WO2014075231A1 - 双因素认证方法及虚拟机设备 - Google Patents

双因素认证方法及虚拟机设备 Download PDF

Info

Publication number
WO2014075231A1
WO2014075231A1 PCT/CN2012/084563 CN2012084563W WO2014075231A1 WO 2014075231 A1 WO2014075231 A1 WO 2014075231A1 CN 2012084563 W CN2012084563 W CN 2012084563W WO 2014075231 A1 WO2014075231 A1 WO 2014075231A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual machine
client
operating system
login
log
Prior art date
Application number
PCT/CN2012/084563
Other languages
English (en)
French (fr)
Inventor
叶思海
林国仁
凌晨
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201280003456.2A priority Critical patent/CN103975567B/zh
Priority to PCT/CN2012/084563 priority patent/WO2014075231A1/zh
Publication of WO2014075231A1 publication Critical patent/WO2014075231A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present invention relates to communications technologies, and in particular, to a two-factor authentication method and a virtual machine device. Background technique
  • the network login method that users usually use is: User Name + Password.
  • the password used by the user is usually a static static password, which is easy to leak or be cracked. This makes the user name + password login method a big security risk.
  • Two factors are a concept of cryptography.
  • identity authentication has three elements: (1) what is known, that is, identity authentication content that requires user memory, such as passwords and ID numbers; (2) The possession of the item, that is, the special authentication enhancement mechanism owned by the user, such as a dynamic password card, an integrated circuit card (IC card) or a magnetic card; (3) the features, ie, the user The only features that you have, such as fingerprints, pupils, sounds, and more.
  • the method of identity authentication that combines any two of these elements is "two-factor authentication.” Due to the need for dual authentication of user identity, two-factor authentication technology can protect against unauthorized visitors and improve the reliability of authentication.
  • VDI Virtual Desktop Infrastructue
  • VM virtual machine
  • Display and input/output devices such as monitors, keyboards, and mice.
  • cloud computing ownership and control of virtual machine resources are separated. The user has ownership, but the virtual machine is in the cloud, and the user does not have control over the physical resources. Therefore, the security requirements for the virtual machine are higher. Therefore, virtual machines in cloud computing are required to support two-factor authentication technology to improve system security.
  • Embodiments of the present invention provide a two-factor authentication method and a virtual machine device for implementing two-factor authentication in a virtual machine.
  • the first aspect provides a two-factor authentication method, including: If the client logs in to the operating system of the virtual machine for the first time, the client is instructed to log in to the operating system of the virtual machine in the first login manner;
  • the operating system of the virtual machine is locked, and then the client is instructed to log in to the virtual machine by using the second login mode. operating system.
  • the client if the client logs in to the operating system of the virtual machine for the first time, the client is instructed to log in to the operating system of the virtual machine in the first login mode, including:
  • the step of indicating that the client logs in to the operating system of the virtual machine in a second login manner includes:
  • the remote desktop connection establishment status identifier is set to identify that the client establishes a connection with the virtual machine, and
  • the login mode currently used to identify is the first login mode.
  • the two-factor authentication method further Includes:
  • the client is instructed to log in to the operating system of the virtual machine by using the second login mode.
  • the two-factor authentication method further includes: After the client successfully logs in to the operating system of the virtual machine in the second login mode, it identifies that the currently used login mode is the second login mode, and allows the client to use the operating system of the virtual machine.
  • the operating system that indicates that the client logs in to the virtual machine in the first login mode includes: Sending the first login prompt information to the client by using the remote desktop protocol, where the first login prompt information is used to indicate that the client returns the first authentication information required by the first login mode; Returning the first authentication information, and performing identity verification on the client according to the first authentication information;
  • the client is allowed to log in to the operating system of the virtual machine; if the authentication is not passed, the client is denied to log in to the operating system of the virtual machine.
  • the operating system that indicates that the client logs in to the virtual machine in a second login manner includes:
  • the client is allowed to log in to the operating system of the virtual machine; if the authentication is not passed, the client is denied to log in to the operating system of the virtual machine.
  • the first login manner includes a user name And the password login mode; the second login mode includes a fingerprint login mode.
  • the second aspect provides a virtual machine device, including:
  • a first indication module configured to: if the client logs in to the operating system of the virtual machine device for the first time, instructing the client to log in to the operating system of the virtual machine device by using the first login mode;
  • a second indication module configured to: after the client successfully logs in to the operating system of the virtual machine device in the first login manner, lock the operating system of the virtual machine device, and then instruct the client to The login mode is used to log in to the operating system of the virtual machine device.
  • the virtual machine device further includes: a determining module, configured to: when the first indication module instructs the client to log in to the virtual machine device in a first login manner Before the operating system, according to the virtual machine and the client Whether the established remote desktop connection establishment status identifier determines whether the client logs in to the operating system of the virtual machine device for the first time.
  • a determining module configured to: when the first indication module instructs the client to log in to the virtual machine device in a first login manner Before the operating system, according to the virtual machine and the client Whether the established remote desktop connection establishment status identifier determines whether the client logs in to the operating system of the virtual machine device for the first time.
  • the second indication module is further configured to: instruct the client to log in to the second login mode After the operating system of the virtual machine device successfully logs in to the operating system of the virtual machine in the first login mode, the remote desktop connection establishment status identifier is set to identify the client and the A connection is established between the virtual machines, and the currently used login mode is identified as the first login mode.
  • the virtual machine device further includes :
  • a third indication module configured to: if the client is not logged into the operating system of the virtual machine device for the first time, instructing the client to log in to the operating system of the virtual machine device by using the second login mode.
  • the second indication module is further used in After the client successfully logs in to the operating system of the virtual machine device in the second login mode, it is identified that the currently used login mode is the second login mode, and the client is allowed to use the operating system of the virtual machine device. .
  • the first indication module includes:
  • a first sending unit configured to send the first login prompt information to the client by using a remote desktop protocol, where the first login prompt information is used to instruct the client to return the first authentication required by the first login mode Information
  • a first receiving unit configured to receive the first authentication information returned by the client
  • a first verification unit configured to perform identity verification on the client according to the first authentication information, if allowed by identity verification, The client logs in to the operating system of the virtual machine device, and if the client does not pass the authentication, the client is denied to log in to the operating system of the virtual machine device.
  • the second indication module includes :
  • a second sending unit configured to send the second login prompt information to the client by using a remote desktop protocol, where the second login prompt information is used to instruct the client to return the second authentication required by the second login mode Information
  • a second receiving unit configured to receive the second authentication information returned by the client
  • a second verification unit configured to perform identity verification on the client according to the second authentication information, if allowed by identity verification.
  • the client logs in to the operating system of the virtual machine device, and if the client does not pass the authentication, the client is denied to log in to the operating system of the virtual machine device.
  • the first login manner includes a user name And the password login mode; the second login mode includes a fingerprint login mode.
  • the third aspect provides a virtual machine device, including:
  • At least one processor and a memory for storing executable program code, wherein the processor runs a program corresponding to the executable program code by reading executable program code stored in the memory
  • the processor runs a program corresponding to the executable program code by reading executable program code stored in the memory
  • the client If the client logs in to the operating system of the virtual machine device for the first time, the client is instructed to log in to the operating system of the virtual machine device in the first login manner;
  • the operating system of the virtual machine device is locked, and then the client is instructed to log in to the virtual device in a second login manner.
  • the operating system of the machine is locked, and then the client is instructed to log in to the virtual device in a second login manner.
  • the two-factor authentication method and the virtual machine device provided by the embodiment of the present invention, when the virtual machine logs in to the operating system of the virtual machine for the first time, the virtual machine instructs the client to log in to the operating system by using the first login mode, and when the client uses the first login mode. After successfully logging in to the operating system, the operating system is locked, and then the client is instructed to log in to the operating system in the second login mode to implement dual authentication of the client identity, and the two-factor authentication is implemented in the virtual machine, which is beneficial to improve the virtual Machine safety.
  • FIG. 1 is a schematic diagram of networking of a desktop cloud solution according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a two-factor authentication method according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of a two-factor authentication method according to another embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a virtual machine device according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a virtual machine device according to another embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a virtual machine device according to another embodiment of the present invention.
  • the technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention.
  • the embodiments are a part of the embodiments of the invention, and not all of the embodiments.
  • FIG. 1 is a schematic diagram of networking of a desktop cloud solution according to an embodiment of the present invention.
  • the desktop cloud system includes: a client 11, a virtual machine 12, and an input/output device 13.
  • the client 11 is disposed locally as a UI terminal, and the input/output device 13 is also disposed locally at the user.
  • the input/output device 13 may include a keyboard, a mouse, a display, and the like.
  • the virtual machine 12 is placed in the cloud. Virtual machine 12 and client 11 communicate via a remote desktop protocol.
  • the remote desktop protocol used may be an Independent Computing Architecture (ICA) or a Remote Desktop Protocol (RDP).
  • ICA Independent Computing Architecture
  • RDP Remote Desktop Protocol
  • the user owns the physical resources of the virtual machine 12, but since the virtual machine 12 is located in the cloud, there is no control over the physical resources of the virtual machine 12. Therefore, there is a greater concern about the security of the virtual machine 12, such as whether the system administrator or other users will use their own virtual machine 12, stealing information on the virtual machine 12, and the like.
  • the following embodiments of the present invention provide a two-factor authentication method, which is applicable to a virtual machine in a cloud computing, to improve the security of the virtual machine, especially for some high security requirements, such as a government department.
  • the virtual machine can only be started after two-factor authentication.
  • FIG. 2 is a flowchart of a two-factor authentication method according to an embodiment of the present invention. as shown in picture 2, The method of this embodiment includes:
  • Step 201 If the client logs in to the operating system of the virtual machine for the first time, instructs the client to log in to the operating system of the virtual machine in the first login mode.
  • Step 202 After the client successfully logs in to the operating system of the virtual machine in the first login mode, the operating system of the virtual machine is locked, and then the client is instructed to log in to the operating system of the virtual machine by using the second login mode.
  • the operating system that the client logs in to the virtual machine for the first time refers to the process of logging in to the operating system of the virtual machine when the client exits the operating system of the virtual machine.
  • the operating system that the client logs in to the virtual machine for the first time The situation may be that the client logs in to the operating system of the virtual machine for the first time after the client starts or after each startup of the virtual machine.
  • the operating system that the client does not log in to the virtual machine for the first time refers to that the client logs in to the operating system of the virtual machine, and the operating system may time out because the client actively performs the locking function to lock the operating system, or because the operating system is not used for a long time. The process of re-entering the operating system of the virtual machine after the protection enters the locked state.
  • the execution subject of this embodiment is a virtual machine in the cloud.
  • the virtual machine may first determine whether the client is the operating system of the virtual machine for the first time. If it is determined that the client is the first time to log in to the operating system, the client is instructed to The first login mode is used to log in to the operating system of the virtual machine. Correspondingly, the client logs in to the operating system in the first login mode according to the instructions of the virtual machine. During the login process in the first login mode, the virtual machine performs the first authentication on the client. If the client passes the authentication, the virtual machine allows the client to log in to the operating system of the virtual machine, that is, the client successfully logs in to the virtual machine.
  • the virtual machine rejects the client's login to the operating system of the virtual machine, that is, the client cannot successfully log in to the operating system of the virtual machine.
  • the virtual machine in the embodiment locks the operating system of the virtual machine, and then instructs the client to log in to the virtual machine again in the second login mode. system.
  • the client continues to log in to the operating system of the virtual machine in the second login mode according to the instructions of the virtual machine.
  • the virtual machine performs the second authentication on the client. If the client passes the authentication, the virtual machine allows the client to log in to the operating system of the virtual machine, that is, the client successfully logs in to the virtual machine. If the client does not pass the authentication, the virtual machine rejects the client's login to the operating system of the virtual machine, that is, the client cannot successfully log in to the operating system of the virtual machine.
  • the client After the client successfully logs in to the operating system of the virtual machine in the second login mode, the client is described. It is legal, so the virtual machine's operating system is no longer locked, which allows the client to use the virtual machine's operating system.
  • the virtual machine when the client logs in to the operating system of the virtual machine for the first time, the virtual machine instructs the client to log in to the operating system by using the first login mode, when the client logs in as the first login. After the system is successfully logged in to the operating system, the operating system is locked, and then the client is instructed to log in to the operating system in the second login mode to implement dual authentication of the client identity, and the two-factor authentication is implemented in the virtual machine, thereby improving the virtual Machine safety.
  • a method is provided for the virtual machine to determine whether the client is the first time to log in to the operating system of the virtual machine.
  • the method includes: the virtual machine establishes a status identifier according to the remote desktop connection, and determines whether the client logs in to the operating system of the virtual machine for the first time.
  • the specific process is as follows:
  • the remote desktop connection establishment status identifier is added to the virtual machine.
  • the remote desktop connection establishment status identifier is mainly used to identify whether the connection between the virtual machine and the client has been established through the remote desktop protocol. For example, when the remote desktop connection establishment status identifier is the first value, the connection between the virtual machine and the client is not established, and when the remote desktop connection establishment status identifier is the second value, the virtual machine and the client are identified. A connection has been established.
  • the first value and the second value are only used to indicate that the values are different, and the specific values are not limited.
  • the first value can be 0 and the second value can be 1.
  • the virtual machine and the client when the client first requests to log in to the operating system of the virtual machine, the virtual machine and the client have not established a connection through the remote desktop protocol. Only after the client successfully logs in to the operating system of the virtual machine, the virtual machine and the client are only between the virtual machine and the client. A connection will be established. When the client is not requesting to log in to the operating system of the virtual machine for the first time, the virtual machine and the client have established a connection through the remote desktop protocol. Based on this, in this embodiment, the virtual machine uses the remote desktop connection to establish a status identifier to identify whether the client is the operating system that logs in to the virtual machine for the first time.
  • the virtual machine and the client have not established a connection, so the virtual machine can determine that the client is the operating system that logs in to the virtual machine for the first time; if the remote desktop connection is established. If the identifier is the second value, the virtual machine and the client have established a connection. Therefore, the virtual machine can determine that the client is not the operating system that logs in to the virtual machine for the first time.
  • the method for determining whether the client is the first time to log in to the operating system of the virtual machine by establishing a status identifier through the remote desktop connection, and after the client successfully logs in to the operating system of the virtual machine in the first login manner, instructing the client to Second login mode before logging in to the operating system of the virtual machine virtual
  • the remote desktop connection establishment status identifier can be set to identify that the client establishes a connection with the virtual machine.
  • the remote desktop connection establishment status identifier can be set to the second value, and the client is not logged into the virtual machine's operating system again.
  • Log in to the operating system of the VM for the first time, and the VM can also identify that the currently used login mode is the first login mode.
  • a user login authentication mode type identifier may be added to the virtual machine, for example, by using a Login-Type.
  • the current login mode is the first login mode.
  • Login-Type is the fourth value
  • the current login mode is used.
  • the third value and the fourth value are only used to indicate that the values are different, and the specific values are not limited.
  • the third value can be 0 and the fourth value can be 1.
  • the third value and the fourth value herein are not necessarily related to the previous first value and the second value.
  • the virtual machine needs to set the remote desktop connection establishment status identifier to the first value.
  • the virtual machine needs to clear the value of the login mode type of the user login mode. For example, you can set the value to be empty or set to different. Other values of the third value and the fourth value are used for subsequent use.
  • the remote desktop connection establishes a status identifier to determine whether the client is the operating system for the first time to log in to the virtual machine, and has the advantage that the judgment is simple and easy to implement.
  • the client has passed the dual-identity authentication, that is, the user has successfully logged in to the virtual mode by using the first login mode and the second login mode.
  • the operating system of the machine the virtual machine can directly instruct the client to log in to the operating system of the virtual machine in the second login mode, instead of logging in again in two login modes, which is beneficial to improving the operating system of the client not logging in to the virtual machine for the first time. Login efficiency.
  • the case where the client is not the first time to log in to the operating system of the virtual machine is not limited to the method in which the virtual machine directly instructs the client to log in to the operating system in the second login mode.
  • the virtual machine may also instruct the client to log in to the operating system of the virtual machine in the first login manner, which may also improve the operation of the client in the non-first login to the virtual machine. System login efficiency.
  • the virtual machine can also identify the currently used login mode as the second login mode, allowing the client.
  • the operating system of the virtual machine is used.
  • the virtual machine uses the user login authentication type identifier Login-type to identify the current login mode.
  • the virtual machine can set the user login authentication mode type identifier Login-Type to the fourth value, which is used to identify the current usage.
  • the second login method is used.
  • the embodiment provides an implementation manner in which the virtual machine instructs the client to log in to the operating system of the virtual machine in the first login manner, and the implementation manner includes:
  • the virtual machine sends the first login prompt information to the client by using the remote desktop protocol, where the first login prompt information is used to indicate that the client returns the first authentication information required by the first login mode.
  • both the virtual machine and the client run a remote desktop protocol.
  • the client can send a login request to the virtual machine through the remote desktop protocol.
  • the virtual machine determines whether the client is the first request to log in to the virtual machine.
  • the system sends the first login prompt message to the client.
  • the first login prompt information can be displayed on the client side through the user interface.
  • the user name and password and corresponding input boxes can be displayed on the user interface.
  • the client returns the first authentication information to the virtual machine according to the first login prompt information, and the first authentication information is transmitted to the virtual machine side through a remote desktop protocol between the client and the virtual machine.
  • the virtual machine receives the first authentication information returned by the client, and authenticates the client according to the first authentication information.
  • the authentication here is equivalent to the first authentication. If the client passes the authentication, the client identity is legal, and the client is allowed to log in to the operating system of the virtual machine. This is equivalent to the virtual machine establishing a connection with the client through the remote desktop protocol; if the client does not pass the authentication If the client's identity is invalid, the client's operating system is denied to the virtual machine.
  • an optional implementation manner of the virtual machine instructing the client to log in to the operating system of the virtual machine in the second login mode includes:
  • the virtual machine sends the second login prompt information to the client by using the remote desktop protocol, where the second login prompt information is used to instruct the client to return the second authentication information required for the second login mode.
  • the second login prompt information can be displayed on the client side through the user interface. If the second authentication information is fingerprint information, the user interface may display a prompt prompting the client to input the fingerprint through the fingerprint device.
  • the client returns the second authentication information to the virtual machine according to the second login prompt information, where the second authentication information is transmitted to the virtual machine side through a remote desktop protocol between the client and the virtual machine.
  • the fingerprint device software is installed on the virtual machine of the desktop cloud, but the physical device that reads the fingerprint information, that is, the fingerprint device is connected to the client.
  • the fingerprint device can be connected to the client through a Universal Serial Bus (USB) port.
  • USB Universal Serial Bus
  • the virtual machine in this embodiment has established an operating system between the client and the virtual machine by instructing the client to log in to the operating system of the virtual machine in the first login mode before instructing the client to log in to the operating system of the virtual machine in the second login mode. Connection, so the client can successfully transmit the fingerprint information read by the fingerprint device to the virtual machine, realize the fingerprint authentication of the virtual machine to the client, and realize the dual authentication of the virtual machine to the client, and realize the double in the virtual machine. Factor certification.
  • the first login mode may be an ordinary user name and password login mode
  • the second login mode may be a fingerprint login mode, but is not limited thereto.
  • the first login mode and the second login mode of the embodiment may have multiple combinations.
  • the first login mode may be a dynamic password card login mode or an IC card login mode, in addition to the user name and password login mode.
  • the second login method may be a login method using a voice or a login method using a pupil.
  • the first login mode is the username and password login mode
  • the second login mode is the fingerprint login mode as an example.
  • the process of dual authentication of the virtual machine to the client is described in detail. Specifically, in the two-factor authentication process, after the client enters the username and password to pass the authentication, fingerprint verification is also required. First, the virtual machine requires the client to input the username and password. The virtual machine pre-stores the username and password corresponding to the client, and compares the username and password entered by the client with the pre-stored username and password. If it is consistent, it passes the verification, and vice versa. After the client verifies the user name and password, the virtual machine asks the client to input the fingerprint information for fingerprint verification.
  • the fingerprint device is installed on the client, and the corresponding fingerprint device software is installed on the virtual machine. After the software and hardware of the fingerprint device are successfully installed, the initial setting of the fingerprint information is required, that is, the fingerprint information that needs to be authenticated is input.
  • the method of setting fingerprint information is as follows: The operating system of the virtual machine prompts to input the fingerprint information to be authenticated, and the user only needs to press a finger on the fingerprint device according to the prompt. After the fingerprint device is successfully recognized, there will be a prompt message, and the sample is repeated. 3-5 times, will be repeated ⁇ The final result is stored on the virtual machine as standard fingerprint information. Based on this, after receiving the fingerprint information input by the client, the virtual machine can compare the fingerprint information input by the user with the previously set standard fingerprint information. If the comparison result is consistent, the verification passes; otherwise, the verification fails.
  • the first login mode is used as the username and password login mode
  • the second login mode is the implementation process.
  • the implementation process specifically includes:
  • the virtual machine checks the remote desktop connection establishment status identifier VDI—Connection—Status—flag. If the remote desktop connection establishment status identifier VDI—Connection—Status— Flag is 0, the user name is selected. Login with password ( UserNamePasswordLoginln ).
  • the virtual machine After the client successfully logs in to the operating system of the virtual machine through the username and password, the virtual machine sets the remote desktop connection establishment status identifier VDI_Connection_Status_flag to 1 to indicate that the virtual machine and the client have been established. Connect, and set the user login authentication type identifier Login_Type to 0, indicating that the currently used login method is UserNamePasswordLoginln.
  • the VM can log in to the VM operating system in the fingerprint login mode ( FingerPrintLoginln ) and then log in to the VM using the fingerprint login mode ( FingerPrintLoginln ) to determine the client login in the UserNamePasswordLoginln mode. system.
  • the client brushes the fingerprint device and enters fingerprint information.
  • the VM After the client successfully logs in to the operating system of the VM through the fingerprint login mode, the VM sets the user login authentication type identifier Login_Type to 1, indicating that the currently used login method is FingerPrintLoginln.
  • the virtual machine can determine that the client is logged in by FingerPrintLoginln according to the user login authentication type type Login_Type.
  • the virtual machine's operating system is not locked, and the client is allowed to use the virtual machine's operating system.
  • the operating system locks the operating system because the client actively performs the locking function, or the operating system is not used for a long time. Because the system timeout protection enters the locked state, the virtual machine checks the remote desktop connection establishment status identifier VDI—Connection— Status—The flag is 1, indicating that a connection has been established between the virtual machine and the client. Therefore, the client is directly prompted to log in by fingerprint login. The client swipes the fingerprint device and enters the fingerprint information to log in to the operating system of the virtual machine again.
  • the virtual machine If the virtual machine enters the running state and the user logs in to the operating system of the virtual machine on another client, the virtual machine considers that the login process is the first time to log in to the operating system of the virtual machine for another client, then use the previous one. The client logs in to the operating system for processing.
  • the virtual machine implements two-factor authentication through the following files:
  • the msgina.dll file is the Windows login authentication policy related module. Used to complete all user login and verification functions; Graphical Identification and Authentication (GINA) module, which is a dynamic database file that is called by winlogon.exe to provide user identity Identify and verify the function and feed the user's account and password to winlogon.exe.
  • GINA Global System for Mobile Network
  • gina.dll files After installing the fingerprint software, there will be 3 gina.dll files in the Windows XP system.
  • One is Windows msgina.dll, one is picagina.dll on the Citrix desktop system, and the other is zwgina.dll on the fingerprint.
  • the fingerprint gina.dll file will be different from manufacturer to manufacturer, and the file name may be different.
  • the corresponding operations in the process of performing the two-factor authentication method on the client by the virtual machine may be implemented by combining the foregoing modules with corresponding files.
  • the virtual machine when the client logs in to the operating system of the virtual machine for the first time, the virtual machine instructs the client to log in to the operating system by using the username and password login mode, and when the client logs in with the username and password.
  • the operating system After the system is successfully logged in to the operating system, the operating system is locked, and then the client is instructed to log in to the operating system by using the fingerprint login mode to implement dual authentication of the client identity.
  • the two-factor authentication is implemented in the virtual machine, and the virtual machine is improved. Security.
  • FIG. 3 is a flowchart of a two-factor authentication method according to another embodiment of the present invention. As shown in FIG. 3, the method in this embodiment includes:
  • Step 301 The client logs in to the operating system of the virtual machine in the first login manner according to the instruction of the virtual machine.
  • Step 302 After the client successfully logs in to the operating system of the virtual machine in the first login mode, the client logs in to the operating system of the virtual machine in the second login mode according to the instruction of the virtual machine.
  • an implementation manner of step 301 includes:
  • the client first sends a login request to the virtual machine.
  • the virtual machine receives the login sent by the client. After the request, the first login prompt message is sent to the client.
  • the client receives the first login prompt information sent by the virtual machine through the remote desktop protocol, and the first login prompt information is used to indicate that the client returns the first authentication information required by the first login mode.
  • the client returns the first authentication information to the virtual machine, so that the virtual machine authenticates the client according to the first authentication information.
  • the virtual machine allows the client to log in to the operating system of the virtual machine, that is, the client successfully logs in to the operating system of the virtual machine.
  • step 302 includes:
  • the client receives the second login prompt information sent by the virtual machine through the remote desktop protocol, and the second login prompt information is used to instruct the client to return the second authentication information required by the second login mode.
  • the virtual machine locks its operating system, and then sends a second login prompt message to the client to instruct the client to log in to the virtual machine in the second login mode.
  • the client returns second authentication information to the virtual machine for the virtual machine to authenticate the client according to the second authentication information.
  • the virtual machine authenticates the client according to the second authentication information. If the client passes the authentication, the virtual machine allows the client to log in to the operating system of the virtual machine and allows the client to use the operating system of the virtual machine, that is, successfully log in to the virtual machine. system.
  • the first login mode may be a user name and password login mode; the second login mode may be a fingerprint login mode, but is not limited thereto.
  • the client cooperates with the virtual machine to implement two-factor authentication on the virtual machine, thereby improving the security of the virtual machine.
  • FIG. 4 is a schematic structural diagram of a virtual machine device according to an embodiment of the present invention. As shown in FIG. 4, the virtual machine device of this embodiment includes: a first indication module 41 and a second indication module 42.
  • the first indication module 41 is configured to: when the client logs in to the operating system of the virtual machine device of the embodiment for the first time, instructs the client to log in to the operating system of the virtual machine device of the embodiment in the first login mode.
  • the second indication module 42 is connected to the first indication module 41, and is used to successfully log in to the operating system of the virtual machine device of the embodiment in the first login mode after the first indication module 41 is instructed by the client.
  • the operating system of the virtual machine device is locked, and then the client is instructed to log in to the operating system of the virtual machine device of the embodiment in the second login mode.
  • the virtual machine device of this embodiment further includes: a determining module 43.
  • the determining module 43 is configured to: before the first indication module 41 instructs the client to log in to the operating system of the virtual machine device in the first login manner, according to the remote desktop used to identify whether the virtual machine device establishes a connection with the client
  • the connection establishment status identifier determines whether the client logs in to the operating system of the virtual machine device of the embodiment for the first time.
  • the determining module 43 is connected to the first indicating module 41, and is configured to provide the first indicating module 41 with information about whether the client is the first time to log in to the operating system of the virtual machine device of the embodiment.
  • the second indication module 42 is further configured to successfully log in to the virtual machine in the first login mode by the client before instructing the client to log in to the operating system of the virtual machine device of the embodiment in the second login mode.
  • the remote desktop connection establishment status identifier is used to identify that the client establishes a connection with the virtual machine device, and identifies that the currently used login mode is the first login mode.
  • the virtual machine device of this embodiment may further include: a third indication module 44.
  • the third indication module 44 is configured to: when the client is not the first time to log in to the operating system of the virtual machine device of the embodiment, instruct the client to log in to the operating system of the virtual machine device of the embodiment in the second login mode.
  • the third indication module 44 is connected to the determination module 43 for obtaining information from the determination module 43 whether the client is the first time to log in to the operating system of the virtual machine device of the embodiment.
  • the second indication module 42 is further configured to: after the client successfully logs in to the operating system of the virtual machine device in the second login mode, the current login mode is used as the second login mode, and the client is allowed to use the embodiment.
  • the operating system of the virtual machine device is further configured to: after the client successfully logs in to the operating system of the virtual machine device in the second login mode, the current login mode is used as the second login mode, and the client is allowed to use the embodiment.
  • the operating system of the virtual machine device is further configured to: after the client successfully logs in to the operating system of the virtual machine device in the second login mode.
  • an optional implementation structure of the first indication module 41 includes: a first sending unit 411, a first receiving unit 412, and a first verifying unit 413.
  • the first sending unit 411 is configured to send the first login prompt information to the client by using the remote desktop protocol, where the first login prompt information is used to indicate that the client returns the first authentication information required by the first login mode.
  • the first receiving unit 412 is configured to receive first authentication information returned by the client.
  • the first receiving unit 412 is connected to the first sending unit 411, and configured to receive the first authentication information input by the client after the first sending unit 411 sends the first login prompt information.
  • the first verification unit 413 is connected to the first receiving unit 412, and configured to perform authentication on the client according to the first authentication information received by the first receiving unit 412. If the authentication is performed, the client is allowed to log in to the virtual machine in the embodiment. The operating system of the device, if not authenticated, rejects the client The user is logged in to the operating system of the virtual machine device of this embodiment.
  • an optional implementation structure of the second indication module 42 includes: a second sending unit 421, a second receiving unit 422, and a second verifying unit 423.
  • the second sending unit 421 is configured to send the second login prompt information to the client by using the remote desktop protocol, where the second login prompt information is used to instruct the client to return the second authentication information required for the second login mode.
  • the second receiving unit 422 is configured to receive second authentication information returned by the client.
  • the second receiving unit 422 is connected to the second sending unit 421, and configured to receive, after the second sending unit 421 sends the second login prompt information, the second authentication information input by the client.
  • a second verification unit 423 connected to the second receiving unit 422, configured to be configured according to the second receiving unit
  • the second authentication information received by the 422 authenticates the client. If the authentication is performed, the client is allowed to log in to the operating system of the virtual machine of the embodiment. If the authentication is not performed, the client is denied to log in to the virtual machine of the embodiment. Operating system.
  • the first login mode may be a user name and password login mode; the second login mode may be a fingerprint login mode, but is not limited thereto.
  • the function modules or units of the virtual machine device provided in this embodiment may be used to perform the process of the two-factor authentication method provided in the embodiment shown in FIG. 2.
  • the specific working principle is not described here. For details, refer to the description of the method embodiment.
  • the virtual machine device When the client logs in to the operating system of the virtual machine device for the first time, the virtual machine device instructs the client to log in to the operating system in the first login mode. After the client successfully logs in to the operating system in the first login mode, The operating system is locked, and then the client is instructed to log in to the operating system in the second login mode to implement dual authentication of the client identity, and the two-factor authentication is implemented in the virtual machine device, thereby improving the security of the virtual machine device.
  • FIG. 6 is a schematic structural diagram of a virtual machine device according to another embodiment of the present invention.
  • the virtual machine device of this embodiment includes: at least one processor 61, and a memory 62 and a communication interface 63.
  • the processor 61, the memory 62, and the communication interface 63 can be connected by a bus.
  • the bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component (PCI) bus, or an Extended Industry Standard Architecture (EISA) bus. Wait.
  • ISA Industry Standard Architecture
  • PCI Peripheral Component
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only Figure 6 It is indicated by a thick line, but does not mean that there is only one bus or one type of bus.
  • the memory 62 is used to store the executable program code.
  • the processor 61 instructs the client to log in to the virtual machine device in the first login mode by reading the operating system of
  • the operating system of the virtual machine device is locked, and then the client is instructed to log in to the virtual device in a second login manner.
  • the operating system of the machine is locked, and then the client is instructed to log in to the virtual device in a second login manner.
  • the memory 62 can be used to store some data or identification information and the like of the processor 61 in the process of implementing the two-factor authentication process in addition to the program code that the processor 61 needs to execute.
  • the communication interface 63 is used to implement communication between the virtual machine device and the client.
  • the processor 61 may send the indication information to the client through the communication interface 63 to instruct the client to log in to the operating system of the virtual machine device in the first login mode or the second login mode.
  • the first login mode may be a user name and password login mode; the second login mode may be a fingerprint login mode, but is not limited thereto.
  • the virtual machine device provided in this embodiment can be used to perform the process of the two-factor authentication method shown in FIG. 2, and the specific working principle is not described here. For details, refer to the description of the method embodiment.
  • the virtual machine device When the client logs in to the operating system of the virtual machine device for the first time, the virtual machine device instructs the client to log in to the operating system in the first login mode. After the client successfully logs in to the operating system in the first login mode, The operating system is locked, and then the client is instructed to log in to the operating system in the second login mode to implement dual authentication of the client identity, and the two-factor authentication is implemented in the virtual machine device, thereby improving the security of the virtual machine device.
  • the method includes the steps of the foregoing method embodiments; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Abstract

本发明实施例提供一种双因素认证方法及虚拟机设备。认证方法包括:如果客户端首次登录虚拟机的操作系统,指示客户端以第一登录方式登录虚拟机的操作系统;在客户端以第一登录方式成功登录虚拟机的操作系统后,将虚拟机的操作系统锁定,然后指示客户端以第二登录方式登录虚拟机的操作系统。本发明技术方案在虚拟机中实现了双因素认证,提高了虚拟机的安全性。

Description

双因素认证方法及虚拟机设备 技术领域 本发明涉及通信技术, 尤其涉及一种双因素认证方法及虚拟机设备。 背景技术
一般情况下, 用户通常使用的网络登录方法为: 用户名称 +密码。 用户使 用的密码通常为固定不变的静态密码, 很容易泄露或者被破解, 这使得用户 名称 +密码的登录方式存在艮大的安全隐患。于是出现一种更加安全的身份认 证方法, 即双因素认证技术。 双因素是密码学的一个概念, 从理论上来说, 身份认证有三个要素: (1 )所知道的内容, 即, 需要使用者记忆的身份认证 内容, 例如密码和身份证号码等; (2 )所拥有的物品, 即, 使用者拥有的特 殊认证加强机制, 例如动态密码卡, 集成电路卡( Integrated Circuit Card, 简 称为 IC卡)或磁卡等; (3 )所具备的特征, 即, 使用者本身拥有的惟一特 征, 例如指纹、 瞳孔、 声音等。 把以上任意两种要素结合起来的身份认证的 方法就是 "双因素认证" 。 由于需要用户身份的双重认证, 因此, 双因素认 证技术可以抵御非法访问者, 提高认证的可靠性。
随着云计算的发展, 出现了一种新的计算应用模式: 虚拟桌面 (Virtual Desktop Infrastructue, 简称为 VDI ) , 即用户的虚拟机( Virtual Machine, 简 称为 VM )是在云端, 本地只有痩终端和显示器、 键盘、 鼠标等显示和输入 / 输出设备。 在云计算中, 虚拟机资源的所有权和控制权分离。 用户有所有权, 但虚拟机在云端, 用户没有对物理资源的控制权, 因此, 对虚拟机的安全性 要求更高。 因此, 要求云计算中的虚拟机支持双因素认证技术, 以提高系统 的安全。 但是, 目前无法在桌面云的解决方案中实现双因素认证。 发明内容 本发明实施例提供一种双因素认证方法及虚拟机设备, 用以在虚拟机中 实现双因素认证。
第一方面提供一种双因素认证方法, 包括: 如果客户端首次登录虚拟机的操作系统, 指示所述客户端以第一登录方 式登录所述虚拟机的操作系统;
在所述客户端以所述第一登录方式成功登录所述虚拟机的操作系统后, 将所述虚拟机的操作系统锁定, 然后指示所述客户端以第二登录方式登录所 述虚拟机的操作系统。
在第一方面的第一种可能的实现方式中, 如果客户端首次登录虚拟机的 操作系统, 指示所述客户端以第一登录方式登录所述虚拟机的操作系统之前 包括:
根据用于标识所述虚拟机与所述客户端之间是否建立连接的远程桌面连 接建立状态标识判断所述客户端是否首次登录所述虚拟机的操作系统。
结合第一方面的第一种可能的实现方式, 在第一方面的第二种可能的实 现方式中, 所述指示所述客户端以第二登录方式登录所述虚拟机的操作系统 之前包括:
在所述客户端以所述第一登录方式成功登录所述虚拟机的操作系统后, 设置所述远程桌面连接建立状态标识用以标识所述客户端与所述虚拟机之间 建立连接, 并标识当前使用的登录方式是所述第一登录方式。
结合第一方面或第一方面的第一种可能的实现方式或第一方面的第二种 可能的实现方式, 在第一方面的第三种可能的实现方式中, 所述双因素认证 方法还包括:
如果所述客户端非首次登录所述虚拟机的操作系统, 指示所述客户端以 所述第二登录方式登录所述虚拟机的操作系统。
结合第一方面的第二种可能的实现方式或第一方面的第三种可能的实现 方式, 在第一方面的第四种可能的实现方式中, 所述双因素认证方法还包括: 在所述客户端以所述第二登录方式成功登录所述虚拟机的操作系统后, 标识当前使用的登录方式是所述第二登录方式, 允许所述客户端使用所述虚 拟机的操作系统。
结合第一方面或第一方面的第一种可能的实现方式或第一方面的第二种 可能的实现方式或第一方面的第三种可能的实现方式或第一方面的第四种可 能的实现方式, 在第一方面的第五种可能的实现方式中, 所述指示所述客户 端以第一登录方式登录虚拟机的操作系统包括: 通过远程桌面协议向所述客户端发送第一登录提示信息, 所述第一登录 提示信息用于指示所述客户端返回所述第一登录方式所需的第一认证信息; 接收所述客户端返回的所述第一认证信息, 并根据所述第一认证信息对 所述客户端进行身份验证;
若通过身份验证, 允许所述客户端登录所述虚拟机的操作系统; 若未通过身份验证, 拒绝所述客户端登录所述虚拟机的操作系统。
结合第一方面或第一方面的第一种可能的实现方式或第一方面的第二种 可能的实现方式或第一方面的第三种可能的实现方式或第一方面的第四种可 能的实现方式, 在第一方面的第六种可能的实现方式中, 所述指示所述客户 端以第二登录方式登录所述虚拟机的操作系统包括:
通过远程桌面协议向所述客户端发送第二登录提示信息, 所述第二登录 提示信息用于指示所述客户端返回所述第二登录方式所需的第二认证信息; 接收所述客户端返回的所述第二认证信息, 并根据所述第二认证信息对 所述客户端进行身份验证;
若通过身份验证, 允许所述客户端登录所述虚拟机的操作系统; 若未通过身份验证, 拒绝所述客户端登录所述虚拟机的操作系统。
结合第一方面或第一方面的第一种可能的实现方式或第一方面的第二种 可能的实现方式或第一方面的第三种可能的实现方式或第一方面的第四种可 能的实现方式或第一方面的第五种可能的实现方式或第一方面的第六种可能 的实现方式, 在第一方面的第七种可能的实现方式中, 所述第一登录方式包 括用户名与密码登录方式; 所述第二登录方式包括指纹登录方式。
第二方面提供一种虚拟机设备, 包括:
第一指示模块, 用于如果客户端首次登录虚拟机设备的操作系统, 指示 所述客户端以第一登录方式登录所述虚拟机设备的操作系统;
第二指示模块, 用于在所述客户端以所述第一登录方式成功登录所述虚 拟机设备的操作系统后, 将所述虚拟机设备的操作系统锁定, 然后指示所述 客户端以第二登录方式登录所述虚拟机设备的操作系统。
在第二方面的第一种可能的实现方式中, 所述虚拟机设备还包括: 判断模块 , 用于在所述第一指示模块指示所述客户端以第一登录方式登 录所述虚拟机设备的操作系统之前, 根据用于标识所述虚拟机与所述客户端 之间是否建立连接的远程桌面连接建立状态标识判断所述客户端是否首次登 录所述虚拟机设备的操作系统。
结合第二方面的第一种可能的实现方式, 在第二方面的第二种可能的实 现方式中, 所述第二指示模块还用于在指示所述客户端以第二登录方式登录 所述虚拟机设备的操作系统之前, 在所述客户端以所述第一登录方式成功登 录所述虚拟机的操作系统后, 设置所述远程桌面连接建立状态标识用以标识 所述客户端与所述虚拟机之间建立连接, 并标识当前使用的登录方式是所述 第一登录方式。
结合第二方面或第二方面的第一种可能的实现方式或第二方面的第二种 可能的实现方式, 在第二方面的第三种可能的实现方式中, 所述虚拟机设备 还包括:
第三指示模块, 用于如果所述客户端非首次登录所述虚拟机设备的操作 系统,指示所述客户端以所述第二登录方式登录所述虚拟机设备的操作系统。
结合第二方面的第二种可能的实现方式或第二方面的第三种可能的实现 方式, 在第二方面的第四种可能的实现方式中, 所述第二指示模块还用于在 所述客户端以所述第二登录方式成功登录所述虚拟机设备的操作系统后, 标 识当前使用的登录方式是所述第二登录方式, 允许所述客户端使用所述虚拟 机设备的操作系统。
结合第二方面或第二方面的第一种可能的实现方式或第二方面的第二种 可能的实现方式或第二方面的第三种可能的实现方式或第二方面的第四种可 能的实现方式, 在第二方面的第五种可能的实现方式中, 所述第一指示模块 包括:
第一发送单元, 用于通过远程桌面协议向所述客户端发送第一登录提示 信息, 所述第一登录提示信息用于指示所述客户端返回所述第一登录方式所 需的第一认证信息;
第一接收单元, 用于接收所述客户端返回的所述第一认证信息; 第一验证单元,用于根据所述第一认证信息对所述客户端进行身份验证, 若通过身份验证, 允许所述客户端登录所述虚拟机设备的操作系统, 若未通 过身份验证, 拒绝所述客户端登录所述虚拟机设备的操作系统。
结合第二方面或第二方面的第一种可能的实现方式或第二方面的第二种 可能的实现方式或第二方面的第三种可能的实现方式或第二方面的第四种可 能的实现方式, 在第二方面的第六种可能的实现方式中, 所述第二指示模块 包括:
第二发送单元, 用于通过远程桌面协议向所述客户端发送第二登录提示 信息, 所述第二登录提示信息用于指示所述客户端返回所述第二登录方式所 需的第二认证信息;
第二接收单元, 用于接收所述客户端返回的所述第二认证信息; 第二验证单元,用于根据所述第二认证信息对所述客户端进行身份验证, 若通过身份验证, 允许所述客户端登录所述虚拟机设备的操作系统, 若未通 过身份验证, 拒绝所述客户端登录所述虚拟机设备的操作系统。
结合第二方面或第二方面的第一种可能的实现方式或第二方面的第二种 可能的实现方式或第二方面的第三种可能的实现方式或第二方面的第四种可 能的实现方式或第二方面的第五种可能的实现方式或第二方面的第六种可能 的实现方式, 在第二方面的第七种可能的实现方式中, 所述第一登录方式包 括用户名与密码登录方式; 所述第二登录方式包括指纹登录方式。
第三方面提供一种虚拟机设备, 包括:
至少一个处理器, 以及存储器, 所述存储器用于存储可执行程序代码, 其中, 所述处理器通过读取所述存储器中存储的可执行程序代码来运行与所 述可执行程序代码对应的程序, 以用于:
如果客户端首次登录虚拟机设备的操作系统, 指示所述客户端以第一登 录方式登录所述虚拟机设备的操作系统;
在所述客户端以所述第一登录方式成功登录所述虚拟机设备的操作系统 后, 将所述虚拟机设备的操作系统锁定, 然后指示所述客户端以第二登录方 式登录所述虚拟机设备的操作系统。
本发明实施例提供的双因素认证方法及虚拟机设备, 虚拟机在客户端首 次登录虚拟机的操作系统时, 指示客户端以第一登录方式登录该操作系统, 当客户端以第一登录方式成功登录该操作系统后, 将操作系统进行锁定, 然 后指示客户端以第二登录方式登录该操作系统, 实现对客户端身份的双重认 证, 在虚拟机中实现了双因素认证, 有利于提高虚拟机的安全性。 附图说明 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实 施例或现有技术描述中所需要使用的附图作一简单地介绍, 显而易见地, 下 面描述中的附图是本发明的一些实施例。
图 1为本发明一实施例提供的桌面云解决方案的组网示意图;
图 2为本发明一实施例提供的双因素认证方法的流程图;
图 3为本发明另一实施例提供的双因素认证方法的流程图;
图 4为本发明一实施例提供的虚拟机设备的结构示意图;
图 5为本发明另一实施例提供的虚拟机设备的结构示意图;
图 6为本发明又一实施例提供的虚拟机设备的结构示意图。 具体实施方式 为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本发 明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。
图 1为本发明一实施例提供的桌面云解决方案的组网示意图。 如图 1所 示, 该桌面云系统包括: 客户端 11、 虚拟机 12和输入 /输出设备 13。
其中, 客户端 11作为痩终端布置在用户本地, 输入 /输出设备 13也布置 在用户本地, 输入 /输出设备 13可以包括键盘、 鼠标和显示器等。 虚拟机 12 布置在云端。 虚拟机 12和客户端 11通过远程桌面协议进行通信。 所使用的 远程桌面协议可以是独立计算架构 ( Independent Computing Architecture, 简 称为 ICA )或远端桌面协议 ( Remote Desktop Protocol, 简称为 RDP )等。
在该桌面云系统中, 用户拥有虚拟机 12的物理资源的所有权, 但由于虚 拟机 12位于云端, 所以没有对虚拟机 12的物理资源的控制权。 因此, 对虚 拟机 12的安全性更加担忧,例如担扰系统管理员或其他用户会不会使用自己 的虚拟机 12, 窃取自己在虚拟机 12上的信息等。 基于此, 本发明以下实施 例提供了一种双因素认证方法, 适用于云计算中的虚拟机, 用以提高虚拟机 的安全性, 特别是对一些高安全要求的应用场景, 例如政府部门, 只有通过 双因素认证后虚拟机才能启动。
图 2为本发明一实施例提供的双因素认证方法的流程图。 如图 2所示, 本实施例的方法包括:
步骤 201、 如果客户端首次登录虚拟机的操作系统, 指示客户端以第一 登录方式登录虚拟机的操作系统。
步骤 202、 在客户端以第一登录方式成功登录虚拟机的操作系统后, 将 虚拟机的操作系统锁定, 然后指示客户端以第二登录方式登录虚拟机的操作 系统。
在本实施例中, 客户端首次登录虚拟机的操作系统是指客户端在退出虚 拟机的操作系统的情况下, 登录虚拟机的操作系统的过程, 例如, 客户端首 次登录虚拟机的操作系统的情况可能是客户端每次启动后或者在虚拟机每次 启动后, 第一次登录虚拟机的操作系统。 相应地, 客户端非首次登录虚拟机 的操作系统是指客户端登录虚拟机的操作系统之后, 可能由于客户端主动执 行锁定功能锁定操作系统, 或由于操作系统长时间没被使用, 因系统超时保 护而进入锁定状态等, 客户端重新登录虚拟机的操作系统的过程。
本实施例的执行主体是云端的虚拟机。 在实际过程中, 当客户端请求登 录虚拟机的操作系统时, 虚拟机可以先判断客户端是否是首次登录虚拟机的 操作系统, 如果判断出客户端是首次登录操作系统, 则指示客户端以第一登 录方式登录虚拟机的操作系统。 相应地, 客户端根据虚拟机的指示, 以第一 登录方式登录操作系统。 在以第一登录方式登录过程中, 虚拟机会对客户端 进行第一重身份验证, 若客户端通过该身份验证, 则虚拟机允许客户端登录 虚拟机的操作系统, 即客户端成功登录虚拟机的操作系统; 若客户端未通过 该身份验证, 虚拟机就拒绝客户端登录虚拟机的操作系统, 即客户端无法成 功登录虚拟机的操作系统。 当客户端成功登录虚拟机的操作系统后, 为了提 高虚拟机的安全性, 本实施例的虚拟机将虚拟机的操作系统进行锁定, 然后 指示客户端以第二登录方式再次登录虚拟机的操作系统。 相应地, 客户端根 据虚拟机的指示继续以第二登录方式登录虚拟机的操作系统。 在以第二登录 方式登录过程中, 虚拟机会对客户端进行第二重身份验证, 若客户端通过该 身份验证, 则虚拟机允许客户端登录虚拟机的操作系统, 即客户端成功登录 虚拟机的操作系统; 若客户端未通过该身份验证, 虚拟机就拒绝客户端登录 虚拟机的操作系统, 即客户端无法成功登录虚拟机的操作系统。
在客户端以第二登录方式成功登录虚拟机的操作系统后, 说明该客户端 是合法的, 因此不再对虚拟机的操作系统进行锁定, 即允许客户端使用虚拟 机的操作系统。
由此可见, 在本实施例提供的双因素认证方法中, 虚拟机在客户端首次 登录虚拟机的操作系统时, 指示客户端以第一登录方式登录该操作系统, 当 客户端以第一登录方式成功登录该操作系统后, 将操作系统进行锁定, 然后 指示客户端以第二登录方式登录该操作系统,实现对客户端身份的双重认证, 在虚拟机中实现了双因素认证, 提高了虚拟机的安全性。
在一可选实施方式中, 提供一种虚拟机判断客户端是否是首次登录虚拟 机的操作系统的方法。 该方法包括: 虚拟机根据远程桌面连接建立状态标识, 判断客户端是否首次登录虚拟机的操作系统。 具体过程如下:
虚拟机中增加远程桌面连接建立状态标识, 该远程桌面连接建立状态标 识主要用于标识虚拟机与客户端之间是否已经通过远程桌面协议建立起连 接。 例如, 当远程桌面连接建立状态标识为第一取值时, 标识虚拟机与客户 端之间尚未建立起连接, 当远程桌面连接建立状态标识为第二取值时, 标识 虚拟机与客户端之间已经建立起连接。 在此说明, 这里的第一取值和第二取 值仅仅用来说明取值不同, 并不限定具体数值。 例如, 第一取值可以为 0 , 第二取值可以为 1。
通常, 在客户端首次请求登录虚拟机的操作系统时, 虚拟机与客户端之 间尚未通过远程桌面协议建立连接, 只有客户端成功登录虚拟机的操作系统 后, 虚拟机和客户端之间才会建立起连接。 而对于客户端在非首次请求登录 虚拟机的操作系统时, 虚拟机与客户端之间已经通过远程桌面协议建立起了 连接。 基于此, 在本实施例中, 虚拟机使用远程桌面连接建立状态标识来标 识客户端是否是首次登录虚拟机的操作系统。 例如, 如果远程桌面连接建立 状态标识为第一取值, 则说明虚拟机与客户端之间尚未建立连接, 故虚拟机 可以确定客户端是首次登录虚拟机的操作系统; 如果远程桌面连接建立状态 标识为第二取值, 则说明虚拟机与客户端之间已经建立起连接, 故虚拟机可 以确定客户端是非首次登录虚拟机的操作系统。
可选的, 基于通过远程桌面连接建立状态标识判断客户端是否是首次登 录虚拟机的操作系统的方法, 在客户端以第一登录方式成功登录虚拟机的操 作系统后, 在指示客户端以第二登录方式登录虚拟机的操作系统之前, 虚拟 机可以设置远程桌面连接建立状态标识用以标识客户端与虚拟机建立连接, 例如可以将远程桌面连接建立状态标识置为第二取值, 同时标识客户端再次 登录虚拟机的操作系统时已经不是首次登录虚拟机的操作系统, 并且虚拟机 还可以标识当前使用的登录方式是第一登录方式。
可选的, 虚拟机中可以增加一个用户登录认证方式类型标识, 例如可以 用 Login— Type来表示。 当用户登录方式类型标识 Login— Type为第三取值时, 表示当前使用的登录方式为第一登录方式; 当用户登录方式类型标识 Login— Type为第四取值时, 表示当前使用的登录方式为第二登录方式。 在此 说明, 第三取值和第四取值仅仅用来说明取值不同, 具体数值不做限定。 例 如, 第三取值可以是 0, 第四取值可以是 1。 另外, 这里的第三取值和第四取 值, 与之前的第一取值和第二取值没有必然联系。
可选的, 如果虚拟机重启或者虚拟机与客户端之间的连接中断, 虚拟机 需要将远程桌面连接建立状态标识置为第一取值。 可选的, 如果虚拟机重启 或者虚拟机与客户端之间的连接中断, 虚拟机也需要将用户登录方式类型标 识 Login— Type的取值清除,例如可以设置其取值为空或者设置为不同于第三 取值和第四取值的其他取值, 以便于后续继续使用。
本实施方式通过远程桌面连接建立状态标识来判断客户端是否是首次登 录虚拟机的操作系统, 具有判断简单易于实现的优势。
在一可选实施方式中, 如果判断出客户端是非首次登录虚拟机的操作系 统, 说明客户端已经通过了双重身份的认证, 即之前已经成功以第一登录方 式和第二登录方式登录到虚拟机的操作系统, 故虚拟机可以直接指示客户端 以第二登录方式登录虚拟机的操作系统, 而不用再次以两种登录方式进行登 录, 有利于提高客户端在非首次登录虚拟机的操作系统时的登录效率。 但是, 对于客户端非首次登录虚拟机的操作系统的情况, 并不限于虚拟机直接指示 客户端以第二登录方式登录操作系统这种方法。 例如, 如果判断出客户端是 非首次登录虚拟机的操作系统, 则虚拟机还可以指示客户端以第一登录方式 登录虚拟机的操作系统, 这样也可以提高客户端在非首次登录虚拟机的操作 系统时的登录效率。
基于上述各实施方式, 当客户端以第二登录方式成功登录虚拟机的操作 系统后, 虚拟机还可以标识当前使用的登录方式为第二登录方式, 允许客户 端使用虚拟机的操作系统。 可选的, 在虚拟机使用用户登录认证方式类型标 识 Login— Type来标识当前使用的登录方式中,虚拟机可以设置用户登录认证 方式类型标识 Login— Type为第四取值,用于标识当前使用的是第二登录方式。
结合上述各实施方式, 本实施例给出一种虚拟机指示客户端以第一登录 方式登录虚拟机的操作系统的实施方式, 该实施方式包括:
虚拟机通过远程桌面协议向客户端发送第一登录提示信息, 该第一登录 提示信息用于指示客户端返回第一登录方式所需的第一认证信息。 其中, 虚 拟机和客户端都运行有远程桌面协议。 在虚拟机向客户端发送第一登录提示 信息之前, 客户端可以通过远程桌面协议向虚拟机发送登录请求, 虚拟机接 收到客户端的登录请求之后, 判断客户端是否是首次请求登录虚拟机的操作 系统, 在判断出客户端是首次登录虚拟机的操作系统后, 向客户端发送第一 登录提示信息。 可选的, 第一登录提示信息在客户端一侧可以通过用户界面 显示。 如果第一认证信息是用户名和密码, 则用户界面上可以显示用户名和 密码以及对应的输入框。 客户端根据第一登录提示信息, 向虚拟机返回第一 认证信息, 第一认证信息通过客户端与虚拟机之间的远程桌面协议被传输到 虚拟机一侧。
接着, 虚拟机接收客户端返回的第一认证信息, 并根据第一认证信息对 客户端进行身份验证。 这里的身份验证相当于第一重身份验证。 若客户端通 过该身份验证, 说明客户端身份合法, 允许客户端登录虚拟机的操作系统, 这也相当于虚拟机与客户端通过远程桌面协议建立起了连接; 若客户端未通 过该身份验证, 说明客户端身份不合法, 则拒绝客户端登录虚拟机的操作系 统。
相应地, 虚拟机指示客户端以第二登录方式登录虚拟机的操作系统的可 选实施方式包括:
虚拟机通过远程桌面协议向客户端发送第二登录提示信息, 该第二登录 提示信息用于指示客户端返回第二登录方式所需的第二认证信息。 可选的, 第二登录提示信息在客户端一侧可以通过用户界面显示。 如果第二认证信息 是指纹信息,则用户界面上可以显示提示客户端通过指纹仪输入指纹的字样。 客户端根据第二登录提示信息, 向虚拟机返回第二认证信息, 第二认证信息 通过客户端与虚拟机之间的远程桌面协议被传输到虚拟机一侧。 在第二登录方式为指纹登录方式, 第二认证信息为指纹信息的场景下, 指纹仪软件安装在桌面云的虚拟机上, 但读取指纹信息的物理设备, 即指纹 仪连接在客户端上, 指纹仪可以通过通用串行总线(Universal Serial BUS, 简 称为 USB ) 口连接到客户端上。 基于此, 要输入指纹信息在虚拟机中进行指 纹认证的前提是客户端与虚拟机通过远程桌面协议已经建立起连接, 能够把 客户端上连接指纹仪的物理端口映射到虚拟机中, 这样客户端才可以把指纹 仪读取到的指纹信息传送到虚拟机中。 由于本实施例的虚拟机在指示客户端 通过第二登录方式登录虚拟机的操作系统之前, 已经通过指示客户端以第一 登录方式登录虚拟机的操作系统建立起客户端与虚拟机之间的连接, 所以客 户端能够把指纹仪读取到的指纹信息成功传送到虚拟机中, 实现虚拟机对客 户端的指纹认证, 进而实现了虚拟机对客户端的双重身份验证, 在虚拟机中 实现了双因素认证。
在上述各实施方式中, 第一登录方式可以是普通的用户名与密码登录方 式, 而第二登录方式可以是指纹登录方式, 但不限于此。 本实施例的第一登 录方式和第二登录方式可以有多种组合, 例如, 第一登录方式除了可以是用 户名与密码登录方式之外, 还可以是动态密码卡登录方式或 IC 卡登录方式 等; 第二登录方式除了可以是指纹登录方式之外, 还可以是使用声音的登录 方式或使用瞳孔的登录方式等。
以第一登录方式为用户名与密码登录方式, 第二登录方式为指纹登录方 式为例, 详细说明虚拟机对客户端进行双重身份验证的过程。 具体的, 在该 双重身份验证过程中, 客户端输入用户名和密码认证通过后, 还需要进行指 纹验证。 首先, 虚拟机要求客户端输入用户名和密码, 虚拟机上预先存储有 客户端对应的用户名和密码, 通过将客户端输入的用户名和密码与预先存储 的用户名和密码进行比对, 如果比对结果为一致, 则通过验证, 反之未通过 验证; 当客户端通过用户名和密码的验证后, 虚拟机要求客户端再输入指纹 信息进行指纹验证。 其中, 客户端上安装有指纹仪, 而虚拟机上安装有相应 的指纹仪软件。 在指纹仪的软硬件安装成功后, 需要进行指纹信息的初始设 置, 即输入需要认证的指纹信息。 通常设置指纹信息的方法是: 虚拟机的操 作系统提示输入待认证的指纹信息, 用户只需要根据提示在指纹仪上按一下 某个手指, 指纹仪识别成功后会有提示信息, 并重复釆样 3-5次, 将多次釆 样得到的最终结果存储在虚拟机上作为标准指纹信息。 基于此, 虚拟机收到 客户端输入的指纹信息后, 可以将用户输入的指纹信息与之前设置的标准指 纹信息进行比对, 如果比对结果为一致, 则验证通过; 反之, 验证未通过。
下面进一步以第一登录方式为用户名与密码登录方式, 第二登录方式为 选实施过程。 该实施过程具体包括:
当客户端首次登录虚拟机的操作系统时, 虚拟机检查远程桌面连接建立 状态标识 VDI— Connection— Status— Flag , 如果远程桌面连接建立状态标识 VDI— Connection— Status— Flag 为 0 , 则选择用户名与密码的登录方式 ( UserNamePasswordLoginln ) 。
当客户端通过用户名与密码成功登录虚拟机的操作系统后,虚拟机把远 程桌面连接建立状态标识 VDI— Connection— Status— Flag 置为 1 ,用于表示虚拟 机与客户端之间已经建立起连接, 并把用户登录认证方式类型标识 Login— Type置为 0, 表示当前釆用的登录方式为 UserNamePasswordLoginln。
虚拟机可以根据用户登录认证方式类型标识 Login— Type判断出客户端是 以 UserNamePasswordLoginln方式登录的, 则立即锁定虚拟机的操作系统, 然后提示客户端以指纹登录方式 ( FingerPrintLoginln )再次登录虚拟机的操 作系统。
客户端刷指纹仪, 输入指纹信息。
当客户端通过指纹登录方式成功登录虚拟机的操作系统后, 虚拟机把用 户登录认证方式类型标识 Login— Type 置为 1 , 表示当前釆用的登录方式为 FingerPrintLoginln。
虚拟机可以根据用户登录认证方式类型标识 Login— Type判断出客户端是 以 FingerPrintLoginln方式登录的, 不对虚拟机的操作系统进行锁定处理, 允 许客户端使用虚拟机的操作系统。
如果虚拟机进入运行状态后, 由于客户端主动执行锁定功能将操作系统 锁定, 或操作系统长时间没被使用, 因系统超时保护进入锁定状态, 虚拟机 检查远程桌面连接建立状态标识 VDI— Connection— Status— Flag为 1 , 说明虚拟 机与客户端之间已经建立起连接, 故直接提示客户端以指纹登录方式进行登 录。 客户端刷指纹仪, 输入指纹信息, 以重新登录虚拟机的操作系统。 如果虚拟机进入运行状态后, 用户到另外一个客户端上登录虚拟机的操 作系统, 虚拟机认为该登录过程对另一个客户端来说是首次登录虚拟机的操 作系统, 则釆用对前一个客户端登录操作系统的处理方式进行处理。
在一个具体应用场景中 (以远程桌面协议为 Citrix的 ICA协议, 操作系 统以 WINDOWS XP为例 ) ,虚拟机通过以下文件实现双因素认证: msgina.dll 文件是 Windows登陆认证策略相关模块, 该模块用于完成所有用户登陆和验 证功能; 图形化识别和验证 ( Graphical Identification and Authentication , 简称 为 GINA )模块, 它是几个动态数据库文件, 被 winlogon.exe所调用, 为其提 供能够对用户身份进行识别和验证的函数, 并将用户的帐号和密码反馈给 winlogon.exe。 其中, 在登录过程中, 客户端上显示的 "欢迎屏幕" 和 "登录 对话框" 都是由 GINA模块显示的。
在安装了指纹仪软件后, Windows XP系统中会有 3个 gina.dll文件。 一 个是 Windows msgina.dll, 一个是 Citrix桌面系统的 picagina.dll, 另一个是指 纹仪的 zwgina.dll。 其中, 指纹仪的 gina.dll文件会因厂家的不同而不同, 并 且文件的名称也可能会不一样。
其中, 上述虚拟机在对客户端进行双因素认证方法过程中的相应操作可 以由上述模块结合相应地文件来实现。
综上可见, 在本实施例中, 虚拟机在客户端首次登录虚拟机的操作系统 时, 指示客户端以用户名与密码的登录方式登录该操作系统, 当客户端以用 户名与密码的登录方式成功登录该操作系统后, 将操作系统进行锁定, 然后 指示客户端以指纹登录方式登录该操作系统,实现对客户端身份的双重认证, 在虚拟机中实现了双因素认证, 提高了虚拟机的安全性。
图 3为本发明另一实施例提供的双因素认证方法的流程图。如图 3所示, 本实施例的方法包括:
步骤 301、 客户端根据虚拟机的指示, 以第一登录方式登录虚拟机的操 作系统。
步骤 302、 当客户端以第一登录方式成功登录虚拟机的操作系统后, 客 户端根据虚拟机的指示, 以第二登录方式登录虚拟机的操作系统。
可选的, 步骤 301的一种实施方式包括:
客户端首先向虚拟机发送登录请求。 虚拟机接收到客户端发送的登录请 求之后, 向客户端发送第一登录提示信息。
客户端接收虚拟机通过远程桌面协议发送的第一登录提示信息, 该第一 登陆提示信息用于指示客户端返回第一登录方式所需的第一认证信息。
客户端向虚拟机返回第一认证信息, 以供虚拟机根据第一认证信息对客 户端进行身份验证。 其中, 当客户端通过该身份验证后, 虚拟机允许客户端 登录虚拟机的操作系统, 即客户端成功登录到虚拟机的操作系统。
可选的, 步骤 302的一种可选实施方式包括:
客户端接收虚拟机通过远程桌面协议发送的第二登录提示信息, 该第二 登录提示信息用于指示客户端返回第二登录方式所需的第二认证信息。其中, 客户端以第一登录方式成功登录到虚拟机的操作系统后, 虚拟机会将其操作 系统锁定, 然后向客户端发送第二登录提示信息, 以指示客户端以第二登录 方式登录虚拟机的操作系统。
客户端向虚拟机返回第二认证信息, 以供虚拟机根据第二认证信息对客 户端进行身份验证。 虚拟机根据第二认证信息对客户端进行身份验证, 若客 户端通过该身份验证, 则虚拟机允许客户端登录虚拟机的操作系统并允许客 户端使用虚拟机的操作系统, 即成功登录虚拟机的系统。
在一可选实施方式中, 第一登录方式可以是用户名与密码登录方式; 第 二登录方式可以是指纹登录方式, 但不限于此。
本实施例是从客户端的角度进行的描述, 关于双因素认证过程的详细流 程可参见上述实施例的描述, 在此不再赘述。
在本实施例中, 客户端与虚拟机相配合, 在虚拟机上实现了双因素认证, 提高了虚拟机的安全性。
图 4为本发明一实施例提供的虚拟机设备的结构示意图。 如图 4所示, 本实施例的虚拟机设备包括: 第一指示模块 41和第二指示模块 42。
第一指示模块 41 , 用于如果客户端首次登录本实施例虚拟机设备的操作 系统, 指示客户端以第一登录方式登录本实施例虚拟机设备的操作系统。
第二指示模块 42, 与第一指示模块 41连接, 用于在客户端在第一指示 模块 41 的指示下以第一登录方式成功登录本实施例虚拟机设备的操作系统 后, 将本实施例虚拟机设备的操作系统锁定, 然后指示所述客户端以第二登 录方式登录本实施例虚拟机设备的操作系统。 在一可选实施方式中, 如图 5所示, 本实施例的虚拟机设备还包括: 判 断模块 43。 判断模块 43 , 用于在第一指示模块 41指示客户端以第一登录方 式登录本实施例虚拟机设备的操作系统之前, 根据用于标识虚拟机设备与所 述客户端是否建立连接的远程桌面连接建立状态标识判断客户端是否首次登 录本实施例虚拟机设备的操作系统。 其中, 判断模块 43与第一指示模块 41 连接,用于向第一指示模块 41提供客户端是否是首次登陆本实施例虚拟机设 备的操作系统的信息。
进一步,第二指示模块 42还可用于在指示客户端以第二登录方式登录本 实施例虚拟机设备的操作系统之前, 在所述客户端以所述第一登录方式成功 登录所述虚拟机的操作系统后, 设置远程桌面连接建立状态标识用以标识客 户端与虚拟机设备建立连接, 并标识当前使用的登录方式是第一登录方式。
如图 5所示, 本实施例的虚拟机设备还可以包括: 第三指示模块 44。 第 三指示模块 44,用于如果客户端非首次登录本实施例虚拟机设备的操作系统, 指示客户端以第二登录方式登录本实施例虚拟机设备的操作系统。 其中, 第 三指示模块 44与判断模块 43连接,用于从判断模块 43获取客户端是否是首 次登陆本实施例虚拟机设备的操作系统的信息。
进一步,第二指示模块 42还可用于在客户端以第二登录方式成功登录本 实施例虚拟机设备的操作系统后,标识当前使用的登录方式是第二登录方式, 允许客户端使用本实施例虚拟机设备的操作系统。
在一可选实施方式中, 第一指示模块 41的一种可选实现结构包括: 第一 发送单元 411、 第一接收单元 412和第一验证单元 413。
第一发送单元 411 , 用于通过远程桌面协议向客户端发送第一登录提示 信息, 该第一登录提示信息用于指示客户端返回第一登录方式所需的第一认 证信息。
第一接收单元 412, 用于接收客户端返回的第一认证信息。 可选的, 第 一接收单元 412与第一发送单元 411连接, 用于在第一发送单元 411发送第 一登录提示信息后, 接收客户端输入的第一认证信息。
第一验证单元 413 , 与第一接收单元 412连接, 用于根据第一接收单元 412接收到的第一认证信息对客户端进行身份验证, 若通过身份验证, 允许 客户端登录本实施例虚拟机设备的操作系统, 若未通过身份验证, 拒绝客户 端登录本实施例虚拟机设备的操作系统。
在一可选实施方式中, 第二指示模块 42的一种可选实现结构包括: 第二 发送单元 421、 第二接收单元 422和第二验证单元 423。
第二发送单元 421 , 用于通过远程桌面协议向客户端发送第二登录提示 信息, 该第二登录提示信息用于指示客户端返回第二登录方式所需的第二认 证信息。
第二接收单元 422, 用于接收客户端返回的第二认证信息。 可选的, 第 二接收单元 422与第二发送单元 421连接, 用于在第二发送单元 421发送第 二登录提示信息后, 接收客户端输入的第二认证信息。
第二验证单元 423 , 与第二接收单元 422连接, 用于根据第二接收单元
422接收到的第二认证信息对客户端进行身份验证, 若通过身份验证, 允许 客户端登录本实施例虚拟机设备的操作系统, 若未通过身份验证, 拒绝客户 端登录本实施例虚拟机设备的操作系统。
在一可选实施方式中, 第一登录方式可以为用户名与密码登录方式; 第 二登录方式可以为指纹登录方式, 但不限于此。
本实施例提供的虚拟机设备的各功能模块或单元, 可用于执行图 2所示 实施例提供的双因素认证方法的流程, 其具体工作原理不再赘述, 详见方法 实施例的描述。
本实施例提供的虚拟机设备, 在客户端首次登录虚拟机设备的操作系统 时, 指示客户端以第一登录方式登录该操作系统, 当客户端以第一登录方式 成功登录该操作系统后, 将操作系统进行锁定, 然后指示客户端以第二登录 方式登录该操作系统, 实现对客户端身份的双重认证, 在虚拟机设备中实现 了双因素认证, 提高了虚拟机设备的安全性。
图 6为本发明又一实施例提供的虚拟机设备的结构示意图。如图 6所示, 本实施例的虚拟机设备包括: 至少一个处理器 61 , 以及存储器 62和通信接 口 63。 处理器 61、 存储器 62以及通信接口 63可以通过总线连接。 所述总线 可以是工业标准体系结构( Industry Standard Architecture , 简称为 ISA )总线、 外部设备互连 ( Peripheral Component, 简称为 PCI ) 总线或扩展工业标准体 系结构 (Extended Industry Standard Architecture, 简称为 EISA ) 总线等。 所 述总线可以分为地址总线、 数据总线、 控制总线等。 为便于表示, 图 6中仅 用一条粗线表示, 但并不表示仅有一根总线或一种类型的总线。 其中: 存储器 62用于存储可执行程序代码;处理器 61通过读取存储器 62中存 如果客户端首次登录虚拟机设备的操作系统, 指示所述客户端以第一登 录方式登录所述虚拟机设备的操作系统;
在所述客户端以所述第一登录方式成功登录所述虚拟机设备的操作系统 后, 将所述虚拟机设备的操作系统锁定, 然后指示所述客户端以第二登录方 式登录所述虚拟机设备的操作系统。
存储器 62除了存储处理器 61需要执行的程序代码之外, 还可用于存储 处理器 61在执行程序代码实现双因素认证过程中的一些数据或标识信息等。
通信接口 63 用于实现虚拟机设备与客户端之间的通信。 例如, 处理器 61 具体可以通过通信接口 63 向客户端发送指示信息, 以指示客户端以第一 登录方式或第二登录方式登录虚拟机设备的操作系统。
在一可选实施方式中, 第一登录方式可以为用户名与密码登录方式; 第 二登录方式可以为指纹登录方式, 但不限于此。
本实施例提供的虚拟机设备可用于执行图 2 所示双因素认证方法的流 程, 其具体工作原理不再赘述, 详见方法实施例的描述。
本实施例提供的虚拟机设备, 在客户端首次登录虚拟机设备的操作系统 时, 指示客户端以第一登录方式登录该操作系统, 当客户端以第一登录方式 成功登录该操作系统后, 将操作系统进行锁定, 然后指示客户端以第二登录 方式登录该操作系统, 实现对客户端身份的双重认证, 在虚拟机设备中实现 了双因素认证, 提高了虚拟机设备的安全性。
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分步骤 可以通过程序指令相关的硬件来完成, 前述的程序可以存储于一计算机可读 取存储介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而前述 的存储介质包括: ROM, RAM, 磁碟或者光盘等各种可以存储程序代码的介 质。
最后应说明的是: 以上各实施例仅用以说明本发明的技术方案, 而非对 其限制; 尽管参照前述各实施例对本发明进行了详细的说明, 本领域的普通 技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改, 或者对其中部分或者全部技术特征进行等同替换; 而这些修改或者替换, 并 不使相应技术方案的本质脱离本发明各实施例技术方案的范围。

Claims

权 利 要求 书
1、 一种双因素认证方法, 其特征在于, 包括:
如果客户端首次登录虚拟机的操作系统, 指示所述客户端以第一登录方 式登录所述虚拟机的操作系统;
在所述客户端以所述第一登录方式成功登录所述虚拟机的操作系统后, 将所述虚拟机的操作系统锁定, 然后指示所述客户端以第二登录方式登录所 述虚拟机的操作系统。
2、 根据权利要求 1所述的双因素认证方法, 其特征在于, 如果客户端首 次登录虚拟机的操作系统, 指示所述客户端以第一登录方式登录所述虚拟机 的操作系统之前包括:
根据用于标识所述虚拟机与所述客户端是否建立连接的远程桌面连接建 立状态标识判断所述客户端是否首次登录所述虚拟机的操作系统。
3、 根据权利要求 2所述的双因素认证方法, 其特征在于, 所述指示所述 客户端以第二登录方式登录所述虚拟机的操作系统之前包括:
在所述客户端以所述第一登录方式成功登录所述虚拟机的操作系统后, 设置所述远程桌面连接建立状态标识用以标识所述客户端与所述虚拟机建立 连接, 并标识当前使用的登录方式是所述第一登录方式。
4、 根据权利要求 1或 2或 3所述的双因素认证方法, 其特征在于, 还包 括:
如果所述客户端非首次登录所述虚拟机的操作系统, 指示所述客户端以 所述第二登录方式登录所述虚拟机的操作系统。
5、 根据权利要求 3或 4所述的双因素认证方法, 其特征在于, 还包括: 在所述客户端以所述第二登录方式成功登录所述虚拟机的操作系统后, 标识当前使用的登录方式是所述第二登录方式, 允许所述客户端使用所述虚 拟机的操作系统。
6、 根据权利要求 1-5任一项所述的双因素认证方法, 其特征在于, 所述 指示所述客户端以第一登录方式登录虚拟机的操作系统包括:
通过远程桌面协议向所述客户端发送第一登录提示信息, 所述第一登录 提示信息用于指示所述客户端返回所述第一登录方式所需的第一认证信息; 接收所述客户端返回的所述第一认证信息, 并根据所述第一认证信息对 所述客户端进行身份验证;
若通过身份验证, 允许所述客户端登录所述虚拟机的操作系统; 若未通过身份验证, 拒绝所述客户端登录所述虚拟机的操作系统。
7、 根据权利要求 1-5任一项所述的双因素认证方法, 其特征在于, 所述 指示所述客户端以第二登录方式登录所述虚拟机的操作系统包括:
通过远程桌面协议向所述客户端发送第二登录提示信息, 所述第二登录 提示信息用于指示所述客户端返回所述第二登录方式所需的第二认证信息; 接收所述客户端返回的所述第二认证信息, 并根据所述第二认证信息对 所述客户端进行身份验证;
若通过身份验证, 允许所述客户端登录所述虚拟机的操作系统; 若未通过身份验证, 拒绝所述客户端登录所述虚拟机的操作系统。
8、 根据权利要求 1-7任一项所述的双因素认证方法, 其特征在于, 所述 第一登录方式包括用户名与密码登录方式; 所述第二登录方式包括指纹登录 方式。
9、 一种虚拟机设备, 其特征在于, 包括:
第一指示模块, 用于如果客户端首次登录虚拟机设备的操作系统, 指示 所述客户端以第一登录方式登录所述虚拟机设备的操作系统;
第二指示模块, 用于在所述客户端以所述第一登录方式成功登录所述虚 拟机设备的操作系统后, 将所述虚拟机设备的操作系统锁定, 然后指示所述 客户端以第二登录方式登录所述虚拟机设备的操作系统。
10、 根据权利要求 9所述的虚拟机设备, 其特征在于, 还包括: 判断模块 , 用于在所述第一指示模块指示所述客户端以第一登录方式登 录所述虚拟机设备的操作系统之前, 根据用于标识所述虚拟机设备与所述客 户端是否建立连接的远程桌面连接建立状态标识判断所述客户端是否首次登 录所述虚拟机设备的操作系统。
1 1、 根据权利要求 10所述的虚拟机设备, 其特征在于, 所述第二指示模 块还用于在指示所述客户端以第二登录方式登录所述虚拟机设备的操作系统 之前,在所述客户端以所述第一登录方式成功登录所述虚拟机的操作系统后, 设置所述远程桌面连接建立状态标识用以标识所述客户端与所述虚拟机设备 建立连接, 并标识当前使用的登录方式是所述第一登录方式。
12、 根据权利要求 9或 10或 11所述的虚拟机设备, 其特征在于, 还包 括:
第三指示模块, 用于如果所述客户端非首次登录所述虚拟机设备的操作 系统,指示所述客户端以所述第二登录方式登录所述虚拟机设备的操作系统。
13、 根据权利要求 11或 12所述的虚拟机设备, 其特征在于, 所述第二 指示模块还用于在所述客户端以所述第二登录方式成功登录所述虚拟机设备 的操作系统后, 标识当前使用的登录方式是所述第二登录方式, 允许所述客 户端使用所述虚拟机设备的操作系统。
14、 根据权利要求 9-13任一项所述的虚拟机设备, 其特征在于, 所述第 一指示模块包括:
第一发送单元, 用于通过远程桌面协议向所述客户端发送第一登录提示 信息, 所述第一登录提示信息用于指示所述客户端返回所述第一登录方式所 需的第一认证信息;
第一接收单元, 用于接收所述客户端返回的所述第一认证信息; 第一验证单元,用于根据所述第一认证信息对所述客户端进行身份验证, 若通过身份验证, 允许所述客户端登录所述虚拟机设备的操作系统, 若未通 过身份验证, 拒绝所述客户端登录所述虚拟机设备的操作系统。
15、 根据权利要求 9-13任一项所述的虚拟机设备, 其特征在于, 所述第 二指示模块包括:
第二发送单元, 用于通过远程桌面协议向所述客户端发送第二登录提示 信息, 所述第二登录提示信息用于指示所述客户端返回所述第二登录方式所 需的第二认证信息;
第二接收单元, 用于接收所述客户端返回的所述第二认证信息; 第二验证单元,用于根据所述第二认证信息对所述客户端进行身份验证, 若通过身份验证, 允许所述客户端登录所述虚拟机设备的操作系统, 若未通 过身份验证, 拒绝所述客户端登录所述虚拟机设备的操作系统。
16、 根据权利要求 9-15任一项所述的虚拟机设备, 其特征在于, 所述第 一登录方式包括用户名与密码登录方式; 所述第二登录方式包括指纹登录方 式。
17、 一种虚拟机设备, 其特征在于, 包括: 至少一个处理器, 以及存储 器, 所述存储器用于存储可执行程序代码, 其中, 所述处理器通过读取所述 以用于:
如果客户端首次登录虚拟机设备的操作系统, 指示所述客户端以第一登 录方式登录所述虚拟机设备的操作系统;
在所述客户端以所述第一登录方式成功登录所述虚拟机设备的操作系统 后, 将所述虚拟机设备的操作系统锁定, 然后指示所述客户端以第二登录方 式登录所述虚拟机设备的操作系统。
PCT/CN2012/084563 2012-11-14 2012-11-14 双因素认证方法及虚拟机设备 WO2014075231A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201280003456.2A CN103975567B (zh) 2012-11-14 2012-11-14 双因素认证方法及虚拟机设备
PCT/CN2012/084563 WO2014075231A1 (zh) 2012-11-14 2012-11-14 双因素认证方法及虚拟机设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/084563 WO2014075231A1 (zh) 2012-11-14 2012-11-14 双因素认证方法及虚拟机设备

Publications (1)

Publication Number Publication Date
WO2014075231A1 true WO2014075231A1 (zh) 2014-05-22

Family

ID=50730465

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/084563 WO2014075231A1 (zh) 2012-11-14 2012-11-14 双因素认证方法及虚拟机设备

Country Status (2)

Country Link
CN (1) CN103975567B (zh)
WO (1) WO2014075231A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279404A (zh) * 2015-10-23 2016-01-27 上海帝联信息科技股份有限公司 操作系统操作控制方法及装置
CN105991709A (zh) * 2015-02-11 2016-10-05 中国移动通信集团河南有限公司 一种云桌面帐号管理方法及装置
CN106658463A (zh) * 2016-09-30 2017-05-10 宇龙计算机通信科技(深圳)有限公司 一种操作系统登录方法、装置及终端
WO2019085761A1 (zh) * 2017-11-06 2019-05-09 深圳市文鼎创数据科技有限公司 一种指纹识别的方法及终端设备
CN110532752A (zh) * 2019-09-03 2019-12-03 山东超越数控电子股份有限公司 一种登录云桌面系统的方法、设备及可读介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112636927B (zh) * 2020-12-28 2022-08-16 郑州信大先进技术研究院 一种基于kpi双证书的云平台密码化方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101154252A (zh) * 2006-09-28 2008-04-02 知网生物识别科技股份有限公司 窗口登录与认证系统及其方法
CN102143230A (zh) * 2011-04-01 2011-08-03 广州杰赛科技股份有限公司 云终端认证及登录云计算系统中虚拟机的方法及登录系统
CN102316452A (zh) * 2011-07-18 2012-01-11 辽宁国兴科技有限公司 一种基于云端利用nfc通信技术的双重鉴权登录系统
US20120140993A1 (en) * 2010-12-05 2012-06-07 Unisys Corp. Secure biometric authentication from an insecure device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1890226B1 (en) * 2006-08-17 2010-01-13 Research In Motion Limited User interface manager and method for reacting to a change in system status
CN101201754A (zh) * 2006-12-14 2008-06-18 英业达股份有限公司 程序通信方法
CN101540687A (zh) * 2009-05-06 2009-09-23 圆刚科技股份有限公司 远程唤醒方法、可被远程唤醒的主机以及唤醒管理服务器
CN102307177A (zh) * 2010-09-25 2012-01-04 广东电子工业研究院有限公司 面向windows虚拟机的一次性密码管理系统及其方法
CN102487380B (zh) * 2010-12-01 2016-09-07 中兴通讯股份有限公司 桌面虚拟化终端托管方法及系统
CN102088353B (zh) * 2011-03-11 2014-01-15 道里云信息技术(北京)有限公司 基于移动终端的双因子认证方法及系统
CN102202052A (zh) * 2011-04-20 2011-09-28 李计兰 一种基于虚拟机技术的信息系统密码管理方法
CN102577315A (zh) * 2011-12-21 2012-07-11 华为技术有限公司 设定用户访问虚拟机权限的方法、设备和系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101154252A (zh) * 2006-09-28 2008-04-02 知网生物识别科技股份有限公司 窗口登录与认证系统及其方法
US20120140993A1 (en) * 2010-12-05 2012-06-07 Unisys Corp. Secure biometric authentication from an insecure device
CN102143230A (zh) * 2011-04-01 2011-08-03 广州杰赛科技股份有限公司 云终端认证及登录云计算系统中虚拟机的方法及登录系统
CN102316452A (zh) * 2011-07-18 2012-01-11 辽宁国兴科技有限公司 一种基于云端利用nfc通信技术的双重鉴权登录系统

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105991709A (zh) * 2015-02-11 2016-10-05 中国移动通信集团河南有限公司 一种云桌面帐号管理方法及装置
CN105279404A (zh) * 2015-10-23 2016-01-27 上海帝联信息科技股份有限公司 操作系统操作控制方法及装置
CN105279404B (zh) * 2015-10-23 2018-07-10 上海帝联信息科技股份有限公司 操作系统操作控制方法及装置
CN106658463A (zh) * 2016-09-30 2017-05-10 宇龙计算机通信科技(深圳)有限公司 一种操作系统登录方法、装置及终端
WO2019085761A1 (zh) * 2017-11-06 2019-05-09 深圳市文鼎创数据科技有限公司 一种指纹识别的方法及终端设备
CN110532752A (zh) * 2019-09-03 2019-12-03 山东超越数控电子股份有限公司 一种登录云桌面系统的方法、设备及可读介质

Also Published As

Publication number Publication date
CN103975567B (zh) 2017-12-12
CN103975567A (zh) 2014-08-06

Similar Documents

Publication Publication Date Title
US20220255918A1 (en) Single sign on for a remote user session
US11258605B2 (en) Out-of-band remote authentication
US8561137B2 (en) Techniques for identity authentication of virtualized machines
JP5877278B2 (ja) 仮想デスクトップにアクセスするためのシステムおよび方法
EP3065074A1 (en) Fingerprint authentication method and device, intelligent terminal, and computer storage medium
WO2014075231A1 (zh) 双因素认证方法及虚拟机设备
US8832813B1 (en) Voice authentication via trusted device
US9544296B2 (en) Transferring web-application prerequisite files while authentication interface occludes web-application interface
KR20220019834A (ko) 디바이스로의 보안 자격증명 전송을 인증하는 방법 및 시스템
US10425395B2 (en) Single sign on system for secure networks
WO2021231065A1 (en) Local authentication virtual authorization
US20220417243A1 (en) Passwordless access to virtual desktops

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12888567

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12888567

Country of ref document: EP

Kind code of ref document: A1