CN115022308B - Login method of remote system and related equipment thereof - Google Patents

Login method of remote system and related equipment thereof Download PDF

Info

Publication number
CN115022308B
CN115022308B CN202210604669.6A CN202210604669A CN115022308B CN 115022308 B CN115022308 B CN 115022308B CN 202210604669 A CN202210604669 A CN 202210604669A CN 115022308 B CN115022308 B CN 115022308B
Authority
CN
China
Prior art keywords
remote
login
rpa
service
remote system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210604669.6A
Other languages
Chinese (zh)
Other versions
CN115022308A (en
Inventor
赵莫言
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202210604669.6A priority Critical patent/CN115022308B/en
Publication of CN115022308A publication Critical patent/CN115022308A/en
Application granted granted Critical
Publication of CN115022308B publication Critical patent/CN115022308B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • G06F9/452Remote windowing, e.g. X-Window System, desktop virtualisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/14Image acquisition
    • G06V30/148Segmentation of character regions
    • G06V30/153Segmentation of character regions using recognition of characters or words
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application belongs to the field of artificial intelligence, and relates to a login method of a remote system, which is applied to local equipment, and comprises the steps of obtaining remote login credentials and service configuration; generating a robot flow automatic RPA monitoring service and an RPA unlocking service according to the service configuration; when the RPA monitoring service monitors that the remote desktop connection is interrupted, reestablishing a remote connection session through the RPA unlocking service, and logging in a remote system through the remote connection session and a remote login credential; and reading the execution state of the task in the remote system, and executing the task according to the execution state. The application also provides a login device of the remote system, computer equipment and a storage medium. The method and the device solve the problem that the cloud computer is in a screen locking state to cause the process execution error reporting when the RPA is started.

Description

Login method of remote system and related equipment thereof
Technical Field
The present disclosure relates to the field of artificial intelligence, and in particular, to a login method for a remote system and related devices thereof.
Background
Robot flow automation (Robotic Process Automation, RPA) products are novel work flow automation office robot software, RPA can process high-frequency services with clear rules in an automatic batch mode through simulating manual operation of a keyboard and a mouse, office staff can be liberated from repeated daily work, and production efficiency is improved.
The user can deploy the RPA on a cloud desktop of the cloud computer through the local computer, and the user can conduct automatic operation to process the service. However, since cloud computers generally have an automatic screen locking mechanism, a user name and a password need to be manually input to re-enter the operating system under the condition of no operation for a long time. In addition, when the remote desktop connection (Microsoft terminal services client, mssc) between the local computer and the cloud computer is locked, the Session (Session) between the local computer and the remote desktop is interrupted, so if the RPA is in the locked state when the RPA is started, the local computer interrupts the Session with the remote desktop, thereby causing a process execution error.
Disclosure of Invention
An objective of the embodiments of the present application is to provide a login method of a remote system and related devices, so as to solve the problem of process execution error reporting caused by a screen locking state of a cloud computer when an RPA is started.
In order to solve the above technical problems, the embodiments of the present application provide a login method of a remote system, which is applied to a local device, and adopts the following technical scheme:
acquiring a remote login credential and a service configuration; generating a robot flow automation (RPA) monitoring service and an RPA unlocking service according to the service configuration; when the RPA monitoring service monitors that the remote desktop connection is interrupted, reestablishing a remote connection session through the RPA unlocking service, and logging in a remote system through the remote connection session and the remote login credentials; and reading the execution state of the task in the remote system, and executing the task according to the execution state.
Further, the service configuration includes a listening configuration parameter and an unlocking configuration parameter; the generating the robot flow automation (RPA) monitoring service and the RPA unlocking service according to the service configuration comprises the following steps: and calling the monitoring configuration parameters to generate RPA monitoring service, and calling the unlocking configuration parameters to generate RPA unlocking service.
Further, the reestablishing the remote connection session through the RPA unlocking service includes: and initiating remote desktop connection through the RPA unlocking service, and entering a remote connection session through the remote desktop connection.
Further, before logging in to a remote system via the remote connection session and the remote login credentials, the logging method further comprises: and decrypting the remote login credentials to obtain a remote account and a password corresponding to the remote account.
Further, the session box corresponding to the remote connection session includes a remote account input box, a password input box and a login control, and the login to the remote system through the remote connection session and the remote login credential includes: and writing the remote account into the remote account input box, writing a password corresponding to the remote account into the password input box, and triggering the login control to log in the remote system.
Further, the execution state is any one of unexecuted and executed; the task executing according to the executing state comprises the following steps: and when the execution state of the target task is non-execution, starting a service script corresponding to the target task to execute the target task.
Further, after logging into the remote system through the remote connection session and the remote login credentials, the method further comprises: intercepting a login interface, and determining that the remote system login is successful when the login interface is recognized as a login success interface through an optical character recognition OCR technology.
In order to solve the above technical problems, the embodiments of the present application further provide a login device of a remote system, which adopts the following technical scheme:
the acquisition module is used for acquiring the remote login credentials and the service configuration; the generation module is used for generating a robot flow automation RPA monitoring service and an RPA unlocking service according to the service configuration; the login module is used for reestablishing a remote connection session through the RPA unlocking service when the RPA monitoring service monitors that the remote desktop connection is interrupted, and logging in a remote system through the remote connection session and the remote login credentials; and the execution module is used for reading the execution state of the task in the remote system and executing the task according to the execution state.
Further, the service configuration includes a listening configuration parameter and an unlocking configuration parameter; the generating module is specifically configured to invoke the monitoring configuration parameter to generate an RPA monitoring service, and invoke the unlocking configuration parameter to generate an RPA unlocking service.
Further, the login module comprises a first login sub-module; the first login sub-module is used for initiating remote desktop connection through the RPA unlocking service and entering a remote connection session through the remote desktop connection.
Further, the login device further comprises a decryption module; and the decryption module is used for decrypting the remote login credentials to obtain a remote account and a password corresponding to the remote account.
Further, the session box corresponding to the remote connection session comprises a remote account input box, a password input box and a login control; the login module further comprises a second login sub-module; the second login sub-module is used for writing the remote account into the remote account input box, writing a password corresponding to the remote account into the password input box, and triggering the login control to login the remote system.
Further, the execution state is any one of unexecuted and executed; the execution module is specifically configured to start a service script corresponding to a target task to execute the target task when an execution state of the target task is not executed.
Further, the login device further comprises an identification module; the recognition module intercepts a login interface and determines that the remote system login is successful when the login interface is recognized as a login success interface through an optical character recognition OCR technology.
In order to solve the above technical problem, an embodiment of the present application further provides a computer device, including a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the login method of the remote system when executing the computer program.
In order to solve the above technical problem, the embodiments of the present application further provide a computer readable storage medium, where a computer program is stored, where the computer program when executed by a processor implements the steps of the login method of the remote system.
Compared with the prior art, the embodiment of the application has the following main beneficial effects: firstly, remote login credentials and service configuration are acquired, and an RPA monitoring service and an RPA unlocking service are generated according to the service configuration. When the RPA monitoring service monitors that the remote desktop connection is interrupted, the remote connection session is reestablished through the RPA unlocking service, and the remote system is logged in through the remote connection session and the remote login credentials. And then, reading the execution state of the task in the remote system, and executing the task according to the execution state. The remote desktop connection disconnection can be monitored through the RPA monitoring service, and the remote desktop is logged in again through the RPA unlocking service. The condition that the cloud computer can reenter the operating system only by manually inputting a user name and a password under the condition that the cloud computer is not operated for a long time is avoided, and the automatic login of a remote system is realized.
In addition, after logging in the remote system again, the execution state of the task in the remote system can be read, and the task can be executed according to the execution state. The problem that the cloud computer is in a screen locking state, the local computer interrupts the session with the remote desktop, and therefore the process execution errors are caused is avoided.
Drawings
For a clearer description of the solution in the present application, a brief description will be given below of the drawings that are needed in the description of the embodiments of the present application, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow chart of one embodiment of a login method for a remote system according to the present application;
FIG. 3 is a schematic diagram of one embodiment of a login device of a remote system according to the present application;
FIG. 4 is a schematic structural view of another embodiment of a login device of a remote system according to the present application;
FIG. 5 is a schematic structural diagram of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the applications herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "comprising" and "having" and any variations thereof in the description and claims of the present application and in the description of the figures above are intended to cover non-exclusive inclusions. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to better understand the technical solutions of the present application, the following description will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings.
As shown in fig. 1, a system architecture 100 may include a local device 101, a network 102, and remote servers 103, 104, 105. The network 102 is the medium used to provide communication links between the local device 101 and the remote servers 103, 104, 105. Network 102 may include various connection types such as wired, wireless communication links, or fiber optic cables, among others.
A user may use the local device 101 to deploy RPA on a cloud desktop of the remote servers 103, 104, 105 over the network 102 for automation operations to handle traffic. The local device 101 may have installed thereon various communication client applications such as web browser applications, shopping class applications, search class applications, instant messaging tools, mailbox clients, social platform software, and the like.
The local device 101 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablet computers, electronic book readers, MP3 players (Moving Picture ExpertsGroup Audio Layer III, dynamic video expert compression standard audio plane 3), MP4 (Moving PictureExperts Group Audio Layer IV, dynamic video expert compression standard audio plane 4) players, laptop and desktop computers, and the like.
The remote servers 103, 104, 105 may be servers that provide various services, such as a background server that provides support for pages displayed on the local device 101.
It should be noted that the login method of the remote system provided in the embodiment of the present application may be applied to the local device 101. The local device 101 may be collectively referred to as an electronic device. That is, the execution body of the login method of the remote system provided in the embodiment of the present application may be a login device of the remote system, and the login device of the remote system may be the above-mentioned electronic device (such as the local device 101).
It should be understood that the number of local devices, networks, and remote servers in fig. 1 is merely illustrative. There may be any number of local devices, networks, and remote servers, as desired for implementation.
With continued reference to FIG. 2, a flow chart of one embodiment of a login method for a remote system according to the present application is shown. The login method of the remote system comprises the following steps:
step S21, obtaining remote login credentials and service configuration.
Specifically, a remote account and a password corresponding to the remote account are obtained from a system process.
In some alternative implementations, the remote account and the ciphertext corresponding to the remote account are stored. Wherein the remote account and the password corresponding to the remote account may be encrypted using an encryption algorithm. Such as symmetric encryption algorithms, hash algorithms, etc.
Step S22, a robot flow automatic RPA monitoring service and an RPA unlocking service are generated according to the service configuration.
The service configuration comprises a monitoring configuration parameter and an unlocking configuration parameter. The monitoring configuration parameters and the unlocking configuration parameters are parameters which are preset by relevant management personnel.
Specifically, the monitoring configuration parameter is called to generate an RPA monitoring service, and the unlocking configuration parameter is called to generate an RPA unlocking service.
In this embodiment, the RPA monitoring service is generated by calling the monitoring configuration parameter, and the RPA unlocking service is generated by calling the unlocking configuration parameter, so that whether the remote desktop connection is interrupted or not is monitored by using the RPA monitoring service, and when the remote desktop connection interruption is monitored, the remote connection session is reestablished by using the RPA unlocking service, so that the remote system is logged in. The condition that the cloud computer can reenter the operating system only by manually inputting a user name and a password under the condition that the cloud computer is not operated for a long time is avoided, and the automatic login of a remote system is realized.
In step S23, when the RPA listening service monitors the remote desktop connection interruption, the remote connection session is re-established by the RPA unlocking service, and the remote system is logged in through the remote connection session and the remote login credentials.
The session box corresponding to the remote connection session comprises a remote account input box, a password input box and a login control.
Specifically, when the RPA monitoring service monitors that the remote desktop connection is interrupted, the remote desktop connection is initiated by the RPA unlocking service, and a remote connection session is entered by the remote desktop connection.
In this embodiment, a remote desktop connection is initiated by the RPA unlock service and entered into a remote connection session by the remote desktop connection, so that a remote system is subsequently logged in according to the remote connection session. The condition that the cloud computer can reenter the operating system only by manually inputting a user name and a password under the condition that the cloud computer is not operated for a long time is avoided, and the automatic login of a remote system is realized.
And writing the remote account into a remote account input box, writing a password corresponding to the remote account into the password input box, and triggering a login control to log in the remote system.
In the embodiment, the remote system can be logged in through the remote connection session and the remote login credentials, so that the condition that the user name and the password need to be manually input to reenter the operating system is avoided, and the automatic login of the remote system is realized.
In some alternative implementations, the remote login credentials are decrypted to obtain the remote account and a password corresponding to the remote account prior to logging into the remote system via the remote connection session and the remote login credentials.
In the embodiment, the remote account and the password ciphertext corresponding to the remote account are stored, and then are used in a decrypting mode when in use, so that the security of the remote account and the password corresponding to the remote account is ensured.
In some alternative implementations of the present embodiment, after logging into the remote system via the remote connection session and the remote login credentials, the logging method further includes intercepting a logging interface and determining that the remote system logging was successful when the logging interface is identified as a logging success interface via optical character recognition (Optical Character Recognition, OCR) technology.
Specifically, after the remote account is written into the remote account input box, the password corresponding to the remote account is written into the password input box, the login control is triggered, the current page (namely the login interface) is intercepted, the current page is compared with the prestored page by using the OCR technology, and when the comparison result is larger than the preset threshold value, the current page is determined to be the login success interface. The pre-stored page is a login success interface of a pre-stored remote desktop, and the remote desktop is a desktop of terminal equipment in a remote system.
In this embodiment, after logging in the remote system, the OCR technology can be used to identify whether the remote system is successfully logged in, so as to avoid the problem of continuous error reporting in the flow caused by login failure.
Step S24, reading the execution state of the task in the remote system, and executing the task according to the execution state.
Wherein the execution state is any one of unexecuted and executed.
Specifically, when the execution state of the target task is unexecuted, a service script corresponding to the target task is started to execute the target task. Wherein the target task is any task in the remote system. In this embodiment, after logging in the remote system again, the execution state of the task in the remote system can be read, and the task can be executed according to the execution state. The problem that the cloud computer is in a screen locking state, the local computer interrupts the session with the remote desktop, and therefore the process execution errors are caused is avoided.
In this embodiment, the telnet credential and the service configuration are first acquired, and the RPA listening service and the RPA unlocking service are generated according to the service configuration. When the RPA monitoring service monitors that the remote desktop connection is interrupted, the remote connection session is reestablished through the RPA unlocking service, and the remote system is logged in through the remote connection session and the remote login credentials. And then, reading the execution state of the task in the remote system, and executing the task according to the execution state. The remote desktop connection disconnection can be monitored through the RPA monitoring service, and the remote desktop is logged in again through the RPA unlocking service. The condition that the cloud computer can reenter the operating system only by manually inputting a user name and a password under the condition that the cloud computer is not operated for a long time is avoided, and the automatic login of a remote system is realized.
In addition, after logging in the remote system again, the execution state of the task in the remote system can be read, and the task can be executed according to the execution state. The problem that the cloud computer is in a screen locking state, the local computer interrupts the session with the remote desktop, and therefore the process execution errors are caused is avoided.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by computer readable instructions stored in a computer readable storage medium that, when executed, may comprise the steps of the embodiments of the methods described above. The storage medium may be a nonvolatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a random access Memory (Random Access Memory, RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
With further reference to fig. 3, as an implementation of the method shown in fig. 2, the present application provides an embodiment of a login device of a remote system, where the embodiment of the device corresponds to the embodiment of the method shown in fig. 2, and the device may be specifically applied to various electronic devices.
As shown in fig. 3, the login device 300 of the remote system according to the present embodiment includes: an acquisition module 301, a generation module 302, a login module 303 and an execution module 304. Wherein:
an obtaining module 301, configured to obtain a telnet credential and a service configuration; the generating module 302 is configured to generate a robot flow automation RPA monitoring service and an RPA unlocking service according to the service configuration; a login module 303, configured to reestablish a remote connection session through the RPA unlock service when the RPA monitor service monitors that the remote desktop connection is interrupted, and login a remote system through the remote connection session and the remote login credentials; and the execution module 304 is configured to read an execution state of a task in the remote system, and execute the task according to the execution state.
In this embodiment, the telnet credential and the service configuration are first acquired, and the RPA listening service and the RPA unlocking service are generated according to the service configuration. When the RPA monitoring service monitors that the remote desktop connection is interrupted, the remote connection session is reestablished through the RPA unlocking service, and the remote system is logged in through the remote connection session and the remote login credentials. And then, reading the execution state of the task in the remote system, and executing the task according to the execution state. The remote desktop connection disconnection can be monitored through the RPA monitoring service, and the remote desktop is logged in again through the RPA unlocking service. The condition that the cloud computer can reenter the operating system only by manually inputting a user name and a password under the condition that the cloud computer is not operated for a long time is avoided, and the automatic login of a remote system is realized.
In addition, after logging in the remote system again, the execution state of the task in the remote system can be read, and the task can be executed according to the execution state. The problem that the cloud computer is in a screen locking state, the local computer interrupts the session with the remote desktop, and therefore the process execution errors are caused is avoided.
In some optional implementations of this embodiment, the service configuration includes a listening configuration parameter and an unlocking configuration parameter; the generating module 302 is specifically configured to invoke the monitoring configuration parameter to generate an RPA monitoring service, and invoke the unlocking configuration parameter to generate an RPA unlocking service.
In this embodiment, the RPA monitoring service is generated by calling the monitoring configuration parameter, and the RPA unlocking service is generated by calling the unlocking configuration parameter, so that whether the remote desktop connection is interrupted or not is monitored by using the RPA monitoring service, and when the remote desktop connection interruption is monitored, the remote connection session is reestablished by using the RPA unlocking service, so that the remote system is logged in. The condition that the cloud computer can reenter the operating system only by manually inputting a user name and a password under the condition that the cloud computer is not operated for a long time is avoided, and the automatic login of a remote system is realized.
In some alternative implementations of the present embodiment, the login module 303 includes a first login sub-module; the first login sub-module is used for initiating remote desktop connection through the RPA unlocking service and entering a remote connection session through the remote desktop connection.
In this embodiment, a remote desktop connection is initiated by the RPA unlock service and entered into a remote connection session by the remote desktop connection, so that a remote system is subsequently logged in according to the remote connection session. The condition that the cloud computer can reenter the operating system only by manually inputting a user name and a password under the condition that the cloud computer is not operated for a long time is avoided, and the automatic login of a remote system is realized.
In some alternative implementations of the present embodiment, referring to fig. 4, a schematic structural diagram of another embodiment of a login device of a remote system according to the present application, where the login device further includes a decryption module 305; the decryption module 305 is configured to decrypt the remote login credential to obtain a remote account and a password corresponding to the remote account.
In the embodiment, the remote account and the password ciphertext corresponding to the remote account are stored, and then are used in a decrypting mode when in use, so that the security of the remote account and the password corresponding to the remote account is ensured.
In some optional implementations of this embodiment, the session box corresponding to the remote connection session includes a remote account input box, a password input box, and a login control; the login module 303 further comprises a second login sub-module; the second login sub-module is used for writing the remote account into the remote account input box, writing a password corresponding to the remote account into the password input box, and triggering the login control to login the remote system.
In the embodiment, the remote system can be logged in through the remote connection session and the remote login credentials, so that the condition that the user name and the password need to be manually input to reenter the operating system is avoided, and the automatic login of the remote system is realized.
In some optional implementations of the present embodiment, the execution state is any one of unexecuted and executed; the execution module 304 is specifically configured to start a service script corresponding to a target task to execute the target task when an execution state of the target task is not executed; .
In this embodiment, after logging in the remote system again, the execution state of the task in the remote system can be read, and the task can be executed according to the execution state. The problem that the cloud computer is in a screen locking state, the local computer interrupts the session with the remote desktop, and therefore the process execution errors are caused is avoided.
In some alternative implementations of the present embodiment, referring to fig. 4, a schematic structural diagram of another embodiment of a login device of a remote system according to the present application, where the login device further includes an identification module 306; the recognition module 306 is configured to intercept a login interface, and determine that the remote system login is successful when the login interface is recognized as a login success interface by using an optical character recognition OCR technology.
In this embodiment, after logging in the remote system, the OCR technology can be used to identify whether the remote system is successfully logged in, so as to avoid the problem of continuous error reporting in the flow caused by login failure.
In order to solve the technical problems, the embodiment of the application also provides computer equipment. Referring specifically to fig. 5, fig. 5 is a basic structural block diagram of a computer device according to the present embodiment.
The computer device 5 comprises a memory 51, a processor 52, a network interface 53 which are communicatively connected to each other via a system bus. It should be noted that only the computer device 5 with components 51-53 is shown in the figures, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that the computer device herein is a device capable of automatically performing numerical calculations and/or information processing in accordance with predetermined or stored instructions, the hardware of which includes, but is not limited to, microprocessors, application specific integrated circuits (Application Specific Integrated Circuit, ASICs), programmable gate arrays (fields-Programmable Gate Array, FPGAs), digital processors (Digital Signal Processor, DSPs), embedded devices, etc.
The computer equipment can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing equipment. The computer equipment can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 51 includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 51 may be an internal storage unit of the computer device 5, such as a hard disk or a memory of the computer device 5. In other embodiments, the memory 51 may also be an external storage device of the computer device 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like, which are provided on the computer device 5. Of course, the memory 51 may also comprise both an internal memory unit of the computer device 5 and an external memory device. In this embodiment, the memory 51 is typically used to store an operating system and various application software installed on the computer device 5, such as computer readable instructions for a login method of a remote system. Further, the memory 51 may be used to temporarily store various types of data that have been output or are to be output.
The processor 52 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 52 is typically used to control the overall operation of the computer device 5. In this embodiment, the processor 52 is configured to execute computer readable instructions stored in the memory 51 or process data, such as computer readable instructions for executing a login method of the remote system.
The network interface 53 may comprise a wireless network interface or a wired network interface, which network interface 53 is typically used to establish communication connections between the computer device 5 and other electronic devices.
In this embodiment, the telnet credential and the service configuration are first acquired, and the RPA listening service and the RPA unlocking service are generated according to the service configuration. When the RPA monitoring service monitors that the remote desktop connection is interrupted, the remote connection session is reestablished through the RPA unlocking service, and the remote system is logged in through the remote connection session and the remote login credentials. And then, reading the execution state of the task in the remote system, and executing the task according to the execution state. The remote desktop connection disconnection can be monitored through the RPA monitoring service, and the remote desktop is logged in again through the RPA unlocking service. The condition that the cloud computer can reenter the operating system only by manually inputting a user name and a password under the condition that the cloud computer is not operated for a long time is avoided, and the automatic login of a remote system is realized.
In addition, after logging in the remote system again, the execution state of the task in the remote system can be read, and the task can be executed according to the execution state. The problem that the cloud computer is in a screen locking state, the local computer interrupts the session with the remote desktop, and therefore the process execution errors are caused is avoided.
The present application also provides another embodiment, namely, a computer-readable storage medium storing computer-readable instructions executable by at least one processor to cause the at least one processor to perform the steps of a login method for a remote system as described above.
In this embodiment, the telnet credential and the service configuration are first acquired, and the RPA listening service and the RPA unlocking service are generated according to the service configuration. When the RPA monitoring service monitors that the remote desktop connection is interrupted, the remote connection session is reestablished through the RPA unlocking service, and the remote system is logged in through the remote connection session and the remote login credentials. And then, reading the execution state of the task in the remote system, and executing the task according to the execution state. The remote desktop connection disconnection can be monitored through the RPA monitoring service, and the remote desktop is logged in again through the RPA unlocking service. The condition that the cloud computer can reenter the operating system only by manually inputting a user name and a password under the condition that the cloud computer is not operated for a long time is avoided, and the automatic login of a remote system is realized.
In addition, after logging in the remote system again, the execution state of the task in the remote system can be read, and the task can be executed according to the execution state. The problem that the cloud computer is in a screen locking state, the local computer interrupts the session with the remote desktop, and therefore the process execution errors are caused is avoided.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
It is apparent that the embodiments described above are only some embodiments of the present application, but not all embodiments, the preferred embodiments of the present application are given in the drawings, but not limiting the patent scope of the present application. This application may be embodied in many different forms, but rather, embodiments are provided in order to provide a more thorough understanding of the present disclosure. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing, or equivalents may be substituted for elements thereof. All equivalent structures made by the specification and the drawings of the application are directly or indirectly applied to other related technical fields, and are also within the protection scope of the application.

Claims (10)

1. A method for logging in a remote system, applied to a local device, comprising the steps of:
acquiring a remote login credential and a service configuration;
generating a robot flow automation (RPA) monitoring service and an RPA unlocking service according to the service configuration;
when the RPA monitoring service monitors that the remote desktop connection is interrupted, reestablishing a remote connection session through the RPA unlocking service, logging in a remote system through the remote connection session and the remote login credentials to end the screen locking state of a cloud computer, wherein the remote connection session is a connection session between the local equipment and the cloud computer;
and reading the execution state of the task in the remote system, and executing the task according to the execution state.
2. The login method of claim 1, wherein the service configuration comprises a listening configuration parameter and an unlocking configuration parameter; the generating the robot flow automation (RPA) monitoring service and the RPA unlocking service according to the service configuration comprises the following steps:
and calling the monitoring configuration parameters to generate RPA monitoring service, and calling the unlocking configuration parameters to generate RPA unlocking service.
3. The login method of claim 1, wherein the reestablishing the remote connection session through the RPA unlock service comprises:
and initiating remote desktop connection through the RPA unlocking service, and entering a remote connection session through the remote desktop connection.
4. The login method of claim 1, wherein prior to logging into a remote system via said remote connection session and said remote login credentials, said login method further comprises:
and decrypting the remote login credentials to obtain a remote account and a password corresponding to the remote account.
5. The login method according to claim 4, wherein a session box corresponding to the remote connection session includes a remote account input box, a password input box, and a login control, and the logging in the remote system through the remote connection session and the remote login credentials includes:
and writing the remote account into the remote account input box, writing a password corresponding to the remote account into the password input box, and triggering the login control to log in the remote system.
6. The login method according to claim 1, wherein the execution state is any one of unexecuted and executed; the task executing according to the executing state comprises the following steps:
and when the execution state of the target task is non-execution, starting a service script corresponding to the target task to execute the target task.
7. The login method of claim 1, wherein after logging into a remote system through the remote connection session and the remote login credentials, the method further comprises:
intercepting a login interface, and determining that the remote system login is successful when the login interface is recognized as a login success interface through an optical character recognition OCR technology.
8. A login device of a remote system, applied to a local device, comprising:
the acquisition module is used for acquiring the remote login credentials and the service configuration;
the generation module is used for generating a robot flow automation RPA monitoring service and an RPA unlocking service according to the service configuration;
the login module is used for reestablishing a remote connection session through the RPA unlocking service when the RPA monitoring service monitors that the remote desktop connection is interrupted, logging in a remote system through the remote connection session and the remote login credentials to finish the screen locking state of the cloud computer, wherein the remote connection session is a connection session between the local equipment and the cloud computer;
and the execution module is used for reading the execution state of the task in the remote system and executing the task according to the execution state.
9. A computer device comprising a memory having stored therein computer readable instructions which when executed by a processor implement the steps of the logging method of a remote system as claimed in any one of claims 1 to 7.
10. A computer readable storage medium having stored thereon computer readable instructions which when executed by a processor implement the steps of the logging method of a remote system according to any of claims 1 to 7.
CN202210604669.6A 2022-05-30 2022-05-30 Login method of remote system and related equipment thereof Active CN115022308B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210604669.6A CN115022308B (en) 2022-05-30 2022-05-30 Login method of remote system and related equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210604669.6A CN115022308B (en) 2022-05-30 2022-05-30 Login method of remote system and related equipment thereof

Publications (2)

Publication Number Publication Date
CN115022308A CN115022308A (en) 2022-09-06
CN115022308B true CN115022308B (en) 2023-08-04

Family

ID=83070188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210604669.6A Active CN115022308B (en) 2022-05-30 2022-05-30 Login method of remote system and related equipment thereof

Country Status (1)

Country Link
CN (1) CN115022308B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035088A (en) * 2019-04-26 2019-07-19 厦门商集网络科技有限责任公司 Method and apparatus based on RPA remote control operation system automated log on
CN111405006A (en) * 2020-03-06 2020-07-10 北京奇艺世纪科技有限公司 Method and device for processing remote login failure and remote login system
US10911546B1 (en) * 2019-12-30 2021-02-02 Automation Anywhere, Inc. Robotic process automation with automated user login for multiple terminal server hosted user sessions
CN113177198A (en) * 2021-05-18 2021-07-27 上海云扩信息科技有限公司 Method for automatically unlocking Windows through software

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090049174A1 (en) * 2007-08-14 2009-02-19 Nicholas Rudnik System and method for managing access to resources and functionality of client computers in a client/server environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035088A (en) * 2019-04-26 2019-07-19 厦门商集网络科技有限责任公司 Method and apparatus based on RPA remote control operation system automated log on
US10911546B1 (en) * 2019-12-30 2021-02-02 Automation Anywhere, Inc. Robotic process automation with automated user login for multiple terminal server hosted user sessions
CN111405006A (en) * 2020-03-06 2020-07-10 北京奇艺世纪科技有限公司 Method and device for processing remote login failure and remote login system
CN113177198A (en) * 2021-05-18 2021-07-27 上海云扩信息科技有限公司 Method for automatically unlocking Windows through software

Also Published As

Publication number Publication date
CN115022308A (en) 2022-09-06

Similar Documents

Publication Publication Date Title
US10798081B2 (en) Method, apparatus, and system for providing a security check
CN110493202B (en) Login token generation and verification method and device and server
CN112534792B (en) Method and system for providing secure access to cloud services in a cloud computing environment
CN106341381B (en) Manage the method and system of the safe golden key of frame server system
CN112651011B (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
US9747434B1 (en) Authenticating with an external device by providing a message having message fields arranged in a particular message field order
CN110162994A (en) Authority control method, system, electronic equipment and computer readable storage medium
CN114996675A (en) Data query method and device, computer equipment and storage medium
CN114363088A (en) Method and device for requesting data
CN112256760B (en) Data prediction method and device, computer equipment and storage medium
CN113158156A (en) Service processing method, system, device, electronic equipment and storage medium
CN115022308B (en) Login method of remote system and related equipment thereof
US10402557B2 (en) Verification that an authenticated user is in physical possession of a client device
JP2010033562A (en) Communication terminal, authentication information generation device, authentication system, authentication information generation program, authentication information generation method and authentication method
US10831878B2 (en) Preventing unauthorized access to secure information systems using dynamic, multi-device authentication
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
CN115330396A (en) Payment state acquisition method and device, computer equipment and storage medium
US20240037250A1 (en) Using machine-learning models to determine graduated levels of access to secured data for remote devices
US20230362153A1 (en) Multi-platform authentication
KR102428409B1 (en) User authentication device, user authentication method using security code and computer program
US20230102682A1 (en) Large pose facial recognition based on 3d facial model
US20220417020A1 (en) Information processing device, information processing method, and non-transitory computer readable storage medium
CN116800505A (en) URL link dynamic sharing method and device, computer equipment and storage medium
CN117278263A (en) Authentication processing method, authentication processing device, computer equipment and storage medium
CN117749508A (en) Data processing method, device, equipment and medium based on RPA flow

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant