METHOD, APPARATUS, TERMINAL, AND SERVER FOR SYNCHRONIZING TERMINAL MIRROR
    11.
    发明申请
    METHOD, APPARATUS, TERMINAL, AND SERVER FOR SYNCHRONIZING TERMINAL MIRROR 有权
    方法,装置,终端和用于同步终端镜的服务器

    公开(公告)号:US20150026293A1

    公开(公告)日:2015-01-22

    申请号:US14318900

    申请日:2014-06-30

    CPC classification number: H04L67/1095 G06F11/1464 G06F11/1484 G06F21/645

    Abstract: A method, an apparatus, a terminal, and a server for synchronizing a terminal mirror are provided. The method includes: obtaining, by a terminal, multiple input events during running of application software; aggregating the multiple input events to obtain an aggregate event; and transmitting the aggregate event to the server, so that after parsing the aggregate event to obtain the multiple input events, the server processes the multiple input events by using a virtual machine that is of the terminal and set on the server, so as to obtain user data generated during the running of the application software. In the present invention, the terminal transmits the input events to the server in an event-driven manner, so that the server obtains the user data that is the same as that on the terminal that runs the application software, thereby ensuring that the server can back up complete user data.

    Abstract translation: 提供了一种用于同步终端镜的方法,装置,终端和服务器。 该方法包括:在运行应用软件期间,由终端获取多个输入事件; 聚合多个输入事件以获得聚合事件; 并且将聚合事件发送到服务器,使得在分析聚合事件以获得多个输入事件之后,服务器通过使用终端并设置在服务器上的虚拟机来处理多个输入事件,以便获得 在应用软件运行期间生成的用户数据。 在本发明中,终端以事件驱动的方式将输入事件发送到服务器,使得服务器获得与运行应用软件的终端上相同的用户数据,从而确保服务器可以 备份完整的用户数据。

    Execution environment virtualization method and apparatus and virtual execution environment access method and apparatus

    公开(公告)号:US11321452B2

    公开(公告)日:2022-05-03

    申请号:US16043124

    申请日:2018-07-23

    Abstract: The present disclosure provides an execution environment virtualization method. The method includes: creating an ordinary virtual machine and a trusted virtual machine for a user in the ordinary execution environment, where the ordinary virtual machine executes an ordinary application of the user, and the trusted virtual machine executes a security application of the user; allocating memories to the ordinary virtual machine and the trusted virtual machine; establishing a mapping relationship between an ordinary memory of the ordinary virtual machine and a physical memory, to obtain a first memory mapping table; and establishing a mapping relationship between a virtual physical memory of the trusted virtual machine and a physical memory, to obtain a second memory mapping table. Therefore, the ordinary application and the security application run in execution environments independent of each other, thereby ensuring data security of the user.

    Method and apparatus for implementing virtual machine introspection

    公开(公告)号:US10007785B2

    公开(公告)日:2018-06-26

    申请号:US15199200

    申请日:2016-06-30

    Abstract: The present disclosure relates to the field of information technologies and discloses a method and an apparatus for implementing virtual machine introspection. The method provided in the present disclosure may further include: determining to-be-checked data in a virtual machine; starting to read the to-be-checked data, saving a copy of the read to-be-checked data, and storing a storage address of the read to-be-checked data in a hardware transactional memory, so that the hardware transactional memory is capable of monitoring the read to-be-checked data according to the storage address; when the read to-be-checked data is modified, stop reading the to-be-checked data, and delete the copy; and when reading the to-be-checked data is completed and it is not detected that the read to-be-checked data is modified, performing security check on the copy. The method can be applied to virtual machine introspection.

    Method and Apparatus for Implementing Virtual Machine Introspection
    15.
    发明申请
    Method and Apparatus for Implementing Virtual Machine Introspection 有权
    实现虚拟机内省的方法和装置

    公开(公告)号:US20160314297A1

    公开(公告)日:2016-10-27

    申请号:US15199200

    申请日:2016-06-30

    Abstract: The present disclosure relates to the field of information technologies and discloses a method and an apparatus for implementing virtual machine introspection. The method provided in the present disclosure may further include: determining to-be-checked data in a virtual machine; starting to read the to-be-checked data, saving a copy of the read to-be-checked data, and storing a storage address of the read to-be-checked data in a hardware transactional memory, so that the hardware transactional memory is capable of monitoring the read to-be-checked data according to the storage address; when the read to-be-checked data is modified, stop reading the to-be-checked data, and delete the copy; and when reading the to-be-checked data is completed and it is not detected that the read to-be-checked data is modified, performing security check on the copy. The method can be applied to virtual machine introspection.

    Abstract translation: 本公开涉及信息技术领域,并且公开了一种用于实现虚拟机内省的方法和装置。 本公开中提供的方法还可以包括:确定虚拟机中的待检查数据; 开始读取待检查的数据,保存读取的被检查数据的副本,以及将读取的被检查数据的存储地址存储在硬件事务存储器中,使得硬件事务存储器 能够根据存储地址监视读取的被检查数据; 当读取的被检查数据被修改时,停止读取待检查的数据,并删除副本; 并且当读取待检查数据完成并且未检测到读取的被检查数据被修改时,对拷贝执行安全性检查。 该方法可以应用于虚拟机内省。

    Data migration method and apparatus

    公开(公告)号:US11347542B2

    公开(公告)日:2022-05-31

    申请号:US16549861

    申请日:2019-08-23

    Abstract: The disclosure relates to the communications technologies field, and in particular, to a data migration method and apparatus, to implement data migration in an enclave page cache (EPC), to improve consistency between data of an application program before migration and that after migration. The method includes: obtaining, by a source host, a migration instruction, where the migration instruction is used to instruct to migrate a target application created with an enclave to a destination host; invoking, by the source host, a migration control thread preset in the enclave of the target application, to write running status data of the target application in an EPC into target memory of the source host, where the target memory is an area other than the EPC in memory of the source host; and sending, by the source host, the running status data of the target application in the target memory to the destination host.

    Data processing method and apparatus

    公开(公告)号:US10243933B2

    公开(公告)日:2019-03-26

    申请号:US15701148

    申请日:2017-09-11

    Abstract: A data processing method and apparatus, where the method includes acquiring a first network data packet that is sent by a target application that runs in an untrusted execution domain, where the first network data packet includes a first identifier; acquiring, in a trusted execution domain, first data corresponding to the first identifier; generating, in the trusted execution domain, a second network data packet according to the first data and the first network data packet; performing, in the trusted execution domain, encryption on the second network data packet by using a first session key to acquire an encrypted second network data packet; and sending the encrypted second network data packet to the target server. The data processing method and apparatus in the embodiments of the present invention can effectively prevent an attacker from stealing data.

    Isolation method for management virtual machine and apparatus

    公开(公告)号:US09971623B2

    公开(公告)日:2018-05-15

    申请号:US14795225

    申请日:2015-07-09

    Abstract: An isolation method for a management virtual machine and an apparatus, which resolves problems that performance of communication between service components is deteriorated, more resources are required for running a virtual machine, and security of the service components is relatively low. The method includes: acquiring a guest identifier; searching, according to the guest identifier, the management virtual machine for a kernel virtual machine; when the kernel virtual machine is not found in the management virtual machine, creating the kernel virtual machine in the management virtual machine; dividing a service provided for a guest virtual machine by the kernel virtual machine into multiple service components; and running the multiple service components in execution environments corresponding to permission of the service components, where the kernel virtual machine includes the multiple execution environments, and the multiple execution environment have different permission.

Patent Agency Ranking