A virtual cloud desktop security access method based on deep protection

A virtualized cloud and secure access technology, which is applied in the field of virtualized cloud desktop security access, can solve the problem that the protection of the virtualization layer cannot fully meet the requirements, and achieve the effect of deep security protection

Inactive Publication Date: 2019-03-15
SD STEEL RIZHAO CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, to prevent malicious attacks between virtual machines in the cloud, traditional network security protection equipment cannot fully meet the requirements for virtualization layer protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtual cloud desktop security access method based on deep protection
  • A virtual cloud desktop security access method based on deep protection
  • A virtual cloud desktop security access method based on deep protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The specific embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0022] Such as Figure 1-3 A security access method for virtualized cloud desktops based on in-depth protection is shown, including:

[0023] 1. Reasonable division of security areas based on business flow analysis

[0024] According to the analysis of business flow, establish a security area model, which is divided into five security areas: security service domain, security support domain, security interconnection domain, wired access domain and wireless access domain, such as figure 1 As shown in , the security service domain includes intranet services, energy services, video services, data centers, and cloud desktop virtualization architectures, covering all service-providing business systems and responsible for providing safe and reliable service resources; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a virtual cloud desktop security access method based on deep protection, which comprises the following steps of: analyzing according to a business flow direction, reasonably dividing security areas, analyzing according to the business flow direction, establishing a security area model, and dividing the security area model into five security areas, namely a security servicearea, a wired access area, a wireless access area, a security support area and a security interconnection area; And performing virtual deep protection, and for security threats faced by a virtualization layer, realizing isolation of a virtual network by designing a virtual network identifier to route and forward a data frame. Through the functions of virus prevention, access control, intrusion detection / intrusion protection, virtual patches, host integrity monitoring, log auditing and the like, comprehensive protection of a virtual host and a virtual system is achieved, different regional networks, different users and different applications are achieved, and different depth protection strategies are adopted to achieve deep-level safety protection of the virtual cloud desktop.

Description

technical field [0001] The invention relates to the technical field of cost accounting for iron and steel enterprises, in particular to a method for safely accessing a virtualized cloud desktop based on deep protection. Background technique [0002] The traditional metallurgical industry uses PC mode for daily office work and R&D to deploy desktop operating systems and applications. The operating systems, applications, and data on the desktop exist in a tightly coupled mode. Any problem with any component will affect the use of users. . The most obvious is that the traditional network security deployment is to install an antivirus software client on each virtual machine. Under the limit state of simultaneous full-scale scanning and killing, such a huge I / O will seriously affect the experience. [0003] The traditional method of network security protection is to install an antivirus software client on each virtual machine. Although the protection effect can meet the security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F9/451
CPCG06F21/55G06F9/452
Inventor 温晓明侯伟谢云峰田坤苏广滨韩笑
Owner SD STEEL RIZHAO CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products