CN111444505A - Cloud desktop mobile device security management method - Google Patents

Cloud desktop mobile device security management method Download PDF

Info

Publication number
CN111444505A
CN111444505A CN202010319266.8A CN202010319266A CN111444505A CN 111444505 A CN111444505 A CN 111444505A CN 202010319266 A CN202010319266 A CN 202010319266A CN 111444505 A CN111444505 A CN 111444505A
Authority
CN
China
Prior art keywords
mobile terminal
cloud
antivirus
antivirus module
cloud desktop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010319266.8A
Other languages
Chinese (zh)
Inventor
段晓亮
王辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Nanjia Technology Co ltd
Original Assignee
Henan Nanjia Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Nanjia Technology Co ltd filed Critical Henan Nanjia Technology Co ltd
Priority to CN202010319266.8A priority Critical patent/CN111444505A/en
Publication of CN111444505A publication Critical patent/CN111444505A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • G06F9/452Remote windowing, e.g. X-Window System, desktop virtualisation

Abstract

The invention discloses a security management method for cloud desktop mobile equipment, which is characterized in that a cloud antivirus module is arranged before the cloud desktop and a mobile terminal are connected, and whether virus threats exist in the mobile terminal or not is detected, and the method comprises the following steps: step 1: the mobile terminal applies for connection with the cloud antivirus module from the cloud desktop; step 2: the cloud desktop agrees with the application of connection establishment between the mobile terminal and the cloud antivirus module, and the mobile terminal is connected to the cloud antivirus module. According to the safety management method for the cloud desktop mobile equipment, the cloud antivirus module is arranged before the cloud desktop and the mobile terminal are connected, so that the cloud antivirus module can perform antivirus work on the mobile terminal before the cloud desktop and the mobile terminal are connected, namely the mobile terminal and the cloud desktop are connected under the condition that no threat exists in the mobile terminal equipment, the management effect on the mobile terminal is effectively enhanced, and the poisoning phenomenon of the cloud desktop is effectively avoided.

Description

Cloud desktop mobile device security management method
Technical Field
The invention relates to the technical field of mobile equipment safety management, in particular to a cloud desktop mobile equipment safety management method.
Background
The cloud desktop is also called desktop virtualization and cloud computer, and is a new mode for replacing the traditional computer; after the cloud desktop is adopted, a user does not need to purchase a computer host, all components such as a CPU (central processing unit), a memory, a hard disk and the like contained in the computer host are virtualized in a server at the back end, and 1-50 different virtual computers can be virtualized by a single high-performance server; the main stream of the front-end equipment is that a thin client (equipment similar to a television set-top box) is connected with a display and a keyboard and mouse, and a user accesses a virtual machine host on a back-end server through a specific communication protocol after installing a client to realize interactive operation, so that the experience effect consistent with that of a computer is achieved.
The mobile device is also called mobile device, handheld device, etc., and is a pocket-sized computing device, usually having a small display screen, touch input, or a small keyboard, because it can access and obtain various information anytime and anywhere, which is becoming popular soon, and together with mobile computing devices such as portable computers and smart phones, PDAs represent a new computer field, and now the use of mobile devices (mobile storage) is becoming more common, the read-write speed is becoming faster, and the storage space is also becoming larger, which greatly facilitates the storage of enterprise computer file information and facilitates the work requirement, but on the other hand, employees can easily copy a large number of computer files through mobile storage devices such as a usb disk, a mobile hard disk, a mobile phone, etc., thereby making enterprise computer files safe with a greater risk, data reading and writing are carried out on mobile equipment (mobile storage) and a cloud desktop, cloud desktop data leakage is easily caused, potential safety hazards exist in the mobile equipment, such as viruses, direct connection easily causes cloud desktop poisoning, the use of the mobile equipment cannot be well limited, and when the two pieces of equipment are connected, error of error connection easily occurs, so that the phenomenon of error transmission occurs, important files are further caused to be leaked and lost, the files cannot be well protected, and a technical concept of protecting the files is provided for realizing the technical concept of protecting the files.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a cloud desktop mobile equipment safety management method, which has the advantages that the cloud antivirus module is arranged before the cloud desktop and the mobile terminal are connected, so that the cloud antivirus module can carry out antivirus work on the mobile terminal before the cloud desktop and the mobile terminal are connected, namely the mobile terminal and the cloud desktop are connected under the condition that the mobile terminal equipment is not threatened, the management effect on the mobile terminal is effectively enhanced, the cloud desktop is effectively prevented from being threatened by viruses in the mobile terminal, the protection effect on data in the cloud desktop is effectively enhanced, the protection effect on files is effectively established and enhanced, the management problem on the mobile terminal and the protection problem on files and data in the cloud desktop are solved.
(II) technical scheme
In order to achieve the management purpose of the mobile terminal and the protection purpose of files and data in the cloud desktop, the invention provides the following technical scheme: the cloud desktop mobile device safety management method comprises the following steps of setting a cloud antivirus module before the cloud desktop and the mobile terminal are connected, and detecting whether virus threats exist in the mobile terminal or not:
step 1: the mobile terminal applies for connection with the cloud antivirus module from the cloud desktop;
step 2: the cloud desktop agrees with an application for establishing connection between the mobile terminal and the cloud antivirus module, and the mobile terminal is connected to the cloud antivirus module;
and step 3: the cloud antivirus module applies for accessing the mobile terminal, if the mobile terminal agrees to access the mobile terminal, the step 4 is carried out, and if the mobile terminal refuses to access, all connections are immediately disconnected;
and 4, step 4: the cloud antivirus module applies for a download authority to the mobile terminal, if the mobile terminal agrees to grant the download authority to the cloud antivirus module, the cloud antivirus module downloads the special antivirus software on the mobile terminal, and after the download is completed, the step 5 is carried out, and if the mobile terminal refuses to grant the download authority to the cloud antivirus module, all connections are immediately disconnected;
and 5: the cloud antivirus module applies for a control authority to the mobile terminal, if the mobile terminal agrees to grant the control authority to the cloud antivirus module, the cloud antivirus module opens the special antivirus software to kill viruses of all files stored in the mobile terminal, and if the mobile terminal refuses to grant the control authority to the cloud antivirus module, all connections are immediately disconnected;
step 6: if no threat is found after the antivirus is finished, the cloud desktop initiates identity recognition to the mobile terminal and performs step 7, and if the threat is found after the antivirus is finished, all connections are immediately disconnected;
and 7: and (4) popping up a password input popup window by the mobile terminal, inputting a password in the popup window by a user, establishing connection with the cloud desktop if the password is correctly input, and repeating the step 7 if the password is wrongly input.
Preferably, after the cloud antivirus module obtains the right to access the mobile terminal in step 3, the cloud antivirus module searches for the dedicated antivirus software on the mobile terminal device, and if the antivirus software exists on the mobile terminal, the step directly jumps to step 5.
Preferably, in step 6, if no threat is found after the antivirus is completed, the antivirus module sends information to a cloud desktop, and then the cloud desktop initiates identity recognition to the mobile terminal, while the cloud antivirus module is in a dormant state.
(III) advantageous effects
Compared with the prior art, the invention provides a cloud desktop mobile device safety management method, which has the following beneficial effects:
1. according to the safety management method for the cloud desktop mobile equipment, the cloud antivirus module is arranged before the cloud desktop and the mobile terminal are connected, so that the cloud antivirus module can perform antivirus work on the mobile terminal before the cloud desktop and the mobile terminal are connected, namely the mobile terminal and the cloud desktop are connected under the condition that no threat exists in the mobile terminal equipment, the management effect on the mobile terminal is effectively enhanced, the cloud desktop is effectively prevented from being threatened by viruses in the mobile terminal, the protection effect on data in the cloud desktop is effectively enhanced, and the protection performance on files is effectively established and enhanced.
Drawings
Fig. 1 is a schematic structural diagram of a security management method for a cloud desktop mobile device according to the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, in the security management method for the cloud desktop mobile device, before the cloud desktop and the mobile terminal are connected, a cloud antivirus module is set to detect whether a virus threat exists in the mobile terminal, in embodiment 1: the method comprises the following steps:
step 1: the mobile terminal applies for connection with the cloud antivirus module from the cloud desktop;
step 2: the cloud desktop agrees with an application for establishing connection between the mobile terminal and the cloud antivirus module, and the mobile terminal is connected to the cloud antivirus module;
and step 3: the cloud antivirus module applies for accessing the mobile terminal, if the mobile terminal agrees to access the mobile terminal, the step 4 is carried out, and if the mobile terminal refuses to access, all connections are immediately disconnected;
and 4, step 4: the cloud antivirus module applies for a download authority to the mobile terminal, if the mobile terminal agrees to grant the download authority to the cloud antivirus module, the cloud antivirus module downloads the special antivirus software on the mobile terminal, and after the download is completed, the step 5 is carried out, and if the mobile terminal refuses to grant the download authority to the cloud antivirus module, all connections are immediately disconnected;
and 5: the cloud antivirus module applies for a control authority to the mobile terminal, if the mobile terminal agrees to grant the control authority to the cloud antivirus module, the cloud antivirus module opens the special antivirus software to kill viruses of all files stored in the mobile terminal, and if the mobile terminal refuses to grant the control authority to the cloud antivirus module, all connections are immediately disconnected;
step 6: if no threat is found after the antivirus is finished, the cloud desktop initiates identity recognition to the mobile terminal and performs step 7, and if the threat is found after the antivirus is finished, all connections are immediately disconnected;
and 7: and (4) popping up a password input popup window by the mobile terminal, inputting a password in the popup window by a user, establishing connection with the cloud desktop if the password is correctly input, and repeating the step 7 if the password is wrongly input.
After the cloud antivirus module obtains the authority to access the mobile terminal in the step 3, the cloud antivirus module searches for the special antivirus software on the mobile terminal equipment, and if the antivirus software exists on the mobile terminal, the step directly jumps to the step 5.
In step 6, if no threat is found after the antivirus is completed, the antivirus module sends information to the cloud desktop, and then the cloud desktop initiates identity recognition to the mobile terminal, and meanwhile, the cloud antivirus module is in a dormant state.
Example two: the method comprises the following steps:
step 1: the mobile terminal applies for connection with the cloud antivirus module from the cloud desktop;
step 2: the cloud desktop agrees with an application for establishing connection between the mobile terminal and the cloud antivirus module, and the mobile terminal is connected to the cloud antivirus module;
and step 3: the cloud antivirus module applies for accessing the mobile terminal, if the mobile terminal agrees to access the mobile terminal, the step 4 is carried out, and if the mobile terminal refuses to access, all connections are immediately disconnected;
and 4, step 4: the cloud antivirus module applies for a download authority to the mobile terminal, if the mobile terminal agrees to grant the download authority to the cloud antivirus module, the cloud antivirus module downloads the special antivirus software on the mobile terminal, and after the download is completed, the step 5 is carried out, and if the mobile terminal refuses to grant the download authority to the cloud antivirus module, all connections are immediately disconnected;
and 5: the cloud antivirus module applies for a control authority to the mobile terminal, if the mobile terminal agrees to grant the control authority to the cloud antivirus module, the cloud antivirus module opens the special antivirus software to kill viruses of all files stored in the mobile terminal, and if the mobile terminal refuses to grant the control authority to the cloud antivirus module, all connections are immediately disconnected;
step 6: if no threat is found after the antivirus is finished, the cloud desktop initiates identity recognition to the mobile terminal and performs step 7, and if the threat is found after the antivirus is finished, all connections are immediately disconnected;
and 7: popping up a password input popup window by the mobile terminal, inputting a password in the popup window by a user, establishing connection with the cloud desktop if the password is correctly input, repeating the step 7 if the password is incorrectly input, and when the mobile terminal and the cloud desktop perform data transmission and the mobile terminal is externally connected with another mobile terminal device (namely, another mobile terminal is connected through a data line, a U disk and the like), immediately pausing the data transmission work and sending information to the cloud antivirus module, and immediately recovering the working state of the cloud antivirus module;
and 8: the cloud antivirus module applies for the access right of another external terminal, if the mobile terminal agrees to grant the access right of the cloud antivirus module, the step 4-7 is repeated, and if the mobile terminal refuses to grant the access right of the antivirus module, the data transmission of the cloud desktop is immediately closed and all connections are immediately disconnected;
and step 9: and (3) inputting the password by the user in the pop-up window, if the password is correctly input, continuing the data transmission work of the cloud desktop, and if the password is incorrectly input, continuing to pause the data transmission task by the cloud desktop, and repeating the step (9).
When the mobile terminal is used, the cloud antivirus module is arranged before the cloud desktop is connected with the mobile terminal, so that the cloud antivirus module can perform antivirus work on the mobile terminal before the cloud desktop is connected with the mobile terminal, namely the mobile terminal is connected with the cloud desktop under the condition that the mobile terminal is not threatened, the management effect on the mobile terminal is effectively enhanced, the cloud desktop is effectively prevented from being threatened by viruses in the mobile terminal, the protection effect on data in the cloud desktop is effectively enhanced, and the protection performance on files is effectively built and enhanced
In summary, according to the safety management method for the cloud desktop mobile device, the cloud antivirus module is arranged before the cloud desktop and the mobile terminal are connected, so that the cloud antivirus module can perform antivirus work on the mobile terminal before the cloud desktop and the mobile terminal are connected, that is, the mobile terminal and the cloud desktop are connected under the condition that no threat exists in the mobile terminal device, and therefore the management effect on the mobile terminal is effectively enhanced, the cloud desktop is effectively prevented from being threatened by viruses in the mobile terminal, the protection effect on data in the cloud desktop is effectively enhanced, the protection performance on files is effectively established and enhanced, and the phenomenon that the files in the cloud desktop are damaged is effectively avoided.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the use of the verb "comprise a" to define an element does not exclude the presence of another, same element in a process, method, article, or apparatus that comprises the element.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (3)

1. The cloud desktop mobile device safety management method is characterized in that a cloud antivirus module is arranged before the cloud desktop and the mobile terminal are connected, and whether virus threats exist in the mobile terminal or not is detected, and the method comprises the following steps:
step 1: the mobile terminal applies for connection with the cloud antivirus module from the cloud desktop;
step 2: the cloud desktop agrees with an application for establishing connection between the mobile terminal and the cloud antivirus module, and the mobile terminal is connected to the cloud antivirus module;
and step 3: the cloud antivirus module applies for accessing the mobile terminal, if the mobile terminal agrees to access the mobile terminal, the step 4 is carried out, and if the mobile terminal refuses to access, all connections are immediately disconnected;
and 4, step 4: the cloud antivirus module applies for a download authority to the mobile terminal, if the mobile terminal agrees to grant the download authority to the cloud antivirus module, the cloud antivirus module downloads the special antivirus software on the mobile terminal, and after the download is completed, the step 5 is carried out, and if the mobile terminal refuses to grant the download authority to the cloud antivirus module, all connections are immediately disconnected;
and 5: the cloud antivirus module applies for a control authority to the mobile terminal, if the mobile terminal agrees to grant the control authority to the cloud antivirus module, the cloud antivirus module opens the special antivirus software to kill viruses of all files stored in the mobile terminal, and if the mobile terminal refuses to grant the control authority to the cloud antivirus module, all connections are immediately disconnected;
step 6: if no threat is found after the antivirus is finished, the cloud desktop initiates identity recognition to the mobile terminal and performs step 7, and if the threat is found after the antivirus is finished, all connections are immediately disconnected;
and 7: and (4) popping up a password input popup window by the mobile terminal, inputting a password in the popup window by a user, establishing connection with the cloud desktop if the password is correctly input, and repeating the step 7 if the password is wrongly input.
2. The cloud desktop mobile device security management method of claim 1, wherein: after the cloud antivirus module obtains the authority to access the mobile terminal in the step 3, the cloud antivirus module searches for the special antivirus software on the mobile terminal equipment, and if the antivirus software exists on the mobile terminal, the step directly jumps to the step 5.
3. The cloud desktop mobile device security management method of claim 1, wherein: if no threat is found after the antivirus is completed in the step 6, the antivirus module sends information to a cloud desktop, then the cloud desktop initiates identity recognition to the mobile terminal, and meanwhile, the cloud antivirus module is in a dormant state.
CN202010319266.8A 2020-04-21 2020-04-21 Cloud desktop mobile device security management method Pending CN111444505A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010319266.8A CN111444505A (en) 2020-04-21 2020-04-21 Cloud desktop mobile device security management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010319266.8A CN111444505A (en) 2020-04-21 2020-04-21 Cloud desktop mobile device security management method

Publications (1)

Publication Number Publication Date
CN111444505A true CN111444505A (en) 2020-07-24

Family

ID=71653427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010319266.8A Pending CN111444505A (en) 2020-04-21 2020-04-21 Cloud desktop mobile device security management method

Country Status (1)

Country Link
CN (1) CN111444505A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113761515A (en) * 2021-08-20 2021-12-07 上海酷栈科技有限公司 Cloud desktop security detection method and system, computing device and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113761515A (en) * 2021-08-20 2021-12-07 上海酷栈科技有限公司 Cloud desktop security detection method and system, computing device and storage medium

Similar Documents

Publication Publication Date Title
US10528719B2 (en) OS security filter
US8850517B2 (en) Runtime risk detection based on user, application, and system action sequence correlation
US10509905B2 (en) Ransomware mitigation system
EP3029593A1 (en) System and method of limiting the operation of trusted applications in the presence of suspicious programs
US20190332765A1 (en) File processing method and system, and data processing method
JP6196740B2 (en) System and method for informing users about applications available for download
KR20180081726A (en) Program Avoidance Detection of Virtual Machines or Emulators
US20180357404A1 (en) Information processing method and apparatus, and electronic device
WO2014146451A1 (en) Method, apparatus, browser, electronic device and computer readable storage medium for enabling private browsing
CN111241546B (en) Malicious software behavior detection method and device
CN114528598A (en) Method and device for determining file integrity of file system and electronic equipment
Ramadhanty et al. Implementation and analysis of keyboard injection attack using usb devices in windows operating system
CN111444505A (en) Cloud desktop mobile device security management method
US10043013B1 (en) Systems and methods for detecting gadgets on computing devices
Efendy et al. Exploring the possibility of usb based fork bomb attack on windows environment
US11914710B2 (en) System and method for application tamper discovery
US9507924B2 (en) User authentication
US20170169044A1 (en) Property retrieval apparatus, method and system
CN113839944B (en) Method, device, electronic equipment and medium for coping with network attack
US10318250B1 (en) Systems and methods for locating functions for later interception
CN114531294A (en) Network anomaly sensing method and device, terminal and storage medium
CN111352357B (en) Robot control method and device and terminal equipment
CN108632366B (en) File downloading method and device and terminal equipment
US11100226B1 (en) Systems and methods for identifying a malicious user interface
CN113779576A (en) Identification method and device for executable file infected virus and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200724

WD01 Invention patent application deemed withdrawn after publication