CN108470125B - OLE redirection method and system based on virtual desktop - Google Patents

OLE redirection method and system based on virtual desktop Download PDF

Info

Publication number
CN108470125B
CN108470125B CN201810134769.0A CN201810134769A CN108470125B CN 108470125 B CN108470125 B CN 108470125B CN 201810134769 A CN201810134769 A CN 201810134769A CN 108470125 B CN108470125 B CN 108470125B
Authority
CN
China
Prior art keywords
ole
desktop
virtual desktop
layer
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810134769.0A
Other languages
Chinese (zh)
Other versions
CN108470125A (en
Inventor
曲恩纯
喻波
王志海
彭洪涛
王志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wondersoft Technology Co Ltd
Original Assignee
Beijing Wondersoft Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wondersoft Technology Co Ltd filed Critical Beijing Wondersoft Technology Co Ltd
Priority to CN201810134769.0A priority Critical patent/CN108470125B/en
Publication of CN108470125A publication Critical patent/CN108470125A/en
Application granted granted Critical
Publication of CN108470125B publication Critical patent/CN108470125B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Abstract

The invention discloses an OLE redirection method and a system based on a virtual desktop, wherein the method comprises the following steps: initializing a virtual desktop environment and related system services; entering a virtual desktop, and starting an application program in the virtual desktop; determining a virtual desktop to which a process currently belongs; judging whether the process starts an OLE access request, if so, redirecting the OLE access; starting an OLE agent module, and acquiring desktop configuration and agent environment initialization; starting an OLE service module; the OLE service module provides service for the outside, responds to the OLE request, and closes the application program by the user. The technical scheme of the invention has advanced architecture, stable technology and high compatibility; the isolation of the access of the application OLE between the desktops can be realized, and the safety degree is high; in addition, the client security is high.

Description

OLE redirection method and system based on virtual desktop
Technical Field
The invention relates to the field of data security, in particular to an OLE redirection method and system based on a virtual desktop.
Background
OLE (object Linking and embedding), i.e. object connection and embedding, is abbreviated as OLE technology. OLE is not only desktop application integration, but also defines and implements a mechanism that allows applications to "connect" to each other as software "objects" (functions of data collections and operational data), such connection mechanisms and protocols being referred to as Component Object Models (COM).
OLE (Object Linking and Embedding), an Object-oriented technology, with which reusable software Components (COM) can be developed. OLE is not only desktop application integration, but also defines and implements a mechanism that allows applications to "connect" to each other as software "objects" (functions of data collections and operational data), called Component Object Models (COM), for short. OLE can be used to create a composite document that contains data of different types created in different source applications so that it can combine text, sound, images, forms, applications, etc.
OLE is a comprehensive set of standards for transferring and sharing information between client applications. A protocol that allows creation of a hybrid document with links to applications so that a user does not have to switch between applications when modifying. OLE is based on the Component Object Model (COM) and allows the development of reusable plug and play objects that can interoperate across multiple applications. This protocol has been widely used in businesses where spreadsheets, word processing programs, financial software packages, and other applications can share and link separate information through a hierarchy of client and server.
Currently, some terminal protection software is already available on the market, as follows:
A. and the multi-desktop software can create a plurality of desktops by utilizing the API provided by Microsoft, and different programs can run in each desktop. The programs share the system bottom layer service, and the accessible range is not limited.
B. The sandbox software performs access control on the program running in the sandbox through a hook technology and a bottom layer driving technology, so that the accessible range of the program is limited within a controllable range, and the generated running result can be automatically cleared after the program is finished.
The multi-desktop technical scheme is as follows:
the multi-desktop software execution scheme is shown in fig. 1 as follows:
step 1), operating multi-desktop software;
step 2), creating or switching a desktop;
step 3), running the program in the desktop;
step 4), judging whether the machine is shut down, if not, jumping to the step 2), otherwise, adjusting to the step 5);
and 5), ending.
The program execution scheme between desktops is shown in FIG. 2 as follows:
step 1), running an application program;
step 2), starting an OLE access;
step 3), providing OLE service by a bottom service provider;
step 4), the application program receives the return content;
step 5), judging whether the program exits, if not, skipping to the step 2), otherwise, skipping to the step 6);
and 6), ending.
The multi-desktop technology is the closest to the technical scheme of the invention, but has the following disadvantages:
the method can not control the separation of the bottom service accessed by the program in the desktop from other desktops, and has the problems of potential safety hazard and compatibility.
The access range of the programs is not limited by each desktop, each desktop shares one set of system service, and program isolation control between the desktops cannot be realized.
Aiming at the problems, from the perspective of actual requirements and applications, the redirection of access to the OLE application program is realized by using the HOOK technology based on the virtual desktop environment. In the virtual desktop, when an application program is started, a processing module is injected, the processing module redirects the access of the OLE to a proxy module according to the desktop environment, and the proxy module calls an actual service module to provide service response, so that the underlying service is associated with the desktop, and the problem of multi-desktop sharing service is solved. The invention has high compatibility and reduces security holes.
Disclosure of Invention
In order to solve the technical problem, the invention provides an OLE redirection method based on a virtual desktop, which is characterized by comprising the following steps:
1) initializing a virtual desktop environment and related system services;
2) entering a virtual desktop, and starting an application program in the virtual desktop;
3) determining a virtual desktop to which a process currently belongs;
4) judging whether the process starts an OLE access request, if so, redirecting the OLE access;
5) starting an OLE agent module, and acquiring desktop configuration and agent environment initialization;
6) starting an OLE service module;
7) the OLE service module provides service for the outside, responds to the OLE request and closes the application program by the user;
8) and (6) ending.
According to the method of the present invention, preferably, the step 1) of initializing the virtual desktop environment and the related system services includes:
initializing a desktop environment, running a core driver and system services, and creating or switching a virtual desktop.
According to the method of the present invention, preferably, after the application program is started in the virtual desktop in step 2), the method further includes:
and starting a process monitoring module to monitor the creation and the closing of the process.
According to the method of the present invention, preferably, the step 4) is further followed by: and judging whether the virtual desktop exits or not, if so, jumping to the step 8), and otherwise, jumping to the step 2).
According to the method of the present invention, it is preferable that said step 7) is followed by: and judging whether the user exits the virtual desktop, if so, cleaning up the OLE service, and otherwise, jumping to the step 6).
In order to solve the above technical problem, the present invention provides an OLE redirection system based on a virtual desktop, which includes: the system comprises a virtual desktop monitoring layer, an OLE service agent layer and an OLE service layer;
the virtual desktop monitoring layer is used for monitoring process starting, desktop environment detection and OLE access redirection;
an OLE service agent layer for acquiring desktop configuration information, initializing agent environment, and receiving redirected information
The OLE accesses the request and transmits the request to an OLE service layer;
and the OLE service layer is used for executing the OLE access request.
According to the system of the present invention, preferably, the virtual desktop monitoring layer includes: the system comprises a process starting monitoring module, a desktop environment detection module and an OLE redirection module;
the system comprises a process starting monitoring module, a desktop environment detection module and a desktop environment monitoring module, wherein the process starting monitoring module is used for monitoring the starting and the closing of a process, and the desktop environment detection module is called when the process is started;
the desktop environment detection module is used for determining the current desktop of the starting process, acquiring relevant configuration information of the desktop and calling the OLE redirection module according to the configuration;
and the OLE redirection module is used for redirecting the OLE access request of the application program to the OLE service proxy layer.
According to the system of the present invention, preferably, the OLE service proxy layer is configured to obtain configuration information of a current virtual table, perform proxy environment initialization, start a system OLE service module, receive an OLE access request redirected by the virtual desktop monitoring layer, and transmit the OLE access request to the OLE service layer.
According to the system of the present invention, preferably, the OLE service layer is configured to execute the OLE access request transmitted by the OLE service agent layer, and return the processing result to the OLE service agent layer.
To solve the above technical problem, the present invention provides a computer-readable storage medium storing computer program instructions that, when executed, implement a method as one of the above.
The technical scheme of the invention has advanced architecture, stable technology and high compatibility; the isolation of the access of the application OLE between the desktops can be realized, and the safety degree is high; in addition, the client security is high.
Drawings
FIG. 1 is a flow diagram of a prior art multi-desktop.
FIG. 2 is a flowchart of a prior art desktop process.
FIG. 3 is a system architecture of the present invention.
FIG. 4 is a flow chart of the method of the present invention.
Detailed Description
Fig. 3 is a general architecture of the present invention, which specifically includes:
the OLE redirection system based on the virtual desktop is generally divided into three layers: the system comprises a virtual desktop monitoring layer, an OLE service agent layer and an OLE service layer. The virtual desktop monitoring layer is responsible for monitoring process starting, desktop environment detection and OLE access redirection; the OLE service proxy layer acquires desktop configuration information, performs proxy environment initialization, receives the redirected OLE access request and transmits the redirected OLE access request to the OLE service layer; and the OLE service layer is responsible for executing the OLE access request.
And the virtual desktop monitoring layer is positioned on the uppermost layer of the overall architecture and consists of a process starting monitoring module, a desktop environment detection module and an OLE redirection module. The process starting monitoring module is responsible for starting and closing the monitoring process, and when the process is started, the desktop environment detection module is called; the desktop environment detection module is used for checking the current desktop of the starting process, acquiring relevant configuration information of the desktop and calling the OLE redirection module according to the configuration; and the OLE redirection module is responsible for redirecting the OLE access request of the application program to the OLE service proxy layer.
And the OLE service agent layer is positioned in the middle layer of the overall architecture and is responsible for acquiring the configuration information of the current virtual table, carrying out agent environment initialization work, starting the OLE service module of the system, receiving the OLE access request redirected by the upper layer and transmitting the OLE access request downwards to the OLE service layer.
And the OLE service layer is positioned at the lowest layer of the whole framework and is responsible for executing the OLE access request transmitted by the upper layer and returning a processing result to the upper layer.
Fig. 4 is a flowchart of the system execution of the present invention, which specifically includes:
1. after the system is started, the operating system starts related system services, initializes the desktop environment, runs the core driver and the system services, and creates or switches the desktop.
2. And entering the virtual desktop.
A. And starting a new application program in the virtual desktop.
B. And starting a process monitoring module, and monitoring the creation and the closing of the process included by the new application program.
C. And the virtual desktop environment detection module is used for checking the desktop to which the process currently belongs.
D. Judging whether the process has an OLE access request, if so, turning to E for execution; otherwise, go to F execution.
E. And redirecting the OLE access request, returning a processing result to the virtual desktop monitoring layer, and then turning to F for execution.
F. And (4) finishing the exit after the application program is processed, and turning to the execution of G.
G. Checking whether the desktop exits, and if so, ending; otherwise, go to A to execute.
3. Checking whether the starting OLE access agent is started or not, and if not, turning to the step 4 for execution; otherwise go to 7 to execute.
4. And starting the OLE agent, and moving to the next step for execution.
5. And acquiring desktop configuration and agent environment initialization, and transferring to the next step for execution after the desktop configuration and the agent environment initialization are completed.
6. And starting the system OLE service module, and transferring to the next step for execution after the system OLE service module is started successfully.
7. The OLE module provides services to the outside, responds to the OLE request, and the user closes the application program.
8. Checking whether a request for exiting the desktop exists, and if the request for exiting the desktop exists, turning to 9 for execution; otherwise go to 7 to execute.
9. And cleaning the OLE proxy service, starting the OLE proxy service layer and the related modules of the OLE service layer at the same time, and ending.
An embodiment of a specific application scenario is described below.
1. After the computer system logs in, a certain data security management system logs in, and the step 2 is carried out after the verification is passed.
2. The background service and related modules of the data security management system are initialized, and then the step 3 is carried out.
3. And (4) synchronizing the virtual desktop configuration and the strategy by the client, and then turning to the step 4 for processing.
4. And entering a virtual desktop through a program interface, and turning to the step 5 for processing.
5. And the application program generates an OLE access request and goes to the step 6 for processing.
6. And receiving data returned by the OLE access request, and turning to the step 7 for processing.
7. The user finishes the application program, and the step 8 is carried out to continue the processing
8. Checking whether the virtual desktop exits or not, and if not, turning to the step 4 for processing; otherwise, the step 9 is carried out.
9. Checking whether the system is quitted, if not, turning to the step 3 for processing; otherwise, exiting and ending.
In recent years, with the outbreak of various divulgence events, the security of the country and the long-term development are greatly threatened. Therefore, the state puts forward higher safety protection requirements for the financial industry related to the national demographics and the like, and the secret divulging event is avoided.
Aiming at the characteristics of the financial industry, with the continuous updating and perfection of the data security management system, the virtual desktop function can realize different desktop access to different applications according to the user requirements, separate the sensitive applications from the common desktop, realize the secure access of the applications without increasing the cost and prevent the occurrence of divulgence. Virtual desktops have gained wide acceptance in the financial industry.
Through the technical scheme of the invention, the following technical effects are achieved:
A. advanced structure, stable technology and high compatibility
B. Realize the isolation of the application OLE access between the desktops and have high safety degree
C. Client security is high
For the system embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a transmitter of a general purpose computer, special purpose computer, embedded transmitter, or other programmable data transmission terminal device to produce a machine, such that the instructions, which execute via the transmitter of the computer or other programmable data transmission terminal device, create a system for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data transmission terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction system which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data transmission terminal device to cause a series of operational steps to be performed on the computer or other programmable terminal device to produce a computer implemented transmission such that the instructions which execute on the computer or other programmable terminal device provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method and system for redirecting OLE based on virtual desktop provided by the present invention are introduced in detail, and a specific example is applied in the text to explain the principle and implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (9)

1. A virtual desktop based OLE redirection method is characterized by comprising the following steps:
1) initializing a virtual desktop environment and related system services;
2) entering a virtual desktop, and starting a new application program in the virtual desktop;
3) determining a virtual desktop to which a process included in the application program currently belongs;
4) judging whether the process starts an OLE access request, if so, redirecting the OLE access request, and redirecting the OLE access request of the application program to an OLE service proxy layer;
5) starting an OLE agent module, and acquiring desktop configuration and agent environment initialization;
6) starting an OLE service module;
7) the OLE service module provides service for the outside, responds to the OLE request and returns a processing result;
8) and (6) ending.
2. The method of claim 1, the step 1) of initializing a virtual desktop environment and related system services comprising: initializing a desktop environment, running a core driver and system services, and creating or switching a virtual desktop.
3. The method of claim 1, further comprising, after starting the new application within the virtual desktop in step 2): and starting a process monitoring module to monitor the creation and the closing of the process.
4. The method of claim 1, further comprising after step 4): and judging whether the virtual desktop exits or not, if so, jumping to the step 8), and otherwise, jumping to the step 2).
5. The method of claim 1, said step 7) being followed by: and judging whether the user exits the virtual desktop, if so, cleaning up the OLE service, and otherwise, jumping to the step 6).
6. A virtual desktop based OLE redirection system, the system comprising: the system comprises a virtual desktop monitoring layer, an OLE service agent layer and an OLE service layer;
the virtual desktop monitoring layer is used for monitoring process starting, desktop environment detection and OLE access redirection of a newly started application program;
the OLE service agent layer is used for acquiring desktop configuration information, initializing an agent environment, receiving an OLE access request redirected by the virtual desktop monitoring layer and transmitting the OLE access request to the OLE service layer;
the OLE service layer is used for executing the OLE access request and returning a processing result;
the virtual desktop monitoring layer comprises: the system comprises a process starting monitoring module, a desktop environment detection module and an OLE redirection module;
the system comprises a process starting monitoring module, a desktop environment detection module and a desktop environment monitoring module, wherein the process starting monitoring module is used for monitoring the starting and the closing of a process, and the desktop environment detection module is called when the process is started;
the desktop environment detection module is used for determining the current desktop of the starting process, acquiring relevant configuration information of the desktop and calling the OLE redirection module according to the configuration;
and the OLE redirection module is used for redirecting the OLE access request of the application program to the OLE service proxy layer.
7. The system of claim 6, wherein the OLE service proxy layer is configured to obtain configuration information of a current virtual table, perform proxy environment initialization, start the OLE service module of the system, receive an OLE access request redirected by the virtual desktop monitoring layer, and transmit the OLE access request to the OLE service layer.
8. The system of claim 6, wherein the OLE service layer is configured to execute the OLE access request passed by the OLE service proxy layer and return the processing result to the OLE service proxy layer.
9. A computer-readable storage medium storing computer program instructions which, when executed, implement the method of any one of claims 1-5.
CN201810134769.0A 2018-02-09 2018-02-09 OLE redirection method and system based on virtual desktop Active CN108470125B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810134769.0A CN108470125B (en) 2018-02-09 2018-02-09 OLE redirection method and system based on virtual desktop

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810134769.0A CN108470125B (en) 2018-02-09 2018-02-09 OLE redirection method and system based on virtual desktop

Publications (2)

Publication Number Publication Date
CN108470125A CN108470125A (en) 2018-08-31
CN108470125B true CN108470125B (en) 2021-01-19

Family

ID=63266411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810134769.0A Active CN108470125B (en) 2018-02-09 2018-02-09 OLE redirection method and system based on virtual desktop

Country Status (1)

Country Link
CN (1) CN108470125B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109669738B (en) * 2018-12-29 2019-12-03 北京明朝万达科技股份有限公司 A kind of starting method and device of application program
CN112099920B (en) * 2020-09-21 2023-10-20 北京明朝万达科技股份有限公司 Method and device for creating secure desktop, electronic equipment and readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020059358A1 (en) * 1997-07-17 2002-05-16 Microsoft Corporation Method and system for accessing objects of different thread types
US20100131654A1 (en) * 2008-11-25 2010-05-27 Microsoft Corporation Platform for enabling terminal services virtualization
CN102207856A (en) * 2010-03-29 2011-10-05 日电(中国)有限公司 Method and system for creating object of in-process component
US20110277026A1 (en) * 2010-05-07 2011-11-10 Mugdha Agarwal Systems and Methods for Providing Single Sign On Access to Enterprise SAAS and Cloud Hosted Applications
CN102819448A (en) * 2012-08-08 2012-12-12 深圳市京华科讯科技有限公司 Data transmission system and self-adaption switching method of a plurality of virtual desktops of data transmission system
CN103533034A (en) * 2013-09-28 2014-01-22 福建星网锐捷软件有限公司 Method for seamlessly using cloud terminal local camera in VDI (Virtual Device Interface) virtual desktop
CN102487380B (en) * 2010-12-01 2016-09-07 中兴通讯股份有限公司 Desktop virtual terminal entrusting method and system
CN106850809A (en) * 2017-02-09 2017-06-13 武汉烽火信息服务有限公司 The device of virtual desktop is used based on desktop cloud platform portal user

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020059358A1 (en) * 1997-07-17 2002-05-16 Microsoft Corporation Method and system for accessing objects of different thread types
US20100131654A1 (en) * 2008-11-25 2010-05-27 Microsoft Corporation Platform for enabling terminal services virtualization
CN102207856A (en) * 2010-03-29 2011-10-05 日电(中国)有限公司 Method and system for creating object of in-process component
US20110277026A1 (en) * 2010-05-07 2011-11-10 Mugdha Agarwal Systems and Methods for Providing Single Sign On Access to Enterprise SAAS and Cloud Hosted Applications
CN102487380B (en) * 2010-12-01 2016-09-07 中兴通讯股份有限公司 Desktop virtual terminal entrusting method and system
CN102819448A (en) * 2012-08-08 2012-12-12 深圳市京华科讯科技有限公司 Data transmission system and self-adaption switching method of a plurality of virtual desktops of data transmission system
CN103533034A (en) * 2013-09-28 2014-01-22 福建星网锐捷软件有限公司 Method for seamlessly using cloud terminal local camera in VDI (Virtual Device Interface) virtual desktop
CN106850809A (en) * 2017-02-09 2017-06-13 武汉烽火信息服务有限公司 The device of virtual desktop is used based on desktop cloud platform portal user

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
The Evolution of an x86 Virtual Machine Monitor;Ole Agesen 等;《ACM SIGOPS Operating Systems Review》;20101231;第3-18页 *

Also Published As

Publication number Publication date
CN108470125A (en) 2018-08-31

Similar Documents

Publication Publication Date Title
CN110222533B (en) Distributed data security application method and system and electronic equipment
US9635098B2 (en) Open platform, open platform access system, storage medium, and method for allowing third party application to access open platform
CN111726399B (en) Docker container secure access method and device
US8074229B2 (en) Co-execution of objects from divergent runtime environments
CN109951547B (en) Transaction request parallel processing method, device, equipment and medium
CN106797388B (en) Cross-system multimedia data encoding and decoding method and device, electronic equipment and computer program product
US20120017094A1 (en) Managing user accounts
CN107203419A (en) Intermodule call method, apparatus and system in application program
US10223321B2 (en) Combining redirected USB interfaces into a single composite device
US20130067100A1 (en) Multi-desktop interaction using nested remote desktop sessions
CN105791324A (en) Account login method and device
CN101876921A (en) Method, device and system for migration decision-making of virtual machine
JP2017514218A (en) Running third-party applications
US20150113546A1 (en) Server and method for managing application services
CN108415710A (en) The method and system of API is issued, called in Intelligent dialogue development platform
CN102135895B (en) System upgrading method and system
CN108470125B (en) OLE redirection method and system based on virtual desktop
US11522864B1 (en) Secure identity transfer
CN104580210A (en) Hotlinking prevention method, hotlinking prevention assembly and cloud platform under cloud platform environment
CN111435382B (en) Login checking method of page and terminal
CN101310256B (en) Method and system for translating computer program code
US10083052B1 (en) Streamlined remote application streaming technology configuration and usage
WO2015010644A1 (en) Method, apparatus, and system for achieving privilege separation
US9819725B1 (en) System, method, and computer program for remotely controlling mobile web applications installed on a mobile device
CN108696864A (en) Virtual-number is asked and sending method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant