Method for virtualizing a personal working environment and device for the same

ABSTRACT

The present invention is directed to a method for virtualizing a personal working environment and a device for the same, relating to the information security field. The method comprises the steps of: installing a Virtual Machine (VM) environment on a device; upon virtualizing the personal working environment, connecting the device to a host, loading the VM environment into the host; and responding to a user operation and saving data of the user operation to the device by the VM environment. The device comprises a communication interface module, a VM environment storage module, and a control module. The present invention provides a means for secure and convenient mobile work.

FIELD OF THE PRESENT INVENTION

The present invention relates to the field of information security, andmore particularly, to a method for virtualizing a personal workingenvironment and a device for the same.

BACKGROUND OF THE PRESENT INVENTION

As e-business develops fast, working is increasingly dependent oncomputers and the network in business affairs. And applications, such asMS Office, electronic mailbox, chat tools, and forums, are frequentlyused for work.

The requirements for security of information boost development of theinformation security device, which is a portable and removable hardwaredevice. The small-sized information security device contains a processorand a storage unit. It can be connected to a host via a datacommunication interface of the host. Typically, the processor takesadvantage of a security-designed chip, so that the so-called keygeneration, key security storage, and preset cryptographic algorithmsare implemented through its built-in security mechanism. Additionally,sensitive information, like passwords and certificates, can be stored inthe information security device to guarantee security or prevent it frombeing forgotten. Operations relating to keys are fully performed insidethe information security device. Moreover, the information securitydevice is an anti-attack device. Generally, the information securitydevice is connected to a host via a USB (Universal Serial Bus)interface, so that the information security device is also called theUSB key or the USB token. At this time, the advanced informationsecurity device is programmable, in other words, the previously storedcode can be executed in the information security device.

In addition to capabilities of common embedded microcontrollers, thesecurity-designed chip also incorporates security. Special processingrelating to security is applied to the architecture of thesecurity-designed chip during its design phase. For example, thesecurity-designed chip employs a specific security kernel, whichprovides supports for multiple states with different right definitions,so as to implement management of access to hardware resources, supportfor randomization of instruction execution time (i.e. instructioncycle), support for switch of chip states through its interrupt system,so as to implement control over different levels of security to supportmulti-applications. In addition, the kernel may also contain a MMU(Memory Management Unit) for separating logic addresses from physicaladdresses and mapping addresses, providing supports for theimplementation of application (or multi-applications) and security fromthe architecture and forming a hardware firewall along with thedifferent states. The interrupt system can also support passing andswitching of interfaces and privileges for system databases and userprograms. The security-designed chip can be equipped with a non-volatilememory as its storage medium. Generally, the security-designed chipcomplies with some standards or is certified by authorities to guaranteeits security. These standards and certification include, for example,TCG TPM v1.2, ISO15408, and certain standards of China PasswordAdministration Committee. One of the commercially availablesecurity-designed chips is ST19WP18 from STMicroelectronics has beensuccessfully certified by EAL5+(Common Criteria Evaluation AssuranceLevel 5 plus), which is one of the highest levels for this kind ofproducts in ISO15408 standard.

In view of the features of the information security device, theinformation security device has been widely applied to identityauthentication, online banking and VPN (Virtual Private Network) inrecent years. The information security device can also be used toencrypt or decrypt data stored in it for the purpose of softwareprotection. In addition, the information security device can be used forthe so-called data interaction (encrypting data written in or decryptingdata read out), identify authentication information processing,storing/verifying passwords, storing/verifying signatures,storing/verifying certificates, access control, and data operation onpreset code, etc. In particular, the preset code may be a preset usersoftware fragment, which cannot be read outside the information securitydevice and can only be operated within the device, and a preset softwareprotection application interface function, which is an interface-levelfunction between the information security device and the softwaredeveloper application, etc.

CDs, hard disks, and mass storage devices are easy to use with theautorun function. In general, programs that can be executedautomatically are called autorun programs. The system is notified ofwhich program is to be executed and which its path is by an autorunprogram, so that the program is executed automatically. When a CD withan autorun program is inserted into or a mass storage device with anautorun program is connected to a host system, the autorun program willautomatically load a relevant file, such as a .exe (executable) file, a.reg (registry) file, a .GIF file, a .HTML file, a .PDF file, etc.,because the autorun program contains commands (for changing drive icon,executing a program, etc.) to be executed automatically.

The Virtual Machine (VM) is a virtualized “computer” by its literalmeaning. The virtualized “computer” is almost just like a real computer,except that its hard disk is virtualized from within a file. Therefore,the settings of the VM can be modified in any way, without tampering thecomputer itself. The VM is a system that supports multiple operatingsystems running in parallel on a single physical server, thus providingmore efficient use of lower level hardware. In the VM, the CentralProcessing Unit (CPU) chip assigns a memory area from other segments ofthe system and the operating system and applications run in a protectedmode. The client operating system and applications can run on the VM,without support by a network adapter.

The working environment herein refers to all application programs andapplication environments needed in work, such as popular work softwarelike Microsoft Office (including Word, Excel, Powerpoint) and Outlook,chat applications like MSN and QQ, and personal preferences like abrowser application, etc.

Generally, people build a personal working environment, set logonpasswords for applications, save private files etc. in their computerfor carrying out their work. However, it is no longer for this manner tomeet the needs now for the security and convenience. When workingoutside the office or at home, people have to remember many passwordsfor their mailboxes, or instant communication tools, such as MSN and QQ.And the classic websites cannot be retrieved by the working computerversus the one that is located at the office. Moreover, personal privatefiles or other confidential files cannot be saved securely on computersother than the office computers. It is also possible that personalaccounts for applications and associated data of the owner of theaccounts and even those of his friends are hacked by hard drive analysisor logging in as Administrator or the owner's role and resettingpasswords, on a computer with which the owner does not have fullcontrol.

SUMMARY OF THE PRESENT INVENTION

To create a more secure and convenient working environment, the presentinvention provides a method for virtualizing a personal workingenvironment and a device for the same. The technical solution is asfollows:

a method for virtualizing a personal working environment, the methodcomprising the steps of:

installing a Virtual Machine (VM) environment on a device;

upon virtualizing the personal working environment, connecting thedevice to a host, and loading the VM environment into the host; and

responding to a user operation and saving data of the user operation tothe device by the VM environment.

The step of installing the VM environment on the device comprisesstoring a VM program and a VM data file on the device.

The step of storing the VM program and the VM data file on the devicefurther comprises the step of:

encrypting the VM data file with an encryption algorithm in the device,and storing the encrypted VM data file in the device; and

accordingly, loading the VM environment into the host further comprisesthe step of:

decrypting the encrypted VM data file with a decryption algorithmassociated with the encryption algorithm in the device and loading theVM environment into the host with the decrypted VM data file.

Loading the VM environment into the host is conducted through an autorunfunction.

Before loading the VM environment into the host, the method furtherincludes the step of:

authenticating a user, and allowing the following loading process inresponse to a positive result, or terminating it in response to anegative result.

After loading the VM environment into the host, the method furtherincludes the step of:

starting a monitor program on the host, and automatically unloading theVM environment if the monitor program detects that the device isdisconnected with the host.

The user operation is a mobile work operation.

The device is an information security device, and the user operation isat least one of a mobile work operation and an information securityoperation.

A device for virtualizing a personal working environment, the devicecomprising:

a communication interface module for connecting the device with a host;

a Virtual Machine (VM) environment storage module for storing a VMprogram and a VM data file, and storing data relating to operationsperformed by a user in a virtualized working environment; and the VMdata file comprising virtual operating system parameters; and

a control module for controlling communications between thecommunication interface module and the host, and virtualization of thepersonal working environment in the host by the VM environment storagemodule.

The device further comprises an information security module forperforming an information security operation under control of thecontrol module.

Specially, the information security module performs an informationsecurity operation in the personal working environment virtualized bythe control module and the VM environment storage module.

The information security module can be integrated with at least one ofthe communication interface module, the VM environment storage moduleand the control module on a chip.

The chip is a security-designed chip which includes a smart card chip.

The device further comprises:

an encryption module for encrypting the VM data file with an encryptionalgorithm in the device under control of the control module, when the VMenvironment storage module stores the VM data file; and

a decryption module for decrypting the VM data file encrypted by theencryption module with a decryption algorithm relating to the encryptionalgorithm in the device under control of the control module, beforevirtualization of the personal working environment by the control moduleand the VM environment storage module in the host.

The device further comprises:

an autorun module for automatically loading the VM program and the VMdata file stored by the VM environment storage module into the hostunder control of the control module, after the device is connected withthe host.

The control module can be integrated with at least one of thecommunication interface module, the VM environment storage module andthe autorun module on a chip.

The device further comprises a monitor module for starting a monitorprogram to automatically unload the VM environment if the monitorprogram detects that the device is disconnected with the host undercontrol of the control module after virtualization of the personalworking environment by the control module and the VM environment storagemodule in the host.

The communication interface module comprises at least one of a UniversalSerial Bus (USB) interface, an IEEE 1394 interface, a SATA (SerialAdvanced Technology Attachment) interface, a Bluetooth interface, aninfrared interface, and a Radio Frequency (RF) interface.

The VM environment storage module is a mass storage element.

The VM environment storage module can be integrated with the informationsecurity module in a mass storage element.

The VM environment storage module can be integrated with the autorunmodule in a mass storage element.

The mass storage element is a flash memory, a micro drive, or a smartcard.

The device is a key-ring style, handheld, or wrist portable device.

By loading a predetermined VM environment from a device to a host, apreferred personal working environment can be virtualized in differentcomputers, and no operation can be traced in the computers if all useroperations are performed in the virtualized working environment.Therefore, the security is increased to the user. In addition, storageof the VM environment in the device eases use of personal workingenvironment and mobile work. If the device is an information securitydevice, all information security associated operations can be applied tothe virtualized working environment to improve the security andconvenience.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention may be further understood from the followingdescription in conjunction with the appended drawings. In the drawings:

FIG. 1 is a flow diagram of a method for virtualizing a personal workingenvironment in Embodiment 1 according to the present invention;

FIG. 2 is a block diagram of a device for virtualizing a personalworking environment in Embodiment 2 according to the present invention;and

FIG. 3 is a block diagram of a preferred device for virtualizing apersonal working environment in Embodiment 2 according to the presentinvention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The present invention is further described with the embodiments and thedrawings below.

Embodiment 1

Referring to FIG. 1, the embodiment provides a method for virtualizing apersonal working environment. The method comprises the following steps.

Step 101: Install a Virtual Machine (VM) environment in a device (i.e.store a VM program and a VM data file), and set a VM environment.

Typically, the VM program is an executable program. A VM program relatesto one or more VM data files. It is possible to implement severaloperating systems in a device with several VM data files, if sufficientmemory space is available. The VM environment in a device can be setusing Vmware, Bochs, and Kqemu etc.

The VM environment can be a VM environment without any operating systemsand applications. When it has been loaded into a host, the user willinstall operating systems and applications as required. In addition, theVM environment can also be a VM environment with basic configurations(e.g. which are set by the developer). In other words, the VMenvironment can be installed with operating systems, such as Windows 98,Windows 2000, Windows XP, and Linux, with basic applications, such asMicrosoft Office (Word, Excel, and Powerpoint, etc.), and/or with amailing system, such as Foxmail or Outlook, etc.

Step 102: Upon virtualizing a personal working environment, connect thedevice with a host.

The device can be wiredly connected with the host, for example, througha Universal Serial Bus (USB) interface, an IEEE 1394 interface or a SATA(Serial Advanced Technology Attachment) interface, or wirelesslyconnected with the host, for example, through a wireless Bluetoothinterface, an infrared interface or a Radio Frequency (RF) interface,etc.

Further, the user can be authenticated by the host. The host verifies ifthe user is the legitimate holder of the device. The PIN (PersonalIdentity Number) code or biometrics can be used for verifying the user.If the result is positive, the following operations are allowed.Otherwise, they can not be performed.

Step 103: Load the VM environment from the device to the host.

The process of loading the VM environment can be done using an autorunprogram. In particular, start an autorun program on the host, whichautomatically parses a VM program and a VM data file previously storedin the device, and loads the VM program in accordance with the virtualoperating system parameters in the VM data file to the host. The VMprogram then runs and starts a VM environment.

Step 104: The VM environment provides a user interface and a personalworking environment.

Step 105: The VM environment responds to a user operation and saves dataof the user operation to the device.

The user operation can be a mobile work operation, such as installing anapplication (e.g. a Kingsoft digital dictionary, a music player,Photoshop or QQ), or specially using the application, etc.

The device can be a storage device (e.g. a USB flash disk) or aninformation security device. If the device is an information securitydevice, the user operation can also be an information securityoperation. Accordingly, the VM environment can respond to theinformation security operation. The process of performing an informationsecurity operation by a user is the same as on a real computer, exceptthat the operation is performed on the virtual space on the mass storageelement of the information security device, and no trail is left on thehost for the operation. The information security operations that can beperformed in the virtual working environment can be those as follows.

1. A Data Interaction Operation

For example, encryption of data of the user operation or decryption ofdata of the user operation in the information security device.

2. An Authentication Information Processing Operation

For example, control of user access to a network in the VM environmentby verifying the hardware information or user authentication informationcontained in the information security device; verification orauthentication of digital signatures or certificates identifying thefile sender in the VM environment to prevent data from being tampered incommunication process; verification of legitimacy of logon to a website(e.g. a banking website) from a remote VM environment with a signature;and addition of access control information to certain files to preventillegitimate access to or use of the information security device fromthe VM environment.

3. A Code Transfer Operation

For example, transfer of a user software segment, and a softwareprotection application interface function, etc. The user softwaresegment cannot be read out of the information security device, and canonly be executed within the information security device to interact withother external segments through the VM environment, so that the softwareis legitimately used. Use of the application interface function can openthe information security device, establish a communication session,close the information security device and clear device statusinformation, or configure all settings for the information securitydevice through the VM environment, thus implementing all softwareprotection functions through the VM environment. The protected codesegment does not go into the VM environment, so that the software isprotected from duplicates without permission of the developer.

Step 106: Close the VM environment in the host and disconnect the deviceupon completion of the user operation.

The VM data file can be encrypted and decrypted to further improve thesecurity in the process. The VM data file can be encrypted with anencryption algorithm in the device before storing the file in thedevice. The encrypted file can be decrypted with a decryption algorithmrelating to the encryption algorithm in the device before loading the VMenvironment into the host with the VM data file.

For example, the encryption algorithm is DES, 3DES, RC4, RC5, RSA, DSA,or ECC.

To prevent abnormal removal of the device and thus result in that the VMenvironment cannot be uninstalled completely, start a monitor program inthe host, which will automatically unload the VM environment if itdetects that the device is directly disconnected with the host while theVM environment has not already been closed (i.e. abnormal removal of thedevice), after loading the VM environment from the device to the host atStep 103.

Embodiment 2

Referring to FIG. 2, the embodiment provides a device 200 forvirtualizing a personal working environment. The device comprises thefollowing modules.

1) A communication interface module 201 for connecting the device with ahost.

The communication interface module 201 is used to connect the devicewith a host by parsing the communication protocol between the device andthe host. It can be integrated with a control chip, or be on a dedicatedcommunication protocol processing chip. The communication interface canbe a wired USB interface, IEEE 1394 interface, or SATA interface, etc.Alternatively, the communication interface can be a wireless interface,such as a wireless Bluetooth interface, an infrared interface, or a RFinterface, etc.

2) A Virtual Machine (VM) environment storage module 202 for storing aVM program, a VM data file, data of operations in the virtual workingenvironment. The VM data file contains virtual operating systemparameters.

The VM program is used to set a personal working environment. The VMdata file is used to store virtual operating system parameters. The VMenvironment storage module 202 loads a virtual personal workingenvironment from the device to the host using the VM program and virtualoperating system parameters in the VM data file and stores data of useroperations in the virtual personal working environment in the device.The user operations include the mobile work operations.

The VM environment storage module 202 can be on a mass storage element,such as a mass storage flash chip, an SD card, a micro drive, or a smartcard, or can be integrated with a control chip as a storage element(e.g. a security-designed chip with a mass storage unit), whose mediumcan be one or more of RAM, ROM, EPROM, EEPROM, and flash memory. Themass storage element can be a fixed part of the device, or a removablepart.

3) A control module 203 for controlling communications between thecommunication interface module 201 and the host, and the personalworking environment virtualized by the VM environment storage module 202in the host. It is connected respectively with the communicationinterface module 201 and the VM environment storage module 202.

The control module 203 can be on a control chip (i.e. a microcontrollerchip), or can be integrated with at least one of the communicationinterface module 201 and the VM environment storage module 202 on amicrocontroller chip.

Further, the device 200 for virtualizing a personal working environmentcan be an information security device, that is, the device 200 canfurther comprises the following module.

4) An information security module 204 for performing informationsecurity operations under control of the control module 203. Theinformation security module 204 is connected with the control module203.

The information security module 204 manages and controls access to theinformation security device by a user according to identity informationof the user, and performs information security operations both on thehost and in the virtual personal working environment. The informationsecurity operations in the virtual personal working environment are thesame as those described in Embodiment 1.

Upon performing information security operations in the VM environment,the information security module 204 is connected with the VM environmentstorage module 202. The VM environment storage module 202 can beintegrated with the information security module 204 on a mass storageelement.

The information security module 204 can be integrated with at least oneof the communication interface module 201, the VM environment storagemodule 202, and the control module 203 on a chip (typically asecurity-designed chip, e.g. a smart card chip).

To improve the security, the device 200 further comprises the followingmodules.

5) An encryption module 205 for encrypting the VM data file with anencryption algorithm in the device under control of the control module203, upon storing the file by the VM environment storage module 202; itis connected respectively with the VM environment storage module 202 andthe control module 203; and

6) A decryption module 206 for decrypting the encrypted VM data filewith a decryption algorithm relating to the encryption algorithm in thedevice under control of the control module 203, before virtualizing thepersonal working environment in the host by the control module 203 andthe VM environment storage module 202; it is connected respectively withthe VM environment storage module 202 and the control module 203.

In addition, the device 200 can also comprise the following module.

7) An autorun module 207 for automatically loading the VM program andthe VM data file stored in the VM environment storage module 202 intothe host under control of the control module 203, after the device 200is connected with the host; it is connected respectively with the VMenvironment storage module 202 and the control module 203.

At least one of the communication interface module 201, the VMenvironment storage module 202, and the autorun module can be integratedwith the control module 203 on a chip. Or the VM environment storagemodule 202 can be integrated with the autorun module 207 on a massstorage element.

If the device 200 comprising the autorun module 207 is an informationsecurity device, at least one of the communication interface module 201,the VM environment storage module 202, the information security module204, and the autorun module 207 can be integrated with the controlmodule 203 on a chip. The chip can be a security-designed chip(including a smart card chip). Or, at least one of the informationsecurity module 2045 and the autorun module 207 can be integrated withthe VM environment storage module 202 on a mass storage element.

To prevent abnormal removal of the device and thus result in that the VMenvironment cannot be uninstalled completely, the device 200 furthercomprises the following module.

8) A monitor module 208 for starting a monitor program and automaticallyunloading the VM environment if it detects that the device 200 isdisconnected with the host under control of the control module 203 aftervirtulization of the personal working environment in the host by thecontrol module 203 and the VM environment storage module 202; it isconnected respectively with the VM environment storage module 202 andthe control module 203.

The device 200 can be a key ring style, handheld, or wrist portabledevice. After the user closes the VM environment and removes the device,no personal information is left on the host. In other words, thepersonal information cannot be obtained by other users from the host.

The mass storage element described in this Embodiment can be a flashmemory, a micro drive, a smart card, or an SD card etc.

The VM environment implemented by the device 200 can be a VM environmentwithout any operating systems and applications, or with basicconfigurations (for example, which are set by the developer). For moreinformation, see description in Embodiment 1.

Referring to FIG. 3, a preferred case of the embodiment 3 is to providea key-ring style portable USB device for virtualizing a personal workingenvironment. The device includes a casing and a circuit board containedin the casing. The core parts of the circuit board are a smart card chipwith a USB interface, a mass storage chip, and a USB connector. In thiscase, the smart card chip is a Z32H256SUF chip 301 from ZTE; the massstorage chip is a K9KAG08U0M chip 302 from SAMSUNG; and the USBconnector 303 is also included. The Z32H256SUF chip is used forperforming functions of a USB flash disk. The foregoing VM program canbe stored on this chip. Also, it can be used for performing functions ofan information security device. Therefore, it can also be used to builda USB device for virtualizing a personal working environment withfunctions of an information security device. The USB connector isadapted to perform communications between the device and a host. TheZ32H256SUF chip 301 is used for controlling and managing the operationmode, and processing and managing the data. In addition, the Z32H256SUFchip 301 can provide a 32 KB of EEPROM for storing data and programs,and a 256 KB of flash memory for storing programs, function libraries,and other data that should not be changed frequently. Because the chipuses a non-volatile memory medium, there can be erased repeatedly, it iseasy to upgrade the program. At the same time, because the chip is ofnon-volatile type, it is more secure and reliable to store the program.Pin D+ (the positive end of the USB data line) of the Z32H256SUF chip301 is connected to pin D+ (the positive end of the USB data line) ofthe USB connector 303 while pin D− of the chip is connected to pin D− ofthe connector, so that the Z32H256SUF chip 301 can establishcommunications with the host through the USB connector 303.

If the device is an information security device, the informationsecurity functions are implemented in the Z32H256SUF chip 301, using theencryption and decryption algorithms stored on the K9KAG08U0M chip 302.The mass storage flash K9KAG08U0M chip 302 carrying a VM program and aVM data file is used for setting a VM environment and storing data ofuser operations in the virtual personal working environment. An autorunprogram for autorun functions can be stored on either the Z32H256SUFchip 301 or the K9KAG08U0M chip 302. After the information securitydevice is connected with a host, the autorun program can automaticallyload a VM operating system on the K9KAG08U0M chip 302 into the host. Amonitor program can be stored on either the Z32H256SUF chip 301 or theK9KAG08U0M chip 302. Once the VM environment is loaded into the host,the monitor program is started on the host and automatically unloads theVM environment from the host if it detects that the device isdisconnected with the host.

As a preferred case, the foregoing communication interface moduleconsists of pins D+ and D− of the Z32H256SUF chip 301 and the USBconnector 303. In an embodiment, the communication interface moduleconsists of a separate USB protocol chip (e.g. the PDIUSBD12 chip fromPHILIPS) and a USB connector.

The foregoing host can be a desktop, a notebook computer, a server, or adedicated machine. The foregoing device can also be connected with otherexternal devices, such as a reader, a communications device, a digitalcamera, a host peripheral, or a dedicated device.

The loaded VM environment in the host is essentially virtualized fromthe mass storage element of the device. The operations in this virtualoperating environment are directed to the virtual space on the massstorage element. Therefore, the operations cannot be traced on the host.If the device is connected with another host, the virtual workingenvironment will be launched again, thus facilitating the mobile work.If the device is an information security device, the informationsecurity operations can be applied in the virtual working environment tofurther improve the security.

It will be appreciated by those of ordinary skill in the art that thepresent invention can be embodied in other specific forms withoutdeparting from the spirit or essential character thereof. The presentlydisclosed embodiments are therefore considered in all respects to beillustrative and not restrictive. The scope of the present invention isindicated by the appended claims rather than the foregoing description,and all changes which come within the meaning and range of equivalentsthereof are intended to be embraced therein.

1. A method for virtualizing a personal working environment, wherein the method comprises the steps of: installing a Virtual Machine (VM) environment on a device; upon virtualizing the personal working environment, connecting the device to a host, loading the VM environment into the host; and responding to a user operation and saving data of the user operation to the device by the VM environment.
 2. A method for virtualizing a personal working environment according to claim 1, wherein the step of installing the VM environment on the device comprises storing a VM program and a VM data file on the device.
 3. A method for virtualizing a personal working environment according to claim 2, wherein the step of storing the VM program and the VM data file on the device further comprises a step of: encrypting the VM data file with an encryption algorithm in the device, and storing the encrypted VM data file in the device; and accordingly, loading the VM environment into the host further comprises a step of: decrypting the encrypted VM data file with a decryption algorithm associated with the encryption algorithm in the device and loading the VM environment into the host with the decrypted VM data file.
 4. A method for virtualizing a personal working environment according to claim 1, wherein loading the VM environment into the host is conducted through an autorun function.
 5. A method for virtualizing a personal working environment according to claim 1, wherein before loading the VM environment into the host, the method further comprises a step of: authenticating a user, and allowing the following loading process in response to a positive result, or terminating it in response to a negative result.
 6. A method for virtualizing a personal working environment according to claim 1, wherein after loading the VM environment into the host, the method further comprises a step of: starting a monitor program on the host, and automatically unloading the VM environment if the monitor program detects that the device is disconnected with the host.
 7. A method for virtualizing a personal working environment according to claim 1, wherein the user operation is a mobile work operation.
 8. A method for virtualizing a personal working environment according to claim 1, wherein the device is an information security device, and the user operation is at least one of a mobile work operation and an information security operation. 