CN115840937A - Control method and device and electronic equipment - Google Patents

Control method and device and electronic equipment Download PDF

Info

Publication number
CN115840937A
CN115840937A CN202310140297.0A CN202310140297A CN115840937A CN 115840937 A CN115840937 A CN 115840937A CN 202310140297 A CN202310140297 A CN 202310140297A CN 115840937 A CN115840937 A CN 115840937A
Authority
CN
China
Prior art keywords
login
virtual machine
account
password
character string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310140297.0A
Other languages
Chinese (zh)
Other versions
CN115840937B (en
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nfs China Software Co ltd
Original Assignee
Nfs China Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nfs China Software Co ltd filed Critical Nfs China Software Co ltd
Priority to CN202310140297.0A priority Critical patent/CN115840937B/en
Publication of CN115840937A publication Critical patent/CN115840937A/en
Application granted granted Critical
Publication of CN115840937B publication Critical patent/CN115840937B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a control method, a control device and electronic equipment, wherein the method comprises the following steps: obtaining a login account and a registration account, wherein the registration account is the registration account of the virtual machine logged in by the login account; creating a password character string corresponding to the registered account, wherein the password character string is used as a login password and is stored in a password storage area; and transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, wherein the login authentication result represents whether the virtual machine is allowed to login by using the registered account.

Description

Control method and device and electronic equipment
Technical Field
The present application relates to the field of virtual machine technologies, and in particular, to a control method and apparatus, and an electronic device.
Background
After a virtual machine configured on a host machine is registered to a certain user, if other users need to use the virtual machine, the virtual machine needs to be registered to other users again.
However, this implementation relies on manual operations by the administrator, which results in a higher complexity of the operations used by the virtual machines.
Disclosure of Invention
In view of this, the present application provides a control method, an apparatus and an electronic device for reducing the complexity of the virtual machine login operation, so as to improve the user experience of the virtual machine. The following were used:
a control method, comprising:
obtaining a login account and a registration account, wherein the registration account is the registration account of the virtual machine logged in by the login account;
creating a password character string corresponding to the registered account, wherein the password character string is used as a login password and is stored in a password storage area;
and transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, wherein the login authentication result represents whether the virtual machine is allowed to login by using the registered account.
In the above method, preferably, in a case where the login account and the registration account are not consistent, after the transmitting the registration account and the password string to the virtual machine, the method further includes:
receiving a login blocking message sent by the virtual machine, wherein the login blocking message is obtained by the virtual machine under the condition that the virtual machine is monitored to be logged in by the registered account;
at least sending the login blocking message to a first client corresponding to the registered account;
in the case of receiving the login authorization message transmitted by the first client, re-executing the following steps: and transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, wherein the login authentication result represents whether the virtual machine is allowed to login by using the registered account.
Preferably, the method for sending at least the login blocking message to the first client corresponding to the registered account includes:
and sending the login blocking message, the identification information of the virtual machine and the registered account to a first client corresponding to the registered account, so that the first client outputs an authorization request interface, wherein the authorization request interface is at least used for prompting whether to authorize the virtual machine to exit from the login state of the registered account.
In the above method, preferably, when the login account is inconsistent with the registration account, before the creating a password string corresponding to the registration account, the method further includes:
inquiring whether authority information corresponding to the login account exists in the authority set corresponding to the virtual machine;
when the authority set corresponding to the virtual machine has authority information corresponding to the login account, executing: and creating a password character string corresponding to the registered account.
Preferably, the method for transmitting the registered account and the password string to the virtual machine includes:
and calling a first interface of a host machine where the virtual machine is located, wherein the first interface is used for at least transmitting the registered account and the password character string to the host machine so as to enable the host machine to call a second interface corresponding to the virtual machine, and the second interface is used for at least transmitting the registered account and the password character string to the virtual machine.
In the above method, preferably, the first interface is configured to transmit the identification information of the virtual machine, the registered account, and the password character string to the host, so that the host calls a second interface corresponding to the virtual machine according to the identification information;
and the second interface is a communication interface based on a socket file, and the host computer at least writes the registered account and the password character string into the socket file, so that the virtual machine reads the registered account and the password character string from the socket file.
The above method, preferably, obtaining the login account and the registration account includes:
receiving a login request message transmitted by a second client;
and analyzing the login request message to obtain a login account corresponding to the second client and a registration account of the virtual machine logged in by the login account.
In the above method, preferably, the password character string is saved as a login password in a destination field corresponding to the registered account in a password storage area.
A control device, comprising:
the account acquisition unit is used for acquiring a login account and a registration account, wherein the registration account is the registration account of the virtual machine logged in by the login account;
the password creating unit is used for creating a password character string corresponding to the registered account, and the password character string is used as a login password and is stored in a password storage area;
and the information transmission unit is used for transmitting the registered account and the password character string to the virtual machine so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, and the login authentication result represents whether the virtual machine is allowed to login by using the registered account or not.
An electronic device, comprising:
a memory for storing a computer program and data generated by the execution of the computer program;
a processor for executing the computer program to implement: obtaining a login account and a registration account, wherein the registration account is the registration account of the virtual machine logged in by the login account; creating a password character string corresponding to the registered account, wherein the password character string is used as a login password and is stored in a password storage area; and transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, wherein the login authentication result represents whether the virtual machine is allowed to login by using the registered account.
According to the technical scheme, after the login account and the registered account of the virtual machine logged in by the login account are obtained, the password character string is created for the registered account and is stored in the password storage area as the login password, and therefore after the registered account and the password character string are transmitted to the virtual machine, the virtual machine performs login verification on the password character string according to the login password corresponding to the registered account in the password storage area, and virtual machine login is achieved. Therefore, in the application, an administrator does not need to reconfigure the virtual machine, a login password is created for the registered account of the logged-in virtual machine, and the virtual machine performs login verification according to the generated login password, so that even if an original password corresponding to the registered account does not exist, the virtual machine can be logged in through the scheme in the embodiment without additional operations of the administrator and a login user, the operation complexity during logging in the virtual machine is further reduced, and the use experience of the user on the virtual machine is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a flowchart of a control method according to an embodiment of the present application;
FIG. 2 is a diagram illustrating an example of an interface for a user to log in a virtual machine according to an embodiment of the present disclosure;
fig. 3 and fig. 4 are partial flowcharts of a control method according to an embodiment of the present application;
FIG. 5 is a diagram illustrating another example of a user logging into a virtual machine according to an embodiment of the present disclosure;
fig. 6 is another flowchart of a control method according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a control device according to a second embodiment of the present application;
fig. 8 and fig. 9 are schematic structural diagrams of a control device according to a second embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of an electronic device according to a third embodiment of the present application;
FIG. 11 is an overall structure diagram of a virtual machine login scenario according to the present application;
FIG. 12 is a flowchart illustrating an overall process applicable to a login scenario of a virtual machine according to the present application;
fig. 13 is a flowchart of the present application applied to a virtual machine login scenario in which a local user logs in a virtual machine;
FIG. 14 is a flowchart of the present application for other users to log in a virtual machine login scenario;
FIG. 15 is a flowchart of a virtual machine login blocking process applicable to a virtual machine login scenario according to the present application;
FIG. 16 is a diagram illustrating roles involved in login authentication in a virtual machine login scenario according to the present application;
fig. 17 is a process diagram of the authentication in the login entity in a certain virtual machine login scenario according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a flowchart for implementing a control method provided in an embodiment of the present application is shown, where the method may be applied to an electronic device capable of data processing, such as a computer or a server configured with a unified authentication interface and a unified authentication service. The technical scheme in the embodiment is mainly used for reducing the operation complexity of the virtual machine.
Specifically, the method in this embodiment may include the following steps:
step 101: a login account and a registration account are obtained.
The registered account is a registered account of the virtual machine, which is logged in by the login account.
Specifically, in this embodiment, the login request message transmitted by the second client may be received and analyzed to obtain the login account corresponding to the second client and the registration account of the virtual machine logged in by the login account.
The second client is a client used by a user to whom the login account belongs, the user to whom the login account belongs opens a login interface of the virtual machine on the second client, and performs account input operation on the login interface, so that a corresponding login request message is generated on the second client and transmitted to the electronic device in the embodiment. Thus, in this embodiment, the login request message transmitted by the second client is received.
Specifically, the login request message may be generated based on the login account, the registration account, and the identification information of the virtual machine. Thus, in this embodiment, the identification information of the login account, the registration account, and the virtual machine can be obtained by parsing the login request message.
For example, a user opens a cloud desktop client, and inputs a corresponding account, such as a user name, in a login interface output by the user and corresponding to a virtual machine that needs to be logged in.
For example, as shown in fig. 2, the current user inputs a login account in a login interface corresponding to the virtual machine a output by the corresponding second client, and the second client generates and transmits a login request message, which is token, based on the login account, the registration account, and the identification information of the virtual machine. Based on this, in this embodiment, the received token is analyzed to obtain the login account input by the current user and the registration account of the virtual machine a.
The registered account of the virtual machine is an original account registered by the virtual machine.
Step 102: and creating a password character string corresponding to the registered account, wherein the password character string is used as a login password and is stored in a password storage area.
Specifically, in this embodiment, a password character string may be created by using a character string generation algorithm for the registered account, and the password character string may be stored in a preset password storage area as a login password of the registered account.
In addition, the password string may be saved as a login password to a destination field corresponding to the registered account in the password storage area.
For example, in this embodiment, a random string may be generated by using a random algorithm, and the random string may be stored in a specified field corresponding to the registered account number of the virtual machine a in the database as the login password of the registered account of the virtual machine a.
Step 103: and transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result.
And the login verification result represents whether the virtual machine is allowed to be logged in by the registered account.
Specifically, in this embodiment, the registered account and the password character string are used as the login account and the input password of the current user and transmitted to the virtual machine; therefore, the virtual machine reads the corresponding login password in the password storage area according to the received registered account, and then compares the login password with the password character string received by the virtual machine; if the comparison is consistent, a login verification result allowing the virtual machine to be logged in through the registered account is obtained. The login password stored in the password storage area is a password character string, so that the obtained login authentication result represents permission for logging in the virtual machine by the registered account. Therefore, even if the original password of the user is not registered, the virtual machine can be logged in, and the waste of resources of the virtual machine is avoided.
As can be seen from the foregoing solution, in the control method provided in the first embodiment of the present application, after the login account and the registered account of the virtual machine logged in by the login account are obtained, a password character string is created for the registered account, and the password character string is saved in the password storage area as the login password. After the registered account and the password character string are transmitted to the virtual machine, the virtual machine performs login verification on the password character string according to a login password corresponding to the registered account in the used password storage area, and login of the virtual machine is achieved. As can be seen, in this embodiment, the administrator does not need to reconfigure the virtual machine, but a login password is created for the registered account of the logged-in virtual machine, and the virtual machine performs login authentication according to the generated login password. Therefore, even if an original password corresponding to the registered account is not available, the user can log in the virtual machine through the scheme in the embodiment without additional operations of an administrator and a login user, so that the operation complexity during logging in the virtual machine is reduced, and the use experience of the user on the virtual machine is improved.
In an implementation manner, in this embodiment, after the login account and the registration account are obtained in step 101, a step of determining consistency between the login account and the registration account may be further included, and when the login account and the registration account are consistent, step 102 and step 103 are directly performed, specifically as shown in fig. 3, the method includes:
step 101: a login account and a registration account are obtained.
Step 104: and judging whether the login account is consistent with the registered account or not, and if so, executing the step 102.
Step 102: and creating a password character string corresponding to the registered account, wherein the password character string is used as a login password and is stored in a password storage area.
Step 103: and transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result.
In another implementation manner, when the login account and the registered account are not consistent, after step 102 and step 103 are executed, a step of receiving a login blocking message sent by the virtual machine needs to be performed, which is specifically shown in fig. 4:
step 101: a login account and a registration account are obtained.
Step 104: judging whether the login account is consistent with the registered account, if the login account is inconsistent with the registered account, executing step 102;
step 102: and creating a password character string corresponding to the registered account, wherein the password character string is used as a login password and is stored in a password storage area.
Step 103: the registered account and password string are transmitted to the virtual machine and step 105 is performed.
Step 105: and receiving a login blocking message sent by the virtual machine.
And the login blocking message is obtained by the virtual machine under the condition that the virtual machine monitors that the virtual machine is logged in by the registered account. If the virtual machine is not monitored as having a registered account logged in, then step 105 need not be performed. That is, after receiving the registered account and the password string, the virtual machine may monitor whether the virtual machine has been logged in by the registered account, if the virtual machine has been logged in by the registered account, the virtual machine generates and transmits a login blocking message, and if the virtual machine has not been logged in by the registered account, the virtual machine continues to perform login authentication on the password string using a login password corresponding to the registered account in the password storage area, so as to obtain a login authentication result.
In addition, in this embodiment, the identification information and the registered account of the virtual machine may also be received to indicate that the registered account on the virtual machine corresponding to the identification information is already logged in.
The identification information of the virtual machine may include information such as a universal Unique Identifier uuid (universal Unique Identifier) and a socket file location of the virtual machine. The uuid is used for uniquely representing the virtual machine, and the socket file position is used for realizing a communication interface between the virtual machine and the host machine where the virtual machine is located, so that data transmission between the virtual machine and the host machine is facilitated.
Step 106: and at least sending the login blocking message to a first client corresponding to the registered account.
Specifically, in this embodiment, the identification information of the virtual machine and the registered account may also be sent to the first client corresponding to the registered account.
Based on the method, an authorization request interface can be output for the user of the first client, and the authorization request interface is at least used for prompting whether the virtual machine is authorized to exit from the login state of the registered account, so that the user of the first client is prompted to perform login authorization or login prohibition operations through the authorization request interface. For example, two controls are output on the authorization request interface: a login authorization control and a login prohibition control. The login authorization control represents a login state that a user of the first client authorizes the virtual machine to exit a login account, namely, authorizes the current user of the second client to login the virtual machine with the login account; the login prohibition control represents that the user of the first client does not exit the login state of the registered account, namely, the current user of the second client is prohibited from logging in the virtual machine by the registered account. Based on the method, the first client generates and transmits a login authorization message or a login prohibition message according to the selection operation of the user on the login authorization interface.
For example, as shown in fig. 5, the current user a inputs a login account in the login interface of the second client, which indicates that the virtual machine a corresponding to the login account is ready to be logged in. In this embodiment, after the login account and the registration account are obtained, a password character string is created for the registration account in real time and stored in the password storage area as the login password. After the registered account and the password character string are sent to the virtual machine A, the virtual machine A monitors that the registered account is logged in by a historical user b corresponding to the first client, and at the moment, the virtual machine A transmits a login blocking message. In this embodiment, after receiving the login blocking message of the virtual machine a, the login blocking message, the identification information of the virtual machine a, and the registered account of the virtual machine a are sent to the first client, and an authorization request interface is output on the first client to prompt the historical user b: other users need to log in the virtual machine A, and a historical user b needs to perform login authorization. Based on the operation, the historical user b can perform login authorization or login inhibition operation on an authorization request interface on the first client. Thus, the first client may transmit a login authorization message or a login disable message to the electronic device in this embodiment.
Step 107: and after receiving the login authorization message transmitted by the first client, re-executing step 103, and further re-transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area, so as to obtain a login authentication result.
Therefore, in the embodiment, the virtual machine can be re-logged by obtaining the authorization of the logged-in user under the condition that the virtual machine is blocked from logging in, no additional operation of an administrator and the user is needed, the operation complexity of the virtual machine logging in is further reduced, and the use experience of the user on the virtual machine is improved.
In one implementation manner, after obtaining the login account and the registration account in step 101, the following steps may be further included in this embodiment, as shown in fig. 6:
step 101: a login account and a registration account are obtained.
Step 104: and judging whether the login account is consistent with the registered account or not, if so, directly executing the step 102 and the step 103, and if not, executing the following step 108.
Step 108: inquiring whether the authority information corresponding to the login account exists in the authority set corresponding to the virtual machine, and under the condition that the authority information corresponding to the login account exists in the authority set corresponding to the virtual machine, executing step 102 and step 103 to create a password character string corresponding to the registered account and transmit the registered account and the password character string to the virtual machine, so that the virtual machine performs login verification on the password character string by using the login password corresponding to the registered account in the password storage area to obtain a login verification result.
If the authority set corresponding to the virtual machine has the authority information corresponding to the login account, the login account is characterized to have the authority to use the virtual machine, and at this time, step 102 and step 103 may be executed, so that the user of the second client corresponding to the login account can log in the virtual machine with the registered account, thereby using the virtual machine. And if the authority set corresponding to the virtual machine does not have the authority information corresponding to the login account, representing that the login account does not have the authority for using the virtual machine, and at the moment, finishing the current process to ensure the use safety of the virtual machine.
In one implementation manner, when the registered account and the password string are transmitted to the virtual machine in step 103, the following implementation manner may be specifically implemented:
and calling a first interface of a host machine where the virtual machine is located, wherein the first interface is used for transmitting at least the registered account and the password character string to the host machine so as to enable the host machine to call a second interface corresponding to the virtual machine, and the second interface is used for transmitting at least the registered account and the password character string to the virtual machine.
Specifically, the called first interface is used for transmitting the identification information, the registered account and the password character string of the virtual machine to the host machine, so that the host machine calls a second interface corresponding to the virtual machine according to the identification information; and the second interface is a communication interface based on the socket file, and the host computer at least writes the registered account and the password character string into the socket file, so that the virtual machine reads the registered account and the password character string from the socket file.
For example, the first interface is an api interface on the host machine, so that the api interface transmits the identification information, the registered account, the password character string and the like of the virtual machine to the host machine, the host machine obtains the information such as the position of the socket file corresponding to the virtual machine by analyzing the identification information of the virtual machine, and writes the information such as the registered account, the password character string and the like into the socket file, that is, calls the second interface of the virtual machine; the second interface can be a communication interface based on a socket file on the virtual machine, and based on the communication interface, the virtual machine reads information such as a registered account and a password character string written by the host machine through the socket file.
Referring to fig. 7, a schematic structural diagram of a control device provided in the second embodiment of the present application is shown, where the control device may be configured in an electronic device capable of performing data processing, such as a computer or a server configured with a unified authentication interface and a unified authentication service. The technical scheme in the embodiment is mainly used for reducing the operation complexity of the virtual machine.
Specifically, the apparatus in this embodiment may include the following units:
an account obtaining unit 701, configured to obtain a login account and a registration account, where the registration account is a registration account of a virtual machine that the login account logs in;
a password creating unit 702, configured to create a password character string corresponding to the registered account, where the password character string is saved in a password storage area as a login password;
an information transmission unit 703 is configured to transmit the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, where the login authentication result represents whether login of the virtual machine with the registered account is allowed.
As can be seen from the above-mentioned solution, in the control device provided in the second embodiment of the present application, after the login account and the registered account of the virtual machine in which the login account is logged in are obtained, the password character string is created for the registered account, and the password character string is stored in the password storage area as the login password, so that after the registered account and the password character string are transmitted to the virtual machine, the virtual machine performs login authentication on the password character string according to the login password corresponding to the registered account in the password storage area, thereby implementing virtual machine login. Therefore, in the embodiment, the virtual machine does not need to be reconfigured by an administrator, a login password is created for the registered account of the logged-in virtual machine, and the virtual machine performs login verification according to the generated login password, so that the virtual machine can be logged in by the scheme in the embodiment even if the original password corresponding to the registered account does not exist, additional operations of the administrator and a login user are not needed, the operation complexity during logging in the virtual machine is further reduced, and the use experience of the user on the virtual machine is improved.
In one implementation, the apparatus in this embodiment may further include the following units, as shown in fig. 8:
a blocking processing unit 704, configured to receive a login blocking message sent by the virtual machine after the information transmission unit 703 transmits the login account and the password character string to the virtual machine when the login account and the login account are inconsistent, where the login blocking message is obtained by the virtual machine when it is monitored that the virtual machine is logged in by the login account; at least sending the login blocking message to a first client corresponding to the registered account; under the condition that the login authorization message transmitted by the first client is received, the information transmission unit 703 is triggered again to transmit the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, and the login authentication result represents whether login of the virtual machine with the registered account is allowed or not.
Based on this, when at least sending the login blocking message to the first client corresponding to the registered account, the blocking processing unit 704 is specifically configured to: and sending the login blocking message, the identification information of the virtual machine and the registered account to a first client corresponding to the registered account, so that the first client outputs an authorization request interface, wherein the authorization request interface is at least used for prompting whether the virtual machine is authorized to exit from the login state of the registered account.
In one implementation, the apparatus in this embodiment may further include the following units, as shown in fig. 9:
the authority verification unit 705 is configured to, when the login account and the registered account are inconsistent, query whether authority information corresponding to the login account exists in an authority set corresponding to the virtual machine before the password creating unit 702 creates the password character string corresponding to the registered account; when the permission set corresponding to the virtual machine has permission information corresponding to the login account, the password creating unit 702 is triggered to create a password character string corresponding to the registered account.
In an implementation manner, when transmitting the registered account and the password character string to the virtual machine, the information transmission unit 703 is specifically configured to: and calling a first interface of a host machine where the virtual machine is located, wherein the first interface is used for at least transmitting the registered account and the password character string to the host machine so as to enable the host machine to call a second interface corresponding to the virtual machine, and the second interface is used for at least transmitting the registered account and the password character string to the virtual machine.
In one implementation manner, the first interface is configured to transmit identification information of the virtual machine, the registered account, and the password character string to the host, so that the host calls a second interface corresponding to the virtual machine according to the identification information;
and the second interface is a communication interface based on a socket file, and the host computer at least writes the registered account and the password character string into the socket file, so that the virtual machine reads the registered account and the password character string from the socket file.
In one implementation manner, the account obtaining unit 701 is specifically configured to: receiving a login request message transmitted by a second client; and analyzing the login request message to obtain a login account corresponding to the second client and a registration account of the virtual machine logged in by the login account.
In one implementation, the password string is saved as a login password in a password storage area in a target field corresponding to the registered account.
It should be noted that, for the specific implementation of each unit in the present embodiment, reference may be made to the corresponding content in the foregoing, and details are not described here.
Referring to fig. 10, a schematic structural diagram of an electronic device provided in the third embodiment of the present application, where the electronic device may include the following structure:
a memory 1001 for storing a computer program and data generated by the computer program;
a processor 1002 for executing the computer program to implement: obtaining a login account and a registration account, wherein the registration account is the registration account of the virtual machine logged in by the login account; creating a password character string corresponding to the registered account, wherein the password character string is used as a login password and is stored in a password storage area; and transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, wherein the login authentication result represents whether the virtual machine is allowed to login by using the registered account.
It can be seen from the foregoing technical solutions that, in the electronic device provided in the third embodiment of the present application, after obtaining the login account and the registration account of the virtual machine in which the login account is logged in, a password character string is created for the registration account, and the password character string is stored in the password storage region as the login password, so that after the registration account and the password character string are transmitted to the virtual machine, the virtual machine performs login authentication on the password character string according to the login password corresponding to the registration account in the password storage region, thereby implementing virtual machine login. Therefore, in the embodiment, the virtual machine does not need to be reconfigured by an administrator, a login password is created for the registered account of the logged-in virtual machine, and the virtual machine performs login verification according to the generated login password, so that the virtual machine can be logged in by the scheme in the embodiment even if the original password corresponding to the registered account does not exist, additional operations of the administrator and a login user are not needed, the operation complexity during logging in the virtual machine is further reduced, and the use experience of the user on the virtual machine is improved.
It should be noted that, in the present embodiment, reference may be made to the corresponding contents in the foregoing, and details are not described here.
The following virtual machine is taken as an example to describe the technical scheme of the present application in detail:
the technical scheme of the application is realized through a uniform authentication interface and a uniform authentication service, the overall structure is shown in fig. 11, the uniform authentication interface establishes corresponding data connection with a client, a host machine with a virtual machine deployed and the uniform authentication service, and the virtual machine login is realized based on the data connection.
Specifically, in the present application, the client invokes the unified authentication interface, and the unified authentication interface interacts with the login entity (the server on which the virtual machine operates, i.e., the host) and the unified authentication service. When the virtual machine is required to be logged in, the client provides login information to the unified authentication interface, such as the content of an initiating user (namely the registration account of the virtual machine), a login user (namely the login account), identification information of the virtual machine and the like; and then, the unified authentication interface inquires whether the virtual machine has the login authority or not through the unified authentication service and performs single sign-on of the virtual machine. The whole flow is shown in fig. 12, the unified authentication interface provides login abstraction (the entity is in the form of an interface) for the client, and the host and the unified authentication service provide an interface for the unified authentication interface.
The unified authentication interface provides desktop cloud login interface abstraction for the client, and the client can log in virtual machines with different authentication authorities in the desktop cloud only by performing data interaction with the interface. The unified authentication service provides functions of adding, deleting, modifying and inquiring of the unified authentication interface, and is used for carrying out access operation on user information. The login entity comprises a computing node and a virtual machine running on the computing node, a mode of calling the virtual machine through the computing node, and an interface running on the computing node.
According to the technical scheme, the unified authentication interface is connected with the unified authentication service, the unified authentication service inquires data storage at the rear end, and user data are stored in the data storage. The unified authentication service inquires whether the user has login authority or not, and returns the login authority to the unified authentication interface, and the administrator admin can realize single-point login of the user through temporary authorization. The administrator admin does not need to modify the user's original information to authorize. The specific scheme is as follows:
as shown in fig. 13, a flowchart of logging in a virtual machine for an original user of the virtual machine, that is, a local user, is as follows:
(1) The cloud desktop client generates a first token, the first token is generated by the login account of the client, the registration account of the virtual machine, identification information of the virtual machine, such as uuid information, and the like, and then the first token is sent to the unified authentication interface.
(2) The unified authentication interface receives the first token and analyzes information to obtain a login account, a registration account and identification information, whether a login user of the client is consistent with an operating system user of the virtual machine is verified through the login account and the registration account, and if the login account is consistent with the registration account, the login user of the client is consistent with the operating system user of the virtual machine. The unified authentication interface generates a second token, the second token can be generated through a random algorithm, and the second token can be a random character string so as to be used as a login password and implanted into a designated field of a virtual machine operating system account in a password storage area in a database through the unified authentication service (the field is used for verification during login of the virtual machine).
(3) The unified authentication interface calls an interface provided by the host machine, such as an api interface on the host machine, and introduces identification information, such as uuid and login information, of the virtual machine through the interface provided by the host machine, wherein the login information comprises a registered account and a second token, so that the host machine obtains the identification information and the login information through the interface of the host machine.
(4) The host machine obtains the virtual machine information such as the position information of the socket file communicated with the virtual machine by analyzing the uuid in the identification information, and based on the position information, the host machine calls an interface of the virtual machine to trigger a login event and provides login information to the interface of the virtual machine, so that the virtual machine receives the login information.
(5) The virtual machine triggers login operation, analyzes login information transmitted by the host machine to obtain a registration account and a second token, is connected to the unified authentication service by using the registration account and the second token, and queries a corresponding login password in a password storage area in the database according to the registration account by the unified authentication service; therefore, the virtual machine performs login verification on the login password inquired by the unified authentication service and the second token, and the login password corresponding to the registered account in the password storage area in the database is pre-stored according to the second token; thus, the login password is consistent with the second token, thereby enabling login with the registered account on the virtual machine.
Therefore, the login password is generated for each login request of the local user, and the login of the virtual machine can be realized without acquiring the original password of the virtual machine.
As shown in fig. 14, the process of logging in the virtual machine for other users, i.e. login users different from the virtual machine operating system user:
(1) The cloud desktop client generates a first token, the first token is generated by the login account of the client, the registration account of the virtual machine, identification information of the virtual machine, such as uuid information, and the like, and then the first token is sent to the unified authentication interface.
(2) The unified authentication interface receives the first token and analyzes the information to obtain a login account, a registration account and identification information, and whether a login user of the client is consistent with an operating system user of the virtual machine or not is verified through the login account and the registration account; if the login account is inconsistent with the registered account, the login user of the client is indicated to be inconsistent with the operating system user of the virtual machine, and at this moment, the unified authentication interface inquires the unified authentication service whether the login user has the authority for logging in the virtual machine, for example, the unified authentication service inquires in an authority set of the database whether the authority information corresponding to the login account exists. And under the condition that the login user has the right of logging in the virtual machine, generating a second token through a unified authentication interface, wherein the second token can be generated through a random algorithm, and the second token can be a random character string so as to be used as a login password and be implanted into a designated field of the virtual machine operating system account in a password storage area in the database through unified authentication service (the field is used for verification when the virtual machine is logged in by the user).
(3) The unified authentication interface calls an interface provided by the host machine, such as an api interface on the host machine, and introduces identification information, such as uuid and login information, of the virtual machine through the interface provided by the host machine, wherein the login information comprises a registered account and a second token, so that the host machine obtains the identification information and the login information through the interface of the host machine. And the host machine obtains the virtual machine information such as the position information of the socket file communicated with the virtual machine by analyzing the uuid in the identification information.
(4) The host machine calls an interface of the virtual machine to trigger a login event, and simultaneously provides login information to the interface of the virtual machine, so that the virtual machine receives the login information.
(5) After receiving login information, the virtual machine firstly inquires login state through a system function in an operating system, if the login state is not logged in, a login account and a second token which are analyzed from the login information are directly used to be connected to a unified authentication service, and the unified authentication service inquires a corresponding login password in a password storage region in a database according to the login account; therefore, the virtual machine performs login verification on the login password inquired by the unified authentication service and the second token, and the login password corresponding to the registered account in the password storage area in the database is pre-stored according to the second token, so that the login password is consistent with the second token, and the virtual machine can realize login with the registered account. And if the login status is logged in, the virtual machine blocking flow is executed, as shown in fig. 15. Based on this, the client application authorization corresponding to the virtual machine operating system account number is sent through the virtual machine blocking flow, which specifically includes:
(1) After the virtual machine receives a login event initiated by the host machine, the virtual machine inquires whether the virtual machine operating system account is logged in currently, if the virtual machine operating system account is not logged in, the virtual machine operating system account is in an unblocked state, and the login process in the previous step is executed, namely login verification is carried out through the unified authentication service. If logged in, it is blocked. And in the blocked state, returning a blocking message to the host machine through the virtual machine interface to represent that the operating system account of the virtual machine is logged in.
(2) The host machine receives the message and returns the blocking message, uuid (virtual machine information) and the login role, namely the registration account of the virtual machine, to the unified authentication interface, and after receiving the blocking message, the unified authentication interface pushes the blocking message to the client side of the login role, namely the client side corresponding to the registration account through the message service and waits for user authorization. And after the user is authorized, the client corresponding to the registered account quits the login virtual machine and waits for the unified authentication interface to call the login).
(3) The blocking message generated by the virtual machine represents that a user corresponding to the operating system account of the virtual machine is using the virtual machine, when the blocking message is transmitted to the client from the unified authentication interface, the user can click to perform authorized login operation after the client receives the blocking message, the authorized message is synchronized to the unified authentication interface through the message service, and the unified authentication interface recalls the host interface to initiate a login event after receiving the authorized message and re-transmits the login information in the blocking event. If the login requests of a plurality of users are received, the login request initiated firstly is preferentially processed in the application, namely, the user initiating the login request firstly receives the message waiting for authorization in the blocked flow of the virtual machine firstly. Only a single user is allowed to log on through a single sign-on the virtual machine.
(4) And after receiving the login event, the virtual machine executes a login process and verifies the login process with the unified authentication service.
Therefore, the role participating in login verification in the application comprises two parts, namely a cloud desktop client and a unified authentication interface. The unified authentication interface is used as an abstraction of login operation and is further divided into a login entity (host) and a unified verification service, as shown in fig. 16, a client initiates the login operation, the unified authentication interface checks whether a login user has authority and inserts a second token, namely a login password, into the unified authentication service, and a login event of the login entity interface is triggered after inquiry.
And after the unified authentication interface receives a login event initiated from the client, analyzing the received first token to obtain a login user of the cloud desktop client and a user needing to login the operating system, and generating a specified field of a login role written by the second token through the unified authentication service.
And then, the unified authentication interface initiates a login event to the login entity, and if the virtual machine in the login entity logs in at present, the virtual machine returns to the blocked state.
If the login entity returns the blocked state, the blocked state is returned to the unified authentication interface, the unified authentication interface pushes the message service to the client of the login role, the user receiving the message determines whether to authorize or not to allow login, the message returns through the unified authentication interface at the moment, if the authorization is obtained, the unified authentication interface restarts the login event, and the virtual machine performs login verification through the unified authentication service.
The login entity in the foregoing is abstract for a virtual machine to be logged in, but because the virtual machine runs on a host, in order to adapt to a complex network environment, a mode of using a network card to realize single sign-on is abandoned in the present application, and communication is performed with the virtual machine through a virtio-serial device.
Wherein the login-entity-internal authentication process is as shown in fig. 17:
(1) And generating a login password by the uniform authentication interface, and inserting the login password into a corresponding login user password field in the corresponding database through the uniform authentication service.
(2) And after the virtual machine receives the login event, the virtual machine is connected with the unified authentication service database to log in, and the field of the login password is the field of the unified authentication interface, so that the virtual machine can log in correctly.
According to the technical scheme of the application, the technical support scene process for using the virtual machine for the staff is as follows:
(1) After the virtual machine of the user encounters a problem, the user can apply for technical support personnel through an administrator and is supported by the technical support personnel through the cooperation of the administrator or a department leader.
(2) After determining the person, the administrator may authorize the questioning virtual machine to the technical support person at the management platform and select the login account as the problem initiating user account.
(3) Technical support personnel click the virtual machine with problems on the cloud desktop client to log in the operating system, and the problems of the user are solved.
(4) Meanwhile, the virtual machine blocking process ensures that the user who initiates the problem uses the virtual machine, and can choose to receive support immediately or receive support after storing the working data under the condition that the user logs in.
The method comprises the following steps of realizing a department collaborative work scene flow for a worker by using a virtual machine:
(1) In the case of department collaboration, if a person changes, for example, the person has completed the work for which the project is responsible, the next project has been performed. Personnel in the department need to log in the virtual machine to search data or carry out debugging work. The application may be led through an administrator or a department with an administrator role. The virtual machine is allowed to be acquired.
(2) The administrator can temporarily authorize the virtual machine to the user at the management platform, i.e. obtain the right for the user.
(3) And logging in the cloud desktop client by the user, and logging in the virtual machine after clicking the virtual machine.
(4) Meanwhile, the virtual machine blocking process ensures that the logged-in user has the right of use of the virtual machine operating system under the condition that the virtual machine has a plurality of authorizations.
In summary, the present application adopts a two-level (user- > unified authentication interface- > virtual machine) login verification method. The login password is generated by the uniform authentication interface and is inserted into a corresponding field in the uniform authentication service through the uniform authentication interface. The login password is regenerated every time of login, and a user is not required to obtain the login password of the original account, and a unified authentication interface is not required to know the login password of the original account. Therefore, on the premise of logging in the virtual machine, the operation complexity of logging in the virtual machine is reduced, and the use experience of a user on the virtual machine is improved.
In the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.

Claims (10)

1. A control method, comprising:
obtaining a login account and a registration account, wherein the registration account is the registration account of the virtual machine logged in by the login account;
creating a password character string corresponding to the registered account, wherein the password character string is used as a login password and is stored in a password storage area;
and transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, wherein the login authentication result represents whether the virtual machine is allowed to login by using the registered account.
2. The method of claim 1, in the event that the login account and the registered account are inconsistent, after the transmitting the registered account and the password string to the virtual machine, the method further comprising:
receiving a login blocking message sent by the virtual machine, wherein the login blocking message is obtained by the virtual machine under the condition that the virtual machine is monitored to be logged in by the registered account;
at least sending the login blocking message to a first client corresponding to the registered account;
in the case of receiving the login authorization message transmitted by the first client, re-executing the following steps: and transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, wherein the login authentication result represents whether the virtual machine is allowed to login by using the registered account.
3. The method of claim 2, wherein sending at least the login blocking message to the first client corresponding to the registered account comprises:
and sending the login blocking message, the identification information of the virtual machine and the registered account to a first client corresponding to the registered account, so that the first client outputs an authorization request interface, wherein the authorization request interface is at least used for prompting whether the virtual machine is authorized to exit from the login state of the registered account.
4. The method of claim 1 or 2, wherein in the event that the login account and the registered account are not consistent, prior to the creating the password string corresponding to the registered account, the method further comprises:
inquiring whether authority information corresponding to the login account exists in the authority set corresponding to the virtual machine;
and if the permission set corresponding to the virtual machine has permission information corresponding to the login account, executing: and creating a password character string corresponding to the registered account.
5. The method of claim 1 or 2, wherein transmitting the registered account and the password string to the virtual machine comprises:
and calling a first interface of a host machine where the virtual machine is located, wherein the first interface is used for at least transmitting the registered account and the password character string to the host machine so as to enable the host machine to call a second interface corresponding to the virtual machine, and the second interface is used for at least transmitting the registered account and the password character string to the virtual machine.
6. The method according to claim 5, wherein the first interface is configured to transmit identification information of the virtual machine, the registered account, and the password string to the host, so that the host calls a second interface corresponding to the virtual machine according to the identification information;
and the second interface is a communication interface based on a socket file, and the host computer at least writes the registered account and the password character string into the socket file, so that the virtual machine reads the registered account and the password character string from the socket file.
7. The method of claim 1 or 2, wherein the obtaining a login account and a registration account comprises:
receiving a login request message transmitted by a second client;
and analyzing the login request message to obtain a login account corresponding to the second client and a registration account of the virtual machine logged in by the login account.
8. The method of claim 1, wherein the password string is saved as a login password to a destination field in a password storage area corresponding to the registered account.
9. A control device, characterized by comprising:
the account acquisition unit is used for acquiring a login account and a registration account, wherein the registration account is the registration account of the virtual machine logged in by the login account;
the password creating unit is used for creating a password character string corresponding to the registered account, and the password character string is used as a login password and is stored in a password storage area;
and the information transmission unit is used for transmitting the registered account and the password character string to the virtual machine so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, and the login authentication result represents whether the virtual machine is allowed to login by using the registered account or not.
10. An electronic device, comprising:
a memory for storing a computer program and data generated by the execution of the computer program;
a processor for executing the computer program to implement: obtaining a login account and a registration account, wherein the registration account is the registration account of the virtual machine logged in by the login account; creating a password character string corresponding to the registered account, wherein the password character string is used as a login password and is stored in a password storage area; and transmitting the registered account and the password character string to the virtual machine, so that the virtual machine performs login authentication on the password character string by using a login password corresponding to the registered account in the password storage area to obtain a login authentication result, wherein the login authentication result represents whether the virtual machine is allowed to login by using the registered account.
CN202310140297.0A 2023-02-21 2023-02-21 Control method and device and electronic equipment Active CN115840937B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310140297.0A CN115840937B (en) 2023-02-21 2023-02-21 Control method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310140297.0A CN115840937B (en) 2023-02-21 2023-02-21 Control method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN115840937A true CN115840937A (en) 2023-03-24
CN115840937B CN115840937B (en) 2023-05-23

Family

ID=85579965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310140297.0A Active CN115840937B (en) 2023-02-21 2023-02-21 Control method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN115840937B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116483517A (en) * 2023-04-27 2023-07-25 安芯网盾(北京)科技有限公司 Virtual machine control method, device and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143230A (en) * 2011-04-01 2011-08-03 广州杰赛科技股份有限公司 Method for mini-station to authenticate and log in virtual machine in cloud system and login system
US20140289508A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN104717261A (en) * 2013-12-17 2015-06-17 华为技术有限公司 Login method and desktop management device
CN107577516A (en) * 2017-07-28 2018-01-12 华为技术有限公司 Virtual machine password remapping method, device and system
CN108710528A (en) * 2018-05-09 2018-10-26 深圳安布斯网络科技有限公司 Access, control method, device, equipment and the storage medium of desktop cloud virtual machine
CN109002344A (en) * 2018-06-12 2018-12-14 广东睿江云计算股份有限公司 A kind of method of cloud management platform resetting KVM virtual machine password
CN111405006A (en) * 2020-03-06 2020-07-10 北京奇艺世纪科技有限公司 Method and device for processing remote login failure and remote login system
CN113656769A (en) * 2021-08-03 2021-11-16 西安万像电子科技有限公司 Control method and device of master-slave unit and master-slave unit system
CN113656770A (en) * 2021-08-05 2021-11-16 西安万像电子科技有限公司 Authorization processing method and device, electronic equipment and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143230A (en) * 2011-04-01 2011-08-03 广州杰赛科技股份有限公司 Method for mini-station to authenticate and log in virtual machine in cloud system and login system
US20140289508A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN104717261A (en) * 2013-12-17 2015-06-17 华为技术有限公司 Login method and desktop management device
CN107577516A (en) * 2017-07-28 2018-01-12 华为技术有限公司 Virtual machine password remapping method, device and system
CN108710528A (en) * 2018-05-09 2018-10-26 深圳安布斯网络科技有限公司 Access, control method, device, equipment and the storage medium of desktop cloud virtual machine
CN109002344A (en) * 2018-06-12 2018-12-14 广东睿江云计算股份有限公司 A kind of method of cloud management platform resetting KVM virtual machine password
CN111405006A (en) * 2020-03-06 2020-07-10 北京奇艺世纪科技有限公司 Method and device for processing remote login failure and remote login system
CN113656769A (en) * 2021-08-03 2021-11-16 西安万像电子科技有限公司 Control method and device of master-slave unit and master-slave unit system
CN113656770A (en) * 2021-08-05 2021-11-16 西安万像电子科技有限公司 Authorization processing method and device, electronic equipment and computer readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116483517A (en) * 2023-04-27 2023-07-25 安芯网盾(北京)科技有限公司 Virtual machine control method, device and system
CN116483517B (en) * 2023-04-27 2024-01-26 安芯网盾(北京)科技有限公司 Virtual machine control method, device and system

Also Published As

Publication number Publication date
CN115840937B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
CN112073400B (en) Access control method, system, device and computing equipment
US8463885B2 (en) Systems and methods for generating management agent installations
US7024556B1 (en) Distributed system authentication
US5586260A (en) Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms
CN106506494B (en) Application access method of open platform
CN107122674B (en) Access method of oracle database applied to operation and maintenance auditing system
CN109873805A (en) Cloud desktop login method, device, equipment and storage medium based on cloud security
CN110221949B (en) Automatic operation and maintenance management method, device, equipment and readable storage medium
CN112838951B (en) Operation and maintenance method, device and system of terminal equipment and storage medium
CN110069909B (en) Method and device for login of third-party system without secret
CN111600906B (en) Data processing method, device, system, medium, and program
CN116170234B (en) Single sign-on method and system based on virtual account authentication
CN105429979A (en) Cross-platform user certificating method and intelligent router, Internet surfing system
CN112954050B (en) Distributed management method and device, management equipment and computer storage medium
CN109101811B (en) Operation, maintenance and audit method of controllable Oracle session based on SSH tunnel
CN109547402B (en) Data protection method and device, electronic equipment and readable storage medium
CN113452711A (en) Single sign-on method of cloud desktop and network equipment
CN114675567A (en) Access processing method, device and storage medium for remotely controlling terminal
CN114389890B (en) User request proxy method, server and storage medium
CN113922982A (en) Login method, electronic device and computer-readable storage medium
CN115840937B (en) Control method and device and electronic equipment
CN108347449B (en) Method and equipment for managing remote login
KR102118380B1 (en) An access control system of controlling server jobs by users
JP2000047955A (en) System for processing program executing information by electronic mail
US10375056B2 (en) Providing a secure communication channel during active directory disaster recovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant