CN108470125A - A kind of OLE reorientation methods and system based on virtual desktop - Google Patents
A kind of OLE reorientation methods and system based on virtual desktop Download PDFInfo
- Publication number
- CN108470125A CN108470125A CN201810134769.0A CN201810134769A CN108470125A CN 108470125 A CN108470125 A CN 108470125A CN 201810134769 A CN201810134769 A CN 201810134769A CN 108470125 A CN108470125 A CN 108470125A
- Authority
- CN
- China
- Prior art keywords
- ole
- desktop
- virtual desktop
- service
- layers
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Information Transfer Between Computers (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses a kind of OLE reorientation methods and system based on virtual desktop, this approach includes the following steps:Initialization of virtual desktop environment and associated system service;Into virtual desktop, start application program in virtual desktop;Determine the current affiliated virtual desktop of process;Judge whether process starts OLE access requests, if it is, OLE access is redirected processing;Start OLE proxy modules, obtains desktop configuration and deputy environment initialization;Start OLE service modules;OLE service modules externally provide service, response OLE requests, and user closes application program.Technical scheme of the present invention, framework is advanced, consistent, and compatibility is high;The isolation accessed using OLE between desktop may be implemented, safe coefficient is high;In addition, client secure is high.
Description
Technical field
The present invention relates to data security arts, and in particular to a kind of OLE reorientation methods and system based on virtual desktop.
Background technology
OLE (Object Linking and Embedding), i.e. object are connected and embedded, abbreviation OLE technologies.OLE is not
Only it is that multipad is integrated, but also defines and realize a kind of permission application program as software " object " (data set
Close and operation data function) each other carry out " connection " mechanism, this connection mechanism and agreement are known as The Component Object Model
(COM)。
OLE (Object Linking and Embedding, object connection and insertion), is a kind of skill of object-oriented
Art can develop reusable component software (COM) using this technology.OLE is not only multipad and integrates, and
Also define and realize a kind of permission application program as software " object " (function of data acquisition system and operation data) each other into
The mechanism of row " connection ", this connection mechanism and agreement are known as The Component Object Model (Component Object Model), letter
Claim COM.OLE can be used for creating compound document, and compound document, which contains, is created in different source applications, there is different type
Data, therefore it can combine word, sound, image, table, application program etc..
OLE is one group of comprehensive standard of transmission and shared information between client applications.Allow to create and be answered with direction
With the hybrid document of the link of program so that the agreement that user need not switch when changing between application program.OLE is based on component pair
As model (COM) and allow to develop the reusable plug and play object that can be interoperated between multiple application programs.The agreement is wide
It is general for commercial, electrical form, word processor, financial software packet and other applications can pass through client in business
Server architecture is shared and links individual information.
Currently, having occurred some terminal protection class softwares in the market, as described below:
A, more Desktop class softwares, the API provided using Microsoft can create multiple desktops, can be run in each desktop
Different programs.Each procedure sharing system bottom service, may have access to range, there is no limit.
B, sandbox class software accesses control to the program run in sandbox by hook technologies and bottom layer driving technology
System makes it may have access to range and is confined in controlled range, and the operation result of generation can automatically be removed after EP (end of program).
More desktop technology schemes are as follows:
The software of more desktops carries into execution a plan referring to as shown in Figure 1, as follows:
Step 1) runs more desktop softwares;
Step 2) creates or switches desktop;
Step 3) runs program in desktop;
Step 4) judges whether to shut down, if it is not, then jumping to step 2), is otherwise aligned to step 5);
Step 5) terminates.
Program carries into execution a plan referring to as shown in Fig. 2, as follows between desktop:
Step 1) runs application program;
Step 2) starts OLE and accesses;
Step 3) provides OLE services by underlying services supplier;
Step 4), application program receive returned content;
Step 5), whether determining program exits, if it is not, then jumping to step 2), otherwise jumps to step 6);
Step 6) terminates.
More desktop technologies and technical solution of the present invention are closest, but have the following disadvantages:
It cannot control the underlying services of desktop internal program access and be detached with other desktops, and there are security risk and compatibility
Problem.
There is no limit the access profiles of program for each desktop, and each Desktop Share set of system service, program between desktop
Isolation control cannot achieve.
In view of the above-mentioned problems, from the angle of actual demand and application, it is based on virtual desktop environment, uses HOOK skills
Art realizes the redirection that application program OLE is accessed.In virtual desktop, when application program launching, processing module, processing are injected
Module is redirected to proxy module according to residing desktop environment, by the access of OLE, and active service module is called by proxy module,
Service response is provided, to make underlying services be associated with desktop, solves the problems, such as more Desktop Share services.Compatibility of the invention
Height reduces security breaches.
Invention content
In order to solve the above technical problems, the present invention provides a kind of OLE reorientation methods based on virtual desktop, feature
It is, this approach includes the following steps:
1) initialization of virtual desktop environment and associated system service;
2) enter virtual desktop, start application program in virtual desktop;
3) the current affiliated virtual desktop of process is determined;
4) judge whether process starts OLE access requests, if it is, OLE access is redirected processing;
5) start OLE proxy modules, obtain desktop configuration and deputy environment initialization;
6) start OLE service modules;
7) OLE service modules externally provide service, response OLE requests, and user closes application program;
8) terminate.
With the method for the invention it is preferred to, step 1) the initialization of virtual desktop environment and associated system service packet
It includes:
Initialize desktop environment, the driving of operation core and system service, establishment or switching virtual desktop.
With the method for the invention it is preferred to, further include after startup application program in virtual desktop in step 2):
Launching process monitoring modular, the establishment of monitoring process are closed.
With the method for the invention it is preferred to, further include after the step 4):Judge whether to exit virtual desktop, such as
Fruit is then to jump to step 8), otherwise jumps to step 2).
With the method for the invention it is preferred to, include after the step 7):Judge whether user exits virtual desktop,
If it is, cleaning OLE services, otherwise jump to step 6).
In order to solve the above technical problems, the present invention provides a kind of OLE Redirectional systems based on virtual desktop, the system
Including:Virtual desktop monitor layer, OLE service brokers layer, OLE service layers;
Wherein virtual desktop monitor layer starts for monitoring process, desktop environment detection and OLE are accessed and redirected;
OLE service broker's layers carry out deputy environment initialization, receive and redirect for obtaining desktop configuration information
's
OLE access requests, and pass to OLE service layers;
OLE service layers, for executing OLE access requests.
The system according to the present invention, it is preferred that the virtual desktop monitor layer, including:Process initiation monitoring module, desktop
Context detection module and OLE redirection modules;
Wherein, process initiation monitoring module is used for the startup and closing of monitoring process, when process initiation, calls desktop ring
Border detection module;
Desktop environment detection module for determining launching process currently affiliated desktop, and obtains desktop relevant configuration information,
OLE redirection modules are called according to configuration;
OLE redirection modules, for the OLE access requests of application program to be redirected to OLE service broker's layers.
The system according to the present invention, it is preferred that OLE service brokers layer matches confidence for obtain current virtual table
Breath, carries out deputy environment initial work, and activation system OLE service modules receive what virtual desktop monitor layer redirection came
OLE access requests are passed down to OLE service layers.
The system according to the present invention, it is preferred that the OLE service layers pass over for executing OLE service brokers layer
OLE access requests, and handling result is returned into OLE service broker's layers.
In order to solve the above technical problems, the present invention provides a kind of computer readable storage medium, which has meter
Calculation machine program instruction is realized when executing the computer program instructions such as one of above-mentioned method.
Technical scheme of the present invention, framework is advanced, consistent, and compatibility is high;It may be implemented to access using OLE between desktop
Isolation, safe coefficient is high;In addition, client secure is high.
Description of the drawings
Fig. 1 is more desktop flow charts of the prior art.
Fig. 2 program flow diagrams between the desktop of the prior art.
Fig. 3 is the system architecture of the present invention.
Fig. 4 is flow chart of the method for the present invention.
Specific implementation mode
Such as Fig. 3, it is the general frame of the present invention, specifically includes:
OLE Redirectional systems based on virtual desktop are generally divided into three levels:Virtual desktop monitor layer, OLE clothes
Be engaged in Agent layer, OLE service layers.Virtual desktop monitor layer is responsible for monitoring process startup, desktop environment detection and OLE access and is reset
To;OLE service broker's layers, obtain desktop configuration information, carry out deputy environment initialization, receive the OLE for redirecting and access
Request, and pass to OLE service layers;OLE service layers are responsible for executing OLE access requests.
Virtual desktop monitor layer is located at the top layer of general frame, is detected by process initiation monitoring module and desktop environment
Module and OLE redirection modules composition.Process initiation monitoring module is responsible for the startup and closing of monitoring process, when process initiation,
Call desktop environment detection module;Desktop environment detection module checks launching process currently affiliated desktop, and obtains desktop correlation
Configuration information calls OLE redirection modules according to configuration;OLE redirection modules are responsible for the OLE access requests of application program
It is redirected to OLE service broker's layers.
OLE service broker's layers, are located at the middle layer of general frame, are responsible for obtaining the configuration information of current virtual table, carry out
Deputy environment initial work, activation system OLE service modules receive upper layer and redirect the OLE access requests to come, pass downwards
Pass OLE service layers.
OLE service layers are located at the lowest level of overall architecture, are responsible for executing the OLE access requests that upper layer transfers come, and will
Handling result returns to upper layer.
Such as Fig. 4, it is the system execution flow chart of the present invention, specifically includes:
1, after system boot, os starting associated system service initializes desktop environment, and operation core drives and is
System service creates or switches desktop.
2, into virtual desktop.
A, in virtual desktop, start new application program.
B, monitoring the process module starts, and monitors the establishment for the process that the new application program includes, closes.
C, virtual desktop environment detection module checks above-mentioned process currently affiliated desktop.
D, judge that the process whether there is OLE access requests, if it is, going to E execution;Otherwise F execution is gone to.
E, the OLE access requests are redirected into processing, handling result is returned into virtual desktop monitor layer, then
Go to F execution.
F, application program is disposed, and terminates to exit, and goes to G execution.
G, it checks whether and exits desktop, if it is, terminating;Otherwise it goes at A and executes.
3, it checks and starts whether OLE access agents have been started up, executed if it is not, going at 4;Otherwise it goes at 7
It executes.
4, start OLE agencies, go to and execute in next step.
5, desktop configuration and deputy environment initialization are obtained, goes to execute in next step after the completion.
6, activation system OLE service modules go to after starting successfully and execute in next step.
7, OLE modules externally provide service, response OLE requests, and user closes application program.
8, it checks whether there is and exits desktop request, if exiting desktop, go at 9 and execute;Otherwise it goes at 7 and executes.
9, OLE agency services, while the correlation module of the OLE agency services layer and OLE service layers started are cleared up, is terminated.
The embodiment of one concrete application scene is described below.
1, after computer system logs in, certain data safety management system is logged in, the processing of the 2nd step is gone to after being verified.
2, the data safety management system background service and correlation module start initialization, go to the processing of the 3rd step after the completion.
3, the configuration of client synchronization virtual desktop and strategy go to the processing of the 4th step after the completion.
4, the processing of the 5th step is gone into virtual desktop by program interface.
5, application program generates OLE access requests, goes to the processing of the 6th step.
6, the data that OLE access requests return are received, the processing of the 7th step is gone to.
7, user terminates application program, goes to the 8th step and continues with
8, it checks whether and exits virtual desktop, if it is not, then going to the processing of the 4th step;Otherwise the processing of the 9th step is gone to.
9, it checks whether and logs off, if it is not, then going to the processing of the 3rd step;Otherwise it exits, terminates.
In recent years, as the various leakages of a state or party secret happen suddenly, great threat is all constituted to national security and long term growth.Therefore
Country proposes higher security protection requirement for the financial industry etc. for being related to national economy, avoids that the leakage of a state or party secret occurs.
The characteristics of for financial industry, as data safety management system continuous renewal is perfect, virtual desktop function can root
According to user demand, different desktop access different applications are realized, the case where being detached with ordinary desktop by sensitive application, do not increase cost
The lower secure access for realizing application, prevents generation of divulging a secret.Virtual desktop is widely recognized in financial circles.
Technical solution through the invention achieves following technique effect:
A, framework is advanced, consistent, and compatibility is high
B, realize that the isolation accessed using OLE between desktop, safe coefficient are high
C, client secure is high
For system embodiments, since it is basically similar to the method embodiment, so fairly simple, the correlation of description
Place illustrates referring to the part of embodiment of the method.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiment, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can be provided as method, system or calculate
Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
The embodiment of the present invention be with reference to according to the method for the embodiment of the present invention, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in flow and/or box combination.These can be provided
Computer program instructions send terminal to all-purpose computer, special purpose computer, embedded transmitter or other programmable datas and set
Standby transmitter is to generate a machine so that the transmitter that terminal device is sent by computer or other programmable datas is held
Capable instruction generates for realizing in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes
The system of specified function.
These computer program instructions, which may also be stored in, can guide computer or other programmable datas to send terminal device
In computer-readable memory operate in a specific manner so that instruction stored in the computer readable memory generates packet
The manufacture of instruction system is included, which realizes in one flow of flow chart or multiple flows and/or one side of block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable datas are sent on terminal device so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented transmission, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one flow of flow chart or multiple flows
And/or in one box of block diagram or multiple boxes specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also include other elements that are not explicitly listed, or further include for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device including the element.
Above to a kind of OLE reorientation methods and system based on virtual desktop provided by the present invention, carry out in detail
It introduces, principle and implementation of the present invention are described for specific case used herein, the explanation of above example
It is merely used to help understand the method and its core concept of the present invention;Meanwhile for those of ordinary skill in the art, according to this
The thought of invention, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification is not answered
It is interpreted as limitation of the present invention.
Claims (10)
1. a kind of OLE reorientation methods based on virtual desktop, which is characterized in that this approach includes the following steps:
1) initialization of virtual desktop environment and associated system service;
2) enter virtual desktop, start new application program in virtual desktop;
3) virtual desktop belonging to determining process that the application program includes currently;
4) judge whether the process starts OLE access requests, if so, redirecting processing to the OLE access requests;
5) start OLE proxy modules, obtain desktop configuration and deputy environment initialization;
6) start OLE service modules;
7) OLE service modules externally provide service, and response OLE requests return to handling result;
8) terminate.
2. according to the method described in claim 1, step 1) the initialization of virtual desktop environment and associated system service include:
Initialize desktop environment, the driving of operation core and system service, establishment or switching virtual desktop.
3. according to the method described in claim 1, further including after starting new application program in virtual desktop in step 2):
Launching process monitoring modular, the establishment of monitoring process are closed.
4. according to the method described in claim 1, further including after the step 4):Judge whether to exit virtual desktop, if
It is then to jump to step 8), otherwise jumps to step 2).
5. according to the method described in claim 1, including after the step 7):Judge whether user exits virtual desktop, such as
Fruit is then to clear up OLE services, otherwise jumps to step 6).
6. a kind of OLE Redirectional systems based on virtual desktop, the system include:Virtual desktop monitor layer, OLE service brokers
Layer, OLE service layers;
Wherein virtual desktop monitor layer is accessed for monitoring the new process initiation for starting application program, desktop environment detection and OLE
It redirects;
OLE service broker's layers, for obtaining desktop configuration information, deputy environment initialization receives the OLE for redirecting and accesses
Request, and pass to OLE service layers;
OLE service layers return to handling result for executing OLE access requests.
7. system according to claim 6, the virtual desktop monitor layer, including:Process initiation monitoring module, desktop ring
Border detection module and OLE redirection modules;
Wherein, process initiation monitoring module is used for the startup and closing of monitoring process, when process initiation, calls desktop environment inspection
Survey module;
Desktop environment detection module for determining launching process currently affiliated desktop, and obtains desktop relevant configuration information, according to
OLE redirection modules are called in configuration;
OLE redirection modules, for the OLE access requests of application program to be redirected to OLE service broker's layers.
8. system according to claim 6, the OLE service brokers layer, the configuration information for obtaining current virtual table,
Deputy environment initial work is carried out, activation system OLE service modules receive virtual desktop monitor layer and redirect the OLE to come
Access request is passed down to OLE service layers.
9. system according to claim 6, the OLE service layers pass over for executing OLE service broker's layers
OLE access requests, and handling result is returned into OLE service broker's layers.
10. a kind of computer readable storage medium, which has computer program instructions, which is characterized in that when execution institute
When stating computer program instructions, the method as described in one of claim 1-5 is realized.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810134769.0A CN108470125B (en) | 2018-02-09 | 2018-02-09 | OLE redirection method and system based on virtual desktop |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810134769.0A CN108470125B (en) | 2018-02-09 | 2018-02-09 | OLE redirection method and system based on virtual desktop |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108470125A true CN108470125A (en) | 2018-08-31 |
CN108470125B CN108470125B (en) | 2021-01-19 |
Family
ID=63266411
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810134769.0A Active CN108470125B (en) | 2018-02-09 | 2018-02-09 | OLE redirection method and system based on virtual desktop |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108470125B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109669738A (en) * | 2018-12-29 | 2019-04-23 | 北京明朝万达科技股份有限公司 | A kind of starting method and device of application program |
CN112099920B (en) * | 2020-09-21 | 2023-10-20 | 北京明朝万达科技股份有限公司 | Method and device for creating secure desktop, electronic equipment and readable storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020059358A1 (en) * | 1997-07-17 | 2002-05-16 | Microsoft Corporation | Method and system for accessing objects of different thread types |
US20100131654A1 (en) * | 2008-11-25 | 2010-05-27 | Microsoft Corporation | Platform for enabling terminal services virtualization |
CN102207856A (en) * | 2010-03-29 | 2011-10-05 | 日电(中国)有限公司 | Method and system for creating object of in-process component |
US20110277026A1 (en) * | 2010-05-07 | 2011-11-10 | Mugdha Agarwal | Systems and Methods for Providing Single Sign On Access to Enterprise SAAS and Cloud Hosted Applications |
CN102819448A (en) * | 2012-08-08 | 2012-12-12 | 深圳市京华科讯科技有限公司 | Data transmission system and self-adaption switching method of a plurality of virtual desktops of data transmission system |
CN103533034A (en) * | 2013-09-28 | 2014-01-22 | 福建星网锐捷软件有限公司 | Method for seamlessly using cloud terminal local camera in VDI (Virtual Device Interface) virtual desktop |
CN102487380B (en) * | 2010-12-01 | 2016-09-07 | 中兴通讯股份有限公司 | Desktop virtual terminal entrusting method and system |
CN106850809A (en) * | 2017-02-09 | 2017-06-13 | 武汉烽火信息服务有限公司 | The device of virtual desktop is used based on desktop cloud platform portal user |
-
2018
- 2018-02-09 CN CN201810134769.0A patent/CN108470125B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020059358A1 (en) * | 1997-07-17 | 2002-05-16 | Microsoft Corporation | Method and system for accessing objects of different thread types |
US20100131654A1 (en) * | 2008-11-25 | 2010-05-27 | Microsoft Corporation | Platform for enabling terminal services virtualization |
CN102207856A (en) * | 2010-03-29 | 2011-10-05 | 日电(中国)有限公司 | Method and system for creating object of in-process component |
US20110277026A1 (en) * | 2010-05-07 | 2011-11-10 | Mugdha Agarwal | Systems and Methods for Providing Single Sign On Access to Enterprise SAAS and Cloud Hosted Applications |
CN102487380B (en) * | 2010-12-01 | 2016-09-07 | 中兴通讯股份有限公司 | Desktop virtual terminal entrusting method and system |
CN102819448A (en) * | 2012-08-08 | 2012-12-12 | 深圳市京华科讯科技有限公司 | Data transmission system and self-adaption switching method of a plurality of virtual desktops of data transmission system |
CN103533034A (en) * | 2013-09-28 | 2014-01-22 | 福建星网锐捷软件有限公司 | Method for seamlessly using cloud terminal local camera in VDI (Virtual Device Interface) virtual desktop |
CN106850809A (en) * | 2017-02-09 | 2017-06-13 | 武汉烽火信息服务有限公司 | The device of virtual desktop is used based on desktop cloud platform portal user |
Non-Patent Citations (1)
Title |
---|
OLE AGESEN 等: "The Evolution of an x86 Virtual Machine Monitor", 《ACM SIGOPS OPERATING SYSTEMS REVIEW》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109669738A (en) * | 2018-12-29 | 2019-04-23 | 北京明朝万达科技股份有限公司 | A kind of starting method and device of application program |
CN112099920B (en) * | 2020-09-21 | 2023-10-20 | 北京明朝万达科技股份有限公司 | Method and device for creating secure desktop, electronic equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108470125B (en) | 2021-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alashhab et al. | Impact of coronavirus pandemic crisis on technologies and cloud computing applications | |
Somani et al. | DDoS attacks in cloud computing: Collateral damage to non-targets | |
Miller | Robust composition: Towards a uni ed approach to access control and concurrency control | |
Hu et al. | A review on cloud computing: Design challenges in architecture and security | |
KR100938521B1 (en) | Method, apparatus and system for enabling a secure location-aware platform | |
RU2424556C2 (en) | Secure and stable hosting of third-party extensions to web services | |
US20210166488A1 (en) | Method and system for exploiting interactions via a virtual environment | |
CN106201468B (en) | A kind of processing method of screenshotss, device and electronic equipment | |
US20070294627A1 (en) | Suppressing Dialog Boxes | |
KR101839647B1 (en) | Per process networking capabilities | |
CN106201566A (en) | The rich big special hot upgrade method of software of profit and equipment | |
Ravidas et al. | Incorporating trust in NFV: Addressing the challenges | |
US10531165B1 (en) | Embedded content synchronization | |
CN107533596B (en) | Fingerprint identification method and mobile terminal | |
CN108470125A (en) | A kind of OLE reorientation methods and system based on virtual desktop | |
US11533543B1 (en) | Community boosting of stream visibility | |
CN108335105A (en) | Data processing method and relevant device | |
US11522864B1 (en) | Secure identity transfer | |
CN109547450A (en) | Method, apparatus, electronic equipment and the computer media in operational safety execution domain | |
WO2015095415A1 (en) | Input control assignment | |
US11553087B1 (en) | Communication session using a virtual environment | |
US20070169012A1 (en) | Asynchronous just-in-time compilation | |
US11445246B1 (en) | Activity-based selection of replacement content | |
CN113490231A (en) | Network slice availability guarantee method and device | |
CN105704154A (en) | RESTful-based service processing method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |