Cloud desktop login method, device and equipment based on cloud security and storage medium

A cloud desktop and security technology, applied in the field of cloud security, which can solve the problems of cumbersome user login operations, complex authentication information interaction, and poor user experience.

Active Publication Date: 2019-06-11
PING AN TECH (SHENZHEN) CO LTD
View PDF11 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, it is necessary to provide a cloud desktop login method, device, equipment and storage based on cloud security for the problems of complex authentication information interaction in the background of the cloud desktop, cumbersome user login operations, and poor user experience when logging in to the cloud desktop. medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud desktop login method, device and equipment based on cloud security and storage medium
  • Cloud desktop login method, device and equipment based on cloud security and storage medium
  • Cloud desktop login method, device and equipment based on cloud security and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof.

[0048] figure 1 It is a flowchart of a cloud security-based cloud desktop lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of cloud security, in particular to a cloud desktop login method, device and equipment based on cloud security and a storage medium. The method comprises the steps that a user terminal receives a cloud desktop login request, the request comprises a UUID, and the user terminal obtains an IM account and sends the IM account and the UUID to a cloud desktopauthentication server; the cloud desktop authentication server sends a verification request to the IM server; when the IM server passes the verification, the password is returned to the cloud desktopauthentication server, and the cloud desktop authentication server sends the UUID, the IM account and the password to the cloud desktop resource server; when the cloud desktop resource server verifies the IM account and the password successfully, the cloud desktop resource server returns the user resource to the cloud desktop authentication server; and the cloud desktop authentication server returns the user resources to the cloud desktop login requester corresponding to the UUID for display. The cloud desktop login and the IM software are combined, and the purpose of one-key login of a useris achieved through interaction among a plurality of servers.

Description

technical field [0001] The present invention relates to the technical field of cloud security, in particular to a cloud security-based cloud desktop login method, device, equipment and storage medium. Background technique [0002] Cloud desktop is based on distributed cloud computing storage technology, integrates essential Internet applications, and relies on highly encrypted algorithms to provide users at all levels of the Internet with the simplest, most abundant, safest, and most intimate services. Cloud desktop can release data space and management services to operators in a desktop way. [0003] However, whether it is applied to the cloud desktop on the mobile phone or the cloud desktop on the web, it is usually necessary to log in to the system. During the login verification process, the background authentication information of the cloud desktop is complicated to interact and two-factor authentication is required. In order to meet the needs of secure login, before log...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/58
CPCH04L65/40
Inventor 张鑫张睿
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products