CN103560948B - Communication means, equipment and system between virtual machine - Google Patents

Communication means, equipment and system between virtual machine Download PDF

Info

Publication number
CN103560948B
CN103560948B CN201310536118.1A CN201310536118A CN103560948B CN 103560948 B CN103560948 B CN 103560948B CN 201310536118 A CN201310536118 A CN 201310536118A CN 103560948 B CN103560948 B CN 103560948B
Authority
CN
China
Prior art keywords
virtual machine
machine
user
message
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310536118.1A
Other languages
Chinese (zh)
Other versions
CN103560948A (en
Inventor
田新雪
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201310536118.1A priority Critical patent/CN103560948B/en
Publication of CN103560948A publication Critical patent/CN103560948A/en
Application granted granted Critical
Publication of CN103560948B publication Critical patent/CN103560948B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

nullThe present invention provides the communication means between a kind of virtual machine、Equipment and system,Wherein,The method includes: the first physical machine is received by the first Microsoft Loopback Adapter and belongs to the message that the source virtual machine of first user sends,Heading includes source virtual machine the first identification information and target virtual machine the second identification information,Load the first key for first user configuration by the first Microsoft Loopback Adapter application is built-in to be encrypted,If the user's registration information of inquiry pre-stored judges that source virtual machine and target virtual machine are attributed to same user,Then according to the second identification information-enquiry routing iinformation, message is sent to the second physical machine,Second physical machine is according to the locally stored virtual machine user information of the second identification information-enquiry,Message is sent on the second Microsoft Loopback Adapter,So that the second Microsoft Loopback Adapter applies the first built-in double secret key message to be decrypted is sent to target virtual machine,Improve and belong to same user、And it is deployed in the safety of communication between the virtual machine in different physical machine.

Description

Communication means, equipment and system between virtual machine
Technical field
The present embodiments relate to communication technical field, particularly relate to the communication party between a kind of virtual machine Method, equipment and system.
Background technology
Along with virtual machine technology and the fast development of cloud treatment technology, in each physical machine in cloud storage Will dispose multiple stage virtual machine, each user can rent be deployed in different physical machine virtual as required Machine.In actual applications, Radix Angelicae Sinensis belong to same user and be deployed in the virtual machine in different physical machine it Between when needing to communicate, owing to communication message can add letting out of information in different physical machine Close property, in order to ensure to belong to same user and be deployed between the virtual machine in different physical machine logical Letter safety, needs the processing method of a kind of correspondence badly.
Summary of the invention
For the drawbacks described above of prior art, the embodiment of the present invention provides the communication party between a kind of virtual machine Method, equipment and system.
One aspect of the present invention provides the communication means between a kind of virtual machine, including:
First physical machine is received by the first Microsoft Loopback Adapter and belongs to the report that the source virtual machine of first user sends Literary composition, the heading of described message includes the first identification information of described source virtual machine and the of target virtual machine Two identification informations, the loading section of described message is applied the first built-in key by described first Microsoft Loopback Adapter Being encrypted, wherein, described first key is that virtual machine monitor is joined for described first user in advance Putting, wherein, described target virtual machine is not to be deployed in described first physical machine and belong to described The virtual machine of one user;
The user's registration information of described first physical machine inquiry pre-stored, if judging to know that described source is virtual Machine and described target virtual machine are attributed to same user, then prestore according to described second identification information-enquiry Described message is sent to second physical machine at described target virtual machine place by the routing iinformation of storage, for Described second physical machine according to the locally stored virtual machine user information of described second identification information-enquiry, Send the messages on the second Microsoft Loopback Adapter corresponding with described target virtual machine, so that described Message described in described first double secret key that two Microsoft Loopback Adapter application are built-in is sent to after being decrypted process Described target virtual machine.
Another aspect of the present invention provides the communication means between a kind of virtual machine, including:
Second physical machine receives the message that the first physical machine sends, and wherein, the heading of described message includes First identification information of source virtual machine and the second identification information of target virtual machine, the load portion of described message Divide and applied the first built-in key to be encrypted by the first Microsoft Loopback Adapter in described first physical machine, Wherein, described first key is that the virtual machine monitor first user in advance for described source virtual machine ownership is joined Putting, wherein, described message is that described first physical machine judges to obtain according to the user's registration information of pre-stored Know that described source virtual machine and described target virtual machine are sent to described second physical machine after being attributed to same user 's;
Described second physical machine is according to the locally stored virtual machine user of described second identification information-enquiry Information sends the messages on the second Microsoft Loopback Adapter corresponding with described target virtual machine, so that institute State after message described in described first double secret key that the second Microsoft Loopback Adapter application is built-in is decrypted process and send out Give described target virtual machine.
Another aspect of the invention provides a kind of first physical machine, including:
First receiver module, for receiving the source virtual machine belonging to first user by the first Microsoft Loopback Adapter The message sent, the heading of described message includes that the first identification information of described source virtual machine and target are empty Second identification information of plan machine, the loading section of described message is built-in by described first Microsoft Loopback Adapter application First key is encrypted, and wherein, described first key is that virtual machine monitor is in advance for described the One is user configured, and wherein, described target virtual machine is not to be deployed in described first physical machine and belong to Virtual machine in described first user;
First sending module, for inquiring about the user's registration information of pre-stored, if judging to know described source Virtual machine and described target virtual machine are attributed to same user, then according to described second identification information-enquiry Described message is sent to second physical machine at described target virtual machine place by the routing iinformation of pre-stored, For described second physical machine according to the locally stored virtual machine user of described second identification information-enquiry Information, sends the messages on the second Microsoft Loopback Adapter corresponding with described target virtual machine, so that After message described in described first double secret key that described second Microsoft Loopback Adapter application is built-in is decrypted process It is sent to described target virtual machine.
Further aspect of the present invention provides a kind of second physical machine, including:
Second receiver module, for receiving the message that the first physical machine sends, wherein, the report of described message Literary composition head includes the first identification information of source virtual machine and the second identification information of target virtual machine, described message Loading section by described first physical machine first Microsoft Loopback Adapter apply the first built-in key add Close process, wherein, described first key is that virtual machine monitor is in advance for the of described source virtual machine ownership One is user configured, and wherein, described message is that described first physical machine registers letter according to the user of pre-stored Breath judgement knows that described source virtual machine and described target virtual machine are sent to described the after being attributed to same user Two physical machine;
Second sending module, uses for the virtual machine locally stored according to described second identification information-enquiry Family information sends the messages on the second Microsoft Loopback Adapter corresponding with described target virtual machine, so that After message described in described first double secret key that described second Microsoft Loopback Adapter application is built-in is decrypted process It is sent to described target virtual machine.
Another aspect of the invention provides the communication system between a kind of virtual machine, including: above-mentioned first Physical machine and the second physical machine.
Communication means, equipment and system between the virtual machine that the embodiment of the present invention provides, the first physics Machine is received by the first Microsoft Loopback Adapter and belongs to the message that the source virtual machine of first user sends, this message Heading include the first identification information of source virtual machine and the second identification information of target virtual machine, should The loading section of message is applied the first built-in key to be encrypted by the first Microsoft Loopback Adapter, and this is the years old One key is that virtual machine monitor configures for first user in advance, and then the first physical machine inquiry prestores The user's registration information of storage, if judging to know that source virtual machine and target virtual machine are attributed to same user, Then according to the routing iinformation of the second identification information-enquiry pre-stored, message is sent to target virtual machine institute The second physical machine, the second physical machine is used according to the locally stored virtual machine of the second identification information-enquiry Family information, is sent to message on the second Microsoft Loopback Adapter corresponding with target virtual machine, so that second is empty Intending network interface card applies the first built-in double secret key message to be sent to target virtual machine after being decrypted process.From And improve and belong to same user and be deployed in the peace of communication between the virtual machine in different physical machine Quan Xing, it is to avoid message is attacked by malicious user through different physical machine.
Accompanying drawing explanation
The flow chart of the communication means between a kind of virtual machine that Fig. 1 provides for the embodiment of the present invention;
The flow chart of the communication means between the another kind of virtual machine that Fig. 2 provides for the embodiment of the present invention;
The structural representation of first physical machine that Fig. 3 provides for the embodiment of the present invention;
The structural representation of second physical machine that Fig. 4 provides for the embodiment of the present invention;
The structural representation of the communication system between a kind of virtual machine that Fig. 5 provides for the embodiment of the present invention.
Detailed description of the invention
The flow chart of the communication means between a kind of virtual machine that Fig. 1 provides for the embodiment of the present invention, such as figure Shown in 1, the method includes:
Step 100, the source that the first physical machine belongs to first user by the first Microsoft Loopback Adapter reception is virtual The message that machine sends, the heading of described message includes the first identification information and the target of described source virtual machine Second identification information of virtual machine, the loading section of described message is built-in by described first Microsoft Loopback Adapter application The first key be encrypted, wherein, described first key is that virtual machine monitor is in advance for described First user configuration, wherein, described target virtual machine is not to be deployed in described first physical machine and return Belong to the virtual machine of described first user;
The all virtual machines configuration correspondence rented in the first physical machine for first user in the first physical machine The first Microsoft Loopback Adapter, the first Microsoft Loopback Adapter has prestored and has been deployed in the first physical machine and belongs to The identification information of all virtual machines of first user, this first Microsoft Loopback Adapter is deployed in the first thing for process On reason machine and belong to the communication interaction between the virtual machine of first user and other virtual machines.
Specifically, need and target virtual machine when the source virtual machine belonging to first user in the first physical machine When communicating mutual, then sending message to the first corresponding Microsoft Loopback Adapter, the heading of this message includes First identification information of source virtual machine and the second identification information of target virtual machine, the first Microsoft Loopback Adapter receives After the message that source virtual machine sends, the portion prestored according to the second identification information-enquiry of target virtual machine Affix one's name in the first physical machine and belong to the identification information of all virtual machines of first user, if judging to know Do not comprise the second identification information of target virtual machine, it is determined that target virtual machine is not to be deployed in the first physics On machine and belong to the virtual machine of first user, then target virtual machine may be for being deployed in other physical machine Go up and be attributed to the virtual machine of first user, or for being deployed in the first physical machine or other physical machine Upper and belong to the virtual machine of other users, now, the first Microsoft Loopback Adapter application built-in, virtual machine prison The loading section of first this message of double secret key that visual organ configures for first user in advance is encrypted, and Message after encryption is sent to the first physical machine.
After it should be noted that the first Microsoft Loopback Adapter receives the message that source virtual machine sends, empty according to target What the second identification information-enquiry of plan machine prestored is deployed in the first physical machine and belongs to first user The identification information of all virtual machines, if judging to know the second identification information wherein comprising target virtual machine, Then determine that target virtual machine is also the virtual machine being deployed in the first physical machine and belonging to first user, source Communication between virtual machine from target virtual machine requires no different physical machine, and the probability divulged a secret is relatively low, First Microsoft Loopback Adapter directly forwards the packet to target virtual machine, is no longer encrypted, this part It not the technical problem to be solved in the present invention, only make a brief description illustratively.
Step 101, the user's registration information of described first physical machine inquiry pre-stored, if judging to know institute State source virtual machine and described target virtual machine is attributed to same user, then look into according to described second identification information Described message is sent to second physical machine at described target virtual machine place by the routing iinformation asking pre-stored, Believe according to the virtual machine user that described second identification information-enquiry is locally stored for described second physical machine Breath, sends the messages on the second Microsoft Loopback Adapter corresponding with described target virtual machine, so that described Message described in described first double secret key that second Microsoft Loopback Adapter application is built-in is sent to institute after being decrypted process State target virtual machine.
It is empty that first physical machine carries out resolving the source in heading that obtains to the message received by the first Microsoft Loopback Adapter First identification information of plan machine and the second identification information of target virtual machine, then inquire about the user of pre-stored Log-on message, wherein, user's registration information include that each user rented all of, be deployed in each The identification information of the virtual machine in physical machine, if the first physical machine judges to know source virtual machine and destination virtual Machine is attributed to same user, then believe according to the route of the second identification information-enquiry pre-stored of target virtual machine Breath knows the IP address for second physical machine corresponding with the second identification information of target virtual machine, then root According to the IP address of the second physical machine, the message after encryption is sent to the second physical machine.
After second physical machine receives the message that the first physical machine sends, according to target virtual machine in heading The locally stored virtual machine user information of the second identification information-enquiry know the second mark with target virtual machine What knowledge information was corresponding is the identification information of the second Microsoft Loopback Adapter, and then the second physical machine is according to the second virtual net This message is sent on the second Microsoft Loopback Adapter corresponding with target virtual machine by the identification information of card.Due to source Virtual machine and target virtual machine are attributed to same user, i.e. target virtual machine and are also attributed to first user, then Second Microsoft Loopback Adapter is rent in the second physical machine for first user in the second physical machine all virtual The Microsoft Loopback Adapter of the corresponding configuration of machine, being built-in with virtual machine monitor in the second Microsoft Loopback Adapter is first in advance User configured first key, the function of the second Microsoft Loopback Adapter and the work of the first Microsoft Loopback Adapter in above-mentioned steps With identical, here is omitted.Thus when the second Microsoft Loopback Adapter receives the encryption that the second physical machine sends Message after, apply built-in this message of the first double secret key to be decrypted process, and by after decryption processing Message is sent to target virtual machine.
Communication means between the virtual machine that the embodiment of the present invention provides, the first physical machine is virtual by first Network interface card receives and belongs to the message that the source virtual machine of first user sends, and the heading of this message includes that source is empty First identification information of plan machine and the second identification information of target virtual machine, the loading section of this message is by One Microsoft Loopback Adapter applies the first built-in key to be encrypted, and this first key is virtual machine monitor In advance for first user configuration, the then user's registration information of the first physical machine inquiry pre-stored, if sentencing Break and know that source virtual machine and target virtual machine are attributed to same user, then pre-according to the second identification information-enquiry Message is sent to second physical machine at target virtual machine place, the second physical machine root by the routing iinformation of storage According to the virtual machine user information that the second identification information-enquiry is locally stored, message is sent to and destination virtual On the second Microsoft Loopback Adapter that machine is corresponding, so that the second Microsoft Loopback Adapter applies the first built-in double secret key message to enter It is sent to target virtual machine after row decryption processing.Thus improve and belong to same user and be deployed in not With the safety of communication between the virtual machine in physical machine, it is to avoid message is through different physical machine quilt malice User attacks.
The flow chart of the communication means between the another kind of virtual machine that Fig. 2 provides for the embodiment of the present invention, as Shown in Fig. 2, the method includes:
Step 200, the second physical machine receives the message that the first physical machine sends, wherein, described message Heading includes the first identification information of source virtual machine and the second identification information of target virtual machine, described report The loading section of literary composition is applied the first built-in key to carry out by the first Microsoft Loopback Adapter in described first physical machine Encryption, wherein, described first key is that virtual machine monitor belongs to for described source virtual machine in advance First user configuration, wherein, described message is that described first physical machine is registered according to the user of pre-stored It is described that information judges to know that described source virtual machine and described target virtual machine are sent to after being attributed to same user Second physical machine;
Step 201, described second physical machine is according to locally stored virtual of described second identification information-enquiry Machine user profile sends the messages on the second Microsoft Loopback Adapter corresponding with described target virtual machine, with Described second Microsoft Loopback Adapter is made to apply message described in built-in described first double secret key to send out after being decrypted process Give described target virtual machine.
In communication means between the virtual machine that the present embodiment provides, the concrete handling process of each step, permissible Seeing the embodiment of the method shown in above-mentioned Fig. 1, it is similar with technique effect that it realizes principle, the most superfluous State.
One of ordinary skill in the art will appreciate that: realize all or part of step of said method embodiment Can be completed by the hardware that programmed instruction is relevant, aforesaid program can be stored in a computer-readable Taking in storage medium, this program upon execution, performs to include the step of said method embodiment;And it is aforementioned Storage medium include: various Jie that can store program code such as ROM, RAM, magnetic disc or CD Matter.
The structural representation of first physical machine that Fig. 3 provides for the embodiment of the present invention, such as Fig. 3 institute Showing, this first physical machine includes: the first receiver module 11 and the first sending module 12, wherein, and first Receiver module 11 for receiving what the source virtual machine belonging to first user sent by the first Microsoft Loopback Adapter Message, the heading of described message includes the first identification information of described source virtual machine and target virtual machine Second identification information, the loading section of described message is applied built-in first close by described first Microsoft Loopback Adapter Key is encrypted, and wherein, described first key is that virtual machine monitor is in advance for described first user Configuration, wherein, described target virtual machine be not be deployed in described first physical machine and belong to described The virtual machine of first user;First sending module 12 is used for inquiring about the user's registration information of pre-stored, if Judge to know that described source virtual machine and described target virtual machine are attributed to same user, then according to described second Described message is sent to the of described target virtual machine place by the routing iinformation of identification information-enquiry pre-stored Two physical machine, for described second physical machine according to locally stored virtual of described second identification information-enquiry Machine user profile, sends the messages on the second Microsoft Loopback Adapter corresponding with described target virtual machine, So that after described second Microsoft Loopback Adapter applies message described in built-in described first double secret key to be decrypted process It is sent to described target virtual machine.
In the first physical machine that the present embodiment provides, the function of each module and handling process, may refer to above-mentioned Embodiment of the method shown in Fig. 1, it is similar with technique effect that it realizes principle, and here is omitted.
The structural representation of second physical machine that Fig. 4 provides for the embodiment of the present invention, such as Fig. 4 institute Showing, this second physical machine includes: the second receiver module 21 and the second sending module 22, wherein, and second Receiver module 21 is for receiving the message that the first physical machine sends, wherein, the heading bag of described message Include the first identification information of source virtual machine and the second identification information of target virtual machine, the load of described message Part is applied the first built-in key to be encrypted by the first Microsoft Loopback Adapter in described first physical machine Reason, wherein, described first key is that virtual machine monitor is in advance for the first use of described source virtual machine ownership Family configuration, wherein, described message is that described first physical machine is sentenced according to the user's registration information of pre-stored Break and know that described source virtual machine and described target virtual machine are sent to described second thing after being attributed to same user Reason machine;Second sending module 22 is for according to locally stored virtual of described second identification information-enquiry Machine user profile sends the messages on the second Microsoft Loopback Adapter corresponding with described target virtual machine, with Described second Microsoft Loopback Adapter is made to apply message described in built-in described first double secret key to send out after being decrypted process Give described target virtual machine.
In the second physical machine that the present embodiment provides, the function of each module and handling process, may refer to above-mentioned Embodiment of the method shown in Fig. 2, it is similar with technique effect that it realizes principle, and here is omitted.
The structural representation of the communication system between a kind of virtual machine that Fig. 5 provides for the embodiment of the present invention, As it is shown in figure 5, this system includes: the first physical machine 1 and the second physical machine 2, wherein, the first physics The first physical machine that machine 1 and the second physical machine 2 provide for the above embodiment of the present invention and the second physical machine.
The function of each module and handling process in communication system between the virtual machine that the present embodiment provides, can To see above-mentioned shown embodiment of the method, it is similar with technique effect that it realizes principle, the most superfluous State.
Last it is noted that above example is only in order to illustrate technical scheme, rather than right It limits;Although the present invention being described in detail with reference to previous embodiment, this area common Skilled artisans appreciate that the technical scheme described in foregoing embodiments still can be repaiied by it Change, or wherein portion of techniques feature is carried out equivalent;And these amendments or replacement, not The essence making appropriate technical solution departs from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (5)

1. the communication means between a virtual machine, it is characterised in that including:
First physical machine is received by the first Microsoft Loopback Adapter and belongs to the report that the source virtual machine of first user sends Literary composition, the heading of described message includes the first identification information of described source virtual machine and the of target virtual machine Two identification informations, the loading section of described message is applied the first built-in key by described first Microsoft Loopback Adapter Being encrypted, wherein, described first key is that virtual machine monitor is joined for described first user in advance Putting, wherein, described target virtual machine is not to be deployed in described first physical machine and belong to described The virtual machine of one user;
The user's registration information of described first physical machine inquiry pre-stored, if judging to know described source virtual machine It is attributed to same user, then according to described second identification information-enquiry pre-stored with described target virtual machine Described message is sent to second physical machine at described target virtual machine place by routing iinformation, for described Two physical machine are according to the locally stored virtual machine user information of described second identification information-enquiry, by described report Literary composition is sent on the second Microsoft Loopback Adapter corresponding with described target virtual machine, so that described second Microsoft Loopback Adapter Message described in built-in described first double secret key is applied to be sent to described destination virtual after being decrypted process Machine;Wherein, that described user's registration information includes that each user rented is all of, be deployed in each thing The identification information of the virtual machine on reason machine.
2. the communication means between a virtual machine, it is characterised in that including:
Second physical machine receives the message that the first physical machine sends, and wherein, the heading of described message includes First identification information of source virtual machine and the second identification information of target virtual machine, the load portion of described message Divide and applied the first built-in key to be encrypted by the first Microsoft Loopback Adapter in described first physical machine, Wherein, described first key is that the virtual machine monitor first user in advance for described source virtual machine ownership is joined Putting, wherein, described message is that described first physical machine judges to obtain according to the user's registration information of pre-stored Know that described source virtual machine and described target virtual machine are sent to described second physical machine after being attributed to same user 's;
Described second physical machine is according to the locally stored virtual machine user information of described second identification information-enquiry Send the messages on the second Microsoft Loopback Adapter corresponding with described target virtual machine, so that described second Message described in described first double secret key that Microsoft Loopback Adapter application is built-in is sent to described mesh after being decrypted process Mark virtual machine;Wherein, that described user's registration information includes that each user rented is all of, be deployed in The identification information of the virtual machine in each physical machine.
3. a physical machine, it is characterised in that including:
First receiver module, for receiving the source virtual machine belonging to first user by the first Microsoft Loopback Adapter The message sent, the heading of described message includes that the first identification information of described source virtual machine and target are empty Second identification information of plan machine, the loading section of described message is built-in by described first Microsoft Loopback Adapter application First key is encrypted, and wherein, described first key is that virtual machine monitor is in advance for described the One is user configured, and wherein, described target virtual machine is not to be deployed in described first physical machine and belong to Virtual machine in described first user;
First sending module, for inquiring about the user's registration information of pre-stored, if judging to know that described source is empty Plan machine and described target virtual machine are attributed to same user, then prestore according to described second identification information-enquiry Described message is sent to second physical machine at described target virtual machine place by the routing iinformation of storage, for institute State the second physical machine according to the locally stored virtual machine user information of described second identification information-enquiry, by institute State message to be sent on the second Microsoft Loopback Adapter corresponding with described target virtual machine, so that described second virtual Message described in described first double secret key that network interface card application is built-in is sent to described target after being decrypted process empty Plan machine;Wherein, that described user's registration information includes that each user rented is all of, be deployed in each The identification information of the virtual machine in physical machine.
4. a physical machine, it is characterised in that including:
Second receiver module, for receiving the message that the first physical machine sends, wherein, the report of described message Literary composition head includes the first identification information of source virtual machine and the second identification information of target virtual machine, described message Loading section by described first physical machine first Microsoft Loopback Adapter apply the first built-in key add Close process, wherein, described first key is that virtual machine monitor is in advance for the of described source virtual machine ownership One is user configured, and wherein, described message is that described first physical machine registers letter according to the user of pre-stored Breath judgement knows that described source virtual machine and described target virtual machine are sent to described the after being attributed to same user Two physical machine;
Second sending module, for the virtual machine user locally stored according to described second identification information-enquiry Information sends the messages on the second Microsoft Loopback Adapter corresponding with described target virtual machine, so that described Message described in described first double secret key that second Microsoft Loopback Adapter application is built-in is sent to institute after being decrypted process State target virtual machine;Wherein, described user's registration information includes all of, the portion that each user is rented The identification information of administration's virtual machine in each physical machine.
5. the communication system between a virtual machine, it is characterised in that including: such as claim 3 institute The first physical machine stated, and the second physical machine as claimed in claim 4.
CN201310536118.1A 2013-11-01 2013-11-01 Communication means, equipment and system between virtual machine Active CN103560948B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310536118.1A CN103560948B (en) 2013-11-01 2013-11-01 Communication means, equipment and system between virtual machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310536118.1A CN103560948B (en) 2013-11-01 2013-11-01 Communication means, equipment and system between virtual machine

Publications (2)

Publication Number Publication Date
CN103560948A CN103560948A (en) 2014-02-05
CN103560948B true CN103560948B (en) 2016-11-02

Family

ID=50015100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310536118.1A Active CN103560948B (en) 2013-11-01 2013-11-01 Communication means, equipment and system between virtual machine

Country Status (1)

Country Link
CN (1) CN103560948B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109525477A (en) * 2018-09-30 2019-03-26 华为技术有限公司 Communication means, device and system in data center between virtual machine
CN109412951B (en) 2018-10-12 2021-06-22 华为技术有限公司 Method and device for sending routing information
CN113162835B (en) * 2021-02-26 2022-08-09 北京百度网讯科技有限公司 Method, device, equipment and storage medium for accessing service resource

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571698A (en) * 2010-12-17 2012-07-11 ***通信集团公司 Access authority control method, system and device for virtual machine
CN103023920A (en) * 2012-12-27 2013-04-03 华为技术有限公司 Virtual machine safety protection method and virtual machine safety protection device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571698A (en) * 2010-12-17 2012-07-11 ***通信集团公司 Access authority control method, system and device for virtual machine
CN103023920A (en) * 2012-12-27 2013-04-03 华为技术有限公司 Virtual machine safety protection method and virtual machine safety protection device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
跨域虚拟机加密通信技术方案设计与实现;李小伟;《硕士学位论文》;20121220;第3.1.2节第29页至第30页,第4.2.3节第37页 *

Also Published As

Publication number Publication date
CN103560948A (en) 2014-02-05

Similar Documents

Publication Publication Date Title
CN105591926B (en) A kind of flow rate protecting method and device
CN105007577B (en) A kind of virtual SIM card parameter management method, mobile terminal and server
WO2018050081A1 (en) Device identity authentication method and apparatus, electric device, and storage medium
CN103795798B (en) Mobile phone checking-in method
CN103532985B (en) Communication means, equipment and system between virtual machine
US9031535B2 (en) Un-ciphered network operation solution
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
US9372987B1 (en) Apparatus and method for masking a real user controlling synthetic identities
EP2441205A2 (en) Key management in secure network enclaves
CN101507235A (en) Method and arrangement for provision of a wire-free mesh network
CN105933353A (en) Method and system for realizing secure login
WO2010144373A2 (en) Discovery of secure network enclaves
JP2008099267A (en) Method for securing session between wireless terminal and equipment in network
CN105763318B (en) A kind of wildcard obtains, distribution method and device
CN106789834A (en) Method, gateway, PCRF network elements and system for identifying user identity
CN104702575B (en) A kind of account management method, management platform and system
CN102970228B (en) A kind of message transmitting method based on IPsec and equipment
CN101039181B (en) Method for preventing service function entity of general authentication framework from attack
CN104247485A (en) Network application function authorisation in a generic bootstrapping architecture
CN103560948B (en) Communication means, equipment and system between virtual machine
CN104767766A (en) Web Service interface verification method, Web Service server and client
CN105992206B (en) A kind of method, apparatus and system of enterprise security manager
WO2017210914A1 (en) Method and apparatus for transmitting information
CN106465117B (en) Method, device and communication system for accessing terminal to communication network
CN105471577A (en) Anti-leakage key encryption method based on 3D modeling

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant