Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting desktop cloud service through access control

An access control, desktop cloud technology, applied in the desktop cloud security field, can solve the problems of easy guessing and brute force cracking, weak security strength, affecting system security, etc., to prevent unauthorized data flow and small changes.

Inactive Publication Date: 2015-03-04
中电科网络安全科技股份有限公司
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security strength of this username and password method is weak, and it is easy to be guessed and violently cracked, thus affecting the security of the entire system.
At the same time, because the virtual desktop IP in the desktop cloud is usually directly exposed to users, there is a risk that malicious users can attack the virtual desktop to bypass the security mechanism of the desktop cloud system and obtain virtual desktop data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting desktop cloud service through access control
  • Method and system for protecting desktop cloud service through access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0028] Any feature disclosed in this specification, unless specifically stated, can be replaced by other equivalent or similar purpose alternative features. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0029] like figure 1 , connect the security gateway between the thin terminal and the desktop cloud data center, the security gateway provides two network ports, internal and external, the external network port is used to connect the thin terminal, and the internal network port is used to connect to the desktop cloud data center.

[0030] like figure 2 , the method disclosed in the present invention comprises:

[0031] Step 1: The thin terminal is connected to the desktop cloud data center through the security g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for protecting desktop cloud service through access control and relates to the technical field of desktop cloud safety. The method for protecting the desktop cloud service through the access control is aimed to solve the problem that the existing mode of using a user name and a password to log in the desktop is weak in safety intensity. The method for protecting the desktop cloud service through the access control includes that step 1, a thin terminal connects with a desktop cloud data center through a security gateway; step 2, a user inserts a USB KEY for marking the identity in the thin terminal; the thin terminal sends an authentication request to the security gateway and sends the signing message of a secrete key in a user identity certificate read from the USB key to the security gateway; step 3, the security gateway verifies the signing message and transmits the user name and password used for logging in the desktop corresponding to the user identity certificate to the desktop could data center after the signing message passes the verification; step 4, the desktop cloud data center verifies the user name and password, and the log-in is finished after the user name and password pass the verification.

Description

technical field [0001] The invention relates to the technical field of desktop cloud security, in particular to a method for realizing login verification of a desktop cloud data center in combination with a USB KEY. Background technique [0002] Existing desktop cloud data centers or desktop cloud servers usually use common user names and passwords for user login; combined with Microsoft's domain server for user authentication. The security strength of this username and password method is weak, and it is easy to be guessed and brute force cracked, thus affecting the security of the entire system. At the same time, because the virtual desktop IP in the desktop cloud is usually directly exposed to users, there is a risk that malicious users can attack the virtual desktop to bypass the security mechanism of the desktop cloud system and obtain virtual desktop data. Contents of the invention [0003] The technical problem to be solved by the present invention is to fundamental...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/08H04L63/083H04L63/0853
Inventor 王华磊
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products