Supercharge Your Innovation With Domain-Expert AI Agents!

Device and method for accessing computer desktop service in multi-network isolation environment

A technology of service access and access method, applied in the field of computer desktop service access devices, can solve the problems of vulnerable security, high hardware cost, attacking the network, etc. Effect

Active Publication Date: 2019-11-22
湖南麒麟信安科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above-mentioned first method requires multiple terminals per person, which is expensive and inconvenient to use; the second method, because personal KVM computer switches generally have physical distance restrictions, the same terminal maintains the same software operating environment and is easily used as a springboard Attack successively connected networks; the third method is connected to multiple networks at the same time and maintains multiple virtual operating environments on the terminal at the same time, and the security is easily challenged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for accessing computer desktop service in multi-network isolation environment
  • Device and method for accessing computer desktop service in multi-network isolation environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0017] refer to figure 1 , the computer desktop service access device in a multi-network isolation environment includes a first cloud desktop server 11 (ie, a virtual desktop server) and a second cloud desktop server 21 (ie, a virtual desktop server), and the first cloud desktop server 11 is located in an isolated network. 10, the first cloud desktop server 11 through the physical network interface 111 (ie figure 1 The network port in the network port) is connected to the isolated network one 10, the second cloud desktop server 21 is located in the isolated network two 20, and the second cloud desktop server 21 is connected through another physical network interface 211 (i.e. figure 1 network port) to connect to isolated network 2 20, isolated network 1 and isolated network 2 are physically separated, each cloud desktop server runs a virtual machine, and each virtual machine runs a user virtual desktop environment, which can provide users with Virtual desktop service, user ap...

Embodiment 2

[0023] The difference between this embodiment and Embodiment 1 is that there may be three or four isolated networks. The user terminal is a PC. The user's personal device 32 is a password-protected USB password device that stores a personal identity certificate. There are 3 virtual desktop client processes running in the user terminal 51, forming a process queue, and each monitoring process selects the queue head process to connect to the cloud desktop server in the isolated network physically connected through the network switcher. When the network is switched, the process at the head of the queue is dequeued and destroyed, and a new process at the head of the queue is selected to automatically connect to the cloud desktop server in the new network based on personal data. When the computing resources of the user terminal are idle, a new virtual desktop client process is started and added to the tail of the queue.

Embodiment 3

[0025] The difference between this embodiment and Embodiment 1 is that the network port 112 is connected to a certain port of the network switch 41 through the network, and the other network port 212 is connected to a certain port of the network switch 41 through the network.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer desktop service access device and an access method in a multi-network isolation environment. The access method comprises the steps of: deploying a server providing a virtual desktop service in each isolation network, wherein each virtual desktop server comprises at least two physical network interfaces; arranging a network switcher between a user terminal and a network to be accessed; deploying writing equipment for writing user personal data into user personal equipment; creating a monitoring process and at least one virtual desktop client process in an operation system of the user terminal; running the monitoring process and the client process by the user terminal; selecting one idle client process for connecting the isolation network by means of the monitoring process; and destroying the currently operating virtual desktop client process of a user when the user terminal detects network switching, selecting or generating a new client process, and identifying the newly connected isolation network. By adopting the computer desktop service access device and the access method, the security, convenience and rapid responsiveness of user operating desktop access in the multi-network isolation environment can be improved.

Description

technical field [0001] The invention relates to the fields of computer cloud computing, virtual computing, and cloud desktops, in particular to a computer desktop service access device and method in a multi-network isolation environment. Background technique [0002] Due to the different security requirements for different networks, there are often multiple physically isolated network environments within the government, military, and enterprises or organizations that require confidentiality. Under normal circumstances, computer terminals are not allowed to connect to these isolated networks at the same time. When a user accesses multiple networks, the first method is to place multiple terminals on the workbench, and each terminal is connected to a separate network. The second method is to use one terminal to switch to different networks through a KVM multi-computer switcher. The third method is to use a terminal and run multiple virtual environments isolated from each other ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F9/44
CPCH04L63/02H04L63/10
Inventor 卢刚欧阳殷朝孙利杰徐鹏杨涛陈松政
Owner 湖南麒麟信安科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More