Cloud desktop login method, device, equipment and storage medium based on cloud security

A cloud desktop and security technology, applied in the field of cloud security, can solve problems such as complicated interaction of authentication information, cumbersome user login operations, and poor user experience

Active Publication Date: 2021-06-25
PING AN TECH (SHENZHEN) CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, it is necessary to provide a cloud desktop login method, device, equipment and storage based on cloud security for the problems of complex authentication information interaction in the background of the cloud desktop, cumbersome user login operations, and poor user experience when logging in to the cloud desktop. medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud desktop login method, device, equipment and storage medium based on cloud security
  • Cloud desktop login method, device, equipment and storage medium based on cloud security
  • Cloud desktop login method, device, equipment and storage medium based on cloud security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof.

[0048] figure 1 It is a flowchart of a cloud security-based cloud desktop lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the technical field of cloud security, in particular to a cloud security-based cloud desktop login method, device, equipment and storage medium. The method includes: the user terminal receives a cloud desktop login request, the request contains a UUID, the user terminal obtains an IM account, and sends the IM account and the UUID to the cloud desktop authentication server; the cloud desktop authentication server sends a verification request to the IM server; the IM server performs When the verification is passed, the password is returned to the cloud desktop authentication server, and the cloud desktop authentication server sends the UUID, IM account and password to the cloud desktop resource server; when the cloud desktop resource server passes the verification of the IM account and password, the user resource is returned to Cloud desktop authentication server; the cloud desktop authentication server returns user resources to the cloud desktop login requester corresponding to the UUID for display. The invention combines cloud desktop login with IM software, and realizes the purpose of one-key login for users through the interaction between multiple servers.

Description

technical field [0001] The present invention relates to the technical field of cloud security, in particular to a cloud security-based cloud desktop login method, device, equipment and storage medium. Background technique [0002] Cloud desktop is based on distributed cloud computing storage technology, integrates essential Internet applications, and relies on highly encrypted algorithms to provide users at all levels of the Internet with the simplest, most abundant, safest, and most intimate services. Cloud desktop can release data space and management services to operators in a desktop way. [0003] However, whether it is applied to the cloud desktop on the mobile phone or the cloud desktop on the web, it is usually necessary to log in to the system. During the login verification process, the background authentication information of the cloud desktop is complicated to interact and two-factor authentication is required. In order to meet the needs of secure login, before log...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/58
CPCH04L65/40
Inventor 张鑫张睿
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products