A virtual cloud desktop security access method based on deep protection
A virtualized cloud and secure access technology, which is applied in the field of virtualized cloud desktop security access, can solve the problem that the protection of the virtualization layer cannot fully meet the requirements, and achieve the effect of deep security protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The specific embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings, but the embodiments of the present invention are not limited thereto.
[0022] Such as Figure 1-3 A security access method for virtualized cloud desktops based on in-depth protection is shown, including:
[0023] 1. Reasonable division of security areas based on business flow analysis
[0024] According to the analysis of business flow, establish a security area model, which is divided into five security areas: security service domain, security support domain, security interconnection domain, wired access domain and wireless access domain, such as figure 1 As shown in , the security service domain includes intranet services, energy services, video services, data centers, and cloud desktop virtualization architectures, covering all service-providing business systems and responsible for providing safe and reliable service resources; ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com