Supercharge Your Innovation With Domain-Expert AI Agents!

Access controlling method and device using virtualization

An access control and virtualization technology, applied in the field of virtualization, can solve the problems of high deployment cost, vulnerable to attack, poor performance, etc., achieve the effect of high forwarding performance, avoid attack risks, and save procurement costs

Inactive Publication Date: 2012-04-04
BEIJING FRONWARE SOFTWARE
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But current access control solutions are ineffective, vulnerable and expensive to deploy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access controlling method and device using virtualization
  • Access controlling method and device using virtualization
  • Access controlling method and device using virtualization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In the existing network environment, the access control software is usually installed on the application server (Windows Sever) as a Windows application program. The virtualization client plug-in on the user terminal side directly accesses the access control software running on the application server, and performs processing such as access control and virtualization protocol communication. However, there are many developers who are familiar with the Windows system, and there are many corresponding attackers. Therefore, the Windows system naturally faces higher security threats. In addition, the virtualization access control software as an application can also be installed on an independent Windows Server to perform virtualization access control. After the user is authenticated and authorized, he can directly access the desktop virtual machine through the client plug-in, and the protocol communication does not go through Virtualization access control software. In this ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a virtualization access controlling device, which comprises an embedded operating system and an access control module, wherein the embedded operating system is used for taking charge of communication of upper layer software and underlying hardware and is a Linux operating system; the access control module is used for using the virtualization service behavior for access control for a user terminal through the network according to the preset rule; the virtualization service behavior at least comprises desktop virtualization; and the access control at least comprises one or many kinds of attestation, authorization, strategic control, flow monitoring and operation audit. The device can save the procurement cost of Server software, has high forwarding performance, supports large consumers for concurrent access, and can avoid a lot of attack risks under the Window system.

Description

technical field [0001] The present invention relates to virtualization technology, in particular to an access control method and device for applying virtualization. Background technique [0002] With the development of network technology and software technology, computer applications are no longer limited to local, and remote application virtualization technology has developed rapidly. The main working principle of application virtualization is: the user terminal is remotely connected to the server through the application virtualization protocol, and the application is started on the server (but it is a virtual local application), and then the server sends the image displayed on the application interface to the user terminal on the remote end. The keyboard and mouse input of the user terminal are transmitted to the server remotely through the protocol. The effect achieved by application virtualization is: there is no need to install applications locally, and the application...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 孙向东
Owner BEIJING FRONWARE SOFTWARE
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More