security virtual machine. , and the upgrade settings of the security driver of the secure virtual machine.
5、 根据权利要求 1至 4任一所述的方法, 其特征在于, 若所述命令为 安全配置命令, 所述安全虚拟机执行所述第二类命令之前还包括: 5. The method according to any one of claims 1 to 4, characterized in that, if the command is a security configuration command, before the security virtual machine executes the second type of command, it further includes:
所述安全虚拟机的用户配置审计模块对所述第二类命令进行审计, 确 定所述第二类命令满足预先配置的安全策略。 The user configuration audit module of the secure virtual machine audits the second type of commands and determines that the second type of commands satisfy the preconfigured security policy.
6、 根据权利要求 1或 2所述的方法, 其特征在于, 当所述命令为安全 功能操作时, 6. The method according to claim 1 or 2, characterized in that when the command is a safety function operation,
所述第一类命令包括以下至少之一: 所述用户虚拟机的安全轻代理的 升级操作、 所述用户虚拟机的安全驱动的升级操作、 查看防护状态、 查看 日志、 查看统计、 查看 4艮告、 和查看被隔离的文件; 或 The first type of command includes at least one of the following: an upgrade operation of the security light agent of the user virtual machine, an upgrade operation of the security driver of the user virtual machine, view protection status, view logs, view statistics, view report, and view quarantined files; or
所述第二类命令包括以下至少之一: 发起快速扫描、 发起全盘扫描、 发起自定义扫描、 扫描引擎的升级操作、 和特征码的升级操作。 The second type of command includes at least one of the following: initiating a quick scan, initiating a full scan, initiating a custom scan, a scan engine upgrade operation, and a signature upgrade operation.
7、 根据权利要求 1-6任一所述的方法, 其特征在于, 还包括: 将对所述第二类命令的执行结果通过所述虚拟机监控器发送给所述用 户虚拟机之前, 所述安全虚拟机的安全功能处理模块确定所述第二类命令 的执行结果满足预先配置的通知策略。 7. The method according to any one of claims 1 to 6, further comprising: before sending the execution result of the second type of command to the user virtual machine through the virtual machine monitor, The security function processing module of the security virtual machine determines that the execution result of the second type of command satisfies the preconfigured notification policy.
8、 根据权利要求 1-7任一所述的方法, 其特征在于, 还包括: 所述安全虚拟机的轻代理检验模块将所述用户虚拟机的安全轻代理的 完整性度量值和第一正确值进行比对, 然后根据预先配置的第一校验策略 对所述安全轻代理的比对结果进行处理, 所述安全轻代理的完整性度量值 是对所述安全轻代理的度量内容进行完整性计算得来的, 所述安全轻代理 的度量内容包括如下至少之一: 所述安全轻代理在内存中的代码、 数据、 磁盘上的程序文件和配置数据。 8. The method according to any one of claims 1 to 7, further comprising: the light agent verification module of the security virtual machine comparing the integrity measurement value of the security light agent of the user virtual machine with the first Correct values are compared, and then the comparison results of the secure light agent are processed according to the preconfigured first verification policy. The integrity measurement value of the security light agent is based on the measurement content of the security light agent. Calculated from integrity calculations, the measurement content of the secure light agent includes at least one of the following: the code, data, program files on disk, and configuration data of the secure light agent in memory.
9、 根据权利要求 1-8任一所述的方法, 其特征在于, 所述安全虚拟机 的轻代理检验模块将所述用户虚拟机的安全驱动的完整性度量值和第二正 确值进行比对, 然后根据预先配置的第二校验策略对所述用户虚拟机的安 全驱动的比对结果进行处理, 所述安全驱动的完整性度量值是对所述用户 虚拟机的安全驱动的度量内容进行完整性计算得来的, 所述安全驱动的度 量内容包括如下至少之一: 所述用户虚拟机的安全驱动在内存中的代码、 数据、 磁盘上保存的驱动文件和配置数据。 9. The method according to any one of claims 1 to 8, characterized in that the light agent verification module of the secure virtual machine compares the integrity measurement value of the security driver of the user virtual machine with the second correct value. Right, and then process the comparison result of the security driver of the user virtual machine according to the preconfigured second verification policy, and the integrity measurement value of the security driver is the measurement content of the security driver of the user virtual machine. Obtained from the integrity calculation, the measurement content of the security driver includes at least one of the following: the code, data, driver files and configuration data saved in the memory of the security driver of the user virtual machine on the disk.
10、 一种实现虚拟化安全的系统, 所述系统包括用户虚拟机和安全虚 拟机, 其特征在于: 10. A system for realizing virtualization security. The system includes a user virtual machine and a secure virtual machine. Virtual machine, which is characterized by:
所述用户虚拟机, 用于接收来自于虚拟机用户的命令, 根据所述命令 对应的执行主体对所述命令进行分类, 得到如下至少之一: 第一类命令和 第二类命令; The user virtual machine is used to receive commands from virtual machine users, classify the commands according to the execution subjects corresponding to the commands, and obtain at least one of the following: first type commands and second type commands;
若得到第一类命令, 则所述用户虚拟机, 用于执行所述第一类命令, 并将所述第一类命令的执行结果向所述虚拟机用户呈现; If the first type of command is obtained, the user virtual machine is used to execute the first type of command and present the execution result of the first type of command to the virtual machine user;
若得到第二类命令, 则所述用户虚拟机, 用于将所述第二类命令通过 虚拟机监控器发送给所述安全虚拟机; 所述安全虚拟机, 用于执行所述第 二类命令, 并将对所述第二类命令的执行结果通过所述虚拟机监控器发送 给所述用户虚拟机; 所述用户虚拟机, 还用于将所述第二类命令的执行结 果向所述虚拟机用户呈现; If the second type of command is obtained, the user virtual machine is used to send the second type of command to the security virtual machine through the virtual machine monitor; the security virtual machine is used to execute the second type of command. command, and send the execution result of the second type of command to the user virtual machine through the virtual machine monitor; the user virtual machine is also used to send the execution result of the second type of command to the user virtual machine. Presented to the virtual machine user;
若得到第一类命令和第二类命令, 则所述用户虚拟机, 用于执行所述 第一类命令, 并将所述第二类命令通过虚拟机监控器发送给所述安全虚拟 机; 所述安全虚拟机, 用于执行所述第二类命令, 并将对所述第二类命令 的执行结果通过所述虚拟机监控器发送给所述用户虚拟机; 所述用户虚拟 机, 还用于将所述第一类命令的执行结果和所述第二类命令的执行结果向 所述虚拟机用户呈现。 If the first type of command and the second type of command are obtained, the user virtual machine is used to execute the first type of command and send the second type of command to the security virtual machine through the virtual machine monitor; The security virtual machine is configured to execute the second type of command, and send the execution result of the second type of command to the user virtual machine through the virtual machine monitor; the user virtual machine, also Used to present the execution result of the first type of command and the execution result of the second type of command to the virtual machine user.
11、 根据权利要求 10所述的系统, 其特征在于, 在所述用户虚拟机上 配置有操作码与执行主体的对应关系, 根据所述命令对应的执行主体对所 述命令进行分类之前, 所述用户虚拟机还用于根据所述命令携带的操作码 查询所述操作码与执行主体的对应关系, 获得所述命令对应的执行主体。 11. The system according to claim 10, wherein a corresponding relationship between an operation code and an execution subject is configured on the user virtual machine, and before the command is classified according to the execution subject corresponding to the command, The user virtual machine is also configured to query the corresponding relationship between the operation code and the execution subject according to the operation code carried by the command, and obtain the execution subject corresponding to the command.
12、 根据权利要求 10或 11所述的系统, 其特征在于, 所述用户虚拟 机包括安全轻代理和安全驱动, 若所述命令为安全配置命令: 12. The system according to claim 10 or 11, wherein the user virtual machine includes a security light agent and a security driver, and if the command is a security configuration command:
所述用户虚拟机的安全轻代理, 用于根据所述第一类命令对应的执行 主体对所述第一类命令进行分类, 得到如下至少之一: 代理类命令和驱动 类命令; 若得到代理类命令, 则所述安全轻代理, 用于执行所述代理类命令, 并将所述代理类命令的执行结果向所述虚拟机用户呈现; The security light agent of the user virtual machine is used to classify the first type of command according to the execution subject corresponding to the first type of command, and obtain at least one of the following: agent type commands and driver type commands; If a proxy command is obtained, the security light agent is used to execute the proxy command and present the execution result of the proxy command to the virtual machine user;
若得到驱动类命令, 则所述安全轻代理, 用于将所述驱动类命令发送 给所述用户虚拟机的安全驱动; 所述用户虚拟机的安全驱动, 用于执行所 述驱动类命令, 并将所述驱动类命令的执行结果发送给所述安全轻代理; 所述安全轻代理, 还用于将所述驱动类命令的执行结果向所述虚拟机用户 呈现; If the driver command is obtained, the security light agent is used to send the driver command to the security driver of the user virtual machine; the security driver of the user virtual machine is used to execute the driver command, and send the execution result of the driver command to the security light agent; the security light agent is also used to present the execution result of the driver command to the virtual machine user;
若得到代理类命令和驱动类命令, 则所述安全轻代理, 用于执行所述 代理类命令, 并将所述驱动类命令发送给所述用户虚拟机的安全驱动; 所 述用户虚拟机的安全驱动, 用于执行所述驱动类命令, 并将所述驱动类命 令的执行结果发送给所述安全轻代理; 所述安全轻代理, 还用于将所述代 理类命令的执行结果和所述驱动类命令的执行结果向所述虚拟机用户呈 现。 If the agent type command and the driver type command are obtained, the security light agent is used to execute the agent type command and send the driver type command to the security driver of the user virtual machine; The security driver is used to execute the driver class command and send the execution result of the driver class command to the security light agent; the security light agent is also used to combine the execution result of the agent class command with all the security driver commands. The execution result of the driver command is presented to the virtual machine user.
13、 根据权利要求 12所述的系统, 其特征在于, 13. The system according to claim 12, characterized in that,
所述代理类命令包括以下至少之一: 所述安全轻代理的日志设置、 所 述安全轻代理的升级设置、 和所述用户虚拟机的安全驱动的升级设置; 或 所述驱动类命令包括以下至少之一: 所述用户虚拟机的安全驱动的日 志设置、緩存设置、 Ema i l防护设置、 所述用户虚拟机的安全驱动的自我防 护设置、 所述安全轻代理的自我防护设置; 或 The agent-type commands include at least one of the following: log settings of the security light agent, upgrade settings of the security light agent, and upgrade settings of the security driver of the user virtual machine; or the driver-type commands include the following At least one of: the log settings, cache settings, email protection settings of the security driver of the user virtual machine, the self-protection settings of the security driver of the user virtual machine, the self-protection settings of the security light agent; or
所述第二类命令包括以下至少之一: 周期性扫描设置、 过滤设置、 信 任文件设置、 处理方式设置、 通知设置、 主动防御设置、 样本设置、 所述 安全虚拟机的安全应用程序的升级设置、 和所述安全虚拟机的安全驱动的 升级设置。 The second type of commands includes at least one of the following: periodic scanning settings, filtering settings, trust file settings, processing mode settings, notification settings, active defense settings, sample settings, and upgrade settings of the security application of the security virtual machine. , and the upgrade settings of the security driver of the secure virtual machine.
14、 根据权利要求 10至 13任一所述的系统, 其特征在于, 所述安全 虚拟机包括用户配置审计模块, 若所述命令为安全配置命令, 所述安全虚 拟机用于执行所述第二类命令之前, 所述用户配置审计模块用于对所述第 二类命令进行审计, 确定所述第二类命令满足预先配置的安全策略。 14. The system according to any one of claims 10 to 13, characterized in that the security virtual machine includes a user configuration audit module, and if the command is a security configuration command, the security virtual machine is used to execute the first Before the second type of command, the user configuration audit module is used to perform the second type of command. The second-category commands are audited to determine that the second-category commands satisfy the pre-configured security policy.
15、 根据权利要求 10或 11所述的系统, 其特征在于, 当所述命令为 安全功能操作时, 15. The system according to claim 10 or 11, characterized in that when the command is a safety function operation,
所述第一类命令包括以下至少之一: 所述用户虚拟机的安全轻代理的 升级操作、 所述用户虚拟机的安全驱动的升级操作、 查看防护状态、 查看 曰志、 查看统计、 查看 4艮告、 和查看被隔离的文件; 或 The first type of command includes at least one of the following: upgrade operation of the security light agent of the user virtual machine, upgrade operation of the security driver of the user virtual machine, view protection status, view log, view statistics, view 4 Report, and view quarantined files; or
所述第二类命令包括以下至少之一: 发起快速扫描、 发起全盘扫描、 发起自定义扫描、 扫描引擎的升级操作、 和特征码的升级操作。 The second type of command includes at least one of the following: initiating a quick scan, initiating a full scan, initiating a custom scan, a scan engine upgrade operation, and a signature upgrade operation.
16、 根据权利要求 10-15任一所述的系统, 其特征在于, 所述安全虚 拟机包括安全功能处理模块, 将对所述第二类命令的执行结果通过所述虚 拟机监控器发送给所述用户虚拟机之前, 所述安全功能处理模块用于确定 所述第二类命令的执行结果满足预先配置的通知策略。 16. The system according to any one of claims 10 to 15, characterized in that the security virtual machine includes a security function processing module that sends the execution result of the second type of command to the virtual machine monitor through the virtual machine monitor. Before the user virtual machine, the security function processing module is configured to determine that the execution result of the second type of command satisfies the preconfigured notification policy.
17、 根据权利要求 10-16任一所述的系统, 其特征在于, 所述安全虚 拟机包括轻代理检验模块: 17. The system according to any one of claims 10 to 16, characterized in that the security virtual machine includes a light agent verification module:
所述轻代理检验模块, 用于将所述用户虚拟机的安全轻代理的完整性 度量值和第一正确值进行比对, 然后根据预先配置的第一校验策略对所述 安全轻代理的比对结果进行处理, 所述安全轻代理的完整性度量值是对所 述安全轻代理的度量内容进行完整性计算得来的, 所述安全轻代理的度量 内容包括如下至少之一: 所述安全轻代理在内存中的代码、 数据、 磁盘上 的程序文件和配置数据。 The light agent verification module is configured to compare the integrity measurement value of the security light agent of the user virtual machine with the first correct value, and then compare the integrity measurement value of the security light agent according to the preconfigured first verification policy. The comparison results are processed. The integrity measurement value of the security light agent is obtained by performing integrity calculation on the measurement content of the security light agent. The measurement content of the security light proxy includes at least one of the following: Secure light agents code, data in memory, program files on disk, and configuration data.
18、 根据权利要求 10-17任一所述的系统, 其特征在于, 所述安全虚 拟机的轻代理检验模块, 用于将所述用户虚拟机的安全驱动的完整性度量 值和第二正确值进行比对, 然后根据预先配置的第二校验策略对所述用户 虚拟机的安全驱动的比对结果进行处理, 所述安全驱动的完整性度量值是 对所述用户虚拟机的安全驱动的度量内容进行完整性计算得来的, 所述安 全驱动的度量内容包括如下至少之一: 所述用户虚拟机的安全驱动在内存 中的代码、 数据、 磁盘上保存的驱动文件和配置数据。 18. The system according to any one of claims 10 to 17, characterized in that the light agent verification module of the security virtual machine is used to compare the integrity measurement value of the security driver of the user virtual machine with the second correct The value is compared, and then the comparison result of the security driver of the user virtual machine is processed according to the preconfigured second verification policy. The integrity measurement value of the security driver is the security driver of the user virtual machine. The measurement content of the security driver is obtained by performing integrity calculations. The measurement content of the security driver includes at least one of the following: The security driver of the user virtual machine is in the memory. Code, data, driver files and configuration data saved on disk.
19、 一种实现虚拟化安全的系统, 其特征在于, 包括: 19. A system for realizing virtualization security, characterized by: including:
处理器、 存储器和系统总线, 所述处理器和所述存储器之间通过所述 系统总线连接并完成相互间的通信; Processor, memory and system bus. The processor and the memory are connected through the system bus and communicate with each other;
所述存储器, 用于存储计算机执行指令; The memory is used to store computer execution instructions;
所述处理器, 用于运行所述计算机执行指令, 执行如权利要求 1-9任 一所述的方法。 The processor is configured to run the computer execution instructions to perform the method described in any one of claims 1-9.
20、 一种计算机程序产品, 包括存储了程序代码的计算机可读存储介 质, 所述程序代码包括的指令用于执行如权利要求 1-9任一所述的方法。 20. A computer program product, including a computer-readable storage medium storing program code, the program code including instructions for executing the method according to any one of claims 1-9.
PCT/CN2013/086956 2013-11-12 2013-11-12 Method and system for realizing virtualization security WO2015070376A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201380004236.6A CN104169939B (en) 2013-11-12 2013-11-12 Method and system realizing virtualization safety
PCT/CN2013/086956 WO2015070376A1 (en) 2013-11-12 2013-11-12 Method and system for realizing virtualization security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/086956 WO2015070376A1 (en) 2013-11-12 2013-11-12 Method and system for realizing virtualization security

Publications (1)

Publication Number Publication Date
WO2015070376A1 true WO2015070376A1 (en) 2015-05-21

Family

ID=51912352

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/086956 WO2015070376A1 (en) 2013-11-12 2013-11-12 Method and system for realizing virtualization security

Country Status (2)

Country Link
CN (1) CN104169939B (en)
WO (1) WO2015070376A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020140205A1 (en) * 2019-01-02 2020-07-09 Nokia Shanghai Bell Co., Ltd. Method, system and apparatus for unified security configuration management

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9652612B2 (en) * 2015-03-25 2017-05-16 International Business Machines Corporation Security within a software-defined infrastructure
CN105227570B (en) * 2015-10-19 2019-02-15 成都卫士通信息产业股份有限公司 A kind of safe e-mail system of integrated campaign
CN108369625B (en) * 2015-12-19 2022-03-04 比特梵德知识产权管理有限公司 Dual memory introspection for protecting multiple network endpoints
CN107038128B (en) 2016-02-03 2020-07-28 华为技术有限公司 Virtualization of execution environment, and access method and device of virtual execution environment
CN106844005B (en) * 2016-12-29 2020-04-14 北京瑞星网安技术股份有限公司 Data recovery method and system based on virtualization environment
CN111831609B (en) * 2020-06-18 2024-01-02 中国科学院数据与通信保护研究教育中心 Method and system for unified management and distribution of binary metric values in virtualized environments

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101630270A (en) * 2009-07-22 2010-01-20 成都市华为赛门铁克科技有限公司 Data processing system and method therefor
CN102254117A (en) * 2011-07-07 2011-11-23 李鹏 Virtualized technology-based data anti-disclosure system
US20130007469A1 (en) * 2011-06-29 2013-01-03 Internatioanl Business Machines Corporation Securely managing the execution of screen rendering instructions in a host operating system and virtual machine
CN102971706A (en) * 2010-05-10 2013-03-13 思杰系统有限公司 Redirection of information from secure virtual machines to unsecure virtual machines

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110004878A1 (en) * 2009-06-30 2011-01-06 Hubert Divoux Methods and systems for selecting a desktop execution location
US8887227B2 (en) * 2010-03-23 2014-11-11 Citrix Systems, Inc. Network policy implementation for a multi-virtual machine appliance within a virtualization environtment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101630270A (en) * 2009-07-22 2010-01-20 成都市华为赛门铁克科技有限公司 Data processing system and method therefor
CN102971706A (en) * 2010-05-10 2013-03-13 思杰系统有限公司 Redirection of information from secure virtual machines to unsecure virtual machines
US20130007469A1 (en) * 2011-06-29 2013-01-03 Internatioanl Business Machines Corporation Securely managing the execution of screen rendering instructions in a host operating system and virtual machine
CN102254117A (en) * 2011-07-07 2011-11-23 李鹏 Virtualized technology-based data anti-disclosure system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020140205A1 (en) * 2019-01-02 2020-07-09 Nokia Shanghai Bell Co., Ltd. Method, system and apparatus for unified security configuration management

Also Published As

Publication number Publication date
CN104169939A (en) 2014-11-26
CN104169939B (en) 2017-02-15

Similar Documents

Publication Publication Date Title
US20200301764A1 (en) Operating system on a computing system
US10630643B2 (en) Dual memory introspection for securing multiple network endpoints
JP6419787B2 (en) Optimized resource allocation to virtual machines in malware content detection system
US10678935B2 (en) Identifying container file events for providing container security
US11222123B2 (en) Securing privileged virtualized execution instances from penetrating a virtual host environment
US9094451B2 (en) System and method for reducing load on an operating system when executing antivirus operations
RU2645268C2 (en) Complex classification for detecting malware
US9639693B2 (en) Techniques for detecting a security vulnerability
WO2015070376A1 (en) Method and system for realizing virtualization security
JP6055574B2 (en) Context-based switching to a secure operating system environment
US10565378B1 (en) Exploit of privilege detection framework
US20180191779A1 (en) Flexible Deception Architecture
US20140165130A1 (en) Application-specific re-adjustment of computer security settings
US10303501B2 (en) Virtual high privilege mode for a system management request
US8826275B2 (en) System and method for self-aware virtual machine image deployment enforcement
US20220188444A1 (en) Systems and methods for securing virtualized execution instances
US11645390B2 (en) Cloud-based method to increase integrity of a next generation antivirus (NGAV) security solution in a virtualized computing environment
EP2881883B1 (en) System and method for reducing load on an operating system when executing antivirus operations
Sun et al. Cloud armor: Protecting cloud commands from compromised cloud services
US20230106879A1 (en) Virtualized applications on managed virtual machines
WO2019209893A1 (en) Operating system on a computing system
US11928494B2 (en) Configuration techniques for managed virtual machines
US20230195881A1 (en) Virtual machines to install untrusted executable codes
Varadharajan et al. Integrated Security Architecture for Virtual Machines

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13897439

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13897439

Country of ref document: EP

Kind code of ref document: A1