WO2012071907A1 - 桌面虚拟化终端托管方法及系统 - Google Patents

桌面虚拟化终端托管方法及系统 Download PDF

Info

Publication number
WO2012071907A1
WO2012071907A1 PCT/CN2011/078795 CN2011078795W WO2012071907A1 WO 2012071907 A1 WO2012071907 A1 WO 2012071907A1 CN 2011078795 W CN2011078795 W CN 2011078795W WO 2012071907 A1 WO2012071907 A1 WO 2012071907A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual machine
network side
side device
authentication
module
Prior art date
Application number
PCT/CN2011/078795
Other languages
English (en)
French (fr)
Inventor
汪军
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012071907A1 publication Critical patent/WO2012071907A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors

Definitions

  • the present invention relates to the field of communications, and in particular to a desktop virtualization terminal hosting method and system.
  • Desktop virtualization is a desktop hosting service developed on the remote desktop technology. The technology completely places the computing and storage of the terminal on the server side, and the terminal itself is only an input and output device.
  • the client can completely operate the operating system desktop provided by the server, and in the existing virtualized desktop implementation product, the client Universal Serial Bus (USB) can be heavy.
  • USB Universal Serial Bus
  • a USB device inserted in the client will be presented in the remote desktop on the server side, such as inserting a USB hard disk, which will be found on the remote virtual desktop and generate a drive letter supply operation.
  • the current virtual desktop technology is mainly used in the hosting application of enterprise office PCs.
  • the main application providers combine it with server virtualization technology to allocate virtual machines instead of physical machines for customers, thus making it possible to support a large number of virtual desktop customers.
  • the inventor has found that the above-mentioned related technologies directly use the above-mentioned enterprise-level solution for implementing the communication terminal in the communication network, and the following problems exist: 1) An enterprise-level user management mechanism such as Active Directory is generally adopted, and the virtual desktop is generally used. Technology cannot be combined with existing user authentication and authorization systems for communication networks.
  • Operators provide virtual desktop hosting services, which cannot provide virtual desktop computing based on user subscriptions, storage capacity support, and poor scheduling capabilities (for example, enterprise-level desktop virtualization generally only provides thousands of levels of virtual machine scheduling capabilities.
  • the communication terminal virtualized desktop hosting a city requires dozens or even millions of virtual machines.
  • terminal upgrade support such as IP multimedia subsystem (IMS) and related new services, mobile application stores, etc. This makes it necessary for operators to persuade users to upgrade, and to provide subsidies to users to purchase terminals, and the user upgrade cycle is long, which makes the early promotion period of new business long and costly.
  • IMS IP multimedia subsystem
  • a virtual desktop technology cannot be authenticated with an existing user of a communication network, and a storage capability is supported and a scheduling capability is poor.
  • the present invention provides a desktop virtualization terminal hosting method and system to solve the above problem. At least one of the problems.
  • a method for hosting a desktop virtualization terminal includes: receiving, by a network side device, a first login request from a user equipment (User Equipment, UE for short) and authenticating the UE;
  • the network side device allocates at least one virtual machine to the UE, where the virtual machine uses the virtual machine ID identifier; the virtual machine corresponding to the virtual machine ID of the UE performs device redirection; and the UE performs virtualized desktop on the virtual machine.
  • the network side device includes: an access gateway, where the network side device performs authentication on the UE, where: the access gateway receives the first login request from the UE; the access gateway interacts with the authentication server to complete the authentication of the UE.
  • the above authentication server is a home subscription server HSS in the mobile network, and the HSS includes: an authentication server function entity and a contract server function entity.
  • the network side device allocates at least one virtual machine to the UE according to the subscription information of the user at the service provider, where the subscription information includes at least one of the following: a virtual machine CPU quantity, a memory size, a disk quota, and a service priority.
  • the network side device After the first login request is the first time that the UE sends the login request to the network side device, after the network side device allocates the at least one virtual machine to the UE, the network side device further includes: the network side device saves the virtual machine ID.
  • the method further includes: the network side device receiving the second login request from the UE, and authenticating the UE; after the authentication is passed, the network side device corresponding to the saved virtual machine ID The virtual machine is reassigned to the UE; the virtual machine corresponding to the virtual machine ID of the UE performs a device redirection operation and performs a virtualized desktop operation.
  • the method further includes: the network side device receiving the logout request from the UE; and the network side device releasing the virtual machine.
  • the foregoing method further includes: the virtual machine reporting to the accounting server
  • a desktop virtualization terminal management system including: a UE and a network side device, where the UE includes: a sending module, configured to send a first login request to the network side device; a redirection module, configured to redirect the input device on the UE side to the virtual machine allocated by the network side device; and execute a module, configured to perform a virtualized desktop operation after performing device redirection on the virtual machine allocated by the UE and the network side device;
  • the network side device includes: a receiving module, configured to receive a first login request from the UE; an authentication module, configured to authenticate the UE according to the first login request; and an allocation module, configured to allocate at least one virtual after the authentication is passed
  • the UE is provided to the UE, where the virtual machine uses the virtual machine ID identifier; and the second redirection module is configured to redirect the output device on the network side to the UE.
  • the foregoing authentication module includes: an access gateway, configured to receive a first login request from the UE and interact with the authentication server to complete authentication of the UE.
  • the above authentication server is a home subscription server HSS in the mobile network, and the HSS includes: an authentication server function entity and a contract server function entity.
  • the network side device further includes: a storage module, configured to: when the first login request is a login request sent by the UE to the network side device for the first time, after the network side device allocates at least one virtual machine to the UE, save the virtual machine ID.
  • the receiving module is further configured to receive a second login request from the UE; the authentication module is further configured to authenticate the UE according to the second login request of the UE; and the allocation module is further configured to save the storage module after the authentication is passed.
  • the virtual machine corresponding to the virtual machine ID is reassigned to the UE.
  • the receiving module is further configured to receive a logout request of the UE.
  • the network side device further includes: a logout module, configured to release the virtual machine according to the logout request.
  • the network side device further includes: a charging module, configured to report the access charging information of the UE to the charging server when the UE performs the virtualized desktop operation.
  • the terminal is managed by the terminal and the network side device, and the authentication mechanism is added in the whole implementation process.
  • the virtual desktop technology cannot be authenticated with the existing user of the communication network, and the storage capability is The support and scheduling capabilities are poor, and the current terminal upgrade period is long and the cost is high, thereby achieving the effect of making the desktop virtualization of the terminal more secure and improving the storage capacity and scheduling capability.
  • FIG. 1 is a block diagram of a desktop virtualization terminal hosting system according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a desktop virtualization terminal hosting system according to a preferred embodiment of the present invention
  • FIG. 4 is a schematic diagram of an internal structure of a physical machine in a virtual machine pool in the embodiment shown in FIG. 3;
  • FIG. 5 is a flowchart of a desktop virtualization terminal hosting method according to an embodiment of the present invention;
  • 6 is a schematic flowchart of a remote desktop client accessing the network in conjunction with the embodiment of FIG. 3;
  • FIG. 7 is a schematic flowchart of a remote desktop client subsequent login access network in conjunction with the embodiment shown in FIG. 3;
  • FIG. 1 is a structural block diagram of a desktop virtualization terminal hosting system according to an embodiment of the present invention.
  • the system includes: a user equipment UE (User Equipment, UE for short) 10 and a network side device 12.
  • the UE 10 includes: a sending module 102, configured to send a first login request to the network side device 12.
  • the first redirection module 104 is configured to redirect the input device on the UE 10 side to the virtual machine allocated by the network side device 12.
  • the first redirection module 104 redirects input devices such as a keyboard, a mouse, a recording, a Subscriber Identity Module (SIM) card, and a USB input to a virtual machine allocated by the network side device 12.
  • the execution module 106 is configured to perform a virtualized desktop operation after the UE 10 and the network side device 12 allocate virtual machines for redirection.
  • the network side device 12 includes: a receiving module 122 configured to receive a first login request from the UE 10; and an authentication module 124 configured to authenticate the UE 10 according to the first login request.
  • the foregoing authentication module 124 includes: an access gateway, configured to receive a first login request from the UE and interact with an authentication server to complete authentication of the UE.
  • the managed system receives the login request of the client by setting up a special access gateway, and the access gateway interacts with the existing authentication server of the telecommunication network to complete the user authentication.
  • the foregoing authentication server may be a home subscription server HSS in the mobile network, and the HSS includes: an authentication server function entity and a subscription server function entity.
  • the distribution module 126 is configured to allocate at least one of the virtual machines to the UE 10 after the authentication is passed, where the virtual machine adopts a virtual machine ID identifier; in a specific application process, after the authentication is passed, the system is contracted according to the user. And the load condition of the virtual machine pool allocates a virtual machine to the authenticated UE.
  • the virtualized desktop input and output channels are initialized to perform desktop operations.
  • the receiving module 122 is further configured to receive a second login request from the UE 10; the authentication module 124 is further configured to authenticate the UE 10 according to the second login request of the UE 10;
  • the foregoing allocation module 126 is further configured to re-allocate the virtual machine corresponding to the virtual machine ID saved by the storage module 130 to the UE 10 after the authentication is passed.
  • the second redirection module 128 is configured to redirect the output device on the network side to the UE 10 described above.
  • the second redirection module 128 redirects the output of the screen, the sound card, the USB output, and the like from the network side device 12 to the UE 10.
  • the desktop virtualization that the terminal participates in is more secure, and the storage capacity and the scheduling capability are improved.
  • the desktop virtualization system that the terminal participates can also be utilized to shorten the terminal upgrade. Cycles and lower upgrade costs.
  • FIG. 1 Preferably, as shown in FIG.
  • the network side device 12 may further include: a storage module 130, configured to: when the first login request is a login request sent by the UE 10 to the network side device 12 for the first time, After the network side device 12 allocates at least one virtual machine to the UE 10, Save the virtual machine ID. This ensures that the software and stored data of the contracted UE 10 installed on the virtual machine can be maintained.
  • the virtual machine information (including the virtual machine ID) assigned by the user for the initial login will be saved by the system, ensuring that the same access can be accessed after the subsequent login again. Virtual machine.
  • the receiving module 122 is further configured to receive the logout request of the UE 10; correspondingly, the network side device 12 may further include: a logout module 134, configured to release the virtual machine ID according to the logout request. Corresponding virtual machine.
  • the network side device 12 may further include: a charging module 132, configured to report the access charging information of the UE to the charging server when the UE performs the virtualized desktop operation.
  • the operator can construct an operational virtual terminal hosting system according to the foregoing embodiment, which has benefits for both users and operators, as follows: For the user, the on-demand payment can be used.
  • FIG. 3 is a schematic structural diagram of a desktop virtualization terminal management system according to an example of the present invention. As shown in FIG.
  • the system includes: a UE 10, which is a terminal of a client on which a virtual desktop is installed, and is configured to provide a client for the virtual desktop. Carrier.
  • the access gateway 302 is configured to process the authentication request of the UE 10; the authentication server 304 is configured to store the authentication security data of the user; in a specific application process, the hosting system receives the login request of the client through the set access gateway 302.
  • the access gateway 302 interacts with the existing authentication server 304 of the telecommunication network to complete user authentication. It can be seen that the combination of the access gateway 302 and the authentication server 304 is equivalent to the authentication module 124 in the embodiment shown in FIG. 2.
  • the virtual machine scheduler 306 is configured to collect the state of the virtual machine in the virtual machine pool 308, accept the application request to perform virtual machine allocation, release, migration, and the like; the virtual machine pool 308 is composed of multiple physical machines, each physical machine A virtual machine manager 306 and a plurality of virtual machines are installed.
  • the virtual machine manager 306 and the virtual machine include virtualized desktop related software.
  • FIG. 4 can be referred to. 4 is a schematic diagram of the internal structure of a physical machine in a virtual machine pool in the embodiment.
  • the physical machine 40 includes: a virtual machine manager 402 and a plurality of virtual machines VM 404.
  • the virtual machine manager 402 is configured to create, undo, and schedule virtual machines of the physical machine.
  • the virtual machine manager 402 includes: a user access control module 4044 loaded in the virtual machine manager 402, configured to perform a second validity check on the received packet, and then report the verification after passing the verification.
  • the communication module of the virtual machine manager performs processing; the desktop virtual device layer 4022, the input and output devices corresponding to the remote desktop, such as a display, a mouse, a keyboard, a sound, and a USB device, are virtualized on the network side;
  • the virtual machine 404 includes: The operating system OS 4046 in the virtual machine; the virtual desktop agent VDA 4044, is configured to process virtual desktop functions related to the operating system 4046, including but not limited to virtual device drivers, desktop graphics compression optimization, etc.; application software 4042 of the UE in the virtual machine .
  • the virtual machine pool 308 includes a plurality of virtual machines having independent operating systems and applications, including software necessary for implementing virtualized desktops.
  • the contract server 310 is provided with a subscription database, and is configured to store the virtualized desktop related subscription data of the user, such as the number of CPUs signed, the size of the memory, the disk quota, the priority, the software configuration, and the like.
  • the subscription server 310 may also be an extension of the existing communication user subscription database, such as an extension based on the HSS (Home Subscriber Server); the accounting server 312 is configured to receive the virtual desktop.
  • the billing information of the system is processed and processed.
  • the billing server 312 can be one of the existing billing servers, such as a Radius server or a Third Generation Partener Project (3GPP). Defined Charging Data Function (CDF) functional entity.
  • CDF Charging Data Function
  • the functions implemented by the virtual machine scheduler 306 include the functions implemented by the receiving module 122, the allocating module 126, and the second redirection module 128 in the embodiment shown in FIG. 2, and the hardware may include a receiving module. 122 and an allocation module 126.
  • the function implemented by the receiving module 122 here includes setting to receive the first login request and the second login request from the UE 10. It should be noted that the above-mentioned authentication server 304 and the subscription server 310 can be combined in an actual deployment.
  • FIG. 5 is a flowchart of a desktop virtualization terminal hosting method according to an embodiment of the present invention.
  • the process includes: Step S502:
  • the network side device receives the first login request from the user equipment UE and performs authentication on the UE.
  • the network side device includes: an access gateway, and the network side.
  • the device may perform the authentication on the UE by: the access gateway receiving the login request from the UE; the access gateway interacting with the authentication server to complete the authentication of the UE.
  • the foregoing authentication server is a home subscription server HSS in the mobile network, and the HSS includes: an authentication server function entity and a contract server function entity.
  • the network side device allocates at least one virtual machine to the UE, where the virtual machine adopts a virtual machine ID identifier; and assigns a unique ID to the virtual machine to identify the specific virtual machine.
  • the network side device allocates at least one virtual machine to the UE according to the subscription information of the user at the service provider, where the subscription information may include at least one of the following: Information such as memory size, disk quota, and service priority.
  • Step S506 The UE performs a device redirection operation with the virtual machine.
  • Step S508 The UE performs a virtualized desktop operation on the virtual machine.
  • the foregoing method may further include the following process: the virtual machine reports the access charging information of the UE to the charging server.
  • the foregoing charging information includes, but is not limited to, information such as the number of CPUs used by the user, the CPU usage, the memory size, the disk quota, and the duration of use.
  • the virtual machine can report the access of the UE to the accounting server according to the user's CPU, memory, storage, and application software access. Billing information.
  • the network side device may further include the following processing: Save the above VM ID.
  • the method may further include the following: the network side device receives the second login request from the UE, and performs authentication on the UE; Then, the network side device re-allocates the virtual machine corresponding to the saved virtual machine ID to the UE; the virtual machine corresponding to the virtual machine ID of the UE performs a device redirection operation and performs a virtualized desktop operation.
  • Step S602 The UE 10 initiates a virtualized desktop service access request to the access gateway 302, where the request carries the identity information of the user.
  • Step S604 the access gateway 302 reads the authentication data from the authentication server 304 according to the user identity information, for example, the user adopts AKA (Authentication and Key Agreement) based on 3GPP SIM (Subscriber Identity Module). In the manner of authentication, the read authentication data is 3GPP authentication 5-tuple data.
  • AKA Authentication and Key Agreement
  • 3GPP SIM Subscriber Identity Module
  • any existing authentication mode in the existing telecommunication network such as the username/password authentication mode used for broadband access and the authentication mode of 3GPP2, may be used.
  • Step S606 the authentication server 304 returns the authentication data.
  • Step S608, the access gateway 302 sends an authentication challenge to the UE 10 according to the read authentication data.
  • step S610 the UE 10 calculates the authentication response data and sends it to the access gateway 302.
  • step S612 the access gateway 302 checks the authentication data sent by the UE 10, and passes the verification to step S614.
  • Step S614, the access gateway 302 sends a virtual machine allocation request to the virtual machine scheduler 306, and carries at least the identity information of the authenticated user.
  • step S616 the virtual machine scheduler 306 requests the subscription server 310 for the virtual desktop subscription information of the user.
  • the subscription server 310 returns the virtual desktop subscription information of the user, including but not limited to the number of CPUs, memory size, disk quota, priority, software configuration information, etc. that the user subscribes to. Since the user is the first login, the virtual machine has never been assigned, so there is no assigned virtual machine identification information in the return information.
  • Step S620 After receiving the subscription data, the virtual machine scheduler 306 allocates an idle virtual machine resource according to the subscription data and the resource usage in the virtual machine pool 308.
  • Step S622 the virtual machine scheduler 306 sends the assignment request to the virtual machine pool, including the resource allocation information of the virtual machine and the identity information of the user, and the assignment request is finally processed by the virtual machine manager where the virtual machine is located, and the relevant information is reserved. Resources.
  • Step S624 the virtual machine scheduler 306 returns a success response to the access gateway 302 after performing the assigned task, including location information such as the IP address of the virtual machine.
  • Step S626, the access gateway 302 returns an authentication success response to the UE 10.
  • the UE 10 initiates a virtual desktop access request.
  • Step S630 the access gateway 302 verifies its legality step S632, and the access gateway 302 forwards the access request of the UE 10 to the virtual machine in the virtual machine pool that the user has allocated.
  • Step S634 the virtual machine manager where the virtual machine has been allocated verifies the validity of the user, and loads the user desktop according to the input and output capability of the user.
  • Step S636 the virtual machine pool 308 reports the assignment success information to the subscription database, including but not limited to the ID information of the virtual machine; the report may be performed by the virtual machine manager where the allocated virtual machine is located.
  • the subscription database in the subscription server 310 records the virtual machine ID, so that the virtual user is assigned when the subsequent user logs in.
  • Steps S640 to S642 the virtual machine returns an access success response, and arrives at the UE 10 via the access gateway 302.
  • Step S644 the virtual machine reports the access charging information to the accounting server, for example, according to the virtual machine usage time charging, where is an accounting start message.
  • Step S646 the virtual desktop access between the UE 10 and the virtual machine depends on the implementation manner of the virtual desktop. The accesses may be organized into different logical channels according to different input and output devices, such as screen, keyboard, mouse, sound, and storage. Divided into logical subchannels.
  • Step S648 During the virtual desktop access process, the virtual machine periodically reports the charging information to the accounting server.
  • the UE may carry its own input and output capability in the access request in step S610, and the information is used when the virtual machine scheduler is assigned.
  • step S622 The virtual machine can be loaded in advance to start the virtual desktop assigned to the client's UE.
  • FIG. 7 is a schematic flowchart of a subsequent login to the network of the remote desktop client in combination with the embodiment shown in FIG. 3. The main difference from the embodiment shown in FIG. 6 is that the user subscription database stores the assigned virtual machine ID information, and subsequent virtual The machine assignment process is also different. The details are as follows: Step S702 corresponds to the operations of steps S602 to S612 in the embodiment shown in FIG. 6. I will not repeat them here.
  • Step S704 the access gateway 302 sends a virtual machine allocation request to the virtual machine scheduler 306, and carries at least the identity information of the authenticated user.
  • the virtual machine scheduler 306 requests the subscription server 310 for the virtual desktop subscription information of the user.
  • the subscription server 310 returns the virtual desktop subscription information of the user, where the virtual desktop subscription information includes, but is not limited to, the number of CPUs, the memory size, the disk quota, the priority, the software configuration information, and the like signed by the user. Since the user is a subsequent login and has logged in to the virtual machine through the virtual desktop, the previously assigned virtual machine ID has already been recorded in the subscription database.
  • Step S710 after receiving the subscription data, the virtual machine scheduler 306 finds the information of the previously allocated virtual machine according to the returned virtual machine ID information, and determines where in the virtual machine pool based on the resource usage in the virtual machine pool. Restore the virtual machine.
  • the virtual machine scheduler 306 issues an instruction to the virtual machine pool 308 to restore the virtual machine of the specified virtual machine ID.
  • Steps S714 to S736 correspond to steps S624 to S648 in the embodiment shown in FIG. 6, and details are not described herein again.
  • the method further includes: the network side device receiving the logout request from the UE; and the network side device releasing the virtual machine.
  • Step S802 The UE 10 sends a logout request to the access gateway 302.
  • step S804 the access gateway 302 verifies the validity of the UE 10 through the authentication server 304.
  • step S806 the access gateway 302 forwards the logout request to the virtual machine scheduler 306.
  • step S808, the virtual machine scheduler 306 finds the virtual machine information corresponding to the user, and issues a virtual machine resource request to the virtual machine pool 308.
  • step S810 the virtual machine pool 308 returns a release response.
  • step S812 the virtual machine scheduler 306 returns a logout response to the access gateway 302.
  • step S814 the access gateway 302 returns a logout confirmation to the UE 10.
  • the foregoing embodiment of the present invention implements terminal virtualization of desktop virtualization through the terminal and the network side device, and adds an authentication mechanism and a charging mechanism in the entire implementation process, and solves the related technology, the virtual desktop technology cannot communicate with the network.
  • the existing users of the network are authenticated, the storage capacity support and scheduling capabilities are poor, and the current terminal upgrade period is long and the cost is high, so that the desktop virtualization that the terminal participates is more secure, and the storage capacity and scheduling capability are improved.
  • the operator can construct an operational virtual terminal hosting system according to the above embodiment, which can shorten the terminal upgrade period and reduce the upgrade cost for the telecommunication operators and users in the existing telecommunication operation mode.
  • the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices.
  • they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.

Abstract

本发明公开了一种桌面虚拟化终端托管方法及系统,上述方法包括:网络侧设备接收来自于UE的第一登陆请求并对UE进行认证;在认证通过后,网络侧设备分配至少一个虚拟机给上述UE,其中,上述虚拟机采用虚拟机ID标识;上述UE与上述虚拟机ID对应的虚拟机进行设备的重定向;上述UE对虚拟机执行虚拟化桌面操作。采用本发明提供的上述方案,达到了使终端参与的桌面虚拟化更加安全,提高存储能力和调度能力的效果。

Description

桌面虚拟化终端托管方法及系统 技术领域 本发明涉及通信领域, 具体而言, 涉及一种桌面虚拟化终端托管方法及系统。 背景技术 桌面虚拟化是一种在远程桌面技术上发展起来的桌面托管服务, 该技术将终端的 计算、 存储完全放在服务器侧进行, 终端本身只是一个输入输出设备。 在虚拟化桌面 技术中, 客户端可以完全操作服务器端提供的操作系统桌面, 并且在现有的虚拟化桌 面实现产品中, 客户端通用串行总线(Universal Serial Bus, 简称为 USB)设备可以重 定向到服务器侧, 在客户机插入一个 USB设备将呈现在服务器侧的远程桌面中, 比如 插入一个 USB硬盘, 远程虚拟桌面上将发现该硬盘, 并生成盘符供应用操作。这使得 远程虚拟桌面可以获得本地桌面接近的用户体验。 当前的虚拟桌面技术主要应用于企业办公 PC 的托管应用, 主要的应用提供商将 其和服务器虚拟化技术相结合, 为客户分配虚拟机而非物理机器, 从而使得支持大量 的虚拟桌面客户成为可能。 发明人发现上述的相关技术中, 上述企业级的解决方案直接用在通信网络实现通 信终端的托管还存在以下问题: 1 ) 一般采用活动目录 (Active Directory)这类企业级 用户管理机制,虚拟桌面技术无法和通信网络现有的用户认证、授权体系结合起来。 2) 运营商提供虚拟桌面托管服务, 无法提供根据用户签约提供虚拟桌面计算, 存储能力 的支持以及调度能力较差 (如企业级桌面虚拟化一般只提供数千个数量级别的虚拟机 调度能力, 而通信终端虚拟化桌面托管一个城市就需要数十乃至数百万级别的虚拟机 等问题)。 同时, 当前的电信运营模式下, 运营商推出的创新业务大部分都需要终端的升级 支持, 比如 IP多媒体子系统(IP multimedia subsystem, 简称为 IMS)及其相关的新业 务、 移动应用商店等, 这使得运营商必须说服用户升级, 并且提供补贴给用户购买终 端, 而且用户升级周期漫长, 这使得新业务的前期推广周期漫长并且成本高昂。 发明内容 针对相关技术中, 虚拟桌面技术无法和通信网络现有的用户进行认证, 存储能力 的支持和调度能力较差等问题, 本发明提供一种桌面虚拟化终端托管方法及系统, 以 解决上述问题至少之一。 根据本发明的一个方面, 提供一种桌面虚拟化终端托管方法, 包括: 网络侧设备 接收来自于用户设备 (User Equipment, 简称为 UE) 的第一登陆请求并对 UE进行认 证; 在认证通过后, 网络侧设备分配至少一个虚拟机给上述 UE, 其中, 上述虚拟机采 用虚拟机 ID标识; 上述 UE与上述虚拟机 ID对应的虚拟机进行设备的重定向; 上述 UE对虚拟机执行虚拟化桌面操作。 上述网络侧设备包括: 接入网关, 网络侧设备对 UE进行认证包括: 接入网关接 收来自于 UE的第一登陆请求; 接入网关与认证服务器进行交互, 完成对 UE的认证。 上述认证服务器为移动网络中的归属签约服务器 HSS, HSS包括: 认证服务器功 能实体和签约服务器功能实体。 上述网络侧设备根据用户在服务提供商处的签约信息分配至少一个虚拟机给 UE, 其中, 签约信息包括以下至少之一项: 虚拟机 CPU数量、 内存大小、 磁盘限额以及服 务优先级。 当上述第一登陆请求为 UE首次向网络侧设备发送的登录请求时, 在网络侧设备 分配至少一个虚拟机给 UE之后, 还包括: 网络侧设备保存虚拟机 ID。 在上述网络侧设备保存虚拟机 ID之后, 方法还包括: 网络侧设备接收来自于 UE 的第二登陆请求, 并对 UE进行认证; 在认证通过后, 网络侧设备将与保存的虚拟机 ID对应的虚拟机重新分配给 UE; UE与虚拟机 ID对应的虚拟机进行设备重定向操作, 并执行虚拟化桌面操作。 上述执行虚拟化桌面操作之后, 还包括: 网络侧设备接收来自于 UE的注销请求; 网络侧设备释放虚拟机。 在上述 UE执行虚拟化桌面操作时, 上述方法还包括: 虚拟机向计费服务器上报
UE的访问计费信息。 根据本发明的另一个方面, 提供一种桌面虚拟化终端托管系统, 包括: UE和网络 侧设备,其中,上述 UE包括:发送模块,设置为向网络侧设备发送第一登陆请求; 第 一重定向模块, 设置为将 UE侧的输入设备重定向到网络侧设备分配的虚拟机; 执行 模块, 设置为在 UE与网络侧设备分配的虚拟机进行设备重定向之后, 执行虚拟化桌 面操作; 上述网络侧设备包括: 接收模块, 设置为接收来自于 UE的第一登陆请求; 认证模块, 设置为根据第一登陆请求对 UE进行认证; 分配模块, 设置为在认证通过 后, 分配至少一个虚拟机给 UE, 其中, 虚拟机采用虚拟机 ID标识; 第二重定向模块, 设置为将网络侧的输出设备重定向到 UE。 上述认证模块包括: 接入网关, 设置为接收来自于 UE的第一登陆请求以及与认 证服务器进行交互, 完成对 UE的认证。 上述认证服务器为移动网络中的归属签约服务器 HSS, HSS包括: 认证服务器功 能实体和签约服务器功能实体。 上述网络侧设备还包括: 存储模块, 设置为在第一登陆请求为 UE首次向网络侧 设备发送的登录请求时, 在网络侧设备分配至少一个虚拟机给 UE之后, 保存虚拟机 ID。 上述接收模块, 还设置为接收来自于 UE的第二登陆请求; 认证模块, 还设置为 根据 UE的第二登陆请求对 UE进行认证; 分配模块, 还设置为在认证通过后, 将存 储模块保存的虚拟机 ID对应的虚拟机重新分配给 UE。 上述接收模块, 还设置为接收 UE的注销请求; 则网络侧设备还包括: 注销模块, 设置为根据注销请求释放与虚拟机。 上述网络侧设备还包括: 计费模块, 设置为在 UE执行虚拟化桌面操作时, 向计 费服务器上报 UE的访问计费信息。 本发明中, 通过终端和网络侧设备实现桌面虚拟化的终端托管, 同时在整个实现 过程中加入认证机制, 解决了相关技术中, 虚拟桌面技术无法和通信网络现有的用户 进行认证, 存储能力的支持和调度能力较差以及当前终端升级周期长、 成本较高等问 题,进而达到了使终端参与的桌面虚拟化更加安全,提高存储能力和调度能力的效果。 本发明的其它特征和优点将在随后的说明书中阐述, 并且, 部分地从说明书中变 得显而易见, 或者通过实施本发明而了解。 本发明的目的和其他优点可通过在所写的 说明书、 权利要求书、 以及附图中所特别指出的结构来实现和获得。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中: 图 1为根据本发明实施例的桌面虚拟化终端托管系统结构框图; 图 2为根据本发明优选实施例的桌面虚拟化终端托管系统结构示意图; 图 3为根据本发明实例的桌面虚拟化终端托管系统结构示意图; 图 4为图 3所示实施例中的虚拟机池中物理机的内部结构示意图; 图 5为根据本发明实施例的桌面虚拟化终端托管方法流程图; 图 6为结合图 3实施例的远程桌面客户端初次接入网络的流程示意图; 图 7为结合图 3所示实施例的远程桌面客户端后续登录接入网络的流程示意图; 图 8为结合图 3所示实施例的 UE从网络注销虚拟桌面的流程示意图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 图 1为根据本发明实施例的桌面虚拟化终端托管系统结构框图, 如图 1所示, 该 系统包括: 用户设备 UE (User Equipment, 简称为 UE) 10和网络侧设备 12。 上述 UE 10包括: 发送模块 102, 设置为向上述网络侧设备 12发送第一登陆请求。 第一重定向模块 104, 设置为将上述 UE 10侧的输入设备重定向到与所述网络侧 设备 12分配的虚拟机。 在具体应用过程中, 该第一重定向模块 104将键盘、 鼠标、 录 音、 客户识别模块 (Subscriber Identity Module, 简称为 SIM) 卡、 USB输入等输入设 备重定向到网络侧设备 12分配的虚拟机。 执行模块 106,设置为在上述 UE 10与网络侧设备 12分配虚拟机进行重定向之后, 执行虚拟化桌面操作。 所述网络侧设备 12包括: 接收模块 122, 设置为接收来自于上述 UE 10的第一登陆请求; 认证模块 124, 设置为根据上述第一登陆请求对上述 UE 10进行认证。 优选地, 上述认证模块 124包括: 接入网关, 设置为接收来自于所述 UE的第一登陆请求以及 与认证服务器进行交互, 完成对所述 UE的认证。 在具体应用过程中,该托管系统通过设置专门的接入网关接收客户端的登录请求, 接入网关和电信网络现有的认证服务器交互, 完成用户认证。 优选地,上述认证服务器可以为移动网络中的归属签约服务器 HSS,该 HSS包括: 认证服务器功能实体和签约服务器功能实体。 分配模块 126, 设置为在认证通过后, 分配至少一个上述虚拟机给上述 UE 10, 其 中, 所述虚拟机采用虚拟机 ID标识; 在具体应用过程中, 当认证通过后, 系统根据用 户的签约以及虚拟机池的负载情况分配一个虚拟机给认证通过的 UE。 UE连接到该虚 拟机后, 初始化虚拟化桌面输入输出通道, 执行桌面操作。 在优选实施过程中, 上述接收模块 122, 还设置为接收来自于上述 UE 10的第二 登陆请求;上述认证模块 124,还设置为根据上述 UE 10的第二登陆请求对上述 UE 10 进行认证; 上述分配模块 126, 还设置为在认证通过后, 将存储模块 130保存的虚拟 机 ID对应的虚拟机重新分配给上述 UE 10。 第二重定向模块 128,设置为将将所述网络侧的输出设备重定向到上述 UE 10。在 具体应用过程中, 上述第二重定向模块 128将屏幕、 声卡放音、 USB输出等输出从网 络侧设备 12重定向到 UE 10。 上述实施例, 实现了使终端参与的桌面虚拟化更加安全, 提高了存储能力和调度 能力的效果, 同时对于电信运营商和用户来说, 也可以利用终端参与的桌面虚拟化系 统, 缩短终端升级的周期和降低升级成本。 优选地, 如图 2所示, 上述网络侧设备 12还可以包括: 存储模块 130, 设置为在上述第一登陆请求为上述 UE 10首次向上述网络侧设备 12发送的登录请求时,在所述网络侧设备 12分配至少一个虚拟机给上述 UE 10之后, 保存所述虚拟机 ID。这样可以保证签约的 UE 10在虚拟机上安装的软件、存储的数据 可以保持, 用户初次登录分配的虚拟机信息 (包括虚拟机 ID)将为系统所保存, 确保 后续再次登录后仍然可以访问同样的虚拟机。 在优选实施过程中, 上述接收模块 122, 还设置为接收上述 UE 10的注销请求; 相应地, 上述网络侧设备 12还可以包括: 注销模块 134, 设置为根据上述注销请求释 放与上述虚拟机 ID对应的虚拟机。 优选地, 如图 2所示, 上述网络侧设备 12还可以包括: 计费模块 132, 设置为在 所述 UE执行虚拟化桌面操作时, 向计费服务器上报所述 UE的访问计费信息。 通过上述实施例可以看出, 运营商可以根据上述实施例构建一个可运营的虚拟终 端托管系统, 它对于用户、 运营商均有利益, 具体如下: 对于用户而言, 可以采用按需付租费的方式获得一个远远超出一般手机性能、 存 储空间的网络虚拟机, 减少了终端的一次性购买成本; 同时由于虚拟机操作系统的通 用性使得客户可以不受原有手机操作系统的限制, 安装更为丰富的应用软件, 获得更 好的客户体验。 对于运营商而言, 可以向最终用户出租计算、 存储能力, 获得了普通通信业务之 外的额外渠道; 并且由于虚拟机由运营商控制, 在业务开展需要时可以快速对托管的 虚拟机进行统一升级以支持新的网络业务, 这使得新业务的面市周期大大缩短。 图 3为根据本发明实例的桌面虚拟化终端托管系统结构示意图, 如图 3所示, 该 系统包括: UE 10,为安装有虚拟桌面的客户端的终端,设置为为上述虚拟桌面的客户端提供 载体。 接入网关 302, 设置为处理上述 UE 10的认证请求; 认证服务器 304, 设置为存储用户的认证安全数据; 在具体应用过程中, 该托管系统通过设置的接入网关 302接收上述客户端的登录 请求, 该接入网关 302和电信网络现有的认证服务器 304交互, 完成用户认证。 由此 可以看出, 接入网关 302与认证服务器 304的结合相当于图 2所示实施例中的认证模 块 124。 虚拟机调度器 306, 设置为收集虚拟机池 308中虚拟机的状态, 接受应用的请求 执行虚拟机的分配、 释放、 迁移等; 虚拟机池 308, 由多个物理机器组成, 每个物理机器安装有虚拟机管理器 306及 若干虚拟机, 虚拟机管理器 306和虚拟机中包含虚拟化桌面相关软件, 具体地, 可参 照图 4。 图 4为本实施例中的虚拟机池中物理机的内部结构示意图, 如图 4所示, 该 物理机 40包括: 虚拟机管理器 402、 若干虚拟机 VM 404。 上述虚拟机管理器 402, 设置为本物理机器的虚拟机创建、 撤销及调度。 其中, 上述虚拟机管理器 402包括:加载在该虚拟机管理器 402中的用户接入控制模块 4044, 设置为对收到的报文进行二次的合法性校验, 校验通过后才上报到虚拟机管理器的通 信模块进行处理; 桌面虚拟设备层 4022, 在网络侧虚拟出来和远程桌面对应的输入输 出设备, 例如显示、 鼠标、 键盘、 声音以及 USB设备等; 上述虚拟机 404包括: 虚拟机中的操作系统 OS 4046; 虚拟桌面代理 VDA 4044, 设置为处理和操作系统 4046相关的虚拟桌面功能,包括但不限于虚拟设备驱动、桌面 图形压缩优化等; 虚拟机中 UE的应用软件 4042。 从图 4的描述可以得知, 上述虚拟机池 308包括多个虚拟机,,有着独立的操作系 统和应用, 包括实现虚拟化桌面所必须的软件。 签约服务器 310, 其设置有签约数据库, 设置为存储用户的虚拟化桌面相关签约 数据, 如签约的 CPU数量、 内存大小、 磁盘限额、 优先级、 软件配置等。 优选实施过 程中, 该签约服务器 310也可以是现有通信用户签约数据库的一个扩展, 比如在 HSS (Home Subscriber Server, 归属签约数据库) 的基础上进行扩展; 计费服务器 312, 设置为接收虚拟桌面系统的计费信息并加以处理, 在优选实施 过程中, 该计费服务器 312可以为现有计费服务器的一种, 如 Radius服务器或第三代 伙伴项目 (Third Generation Partener Project, 简称为 3GPP ) 定义的计费数据功能 (Charging Data Function, 简称为 CDF) 功能实体。 从以上描述可以看出, 上述虚拟机调度器 306实现的功能, 包括图 2所示实施例 中接收模块 122、 分配模块 126及第二重定向模块 128实现的功能, 硬件上则可以包 括接收模块 122和分配模块 126。 其中, 接收模块 122在此处实现的功能包括设置为 接收来自于上述 UE 10的第一登陆请求和第二登陆请求。 需要指出的是, 上述认证服务器 304和签约服务器 310在实际部署中可以合设, 比如采用现有移动网络中的 HSS(Home Subscriber Server,归属签约服务器)就包含了认 证服务器和签约服务器两种功能实体。 图 5为根据本发明实施例的桌面虚拟化终端托管方法流程图。 如图 5所示, 该流 程包括: 步骤 S502, 网络侧设备接收来自于用户设备 UE的第一登陆请求并对上述 UE进 行认证; 优选地, 上述网络侧设备包括: 接入网关, 上述网络侧设备对上述 UE进行认证 可以通过以下方式实现: 上述接入网关接收来自于所述 UE的登陆请求; 该接入网关 与认证服务器进行交互, 完成对所述 UE的认证。 在优选实施过程中,上述认证服务器为移动网络中的归属签约服务器 HSS,该 HSS 包括: 认证服务器功能实体和签约服务器功能实体。 步骤 S504, 在认证通过后, 上述网络侧设备分配至少一个虚拟机给所述 UE, 其 中, 所述虚拟机采用虚拟机 ID标识; 在具体应用时为所述虚拟机分配一个唯一的 ID 予以标识; 在优选实施过程中, 上述网络侧设备根据用户在服务提供商处的签约信息分配至 少一个虚拟机给所述 UE, 其中, 上述签约信息可以包括以下至少之一项: 上述虚拟机 CPU数量、 内存大小、 磁盘限额以及服务优先级等信息。 步骤 S506, 上述 UE与上述虚拟机进行设备重定向操作; 步骤 S508, 上述 UE对上述虚拟机执行虚拟化桌面操作。 优选地, 在上述 UE执行虚拟化桌面操作时, 上述方法还可以包括以下处理: 上 述虚拟机向计费服务器上报所述 UE的访问计费信息。 优选地, 上述计费信息包括但 不限于: 用户使用虚拟机的 CPU数量、 CPU 占用率、 内存大小、 磁盘限额、 使用时 长等信息。 在具体实施过程中, 当远程桌面客户端初次接入网络或者后续接入网络时, 虚拟 机根据用户的 CPU、 内存、 存储及应用软件的访问情况均可以向计费服务器上报所述 UE的访问计费信息。 优选地, 当上述第一登陆请求为所述 UE首次向所述网络侧设备发送的登录请求 时, 在上述网络侧设备分配至少一个虚拟机给 UE之后, 还可以包括以下处理: 上述 网络侧设备保存上述虚拟机 ID。 在优选实施过程中,在上述网络侧设备保存虚拟机 ID之后,上述方法还可以包括 以下处理: 上述网络侧设备接收来自于上述 UE的第二登陆请求, 并对该 UE进行认 证;在认证通过后,上述网络侧设备将与上述保存的虚拟机 ID对应的虚拟机重新分配 给上述 UE; 上述 UE与上述虚拟机 ID对应的虚拟机进行设备重定向操作, 并执行虚 拟化桌面操作。 图 6为结合图 3所示实施例的远程桌面客户端初次接入网络的流程示意图,其中, 本实施例所指"初次"是指用户签约终端虚拟化桌面托管服务后第一次接入网络的流 程, 如图 6所示, 该流程包括: 步骤 S602, UE 10向接入网关 302发起虚拟化桌面服务接入请求, 该请求携带用 户的身份信息。 步骤 S604, 接入网关 302根据用户身份信息向认证服务器 304读取鉴权数据, 如 用户采用基于 3GPP SIM ( Subscriber Identity Module, 用户身份模块) 的 AKA( Authentication and Key Agreement, 认证及密钥协商)方式进行认证, 则读取的鉴 权数据为 3GPP的鉴权 5元组数据。 在本步骤的鉴权模式, 可以采用现有电信网络中任何已有的认证模式, 比如宽带 接入所用用户名 /密码认证方式、 3GPP2的认证方式等。 步骤 S606, 认证服务器 304返回鉴权数据。 步骤 S608, 接入网关 302根据读取的鉴权数据, 向 UE 10发出认证挑战。 步骤 S610, UE 10计算出鉴权响应数据, 发给接入网关 302。 步骤 S612, 接入网关 302对 UE 10发过来的鉴权数据进行校验, 校验通过后转步 骤 S614。 步骤 S614, 接入网关 302向虚拟机调度器 306发出虚拟机分配请求, 至少携带已 认证用户的身份信息。 步骤 S616,虚拟机调度器 306向签约服务器 310请求该用户的虚拟桌面签约信息。 步骤 S618, 签约服务器 310返回该用户的虚拟桌面签约信息, 包括但不限于该用 户签约的 CPU数量、 内存大小、 磁盘限额、 优先级、 软件配置信息等。 由于用户是初 次登录, 从未指派过虚拟机, 故返回信息中没有已分配的虚拟机标识信息。 步骤 S620, 虚拟机调度器 306收到签约数据后, 结合签约数据和虚拟机池 308中 资源使用情况, 分配一个空闲的虚拟机资源。 步骤 S622, 虚拟机调度器 306将指派请求发给虚拟机池, 包括虚拟机的资源分配 信息以及用户的身份信息, 该指派请求最终由虚拟机所在的虚拟机管理器负责处理, 预留好相关资源。 步骤 S624, 虚拟机调度器 306执行完指派任务后向接入网关 302返回成功响应, 其中包括虚拟机的 IP地址等位置信息。 步骤 S626, 接入网关 302给 UE 10返回认证成功响应。 步骤 S628, UE 10发起虚拟桌面访问请求。 步骤 S630, 接入网关 302验证其合法性 步骤 S632,接入网关 302将 UE 10的访问请求转发给该用户已经分配的虚拟机池 中的虚拟机。 步骤 S634, 已经分配的虚拟机所在虚拟机管理器验证用户合法性, 并根据用户的 输入输出能力加载用户桌面。 步骤 S636, 虚拟机池 308向签约数据库上报指派成功信息, 包含但不限于虚拟机 的 ID信息; 该上报可以由已分配的虚拟机所在的虚拟机管理器执行。 步骤 S638, 签约服务器 310中的签约数据库记录下虚拟机 ID, 以备后续用户登 录时指派虚拟使用。 步骤 S640〜S642, 虚拟机返回访问成功响应, 经由接入网关 302到达 UE 10。 步骤 S644, 虚拟机向计费服务器上报访问计费信息, 比如说按虚拟机使用时间计 费, 此处就是一个计费开始报文。 步骤 S646, UE 10和虚拟机间进行虚拟桌面的访问,取决于虚拟桌面的实现方式, 这些访问可以按照输入输出设备的不同组织成不同的逻辑通道, 比如按照屏幕、键盘、 鼠标、 声音、 存储分成逻辑子通道。 步骤 S648, 虚拟桌面的访问过程中, 虚拟机周期性向计费服务器上报计费信息。 进一步地,为了提高虚拟桌面的加载时间,提升客户的体验, UE可以在步骤 S610 接入请求中就携带自身的输入输出能力, 该信息由虚拟机调度器指派时使用, 在步骤 S622时, 就可以提前加载虚拟机, 启动为客户的 UE分配的虚拟桌面。 图 7为结合图 3所示实施例的远程桌面客户端后续登录接入网络的流程示意图, 与图 6所示的实施例主要不同在于用户签约数据库存储了已经指派的虚拟机 ID信息, 后续虚拟机指派过程也有所不同。 具体如下: 步骤 S702, 对应于图 6所示实施例中步骤 S602〜S612的操作。 此处不再赘述。 步骤 S704, 接入网关 302向虚拟机调度器 306发出虚拟机分配请求, 至少携带已 认证用户的身份信息。 步骤 S706,虚拟机调度器 306向签约服务器 310请求该用户的虚拟桌面签约信息。 步骤 S708, 签约服务器 310返回该用户的虚拟桌面签约信息, 其中, 该虚拟桌面 签约信息包括但不限于该用户签约的 CPU数量、 内存大小、 磁盘限额、 优先级、 软件 配置信息等。 由于用户是后续登录, 已经通过虚拟桌面登录到虚拟机, 故签约数据库 中已经记录了以往分配的虚拟机 ID。 步骤 S710, 虚拟机调度器 306收到签约数据后, 根据返回的虚拟机 ID信息, 查 找到以往分配的虚拟机的信息, 结合虚拟机池中资源使用情况, 决定在虚拟机池中的 什么位置恢复虚拟机。 步骤 S712, 虚拟机调度器 306向虚拟机池 308发出恢复指定虚拟机 ID的虚拟机 的指令。 步骤 S714到 S736, 对应图 6所示实施例中的步骤 S624-步骤 S648, 此处不再赘 述。 优选地, 上述执行虚拟化桌面操作之后, 还可以包括: 上述网络侧设备接收来自 于上述 UE的注销请求; 上述网络侧设备释放上述虚拟机。 为了更好的理解上述优选实施例中的注销过程, 下面结合图 8详细说明, 其中, 图 8为结合图 3所示实施例的 UE从网络注销虚拟桌面的流程示意图, 如图 8所示, 该注销流程包括: 步骤 S802, UE 10向接入网关 302发出注销请求; 步骤 S804, 接入网关 302通过认证服务器 304验证 UE 10的合法性。 步骤 S806, 接入网关 302向虚拟机调度器 306转发注销请求。 步骤 S808, 虚拟机调度器 306查找到该用户对应的虚拟机信息, 向虚拟机池 308 发出释放虚拟机资源请求。 步骤 S810, 虚拟机池 308返回释放响应。 步骤 S812, 虚拟机调度器 306向接入网关 302返回注销响应。 步骤 S814, 接入网关 302向 UE 10返回注销确认。 综上所述,本发明上述实施例通过终端和网络侧设备实现桌面虚拟化的终端托管, 同时在整个实现过程中加入认证机制和计费机制, 解决了相关技术中, 虚拟桌面技术 无法和通信网络现有的用户进行认证, 存储能力的支持和调度能力较差以及当前终端 升级周期长、 成本较高等问题, 进而达到了使终端参与的桌面虚拟化更加安全, 提高 存储能力和调度能力的效果, 同时运营商可以根据上述实施例构建一个可运营的虚拟 终端托管系统, 对现有电信运营模式下的电信运营商和用户来说, 也可以缩短终端升 级的周期和降低升级成本。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1. 一种桌面虚拟化终端托管方法, 包括:
网络侧设备接收来自于用户设备 UE的第一登陆请求并对所述 UE进行认 证;
在认证通过后, 所述网络侧设备分配至少一个虚拟机给所述 UE, 其中, 所述虚拟机采用虚拟机标识 ID;
所述 UE与所述虚拟机 ID对应的虚拟机进行设备的重定向; 所述 UE对所述虚拟机执行虚拟化桌面操作。
2. 根据权利要求 1所述的方法, 其中, 所述网络侧设备包括: 接入网关, 所述网 络侧设备对所述 UE进行认证包括:
所述接入网关接收来自于所述 UE的第一登陆请求;
所述接入网关与认证服务器进行交互, 完成对所述 UE的认证。
3. 根据权利要求 2所述的方法, 其中, 所述认证服务器为移动网络中的归属签约 服务器 HSS, 所述 HSS包括: 认证服务器功能实体和签约服务器功能实体。
4. 根据权利要求 1所述的方法, 其中, 所述网络侧设备根据用户在服务提供商处 的签约信息分配至少一个虚拟机给所述 UE, 其中, 所述签约信息包括以下至 少之一项: 所述虚拟机 CPU数量、 内存大小、 磁盘限额以及服务优先级。
5. 根据权利要求 1或 2所述的方法, 其中, 当所述第一登陆请求为所述 UE首次 向所述网络侧设备发送的登录请求时, 在所述网络侧设备分配至少一个虚拟机 给所述 UE之后, 还包括:
所述网络侧设备保存所述虚拟机 ID。
6. 根据权利要求 5所述的方法, 其中, 在所述网络侧设备保存所述虚拟机 ID之 后, 所述方法还包括:
所述网络侧设备接收来自于所述 UE的第二登陆请求, 并对所述 UE进行 认证;
在认证通过后, 所述网络侧设备将与所述保存的虚拟机 ID对应的虚拟机 重新分配给所述 UE; 所述 UE与所述虚拟机 ID对应的虚拟机进行设备重定向操作,并执行虚拟 化桌面操作。
7. 根据权利要求 1或 2所述的方法, 其中, 所述执行虚拟化桌面操作之后, 还包 括:
所述网络侧设备接收来自于所述 UE的注销请求; 所述网络侧设备释放所述虚拟机。
8. 根据权利要求 1或 2所述的方法, 其中, 在所述 UE执行虚拟化桌面操作时, 所述方法还包括: 所述虚拟机向计费服务器上报所述 UE的访问计费信息。
9. 一种桌面虚拟化终端托管系统, 包括: 用户设备 UE和网络侧设备,
所述 UE包括:
发送模块, 设置为向所述网络侧设备发送第一登陆请求;
第一重定向模块, 设置为将所述 UE侧的输入设备重定向到所述网络侧设 备分配的虚拟机;
执行模块, 设置为在所述 UE与网络侧设备分配的虚拟机进行设备重定向 之后, 执行虚拟化桌面操作;
所述网络侧设备包括:
接收模块, 设置为接收来自于所述 UE的第一登陆请求;
认证模块, 设置为根据所述第一登陆请求对所述 UE进行认证; 分配模块, 设置为在认证通过后, 分配至少一个所述虚拟机给所述 UE, 其中, 所述虚拟机采用虚拟机标识 ID;
第二重定向模块, 设置为将所述网络侧的输出设备重定向到所述 UE。
10. 根据权利要求 9所述的托管系统, 其中, 所述认证模块包括: 接入网关, 设置 为接收来自于所述 UE的第一登陆请求以及与认证服务器进行交互, 完成对所 述 UE的认证。
11. 根据权利要求 9所述的托管系统, 其中, 所述认证服务器为移动网络中的归属 签约服务器 HSS,所述 HSS包括:认证服务器功能实体和签约服务器功能实体。
12. 根据权利要求 9或 10所述的托管系统, 其中, 所述网络侧设备还包括: 存储模块, 设置为在所述第一登陆请求为所述 UE首次向所述网络侧设备 发送的登录请求时, 在所述网络侧设备分配至少一个虚拟机给所述 UE之后, 保存所述虚拟机 ID。
13. 根据权利要求 10所述的托管系统, 其中,
所述接收模块, 还设置为接收来自于所述 UE的第二登陆请求; 所述认证模块, 还设置为根据所述 UE的第二登陆请求对所述 UE进行认 证;
所述分配模块, 还设置为在认证通过后, 将所述存储模块保存的虚拟机 ID 对应的虚拟机重新分配给所述 UE。
14. 根据权利要求 9或 10所述的托管系统, 其中,
所述接收模块, 还设置为接收所述 UE的注销请求;
则所述网络侧设备还包括:
注销模块, 设置为根据所述注销请求释放与所述虚拟机。
15. 根据权利要求 9或 10所述的托管系统, 其中, 所述网络侧设备还包括:
计费模块, 设置为在所述 UE执行虚拟化桌面操作时, 向计费服务器上报 所述 UE的访问计费信息。
PCT/CN2011/078795 2010-12-01 2011-08-23 桌面虚拟化终端托管方法及系统 WO2012071907A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010569636.XA CN102487380B (zh) 2010-12-01 2010-12-01 桌面虚拟化终端托管方法及系统
CN201010569636.X 2010-12-01

Publications (1)

Publication Number Publication Date
WO2012071907A1 true WO2012071907A1 (zh) 2012-06-07

Family

ID=46152834

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/078795 WO2012071907A1 (zh) 2010-12-01 2011-08-23 桌面虚拟化终端托管方法及系统

Country Status (2)

Country Link
CN (1) CN102487380B (zh)
WO (1) WO2012071907A1 (zh)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514044B (zh) * 2012-06-29 2017-02-08 北京金山安全软件有限公司 一种动态行为分析系统的资源优化方法、装置和系统
CN102868723A (zh) * 2012-08-22 2013-01-09 上海金图信息科技有限公司 管理零终端机和桌面虚拟机的控制台及管理方法
CN103634364B (zh) * 2012-08-29 2017-12-29 中兴通讯股份有限公司 一种实现远程桌面的系统、方法、客户端和服务中心
CN102891851A (zh) * 2012-09-25 2013-01-23 中国联合网络通信集团有限公司 虚拟桌面访问控制方法、设备及系统
CN103780641B (zh) * 2012-10-17 2017-08-15 中国电信股份有限公司 接入云桌面的方法、家庭网关和系统
WO2014075231A1 (zh) * 2012-11-14 2014-05-22 华为技术有限公司 双因素认证方法及虚拟机设备
CN103209190A (zh) * 2013-04-23 2013-07-17 深圳市京华科讯科技有限公司 桌面一体机接入网关及实现方法
CN103220359A (zh) * 2013-04-23 2013-07-24 深圳市京华科讯科技有限公司 桌面一体机管理系统及方法
CN104679494B (zh) * 2013-11-29 2020-03-31 华为技术有限公司 用于实现远程虚拟桌面和应用程序的方法以及设备
CN103944882A (zh) * 2014-03-19 2014-07-23 华存数据信息技术有限公司 一种云计算环境下云桌面授权管理方法
CN104954400A (zh) * 2014-03-27 2015-09-30 中国电信股份有限公司 云计算系统及其实现方法
CN104468550B (zh) * 2014-11-28 2018-10-19 华为技术有限公司 一种Windows桌面的用户登录方法、设备及系统
CN105159749B (zh) * 2015-09-11 2019-02-12 广东微云科技股份有限公司 一种云终端重定向本地磁盘到虚拟机的方法及系统
CN107124390B (zh) * 2016-02-25 2021-05-04 阿里巴巴集团控股有限公司 计算设备的安全防御、实现方法、装置及系统
CN105843612A (zh) * 2016-03-21 2016-08-10 深圳市京华科讯科技有限公司 一种实现终端设备切换虚拟机的方法及终端设备
CN106209423B (zh) * 2016-06-23 2019-09-06 新华三技术有限公司 虚拟桌面分配方法及装置
CN106130765B (zh) * 2016-06-23 2019-07-09 新华三技术有限公司 虚拟桌面分配方法及装置
CN108470125B (zh) * 2018-02-09 2021-01-19 北京明朝万达科技股份有限公司 一种基于虚拟桌面的ole重定向方法及系统
CN112241299B (zh) * 2019-07-18 2023-08-18 上海达龙信息科技有限公司 电子设备的运营管理方法、系统、介质及服务器

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1526096A (zh) * 2001-03-19 2004-09-01 �����ɷ� 无线设备上系统服务的动态下载和执行
CN101242261A (zh) * 2008-03-21 2008-08-13 华耀环宇科技(北京)有限公司 一种基于操作系统桌面的vpn连接分离方法
WO2009108579A2 (en) * 2008-02-26 2009-09-03 Vmware, Inc. Extending server-based desktop virtual machine architecture to client machines
CN101681257A (zh) * 2007-04-26 2010-03-24 惠普开发有限公司 虚拟机控制

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR0112170A (pt) * 2000-07-05 2004-07-27 Ernst & Young Llp Aparelho provendo um ou mais serviços de computador para diversos clientes, combinação de um primeiro aparelho e um segundo aparelho substancialmente idêntico ao citado primeiro aparelho, e, processos para prover um ou mais serviços de computador para diversos clientes, para operar um computador real em nome de diversos clientes, e para prover, para diversos clientes, um ou mais serviços de computador
US20060294517A1 (en) * 2005-06-28 2006-12-28 Zimmer Vincent J Network interface sharing among multiple virtual machines
US20070174429A1 (en) * 2006-01-24 2007-07-26 Citrix Systems, Inc. Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
CN101378386B (zh) * 2007-08-31 2012-11-07 运软网络科技(上海)有限公司 一种应用虚拟技术通过掌上终端传递屏幕的安全认证方法及装置
US8181174B2 (en) * 2007-12-28 2012-05-15 Accenture Global Services Limited Virtual machine configuration system
CN101621377A (zh) * 2009-03-26 2010-01-06 常熟理工学院 虚拟计算环境下的可信接入方法
CN101667144B (zh) * 2009-09-29 2013-02-13 北京航空航天大学 一种基于共享内存的虚拟机通信方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1526096A (zh) * 2001-03-19 2004-09-01 �����ɷ� 无线设备上系统服务的动态下载和执行
CN101681257A (zh) * 2007-04-26 2010-03-24 惠普开发有限公司 虚拟机控制
WO2009108579A2 (en) * 2008-02-26 2009-09-03 Vmware, Inc. Extending server-based desktop virtual machine architecture to client machines
CN101242261A (zh) * 2008-03-21 2008-08-13 华耀环宇科技(北京)有限公司 一种基于操作系统桌面的vpn连接分离方法

Also Published As

Publication number Publication date
CN102487380A (zh) 2012-06-06
CN102487380B (zh) 2016-09-07

Similar Documents

Publication Publication Date Title
WO2012071907A1 (zh) 桌面虚拟化终端托管方法及系统
US11734621B2 (en) Methods and systems for building custom appliances in a cloud-based network
CN103001992B (zh) 虚拟桌面实现系统及其使用方法
US10181990B2 (en) Metering software infrastructure in a cloud computing environment
US10001821B2 (en) Cloud management with power management support
US20190332511A1 (en) Tracking cloud installation information using cloud-aware kernel of operating system
US9450783B2 (en) Abstracting cloud management
US9658871B2 (en) Providing configurable bootstrapping of software execution
US8271653B2 (en) Methods and systems for cloud management using multiple cloud management schemes to allow communication between independently controlled clouds
US8943497B2 (en) Managing subscriptions for cloud-based virtual machines
US8832459B2 (en) Securely terminating processes in a cloud computing environment
US20110131306A1 (en) Systems and methods for service aggregation using graduated service levels in a cloud network
US9311162B2 (en) Flexible cloud management
US20090300152A1 (en) Methods and systems for user identity management in cloud-based networks
US8862720B2 (en) Flexible cloud management including external clouds
US8171529B2 (en) Secure subscriber identity module service
US9930138B2 (en) Communicating with third party resources in cloud computing environment
EP2798868B1 (en) Remote provisioning of 3gpp downloadable subscriber identity module for virtual machine applications
US10382213B1 (en) Certificate registration
US20100132016A1 (en) Methods and systems for securing appliances for use in a cloud computing environment
US20120131193A1 (en) Systems and methods for identifying service dependencies in a cloud deployment
US20100131949A1 (en) Methods and systems for providing access control to user-controlled resources in a cloud computing environment
US20110131315A1 (en) Methods and systems for verifying software license compliance in cloud computing environments
KR20130007373A (ko) 가상 데스크탑 서비스를 위한 방법 및 아키텍처
WO2009094890A1 (fr) Procédé de programmation d'un service et système associé, appareil de programmation de services

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11844633

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11844633

Country of ref document: EP

Kind code of ref document: A1