Dual-network-isolated cloud desktop connection method and system

A connection method and cloud desktop technology, applied in the field of Internet security, can solve problems such as hidden safety hazards, inconvenient maintenance, and increased costs, and achieve the effects of easy upgrades, low cost, and convenient use

Inactive Publication Date: 2018-06-15
G CLOUD TECH
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the way to realize dual-network isolation usually uses the isolation method of software technology, which is limited by software technology, and there are many security risks in this method; or the physical isolation method of terminals is used, which requires human participation in the transformation and upgrading of terminals. This method not only Maintenance is inconvenient and additional costs are added

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual-network-isolated cloud desktop connection method and system
  • Dual-network-isolated cloud desktop connection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose of the present invention, technical characteristics and method obtain clearer description, below in conjunction with accompanying drawing and example, be described in detail, concrete implementation process is as follows:

[0030] figure 1 It is a flowchart of the method of the present invention. Such as figure 1 As shown, the method includes:

[0031] S1: Press the switch button of the network switcher;

[0032] S2: The connection between the cloud terminal and the first network cloud desktop is disconnected;

[0033] S3: The cloud terminal is connected to the cloud desktop with the same name in the second network.

[0034] Before steps S1-S3, open the network connected to the cloud terminal as the first network. When the switch button of the network switcher is pressed, the first network is disconnected and switched to the second network. At this time, the cloud terminal and the cloud desktop of the first network is disconnected.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of internet safety and especially relates to a dual-network-isolated cloud desktop connection method and system. The method is characterized in that a cloud terminal realizes switching of connection between a first network and a second network through a network switcher, realizes continuous detection of connectivity of the network through a cloud terminal agent module, and feeds back and reminds users according to the detection obtained connectivity information. The system comprises the cloud terminal agent module, a cloud desktop management module,a network switcher, an intranet switch and an extranet switch. The method and system can provide a physically completely-isolated intranet / extranet cloud desktop for the users without transforming the cloud terminal, automatically connect to the cloud desktop in the switching process and have the advantages of low cost, convenient use and easy upgrade and the like.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a double-network isolated cloud desktop connection method and system. Background technique [0002] The development of Internet technology has brought convenience to people, but also brought threats such as hackers, Trojan horses, viruses, etc., and the security of information cannot be guaranteed; therefore, in financial, military, government or some enterprises that require high confidentiality, Intranet and extranet need to be isolated. At present, the way to realize dual-network isolation usually uses the isolation method of software technology, which is limited by software technology, and there are many security risks in this method; or the physical isolation method of terminals is used, which requires human participation in the transformation and upgrading of terminals. This method not only Maintenance is inconvenient and additional costs have been added. Conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/0209H04L67/562
Inventor 陈海钊季统凯
Owner G CLOUD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products