CN111444505A - Cloud desktop mobile device security management method - Google Patents
Cloud desktop mobile device security management method Download PDFInfo
- Publication number
- CN111444505A CN111444505A CN202010319266.8A CN202010319266A CN111444505A CN 111444505 A CN111444505 A CN 111444505A CN 202010319266 A CN202010319266 A CN 202010319266A CN 111444505 A CN111444505 A CN 111444505A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- cloud
- antivirus
- antivirus module
- cloud desktop
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 23
- 230000002155 anti-virotic effect Effects 0.000 claims abstract description 112
- 241000700605 Viruses Species 0.000 claims abstract description 13
- 238000000034 method Methods 0.000 claims abstract description 10
- 230000000694 effects Effects 0.000 abstract description 12
- 231100000572 poisoning Toxicity 0.000 abstract description 2
- 230000000607 poisoning effect Effects 0.000 abstract description 2
- 230000005540 biological transmission Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
- G06F9/452—Remote windowing, e.g. X-Window System, desktop virtualisation
Abstract
The invention discloses a security management method for cloud desktop mobile equipment, which is characterized in that a cloud antivirus module is arranged before the cloud desktop and a mobile terminal are connected, and whether virus threats exist in the mobile terminal or not is detected, and the method comprises the following steps: step 1: the mobile terminal applies for connection with the cloud antivirus module from the cloud desktop; step 2: the cloud desktop agrees with the application of connection establishment between the mobile terminal and the cloud antivirus module, and the mobile terminal is connected to the cloud antivirus module. According to the safety management method for the cloud desktop mobile equipment, the cloud antivirus module is arranged before the cloud desktop and the mobile terminal are connected, so that the cloud antivirus module can perform antivirus work on the mobile terminal before the cloud desktop and the mobile terminal are connected, namely the mobile terminal and the cloud desktop are connected under the condition that no threat exists in the mobile terminal equipment, the management effect on the mobile terminal is effectively enhanced, and the poisoning phenomenon of the cloud desktop is effectively avoided.
Description
Technical Field
The invention relates to the technical field of mobile equipment safety management, in particular to a cloud desktop mobile equipment safety management method.
Background
The cloud desktop is also called desktop virtualization and cloud computer, and is a new mode for replacing the traditional computer; after the cloud desktop is adopted, a user does not need to purchase a computer host, all components such as a CPU (central processing unit), a memory, a hard disk and the like contained in the computer host are virtualized in a server at the back end, and 1-50 different virtual computers can be virtualized by a single high-performance server; the main stream of the front-end equipment is that a thin client (equipment similar to a television set-top box) is connected with a display and a keyboard and mouse, and a user accesses a virtual machine host on a back-end server through a specific communication protocol after installing a client to realize interactive operation, so that the experience effect consistent with that of a computer is achieved.
The mobile device is also called mobile device, handheld device, etc., and is a pocket-sized computing device, usually having a small display screen, touch input, or a small keyboard, because it can access and obtain various information anytime and anywhere, which is becoming popular soon, and together with mobile computing devices such as portable computers and smart phones, PDAs represent a new computer field, and now the use of mobile devices (mobile storage) is becoming more common, the read-write speed is becoming faster, and the storage space is also becoming larger, which greatly facilitates the storage of enterprise computer file information and facilitates the work requirement, but on the other hand, employees can easily copy a large number of computer files through mobile storage devices such as a usb disk, a mobile hard disk, a mobile phone, etc., thereby making enterprise computer files safe with a greater risk, data reading and writing are carried out on mobile equipment (mobile storage) and a cloud desktop, cloud desktop data leakage is easily caused, potential safety hazards exist in the mobile equipment, such as viruses, direct connection easily causes cloud desktop poisoning, the use of the mobile equipment cannot be well limited, and when the two pieces of equipment are connected, error of error connection easily occurs, so that the phenomenon of error transmission occurs, important files are further caused to be leaked and lost, the files cannot be well protected, and a technical concept of protecting the files is provided for realizing the technical concept of protecting the files.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a cloud desktop mobile equipment safety management method, which has the advantages that the cloud antivirus module is arranged before the cloud desktop and the mobile terminal are connected, so that the cloud antivirus module can carry out antivirus work on the mobile terminal before the cloud desktop and the mobile terminal are connected, namely the mobile terminal and the cloud desktop are connected under the condition that the mobile terminal equipment is not threatened, the management effect on the mobile terminal is effectively enhanced, the cloud desktop is effectively prevented from being threatened by viruses in the mobile terminal, the protection effect on data in the cloud desktop is effectively enhanced, the protection effect on files is effectively established and enhanced, the management problem on the mobile terminal and the protection problem on files and data in the cloud desktop are solved.
(II) technical scheme
In order to achieve the management purpose of the mobile terminal and the protection purpose of files and data in the cloud desktop, the invention provides the following technical scheme: the cloud desktop mobile device safety management method comprises the following steps of setting a cloud antivirus module before the cloud desktop and the mobile terminal are connected, and detecting whether virus threats exist in the mobile terminal or not:
step 1: the mobile terminal applies for connection with the cloud antivirus module from the cloud desktop;
step 2: the cloud desktop agrees with an application for establishing connection between the mobile terminal and the cloud antivirus module, and the mobile terminal is connected to the cloud antivirus module;
and step 3: the cloud antivirus module applies for accessing the mobile terminal, if the mobile terminal agrees to access the mobile terminal, the step 4 is carried out, and if the mobile terminal refuses to access, all connections are immediately disconnected;
and 4, step 4: the cloud antivirus module applies for a download authority to the mobile terminal, if the mobile terminal agrees to grant the download authority to the cloud antivirus module, the cloud antivirus module downloads the special antivirus software on the mobile terminal, and after the download is completed, the step 5 is carried out, and if the mobile terminal refuses to grant the download authority to the cloud antivirus module, all connections are immediately disconnected;
and 5: the cloud antivirus module applies for a control authority to the mobile terminal, if the mobile terminal agrees to grant the control authority to the cloud antivirus module, the cloud antivirus module opens the special antivirus software to kill viruses of all files stored in the mobile terminal, and if the mobile terminal refuses to grant the control authority to the cloud antivirus module, all connections are immediately disconnected;
step 6: if no threat is found after the antivirus is finished, the cloud desktop initiates identity recognition to the mobile terminal and performs step 7, and if the threat is found after the antivirus is finished, all connections are immediately disconnected;
and 7: and (4) popping up a password input popup window by the mobile terminal, inputting a password in the popup window by a user, establishing connection with the cloud desktop if the password is correctly input, and repeating the step 7 if the password is wrongly input.
Preferably, after the cloud antivirus module obtains the right to access the mobile terminal in step 3, the cloud antivirus module searches for the dedicated antivirus software on the mobile terminal device, and if the antivirus software exists on the mobile terminal, the step directly jumps to step 5.
Preferably, in step 6, if no threat is found after the antivirus is completed, the antivirus module sends information to a cloud desktop, and then the cloud desktop initiates identity recognition to the mobile terminal, while the cloud antivirus module is in a dormant state.
(III) advantageous effects
Compared with the prior art, the invention provides a cloud desktop mobile device safety management method, which has the following beneficial effects:
1. according to the safety management method for the cloud desktop mobile equipment, the cloud antivirus module is arranged before the cloud desktop and the mobile terminal are connected, so that the cloud antivirus module can perform antivirus work on the mobile terminal before the cloud desktop and the mobile terminal are connected, namely the mobile terminal and the cloud desktop are connected under the condition that no threat exists in the mobile terminal equipment, the management effect on the mobile terminal is effectively enhanced, the cloud desktop is effectively prevented from being threatened by viruses in the mobile terminal, the protection effect on data in the cloud desktop is effectively enhanced, and the protection performance on files is effectively established and enhanced.
Drawings
Fig. 1 is a schematic structural diagram of a security management method for a cloud desktop mobile device according to the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, in the security management method for the cloud desktop mobile device, before the cloud desktop and the mobile terminal are connected, a cloud antivirus module is set to detect whether a virus threat exists in the mobile terminal, in embodiment 1: the method comprises the following steps:
step 1: the mobile terminal applies for connection with the cloud antivirus module from the cloud desktop;
step 2: the cloud desktop agrees with an application for establishing connection between the mobile terminal and the cloud antivirus module, and the mobile terminal is connected to the cloud antivirus module;
and step 3: the cloud antivirus module applies for accessing the mobile terminal, if the mobile terminal agrees to access the mobile terminal, the step 4 is carried out, and if the mobile terminal refuses to access, all connections are immediately disconnected;
and 4, step 4: the cloud antivirus module applies for a download authority to the mobile terminal, if the mobile terminal agrees to grant the download authority to the cloud antivirus module, the cloud antivirus module downloads the special antivirus software on the mobile terminal, and after the download is completed, the step 5 is carried out, and if the mobile terminal refuses to grant the download authority to the cloud antivirus module, all connections are immediately disconnected;
and 5: the cloud antivirus module applies for a control authority to the mobile terminal, if the mobile terminal agrees to grant the control authority to the cloud antivirus module, the cloud antivirus module opens the special antivirus software to kill viruses of all files stored in the mobile terminal, and if the mobile terminal refuses to grant the control authority to the cloud antivirus module, all connections are immediately disconnected;
step 6: if no threat is found after the antivirus is finished, the cloud desktop initiates identity recognition to the mobile terminal and performs step 7, and if the threat is found after the antivirus is finished, all connections are immediately disconnected;
and 7: and (4) popping up a password input popup window by the mobile terminal, inputting a password in the popup window by a user, establishing connection with the cloud desktop if the password is correctly input, and repeating the step 7 if the password is wrongly input.
After the cloud antivirus module obtains the authority to access the mobile terminal in the step 3, the cloud antivirus module searches for the special antivirus software on the mobile terminal equipment, and if the antivirus software exists on the mobile terminal, the step directly jumps to the step 5.
In step 6, if no threat is found after the antivirus is completed, the antivirus module sends information to the cloud desktop, and then the cloud desktop initiates identity recognition to the mobile terminal, and meanwhile, the cloud antivirus module is in a dormant state.
Example two: the method comprises the following steps:
step 1: the mobile terminal applies for connection with the cloud antivirus module from the cloud desktop;
step 2: the cloud desktop agrees with an application for establishing connection between the mobile terminal and the cloud antivirus module, and the mobile terminal is connected to the cloud antivirus module;
and step 3: the cloud antivirus module applies for accessing the mobile terminal, if the mobile terminal agrees to access the mobile terminal, the step 4 is carried out, and if the mobile terminal refuses to access, all connections are immediately disconnected;
and 4, step 4: the cloud antivirus module applies for a download authority to the mobile terminal, if the mobile terminal agrees to grant the download authority to the cloud antivirus module, the cloud antivirus module downloads the special antivirus software on the mobile terminal, and after the download is completed, the step 5 is carried out, and if the mobile terminal refuses to grant the download authority to the cloud antivirus module, all connections are immediately disconnected;
and 5: the cloud antivirus module applies for a control authority to the mobile terminal, if the mobile terminal agrees to grant the control authority to the cloud antivirus module, the cloud antivirus module opens the special antivirus software to kill viruses of all files stored in the mobile terminal, and if the mobile terminal refuses to grant the control authority to the cloud antivirus module, all connections are immediately disconnected;
step 6: if no threat is found after the antivirus is finished, the cloud desktop initiates identity recognition to the mobile terminal and performs step 7, and if the threat is found after the antivirus is finished, all connections are immediately disconnected;
and 7: popping up a password input popup window by the mobile terminal, inputting a password in the popup window by a user, establishing connection with the cloud desktop if the password is correctly input, repeating the step 7 if the password is incorrectly input, and when the mobile terminal and the cloud desktop perform data transmission and the mobile terminal is externally connected with another mobile terminal device (namely, another mobile terminal is connected through a data line, a U disk and the like), immediately pausing the data transmission work and sending information to the cloud antivirus module, and immediately recovering the working state of the cloud antivirus module;
and 8: the cloud antivirus module applies for the access right of another external terminal, if the mobile terminal agrees to grant the access right of the cloud antivirus module, the step 4-7 is repeated, and if the mobile terminal refuses to grant the access right of the antivirus module, the data transmission of the cloud desktop is immediately closed and all connections are immediately disconnected;
and step 9: and (3) inputting the password by the user in the pop-up window, if the password is correctly input, continuing the data transmission work of the cloud desktop, and if the password is incorrectly input, continuing to pause the data transmission task by the cloud desktop, and repeating the step (9).
When the mobile terminal is used, the cloud antivirus module is arranged before the cloud desktop is connected with the mobile terminal, so that the cloud antivirus module can perform antivirus work on the mobile terminal before the cloud desktop is connected with the mobile terminal, namely the mobile terminal is connected with the cloud desktop under the condition that the mobile terminal is not threatened, the management effect on the mobile terminal is effectively enhanced, the cloud desktop is effectively prevented from being threatened by viruses in the mobile terminal, the protection effect on data in the cloud desktop is effectively enhanced, and the protection performance on files is effectively built and enhanced
In summary, according to the safety management method for the cloud desktop mobile device, the cloud antivirus module is arranged before the cloud desktop and the mobile terminal are connected, so that the cloud antivirus module can perform antivirus work on the mobile terminal before the cloud desktop and the mobile terminal are connected, that is, the mobile terminal and the cloud desktop are connected under the condition that no threat exists in the mobile terminal device, and therefore the management effect on the mobile terminal is effectively enhanced, the cloud desktop is effectively prevented from being threatened by viruses in the mobile terminal, the protection effect on data in the cloud desktop is effectively enhanced, the protection performance on files is effectively established and enhanced, and the phenomenon that the files in the cloud desktop are damaged is effectively avoided.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the use of the verb "comprise a" to define an element does not exclude the presence of another, same element in a process, method, article, or apparatus that comprises the element.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (3)
1. The cloud desktop mobile device safety management method is characterized in that a cloud antivirus module is arranged before the cloud desktop and the mobile terminal are connected, and whether virus threats exist in the mobile terminal or not is detected, and the method comprises the following steps:
step 1: the mobile terminal applies for connection with the cloud antivirus module from the cloud desktop;
step 2: the cloud desktop agrees with an application for establishing connection between the mobile terminal and the cloud antivirus module, and the mobile terminal is connected to the cloud antivirus module;
and step 3: the cloud antivirus module applies for accessing the mobile terminal, if the mobile terminal agrees to access the mobile terminal, the step 4 is carried out, and if the mobile terminal refuses to access, all connections are immediately disconnected;
and 4, step 4: the cloud antivirus module applies for a download authority to the mobile terminal, if the mobile terminal agrees to grant the download authority to the cloud antivirus module, the cloud antivirus module downloads the special antivirus software on the mobile terminal, and after the download is completed, the step 5 is carried out, and if the mobile terminal refuses to grant the download authority to the cloud antivirus module, all connections are immediately disconnected;
and 5: the cloud antivirus module applies for a control authority to the mobile terminal, if the mobile terminal agrees to grant the control authority to the cloud antivirus module, the cloud antivirus module opens the special antivirus software to kill viruses of all files stored in the mobile terminal, and if the mobile terminal refuses to grant the control authority to the cloud antivirus module, all connections are immediately disconnected;
step 6: if no threat is found after the antivirus is finished, the cloud desktop initiates identity recognition to the mobile terminal and performs step 7, and if the threat is found after the antivirus is finished, all connections are immediately disconnected;
and 7: and (4) popping up a password input popup window by the mobile terminal, inputting a password in the popup window by a user, establishing connection with the cloud desktop if the password is correctly input, and repeating the step 7 if the password is wrongly input.
2. The cloud desktop mobile device security management method of claim 1, wherein: after the cloud antivirus module obtains the authority to access the mobile terminal in the step 3, the cloud antivirus module searches for the special antivirus software on the mobile terminal equipment, and if the antivirus software exists on the mobile terminal, the step directly jumps to the step 5.
3. The cloud desktop mobile device security management method of claim 1, wherein: if no threat is found after the antivirus is completed in the step 6, the antivirus module sends information to a cloud desktop, then the cloud desktop initiates identity recognition to the mobile terminal, and meanwhile, the cloud antivirus module is in a dormant state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010319266.8A CN111444505A (en) | 2020-04-21 | 2020-04-21 | Cloud desktop mobile device security management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010319266.8A CN111444505A (en) | 2020-04-21 | 2020-04-21 | Cloud desktop mobile device security management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111444505A true CN111444505A (en) | 2020-07-24 |
Family
ID=71653427
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010319266.8A Pending CN111444505A (en) | 2020-04-21 | 2020-04-21 | Cloud desktop mobile device security management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111444505A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113761515A (en) * | 2021-08-20 | 2021-12-07 | 上海酷栈科技有限公司 | Cloud desktop security detection method and system, computing device and storage medium |
-
2020
- 2020-04-21 CN CN202010319266.8A patent/CN111444505A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113761515A (en) * | 2021-08-20 | 2021-12-07 | 上海酷栈科技有限公司 | Cloud desktop security detection method and system, computing device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10528719B2 (en) | OS security filter | |
US8850517B2 (en) | Runtime risk detection based on user, application, and system action sequence correlation | |
US10509905B2 (en) | Ransomware mitigation system | |
EP3029593A1 (en) | System and method of limiting the operation of trusted applications in the presence of suspicious programs | |
US20190332765A1 (en) | File processing method and system, and data processing method | |
JP6196740B2 (en) | System and method for informing users about applications available for download | |
KR20180081726A (en) | Program Avoidance Detection of Virtual Machines or Emulators | |
US20180357404A1 (en) | Information processing method and apparatus, and electronic device | |
WO2014146451A1 (en) | Method, apparatus, browser, electronic device and computer readable storage medium for enabling private browsing | |
CN111241546B (en) | Malicious software behavior detection method and device | |
CN114528598A (en) | Method and device for determining file integrity of file system and electronic equipment | |
Ramadhanty et al. | Implementation and analysis of keyboard injection attack using usb devices in windows operating system | |
CN111444505A (en) | Cloud desktop mobile device security management method | |
US10043013B1 (en) | Systems and methods for detecting gadgets on computing devices | |
Efendy et al. | Exploring the possibility of usb based fork bomb attack on windows environment | |
US11914710B2 (en) | System and method for application tamper discovery | |
US9507924B2 (en) | User authentication | |
US20170169044A1 (en) | Property retrieval apparatus, method and system | |
CN113839944B (en) | Method, device, electronic equipment and medium for coping with network attack | |
US10318250B1 (en) | Systems and methods for locating functions for later interception | |
CN114531294A (en) | Network anomaly sensing method and device, terminal and storage medium | |
CN111352357B (en) | Robot control method and device and terminal equipment | |
CN108632366B (en) | File downloading method and device and terminal equipment | |
US11100226B1 (en) | Systems and methods for identifying a malicious user interface | |
CN113779576A (en) | Identification method and device for executable file infected virus and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20200724 |
|
WD01 | Invention patent application deemed withdrawn after publication |