WO2015184812A1 - 登录云终端的方法、云终端、云服务器及云系统 - Google Patents

登录云终端的方法、云终端、云服务器及云系统 Download PDF

Info

Publication number
WO2015184812A1
WO2015184812A1 PCT/CN2015/070998 CN2015070998W WO2015184812A1 WO 2015184812 A1 WO2015184812 A1 WO 2015184812A1 CN 2015070998 W CN2015070998 W CN 2015070998W WO 2015184812 A1 WO2015184812 A1 WO 2015184812A1
Authority
WO
WIPO (PCT)
Prior art keywords
cloud
user information
cloud server
cloud terminal
terminal
Prior art date
Application number
PCT/CN2015/070998
Other languages
English (en)
French (fr)
Inventor
肖自辉
郭热思
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015184812A1 publication Critical patent/WO2015184812A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present invention relates to the technical field of logging in to a cloud terminal, and more particularly to a method for logging in to a cloud terminal, a cloud terminal, a cloud server, and a cloud system.
  • User login and authentication are often involved in cloud terminals and cloud desktop systems.
  • user names and passwords user names and passwords, fingerprint logins, and smart card logins are displayed.
  • the above methods have various advantages and disadvantages.
  • Each user login and password is easy to display the user name and password, and the security is not strong.
  • the fingerprint login method is convenient and simple, and the security is also strong, but the fingerprint is also easily stolen.
  • the main purpose of the embodiments of the present invention is to provide a method for logging in to a cloud terminal, which is to solve the technical problem of how to improve the security of user information when the user logs in to the cloud terminal.
  • a method for logging in to a cloud terminal comprising:
  • the cloud terminal sends the encrypted data and the hardware number to the cloud server;
  • the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key, and acquires second user information sent by the cloud terminal;
  • the cloud server compares the first user information and the second user information, if the cloud server is the same, the cloud server provides a cloud desktop environment to the cloud terminal.
  • the method before the step of the cloud terminal sending the encrypted data and the hardware number to the cloud server, the method further includes:
  • the cloud terminal sends a login request to the cloud server, and the cloud server returns a first random character string to the cloud terminal;
  • the cloud terminal encrypts the user information according to the private key stored in the hardware device USB and the first random string, to obtain the encrypted user information;
  • the step of the cloud terminal sending the encrypted data and the hardware number to the cloud server includes:
  • the cloud terminal sends the hardware number and the encrypted user information to the cloud server, where the hardware number is a unique identifier of the hardware device.
  • the method before the step of comparing, by the cloud server, the first user information and the second user information, the method further includes:
  • the method further includes:
  • the cloud terminal exits the login cloud desktop environment.
  • the method further includes:
  • the cloud terminal exits the login cloud desktop environment.
  • a method for logging in to a cloud terminal comprising:
  • the cloud server compares the first user information and the second user information, and confirms that the first user information and the second user information are the same, logging in to the cloud desktop environment provided by the cloud server .
  • the method before the step of sending the encrypted data and the hardware number to the cloud server, the method further includes:
  • the step of sending the encrypted data and the hardware number to the cloud server includes:
  • the method further includes:
  • Performing heartbeat detection on the hardware device if the hardware device is not detected, sending a message to the cloud server, so that the cloud server disconnects the corresponding cloud desktop environment.
  • the method further includes:
  • a method for logging in to a cloud terminal comprising:
  • the method before the step of comparing the first user information and the second user information, the method further includes:
  • the cloud terminal encrypts the user information according to the private key stored in the hardware device and the first random string, the encrypted data is decrypted according to the public key, and the second random character sent by the cloud terminal is acquired. string;
  • the method further includes:
  • the hardware number, a public key corresponding to the hardware number, and user information are stored.
  • a cloud terminal includes a sending unit and a login unit, wherein:
  • the sending unit is configured to: send the encrypted data and the hardware number to the cloud server, so that the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key, and obtains Second user information sent by the cloud terminal;
  • the login unit is configured to log in to the cloud desktop environment provided by the cloud server if the cloud server compares the first user information and the second user information.
  • the cloud terminal further includes a sending and receiving unit and an encryption unit, where:
  • the sending and receiving unit is configured to: send a login request to the cloud server, and receive the cloud server to send a first random character string to the cloud terminal;
  • the encryption unit is configured to: encrypt the user information according to the private key stored in the hardware device and the first random string, to obtain the encrypted user information;
  • the sending unit is configured to send the encrypted data and the hardware number to the cloud server as follows:
  • the cloud terminal further includes a detecting unit
  • the detecting unit is configured to: perform heartbeat detection on the hardware device, and if the hardware device is not detected, send a message to the cloud server, so that the cloud server disconnects the corresponding cloud desktop environment.
  • the login unit is further configured to:
  • a cloud server includes a receiving unit, a processing unit, and a first comparing unit, wherein:
  • the receiving unit is configured to: receive encrypted data and hardware code sent by the cloud terminal;
  • the processing unit is configured to: search for a public key and first user information according to the hardware number, and Decrypting the encrypted data according to the public key, and acquiring second user information sent by the cloud terminal;
  • the first comparison unit is configured to: compare the first user information with the second user information, and if yes, provide a cloud desktop environment to the cloud terminal.
  • the cloud server further includes an obtaining unit and a second comparing unit, where:
  • the acquiring unit is configured to: when the cloud terminal encrypts the user information according to the private key stored in the hardware device and the first random string, decrypt the encrypted data according to the public key, and acquire the cloud a second random string sent by the terminal;
  • the second comparing unit is configured to compare the first random character string and the second random character string, and if the same, perform the step of comparing the first user information with the second user information.
  • the cloud server further includes a storage unit, where:
  • the storage unit is configured to: store the hardware number, a public key corresponding to the hardware number, and user information.
  • a cloud system includes any of the above cloud terminals and any of the above cloud servers.
  • the embodiment of the present invention sends the encrypted data and the hardware number to the cloud server through the cloud terminal; the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key to obtain the The second user information sent by the cloud terminal; if the cloud server compares the first user information and the second user information, if the cloud server is the same, the cloud server provides a cloud desktop environment to the cloud terminal, and the hardware can be implemented. Two-factor authentication of the device and the user information, that is, each user corresponds to a unique hardware device, and the private key is stored in the hardware device and cannot be exported, thereby ensuring the security of the user information.
  • FIG. 1 is a schematic flowchart of a first embodiment of a method for logging in to a cloud terminal according to the present invention
  • FIG. 2 is a schematic flowchart of a second embodiment of a method for logging in to a cloud terminal according to the present invention
  • FIG. 3 is a schematic flowchart of a third embodiment of a method for logging in to a cloud terminal according to the present invention.
  • FIG. 4 is a schematic flowchart of a fourth embodiment of a method for logging in to a cloud terminal according to the present invention.
  • FIG. 5 is a schematic diagram of functional modules of a first embodiment of a cloud terminal according to the present invention.
  • FIG. 6 is a schematic diagram of functional modules of a first embodiment of a cloud server according to the present invention.
  • Figure 7 is a system configuration diagram of a first embodiment of the cloud system of the present invention.
  • the embodiment of the invention provides a method for logging in to a cloud terminal.
  • FIG. 1 is a schematic flowchart diagram of a first embodiment of a method for logging in to a cloud terminal according to the present invention.
  • the method for logging in to the cloud terminal includes:
  • Step 101 The cloud terminal sends the encrypted data and the hardware number to the cloud server.
  • the cloud terminal when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal initiates a login verification request to the cloud server, and the cloud terminal encrypts the stored user information by using the private key stored in the hardware device USB-KEY, and encrypts the encrypted
  • the subsequent user information and the hardware number stored in the USB-KEY are sent to the cloud server.
  • the hardware number is a unique identifier of the USB-KEY.
  • the encrypted user information is user information that uses the private key to encrypt the user information, that is, the original user information.
  • Step 102 The cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key, and acquires second user information sent by the cloud terminal.
  • the first user information is user information of the plaintext stored by the cloud server.
  • the second user information is user information sent by the cloud terminal acquired by using the public key to decrypt.
  • the cloud server searches for the public key and the first user information stored in the cloud server database according to the hardware number, and decrypts the encrypted user information by using the public key to obtain the The second user information sent by the cloud terminal.
  • Step 103 The cloud server compares the first user information and the second user information, and if the same, the cloud server provides a cloud desktop environment to the cloud terminal.
  • the cloud server compares and analyzes the first user information and the second user information, and if the same, the user is authenticated as an authorized user, and provides a cloud desktop environment for the user.
  • the embodiment of the present invention sends the encrypted data and the hardware number to the cloud server through the cloud terminal; the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key to obtain the The second user information sent by the cloud terminal; if the cloud server compares the first user information and the second user information, if the cloud server is the same, the cloud server provides a cloud desktop environment to the cloud terminal, and the hardware can be implemented. Two-factor authentication of the device and the user information, that is, each user corresponds to a unique hardware device, and the private key is stored in the hardware device and cannot be exported, thereby ensuring the security of the user information.
  • the embodiment of the invention also discloses a computer program, comprising program instructions, which when executed by a computer, enable the computer to execute the method for logging in to the cloud terminal of the first embodiment.
  • the embodiment of the invention also discloses a carrier carrying the computer program.
  • FIG. 2 is a schematic flowchart diagram of a second embodiment of a method for logging in to a cloud terminal according to the present invention.
  • the method for logging in to the cloud terminal includes:
  • Step 201 The cloud terminal sends a login request to the cloud server, and the cloud server returns a first random character string to the cloud terminal, where the cloud terminal is based on a private key stored in the hardware device and the first random number The string encrypts the user information to obtain the encrypted user information.
  • Step 202 The cloud terminal sends the encrypted user information and the hardware number to the cloud server, where the hardware number is a unique identifier of the hardware device.
  • Step 203 The cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key, and acquires second user information sent by the cloud terminal.
  • Step 204 The cloud server decrypts the encrypted data according to the public key, and acquires a second random string sent by the cloud terminal.
  • the cloud server compares the first random string with the second random string. If the same, step 205 is performed;
  • Step 205 The cloud server compares the first user information and the second user information, and if the same, the cloud server provides a cloud desktop environment to the cloud terminal.
  • the cloud terminal when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal initiates a login verification request to the server, and the server randomly generates a string to be sent to the cloud terminal, and the cloud terminal accepts the user to input the correct personal identification password ( After the Personal Identification Number (PIN code), the random string and the stored user information are encrypted by the private key in the USB-KEY. If you log in to the cloud desktop automatically after logging in to the terminal system, you can omit the input PIN code operation.
  • PIN code Personal Identification Number
  • the cloud terminal sends the encrypted data and the corresponding hardware number to the server through the network, and the server uses the hardware number to find the corresponding public key to decrypt the encrypted data, and restores the random string and the user information.
  • the cloud desktop server verifies the restored data. First, the random string is verified. After the verification is passed, the user information stored in the server database is verified again. After the matching is correct, the corresponding cloud desktop environment is provided.
  • the method further includes:
  • the cloud terminal exits the login cloud desktop environment.
  • the method further includes:
  • the cloud terminal exits the login cloud desktop environment.
  • the embodiment of the present invention sends the encrypted data and the hardware number to the cloud server through the cloud terminal; the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key to obtain the The second user information sent by the cloud terminal; if the cloud server compares the first user information and the second user information, if the cloud server is the same, the cloud server provides a cloud desktop environment to the cloud terminal, and the hardware can be implemented. Two-factor authentication of the device and the user information, that is, each user corresponds to a unique hardware device, and the private key is stored in the hardware device and cannot be exported, thereby ensuring the security of the user information.
  • the embodiment of the invention also discloses a computer program, comprising program instructions, which when executed by a computer, enable the computer to execute the method of logging in to the cloud terminal of the second embodiment.
  • the embodiment of the invention also discloses a carrier carrying the computer program.
  • FIG. 3 is a schematic flowchart diagram of a third embodiment of a method for logging in to a cloud terminal according to the present invention.
  • the method for logging in to the cloud terminal includes:
  • Step 301 Send the encrypted data and the hardware number to the cloud server, so that the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key, and acquires the sent by the cloud terminal.
  • Second user information
  • Step 302 Log in to the cloud desktop environment provided by the cloud server if the cloud server compares the first user information and the second user information.
  • the cloud terminal when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal initiates a login verification request to the cloud server, and the cloud terminal encrypts the stored user information by using the private key stored in the hardware device USB-KEY, and obtains the encrypted information.
  • User information and send the encrypted user information and the hardware number stored in the USB-KEY to the cloud server.
  • the hardware number is a unique identifier of the USB-KEY.
  • the cloud server searches for the public key and the first user information stored in the cloud server database according to the hardware number, and decrypts the encrypted user information by using the public key to obtain the second user information sent by the cloud terminal. And comparing, by the cloud server, the first user information and the second user information, if the same, verifying that the user is an authorized user, providing a cloud desktop environment for the user.
  • the method before the sending the encrypted data and the hardware number to the cloud server, the method further includes:
  • Sending the encrypted data and the hardware number to the cloud server including:
  • the cloud terminal when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal initiates a login verification request to the server, and the server randomly generates a string to be sent to the cloud terminal, and the cloud terminal accepts the user to input the correct personal identification password ( Personal Identification Number, PIN code) After that, the random string and the stored user information are encrypted by using the private key in the USB-KEY. If you log in to the cloud desktop automatically after logging in to the terminal system, you can omit the input PIN code operation.
  • the cloud terminal sends the encrypted data and the corresponding hardware number to the server through the network, and the server uses the hardware number to find the corresponding public key to decrypt the encrypted data, and restores the random string and the user information.
  • the cloud desktop server verifies the restored data. First, the random string is verified. After the verification is passed, the user information stored in the server database is verified again. After the matching is correct, the corresponding cloud desktop environment is provided.
  • the method further includes:
  • Performing heartbeat detection on the hardware device if the hardware device is not detected, sending a message to the cloud server, so that the cloud server disconnects the corresponding cloud desktop environment.
  • the cloud terminal performs heartbeat detection on the USB-KEY. If the user unplugs the USB-KEY after logging in to the cloud desktop, the cloud terminal performs 3 times and 3 seconds detection. If the USB-KEY is not detected continuously, the message is sent to the cloud. On the desktop server, the cloud desktop server disconnects the corresponding cloud desktop.
  • the hardware device can be unplugged.
  • the cloud terminal detects that the hardware device is not inserted, the cloud device sends the disconnected cloud to the cloud server. The request of the desktop makes the user data protected to a certain extent.
  • the method further includes:
  • the USB-KEY is inserted, and the PIN code is input. After the PIN code is correct, the user information is read into the cloud terminal system, otherwise the login cannot be performed normally.
  • a method for logging in to a cloud terminal, a cloud terminal, a cloud server, and a cloud system where the method sends an encrypted data and a hardware number to a cloud server through a cloud terminal; the cloud server searches for a public number according to the hardware number. Key and first user information, and decrypting the encrypted data according to the public key, acquiring second user information sent by the cloud terminal; the cloud server comparing the first If the user information and the second user information are the same, the cloud server provides the cloud desktop environment to the cloud terminal, and the two-factor authentication of the hardware device and the user information may be implemented, that is, each user corresponds to a unique hardware device.
  • the private key is stored in the hardware device and cannot be exported, thus ensuring the security of the user information.
  • the embodiment of the invention also discloses a computer program, comprising program instructions, which when executed by a computer, enable the computer to execute the method of logging in to the cloud terminal of the third embodiment.
  • the embodiment of the invention also discloses a carrier carrying the computer program.
  • FIG. 4 is a schematic flowchart diagram of a fourth embodiment of a method for logging in to a cloud terminal according to the present invention.
  • the method for logging in to the cloud terminal includes:
  • Step 401 Receive encrypted data and hardware code sent by the cloud terminal.
  • Step 402 Search for the public key and the first user information according to the hardware number, and decrypt the encrypted data according to the public key, and obtain the second user information sent by the cloud terminal.
  • Step 403 Compare the first user information and the second user information, if the same, provide a cloud desktop environment to the cloud terminal.
  • the cloud terminal when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal initiates a login verification request to the cloud server, and the cloud terminal encrypts the stored user information by using the private key stored in the hardware device USB-KEY, and encrypts the encrypted
  • the subsequent user information and the hardware number stored in the USB-KEY are sent to the cloud server.
  • the hardware number is a unique identifier of the USB-KEY.
  • the cloud server searches for the public key and the first user information stored in the cloud server database according to the hardware number, and decrypts the encrypted user information by using the public key to obtain the second user information sent by the cloud terminal. And comparing, by the cloud server, the first user information and the second user information, if the same, verifying that the user is an authorized user, providing a cloud desktop environment for the user.
  • the method before the comparing the first user information and the second user information, the method further includes:
  • the cloud terminal encrypts the user information according to the private key stored in the hardware device and the first random string, the encrypted data is decrypted according to the public key, and the second random character sent by the cloud terminal is acquired. string;
  • the cloud terminal when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal initiates a login verification request to the server, and the server randomly generates a string to be sent to the cloud terminal, and the cloud terminal accepts the user to input the correct personal identification password ( After the Personal Identification Number (PIN code), the random string and the stored user information are encrypted by the private key in the USB-KEY. If you log in to the cloud desktop automatically after logging in to the terminal system, you can omit the input PIN code operation.
  • PIN code Personal Identification Number
  • the cloud terminal sends the encrypted data and the corresponding hardware number to the server through the network, and the server uses the hardware number to find the corresponding public key to decrypt the encrypted data, and restores the random string and the user information.
  • the cloud desktop server verifies the restored data. First, the random string is verified. After the verification is passed, the user information stored in the server database is verified again. After the matching is correct, the corresponding cloud desktop environment is provided.
  • the method further includes:
  • the hardware number, a public key corresponding to the hardware number, and user information are stored.
  • the system administrator uses the USB-KEY SDK secondary development tool to write the corresponding user information to the USB-KEY, and derives the corresponding public key, and the hardware number corresponding to the public key and the USB-KEY.
  • User information is stored in the database on the cloud desktop server.
  • the embodiment of the present invention sends the encrypted data and the hardware number to the cloud server through the cloud terminal; the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key to obtain the The second user information sent by the cloud terminal; if the cloud server compares the first user information and the second user information, if the cloud server is the same, the cloud server provides a cloud desktop environment to the cloud terminal, and the hardware can be implemented. Two-factor authentication of the device and the user information, that is, each user corresponds to a unique hardware device, and the private key is stored in the hardware device and cannot be exported, thereby ensuring the security of the user information.
  • the embodiment of the invention further discloses a computer program, comprising program instructions, which when executed by a computer, enable the computer to execute the method for logging in to the cloud terminal of the fourth embodiment.
  • the embodiment of the invention also discloses a carrier carrying the computer program.
  • the embodiment of the invention provides a cloud terminal.
  • FIG. 5 is a schematic diagram of functional modules of a first embodiment of a cloud terminal according to the present invention.
  • the cloud terminal includes:
  • the sending unit 501 is configured to: send the encrypted data and the hardware number to the cloud server, so that the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key, and obtains Second user information sent by the cloud terminal;
  • the login unit 502 is configured to log in to the cloud desktop environment provided by the cloud server if the cloud server compares the first user information and the second user information.
  • the cloud terminal when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal initiates a login verification request to the cloud server, and the cloud terminal encrypts the stored user information by using the private key stored in the hardware device USB-KEY, and encrypts the encrypted
  • the subsequent user information and the hardware number stored in the USB-KEY are sent to the cloud server.
  • the hardware number is a unique identifier of the USB-KEY.
  • the cloud server searches for the public key and the first information stored in the cloud server database according to the hardware number, and decrypts the encrypted user information by using the public key to obtain the second user information sent by the cloud terminal. And comparing, by the cloud server, the first user information and the second user information, if the same, verifying that the user is an authorized user, providing a cloud desktop environment for the user.
  • the cloud terminal further includes:
  • the sending and receiving unit 503 is configured to: send a login request to the cloud server, and receive the cloud server to send a first random character string to the cloud terminal;
  • the encryption unit 504 is configured to: encrypt the user information according to the private key stored in the hardware device and the first random string, to obtain the encrypted user information;
  • the sending unit 501 is specifically configured to:
  • the cloud terminal when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal initiates a login verification request to the server, and the server randomly generates a string to be sent to the cloud terminal, and the cloud terminal accepts the user to input the correct personal identification password ( After the Personal Identification Number (PIN code), the random string and the stored user information are added by using the private key in the USB-KEY. dense. If you log in to the cloud desktop automatically after logging in to the terminal system, you can omit the input PIN code operation.
  • PIN code Personal Identification Number
  • the cloud terminal sends the encrypted data and the corresponding hardware number to the server through the network, and the server uses the hardware number to find the corresponding public key to decrypt the encrypted data, and restores the random string and the user information.
  • the cloud desktop server verifies the restored data. First, the random string is verified. After the verification is passed, the user information stored in the server database is verified again. After the matching is correct, the corresponding cloud desktop environment is provided.
  • the cloud terminal further includes a detecting unit 505;
  • the detecting unit 505 is configured to: perform heartbeat detection on the hardware device, and if the hardware device is not detected, send a message to the cloud server, so that the cloud server disconnects the corresponding cloud desktop environment.
  • the cloud terminal performs heartbeat detection on the USB-KEY. If the user unplugs the USB-KEY after logging in to the cloud desktop, the cloud terminal performs 3 times and 3 seconds detection. If the USB-KEY is not detected continuously, the message is sent to the cloud. On the desktop server, the cloud desktop server disconnects the corresponding cloud desktop.
  • the hardware device can be unplugged.
  • the cloud terminal detects that the hardware device is not inserted, the cloud device sends the disconnected cloud to the cloud server. The request of the desktop makes the user data protected to a certain extent.
  • the login unit 502 is further configured to:
  • the USB-KEY is inserted, and the PIN code is input. After the PIN code is correct, the user information is read into the cloud terminal system, otherwise the login cannot be performed normally.
  • the embodiment of the present invention sends the encrypted data and the hardware number to the cloud server through the cloud terminal; the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key to obtain the The second user information sent by the cloud terminal; the cloud server compares the first user information with the second user information, and if the same, the cloud server sends the cloud server to the cloud terminal
  • the cloud desktop environment can be used to implement the two-factor authentication of the hardware device and the user information, that is, each user corresponds to a unique hardware device, and the private key is stored in the hardware device and cannot be exported, thereby ensuring the security of the user information.
  • the embodiment of the invention provides a cloud server.
  • FIG. 6 is a schematic diagram of functional modules of a first embodiment of a cloud server according to the present invention.
  • the cloud server includes:
  • the receiving unit 601 is configured to: receive the encrypted data and the hardware code sent by the cloud terminal;
  • the processing unit 602 is configured to: find the public key and the first user information according to the hardware number, and decrypt the encrypted data according to the public key, and acquire the second user information sent by the cloud terminal;
  • the first comparison unit 603 is configured to: compare the first user information with the second user information, and if yes, provide a cloud desktop environment to the cloud terminal.
  • the cloud terminal when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal initiates a login verification request to the cloud server, and the cloud terminal encrypts the stored user information by using the private key stored in the hardware device USB-KEY, and obtains the encrypted information.
  • User information and send the encrypted user information and the hardware number stored in the USB-KEY to the cloud server.
  • the hardware number is a unique identifier of the USB-KEY.
  • the cloud server searches for the public key and the first user information stored in the cloud server database according to the hardware number, and decrypts the encrypted user information by using the public key to obtain the second user information sent by the cloud terminal. And comparing, by the cloud server, the first user information and the second user information, if the same, verifying that the user is an authorized user, providing a cloud desktop environment for the user.
  • the cloud server further includes:
  • the obtaining unit 604 is configured to: when the cloud terminal encrypts the user information according to the private key stored in the hardware device and the first random string, decrypt the encrypted data according to the public key, and acquire the cloud a second random string sent by the terminal;
  • the second comparison unit 605 is further configured to: compare the first random string and the second random string, if the same, perform a step of comparing the first user information with the second user information, if the same And providing a cloud desktop environment to the cloud terminal.
  • the cloud terminal when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal initiates a login verification request to the server, and the server randomly generates a string to be sent to the cloud terminal, and the cloud terminal accepts the user to input the correct personal identification password ( After the Personal Identification Number (PIN code), the random string and the stored user information are encrypted by the private key in the USB-KEY. If you log in to the cloud desktop automatically after logging in to the terminal system, you can omit the input PIN code operation.
  • PIN code Personal Identification Number
  • the cloud terminal sends the encrypted data and the corresponding hardware number to the server through the network, and the server uses the hardware number to find the corresponding public key to decrypt the encrypted data, and restores the random string and the user information.
  • the cloud desktop server verifies the restored data. First, the random string is verified. After the verification is passed, the user information stored in the server database is verified again. After the matching is correct, the corresponding cloud desktop environment is provided.
  • the cloud server further includes:
  • the storage unit 606 is configured to: store the hardware number, a public key corresponding to the hardware number, and user information.
  • the system administrator uses the USB-KEY SDK secondary development tool to write the corresponding user information to the USB-KEY, and derives the corresponding public key, and the hardware number corresponding to the public key and the USB-KEY.
  • User information is stored in the database on the cloud desktop server.
  • the embodiment of the present invention sends the encrypted data and the hardware number to the cloud server through the cloud terminal; the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key to obtain the The second user information sent by the cloud terminal; if the cloud server compares the first user information and the second user information, if the cloud server is the same, the cloud server provides a cloud desktop environment to the cloud terminal, and the hardware can be implemented. Two-factor authentication of the device and the user information, that is, each user corresponds to a unique hardware device, and the private key is stored in the hardware device and cannot be exported, thereby ensuring the security of the user information.
  • the embodiment of the invention further provides a cloud system.
  • Figure 7 is a system configuration diagram of a first embodiment of the cloud system of the present invention.
  • the system includes a cloud terminal 701 and a cloud server 702;
  • the cloud terminal 701 is configured to: send the encrypted data and the hardware number to the cloud server 702, so that the cloud server 702 searches for the public key and the first user information according to the hardware number, and decrypts the information according to the public key. Encrypting the data, acquiring the second user information sent by the cloud terminal 701; and logging in to the cloud desktop environment provided by the cloud server 702, if the cloud server 702 is the same as the first user information and the second user information ;
  • the cloud server 702 is configured to: receive encrypted data and hardware code sent by the cloud terminal 701; search for a public key and first user information according to the hardware number, and decrypt the encrypted data according to the public key to obtain the The second user information sent by the cloud terminal 701; if the first user information and the second user information are the same, the cloud desktop environment is provided to the cloud terminal 701.
  • the cloud terminal 701 when the user needs to log in to the cloud desktop environment, after clicking the login button, the cloud terminal 701 initiates a login verification request to the cloud server 702, and the cloud terminal 701 encrypts the stored user information by using the private key stored in the hardware device USB-KEY.
  • the encrypted user information is obtained, and the encrypted user information and the hardware number stored in the USB-KEY are transmitted to the cloud server 702.
  • the hardware number is a unique identifier of the USB-KEY.
  • the cloud server 702 searches for the public key and the first information stored in the cloud server database according to the hardware number, and decrypts the encrypted user information by using the public key, and acquires the second user information sent by the cloud terminal 701. .
  • the cloud server 702 compares and analyzes the first user information and the second user information. If they are the same, the user is authenticated as an authorized user, and provides a cloud desktop environment for the user.
  • the cloud terminal 701 is further configured to:
  • the sending the encrypted data and the hardware number to the cloud server 702 includes:
  • the hardware number being a unique identifier of the hardware device.
  • the cloud terminal 701 when the user needs to log in to the cloud desktop environment, after the login button is clicked, the cloud terminal 701 initiates a login verification request to the server, and the server randomly generates a string to be sent to the cloud terminal 701. After accepting the user's correct Personal Identification Number (PIN code), the cloud terminal 701 encrypts the random character string and the stored user information by using the private key in the USB-KEY. If you log in to the cloud desktop automatically after logging in to the terminal system, you can omit the input PIN code operation.
  • PIN code Personal Identification Number
  • the cloud terminal 701 sends the encrypted data and the corresponding hardware number to the server through the network, and the server uses the hardware number to search for the corresponding public key to decrypt the encrypted data, and restores the random string and the user information.
  • the cloud desktop server verifies the restored data. First, the random string is verified. After the verification is passed, the user information stored in the server database is verified again. After the matching is correct, the corresponding cloud desktop environment is provided.
  • the cloud terminal 701 further includes a detecting unit
  • the detecting unit is configured to: perform heartbeat detection on the hardware device, and if the hardware device is not detected, send a message to the cloud server 702, so that the cloud server 702 disconnects the corresponding cloud desktop environment.
  • the cloud terminal 701 is further configured to:
  • the cloud terminal 701 performs heartbeat detection on the USB-KEY. If the user unplugs the USB-KEY after logging in to the cloud desktop, the cloud terminal 701 performs three times and three seconds of detection. If the USB-KEY is not detected, the message is sent. To the cloud desktop server, the cloud desktop server disconnects the corresponding cloud desktop.
  • the hardware device can be unplugged.
  • the cloud terminal 701 detects that the hardware device is not inserted, the cloud terminal 701 sends the disconnection to the cloud server 702. The request of the corresponding cloud desktop makes the user data protected to a certain extent.
  • the cloud server 702 is further configured to:
  • the cloud terminal 701 encrypts the user information according to the private key stored in the hardware device and the first random character string, decrypting the encrypted data according to the public key to acquire a cloud terminal. a second random string sent by 701;
  • the cloud terminal 701 initiates a login verification request to the server, and the server randomly generates a string to be sent to the cloud terminal 701, and the cloud terminal 701 accepts the user to input the correct individual.
  • the password Personal Identification Number, PIN code
  • the random character string and the stored user information are encrypted by using the private key in the USB-KEY. If you log in to the cloud desktop automatically after logging in to the terminal system, you can omit the input PIN code operation.
  • the cloud terminal 701 sends the encrypted data and the corresponding hardware number to the server through the network, and the server uses the hardware number to search for the corresponding public key to decrypt the encrypted data, and restores the random string and the user information.
  • the cloud desktop server verifies the restored data. First, the random string is verified. After the verification is passed, the user information stored in the server database is verified again. After the matching is correct, the corresponding cloud desktop environment is provided.
  • the cloud server 702 is further configured to:
  • the hardware number, a public key corresponding to the hardware number, and user information are stored.
  • the embodiment of the present invention sends the encrypted data and the hardware number to the cloud server through the cloud terminal; the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key to obtain the The second user information sent by the cloud terminal; if the cloud server compares the first user information and the second user information, if the cloud server is the same, the cloud server provides a cloud desktop environment to the cloud terminal, and the hardware can be implemented. Two-factor authentication of the device and the user information, that is, each user corresponds to a unique hardware device, and the private key is stored in the hardware device and cannot be exported, thereby ensuring the security of the user information.
  • the embodiment of the present invention sends the encrypted data and the hardware number to the cloud server through the cloud terminal; the cloud server searches for the public key and the first user information according to the hardware number, and decrypts the encrypted data according to the public key to obtain the The second user information sent by the cloud terminal; if the cloud server compares the first user information and the second user information, if the cloud server is the same, the cloud server provides a cloud desktop environment to the cloud terminal, and the hardware can be implemented.
  • Two-factor authentication of the device and the user information that is, each user corresponds to a unique hardware device, and the private key is stored in the hardware device and cannot be exported, thereby ensuring the security of the user information. Therefore, the present invention has strong industrial applicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

一种登录云终端的方法,通过云终端向云服务器发送加密数据和硬件编号;所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境,本发明还公开了一种云终端、云服务器及云系统。本发明技术方案可以实现利用硬件设备和用户信息双因子认证,即使得每一个用户对应唯一的硬件设备,私钥存放在硬件设备中不能导出,从而保证用户信息的安全性。

Description

登录云终端的方法、云终端、云服务器及云系统 技术领域
本发明涉及登录云终端的技术领域,尤其涉及到一种登录云终端的方法、云终端、云服务器及云系统。
背景技术
在云终端和云桌面系统中经常涉及到用户登录及验证,在已有的登录与认证方法中有显示用户名和密码、指纹登陆、智能卡登录等。以上方法各种登录方法各有利弊,在使用用户名和密码登陆时容易显示用户名和密码,其安全性不强;指纹登录方法比较方便简单,安全性也比较强,但是指纹也容易被盗用。
发明内容
本发明实施例主要目的提供了一种登录云终端的方法,旨在解决用户登录云终端时如何提高用户信息安全性的技术问题。
为实现上述目的,采用如下技术方案:
一种登录云终端的方法,包括:
云终端向云服务器发送加密数据和硬件编号;
所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;
所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境。
可选地,所述云终端向云服务器发送加密数据和硬件编号的步骤之前,该方法还包括:
所述云终端向所述云服务器发送登录请求,所述云服务器向所述云终端返回第一随机字符串;
所述云终端根据硬件设备USB中存储的私钥和所述第一随机字符串对用户信息进行加密,得到加密后的用户信息;
所述云终端向云服务器发送加密数据和硬件编号的步骤包括:
所述云终端向所述云服务器发送所述硬件编号和所述加密后的用户信息,所述硬件编号为所述硬件设备的唯一标识。
可选地,所述云服务器对比所述第一用户信息和所述第二用户信息的步骤之前,该方法还包括:
所述云服务器根据所述公钥解密所述加密数据,获取云终端发送的第二随机字符串;
所述云服务器对比所述第一随机字符串和所述第二随机字符串,若相同,则执行对比所述第一用户信息和所述第二用户信息的步骤。
可选地,所述方法还包括:
若所述第一用户信息和所述第二用户信息不相同,则所述云终端退出登录云桌面环境。
可选地,所述方法还包括:
若所述第一随机字符串和所述第二随机字符串不相同,则所述云终端退出登录云桌面环境。
一种登录云终端的方法,所述方法包括:
向云服务器发送加密数据和硬件编号,并通知所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取云终端发送的第二用户信息;
在所述云服务器对比所述第一用户信息和所述第二用户信息,且确认所述第一用户信息和所述第二用户信息相同的情况下,登录所述云服务器提供的云桌面环境。
可选地,所述向云服务器发送加密数据和硬件编号的步骤之前,该方法还包括:
向所述云服务器发送登录请求,并接收所述云服务器向所述云终端发送第一随机字符串;
根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密,得到加密后的用户信息;
所述向云服务器发送加密数据和硬件编号的步骤包括:
向所述云服务器发送所述加密后的用户信息和所述硬件编号,所述硬件编号为所述硬件设备的唯一标识。
可选地,所述方法还包括:
对硬件设备进行心跳检测,若未检测到所述硬件设备,则向云服务器发送消息,使得所述云服务器断开相应的云桌面环境。
可选地,所述方法还包括:
根据硬件设备和个人识别密码PIN码登录云系统。
一种登录云终端的方法,所述方法包括:
接收云终端发送的加密数据和硬件编码;
根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;
对比所述第一用户信息和所述第二用户信息,若相同,则向所述云终端提供云桌面环境。
可选地,所述对比所述第一用户信息和所述第二用户信息的步骤之前,该方法还包括:
在所述云终端根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密的情况下,根据所述公钥解密所述加密数据,获取云终端发送的第二随机字符串;
对比所述第一随机字符串和所述第二随机字符串,若相同,则执行所述对比所述第一用户信息和所述第二用户信息的步骤。
可选地,所述方法还包括:
存储所述硬件编号、与所述硬件编号对应的公钥和用户信息。
一种云终端,所述云终端包括发送单元和登录单元,其中:
所述发送单元设置成:向云服务器发送加密数据和硬件编号,以使得所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取云终端发送的第二用户信息;
所述登录单元设置成:在所述云服务器对比所述第一用户信息和所述第二用户信息相同的情况下,登录所述云服务器提供的云桌面环境。
可选地,所述云终端还包括发送接收单元和加密单元,其中:
所述发送接收单元设置成:向所述云服务器发送登录请求,并接收所述云服务器向所述云终端发送第一随机字符串;
所述加密单元设置成:根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密,得到加密后的用户信息;
所述发送单元设置成按照如下方式向云服务器发送加密数据和硬件编号:
向所述云服务器发送所述加密后的用户信息和所述硬件编号,所述硬件编号为所述硬件设备的唯一标识。
可选地,所述云终端还包括检测单元;
所述检测单元设置成:对硬件设备进行心跳检测,若未检测到所述硬件设备,则向云服务器发送消息,使得所述云服务器断开相应的云桌面环境。
可选地,所述登录单元还设置成:
根据硬件设备和个人识别密码PIN码登录云系统。
一种云服务器,所述云服务器包括接收单元、处理单元和第一对比单元,其中:
所述接收单元设置成:接收云终端发送的加密数据和硬件编码;
所述处理单元设置成:根据所述硬件编号查找公钥和第一用户信息,并 根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;
所述第一对比单元设置成:对比所述第一用户信息和所述第二用户信息,若相同,则向所述云终端提供云桌面环境。
可选地,所述云服务器还包括获取单元和第二对比单元,其中:
所述获取单元设置成:在所述云终端根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密的情况下,根据所述公钥解密所述加密数据,获取云终端发送的第二随机字符串;
所述第二对比单元设置成:对比所述第一随机字符串和所述第二随机字符串,若相同,则执行所述对比所述第一用户信息和所述第二用户信息的步骤。
可选地,所述云服务器还包括存储单元,其中:
所述存储单元设置成:存储所述硬件编号、与所述硬件编号对应的公钥和用户信息。
一种云系统,所述云系统包括上述任意的云终端及上述任意的云服务器。
本发明实施例通过云终端向云服务器发送加密数据和硬件编号;所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境,可以实现利用硬件设备和用户信息双因子认证,即使得每一个用户对应唯一的硬件设备,私钥存放在硬件设备中不能导出,从而保证用户信息的安全性。
附图概述
图1是本发明登录云终端的方法第一实施例的流程示意图;
图2是本发明登录云终端的方法第二实施例的流程示意图;
图3是本发明登录云终端的方法第三实施例的流程示意图;
图4是本发明登录云终端的方法第四实施例的流程示意图;
图5是本发明云终端第一实施例的功能模块示意图;
图6是本发明云服务器第一实施例的功能模块示意图;
图7是本发明云系统第一实施例的系统结构图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
本发明的较佳实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明实施例提供了一种登录云终端的方法。
参考图1,图1是本发明登录云终端的方法第一实施例的流程示意图。
在第一实施例中,该登录云终端的方法包括:
步骤101,云终端向云服务器发送加密数据和硬件编号;
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端向云服务器发起登陆验证请求,云终端利用硬件设备USB-KEY内存储的私钥对存放的用户信息进行加密,并将加密后的用户信息以及存储在USB-KEY中的硬件编号发送给云服务器。所述硬件编号为所述USB-KEY的唯一标识。
可选地,加密后的用户信息为利用私钥对用户信息,即对原始的用户信息加密后的用户信息。
步骤102,所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;
可选地,第一用户信息为云服务器存放的明文的用户信息。
第二用户信息为利用公钥解密后获取到的云终端发送的用户信息。
具体的,云服务器根据所述硬件编号查找存储在云服务器数据库中的公钥和第一用户信息,并利用所述公钥解密所述加密后的用户信息,获取所述 云终端发送的第二用户信息。
步骤103,所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境。
具体的,所述云服务器对比分析所述第一用户信息和所述第二用户信息,若相同,则验证此用户为授权用户,为其提供云桌面环境。
本发明实施例通过云终端向云服务器发送加密数据和硬件编号;所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境,可以实现利用硬件设备和用户信息双因子认证,即使得每一个用户对应唯一的硬件设备,私钥存放在硬件设备中不能导出,从而保证用户信息的安全性。
本发明实施例还公开了一种计算机程序,包括程序指令,当该程序指令被计算机执行时,使得该计算机可执行第一实施例的登录云终端的方法。
本发明实施例还公开了一种载有所述计算机程序的载体。
参考图2,图2是本发明登录云终端的方法第二实施例的流程示意图。
在第二实施例中,该登录云终端的方法包括:
步骤201,所述云终端向所述云服务器发送登录请求,所述云服务器向所述云终端返回第一随机字符串,所述云终端根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密,得到加密后的用户信息;
步骤202,所述云终端向所述云服务器发送所述加密后的用户信息和所述硬件编号,所述硬件编号为所述硬件设备的唯一标识;
步骤203,所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;
步骤204,所述云服务器根据所述公钥解密所述加密数据,获取云终端发送的第二随机字符串;所述云服务器对比所述第一随机字符串和所述第二随机字符串,若相同,则执行步骤205;
步骤205,所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端向服务端发起登陆验证请求,服务端随机产生一个字符串发送给云终端,云终端在接受用户输入正确的个人识别密码(Personal Identification Number,PIN码)后,在USB-KEY内利用私钥将这个随机字符串以及存放的用户信息进行加密。如果登录终端系统就自动登录云桌面,可以省略此次的输入PIN码操作。
云终端将加密后数据以及相应的硬件编号通过网络发送到服务端,服务端利用硬件编号查找对应的公钥对加密数据进行解密,还原出随机字符串和用户信息。
云桌面服务器端对还原的数据进行检验,首先对随机字符串进行校验,校验通过后再次校验存放在服务端数据库中的用户信息,匹配正确后则提供相应的云桌面环境。
可选地,所述方法还包括:
若所述第一用户信息和所述第二用户信息不相同,则所述云终端退出登录云桌面环境。
可选地,所述方法还包括:
若所述第一随机字符串和所述第二随机字符串不相同,则所述云终端退出登录云桌面环境。
本发明实施例通过云终端向云服务器发送加密数据和硬件编号;所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境,可以实现利用硬件设备和用户信息双因子认证,即使得每一个用户对应唯一的硬件设备,私钥存放在硬件设备中不能导出,从而保证用户信息的安全性。
本发明实施例还公开了一种计算机程序,包括程序指令,当该程序指令被计算机执行时,使得该计算机可执行第二实施例的登录云终端的方法。
本发明实施例还公开了一种载有所述计算机程序的载体。
参考图3,图3是本发明登录云终端的方法第三实施例的流程示意图。
在第三实施例中,该登录云终端的方法包括:
步骤301,向云服务器发送加密数据和硬件编号,以使得所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取云终端发送的第二用户信息;
步骤302,在所述云服务器对比所述第一用户信息和所述第二用户信息相同的情况下,登录所述云服务器提供的云桌面环境。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端向云服务器发起登陆验证请求,云终端利用硬件设备USB-KEY内存储的私钥对存放的用户信息进行加密,得到加密后的用户信息,并将加密后的用户信息以及存储在USB-KEY中的硬件编号发送给云服务器。所述硬件编号为所述USB-KEY的唯一标识。云服务器根据所述硬件编号查找存储在云服务器数据库中的公钥和第一用户信息,并利用所述公钥解密所述加密后的用户信息,获取所述云终端发送的第二用户信息。所述云服务器对比分析所述第一用户信息和所述第二用户信息,若相同,则验证此用户为授权用户,为其提供云桌面环境。
可选地,所述向云服务器发送加密数据和硬件编号之前还包括:
向所述云服务器发送登录请求,并接收所述云服务器向所述云终端发送第一随机字符串;
根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密,得到加密后的用户信息;
所述向云服务器发送加密数据和硬件编号,包括:
向所述云服务器发送所述加密后的用户信息和硬件编号,所述硬件编号为所述硬件设备的唯一标识。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端向服务端发起登陆验证请求,服务端随机产生一个字符串发送给云终端,云终端在接受用户输入正确的个人识别密码(Personal Identification Number,PIN码) 后,在USB-KEY内利用私钥将这个随机字符串以及存放的用户信息进行加密。如果登录终端系统就自动登录云桌面,可以省略此次的输入PIN码操作。
云终端将加密后数据以及相应的硬件编号通过网络发送到服务端,服务端利用硬件编号查找对应的公钥对加密数据进行解密,还原出随机字符串和用户信息。
云桌面服务器端对还原的数据进行检验,首先对随机字符串进行校验,校验通过后再次校验存放在服务端数据库中的用户信息,匹配正确后则提供相应的云桌面环境。
可选地,所述方法还包括:
对硬件设备进行心跳检测,若未检测到所述硬件设备,则向云服务器发送消息,使得所述云服务器断开相应的云桌面环境。
具体的,云终端对USB-KEY进行心跳检测,如果用户在登陆云桌面后拔掉USB-KEY后,云终端进行3次3秒检测,如果持续没有检测到USB-KEY,则发送消息给云桌面服务端,云桌面服务端断开相应的云桌面。
在传统的登录云桌面中,用户输入PIN码以及用户信息登录云系统后,在用户离开云桌面的情况下,其他用户也可以同样使用,从而有可能造成用户数据的泄露,而在本发明实施例利用硬件设备和用户信息双因子认证的情况下,若用户暂时不使用云桌面时,则可以拔出硬件设备,当云终端检测到硬件设备未插入时,则向云服务器发送断开相应云桌面的请求,使得用户数据在一定程度上得到保护。
可选地,所述方法还包括:
根据硬件设备和个人识别密码PIN码登录云系统。
具体的,用户登录云终端时,插入USB-KEY,输入PIN码,PIN码正确后,读取用户信息进入云终端系统,否则不能正常登录。
本发明实施例提供的一种登录云终端的方法、云终端、云服务器及云系统,所述方法通过云终端向云服务器发送加密数据和硬件编号;所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;所述云服务器对比所述第一 用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境,可以实现利用硬件设备和用户信息双因子认证,即使得每一个用户对应唯一的硬件设备,私钥存放在硬件设备中不能导出,从而保证用户信息的安全性。
本发明实施例还公开了一种计算机程序,包括程序指令,当该程序指令被计算机执行时,使得该计算机可执行第三实施例的登录云终端的方法。
本发明实施例还公开了一种载有所述计算机程序的载体。
参考图4,图4是本发明登录云终端的方法第四实施例的流程示意图。
在第四实施例中,该登录云终端的方法包括:
步骤401,接收云终端发送的加密数据和硬件编码;
步骤402,根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;
步骤403,对比所述第一用户信息和所述第二用户信息,若相同,则向所述云终端提供云桌面环境。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端向云服务器发起登陆验证请求,云终端利用硬件设备USB-KEY内存储的私钥对存放的用户信息进行加密,并将加密后的用户信息以及存储在USB-KEY中的硬件编号发送给云服务器。所述硬件编号为所述USB-KEY的唯一标识。云服务器根据所述硬件编号查找存储在云服务器数据库中的公钥和第一用户信息,并利用所述公钥解密所述加密后的用户信息,获取所述云终端发送的第二用户信息。所述云服务器对比分析所述第一用户信息和所述第二用户信息,若相同,则验证此用户为授权用户,为其提供云桌面环境。
可选地,所述对比所述第一用户信息和所述第二用户信息之前,还包括:
在所述云终端根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密的情况下,根据所述公钥解密所述加密数据,获取云终端发送的第二随机字符串;
对比所述第一随机字符串和所述第二随机字符串,若相同,则执行步骤对比所述第一用户信息和所述第二用户信息,若相同,则向所述云终端提供 云桌面环境。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端向服务端发起登陆验证请求,服务端随机产生一个字符串发送给云终端,云终端在接受用户输入正确的个人识别密码(Personal Identification Number,PIN码)后,在USB-KEY内利用私钥将这个随机字符串以及存放的用户信息进行加密。如果登录终端系统就自动登录云桌面,可以省略此次的输入PIN码操作。
云终端将加密后数据以及相应的硬件编号通过网络发送到服务端,服务端利用硬件编号查找对应的公钥对加密数据进行解密,还原出随机字符串和用户信息。
云桌面服务器端对还原的数据进行检验,首先对随机字符串进行校验,校验通过后再次校验存放在服务端数据库中的用户信息,匹配正确后则提供相应的云桌面环境。
可选地,所述方法还包括:
存储所述硬件编号、与所述硬件编号对应的公钥和用户信息。
具体的,系统管理员利用USB-KEY的SDK二次开发的工具,向USB-KEY中写入相应的用户信息,并导出对应的公钥,同时将此公钥和USB-KEY对应的硬件编号、用户信息存放在云桌面服务器端的数据库中。
本发明实施例通过云终端向云服务器发送加密数据和硬件编号;所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境,可以实现利用硬件设备和用户信息双因子认证,即使得每一个用户对应唯一的硬件设备,私钥存放在硬件设备中不能导出,从而保证用户信息的安全性。
本发明实施例还公开了一种计算机程序,包括程序指令,当该程序指令被计算机执行时,使得该计算机可执行第四实施例的登录云终端的方法。
本发明实施例还公开了一种载有所述计算机程序的载体。
本发明实施例提供了一种云终端。
参考图5,图5是本发明云终端第一实施例的功能模块示意图。该云终端包括:
发送单元501,设置成:向云服务器发送加密数据和硬件编号,以使得所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取云终端发送的第二用户信息;
登录单元502,设置成:在所述云服务器对比所述第一用户信息和所述第二用户信息相同的情况下,登录所述云服务器提供的云桌面环境。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端向云服务器发起登陆验证请求,云终端利用硬件设备USB-KEY内存储的私钥对存放的用户信息进行加密,并将加密后的用户信息以及存储在USB-KEY中的硬件编号发送给云服务器。所述硬件编号为所述USB-KEY的唯一标识。云服务器根据所述硬件编号查找存储在云服务器数据库中的公钥和第一信息,并利用所述公钥解密所述加密后的用户信息,获取所述云终端发送的第二用户信息。所述云服务器对比分析所述第一用户信息和所述所述第二用户信息,若相同,则验证此用户为授权用户,为其提供云桌面环境。
可选地,所述云终端还包括:
发送接收单元503,设置成:向所述云服务器发送登录请求,并接收所述云服务器向所述云终端发送第一随机字符串;
加密单元504,设置成:根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密,得到加密后的用户信息;
所述发送单元501,具体设置成:
向所述云服务器发送所述加密后的用户信息和硬件编号,所述硬件编号为所述硬件设备的唯一标识。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端向服务端发起登陆验证请求,服务端随机产生一个字符串发送给云终端,云终端在接受用户输入正确的个人识别密码(Personal Identification Number,PIN码)后,在USB-KEY内利用私钥将这个随机字符串以及存放的用户信息进行加 密。如果登录终端系统就自动登录云桌面,可以省略此次的输入PIN码操作。
云终端将加密后数据以及相应的硬件编号通过网络发送到服务端,服务端利用硬件编号查找对应的公钥对加密数据进行解密,还原出随机字符串和用户信息。
云桌面服务器端对还原的数据进行检验,首先对随机字符串进行校验,校验通过后再次校验存放在服务端数据库中的用户信息,匹配正确后则提供相应的云桌面环境。
可选地,所述云终端还包括检测单元505;
所述检测单元505,设置成:对硬件设备进行心跳检测,若未检测到所述硬件设备,则向云服务器发送消息,使得所述云服务器断开相应的云桌面环境。
具体的,云终端对USB-KEY进行心跳检测,如果用户在登陆云桌面后拔掉USB-KEY后,云终端进行3次3秒检测,如果持续没有检测到USB-KEY,则发送消息给云桌面服务端,云桌面服务端断开相应的云桌面。
在传统的登录云桌面中,用户输入PIN码以及用户信息登录云系统后,在用户离开云桌面的情况下,其他用户也可以同样使用,从而有可能造成用户数据的泄露,而在本发明实施例利用硬件设备和用户信息双因子认证的情况下,若用户暂时不使用云桌面时,则可以拔出硬件设备,当云终端检测到硬件设备未插入时,则向云服务器发送断开相应云桌面的请求,使得用户数据在一定程度上得到保护。
可选地,所述登录单元502还设置成:
根据硬件设备和个人识别密码PIN码登录云系统。
具体的,用户登录云终端时,插入USB-KEY,输入PIN码,PIN码正确后,读取用户信息进入云终端系统,否则不能正常登录。
本发明实施例通过云终端向云服务器发送加密数据和硬件编号;所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端 提供云桌面环境,可以实现利用硬件设备和用户信息双因子认证,即使得每一个用户对应唯一的硬件设备,私钥存放在硬件设备中不能导出,从而保证用户信息的安全性。
本发明实施例提供了一种云服务器。
参考图6,图6是本发明云服务器第一实施例的功能模块示意图。该云服务器包括:
接收单元601,设置成:接收云终端发送的加密数据和硬件编码;
处理单元602,设置成:根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;
第一对比单元603,设置成:对比所述第一用户信息和所述第二用户信息,若相同,则向所述云终端提供云桌面环境。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端向云服务器发起登陆验证请求,云终端利用硬件设备USB-KEY内存储的私钥对存放的用户信息进行加密,得到加密后的用户信息,并将加密后的用户信息以及存储在USB-KEY中的硬件编号发送给云服务器。所述硬件编号为所述USB-KEY的唯一标识。云服务器根据所述硬件编号查找存储在云服务器数据库中的公钥和第一用户信息,并利用所述公钥解密所述加密后的用户信息,获取所述云终端发送的第二用户信息。所述云服务器对比分析所述第一用户信息和所述第二用户信息,若相同,则验证此用户为授权用户,为其提供云桌面环境。
可选地,所述云服务器还包括:
获取单元604,设置成:在所述云终端根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密的情况下,根据所述公钥解密所述加密数据,获取云终端发送的第二随机字符串;
第二对比单元605,还设置成:对比所述第一随机字符串和所述第二随机字符串,若相同,则执行步骤对比所述第一用户信息和所述第二用户信息,若相同,则向所述云终端提供云桌面环境。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端向服务端发起登陆验证请求,服务端随机产生一个字符串发送给云终端,云终端在接受用户输入正确的个人识别密码(Personal Identification Number,PIN码)后,在USB-KEY内利用私钥将这个随机字符串以及存放的用户信息进行加密。如果登录终端系统就自动登录云桌面,可以省略此次的输入PIN码操作。
云终端将加密后数据以及相应的硬件编号通过网络发送到服务端,服务端利用硬件编号查找对应的公钥对加密数据进行解密,还原出随机字符串和用户信息。
云桌面服务器端对还原的数据进行检验,首先对随机字符串进行校验,校验通过后再次校验存放在服务端数据库中的用户信息,匹配正确后则提供相应的云桌面环境。
可选地,所述云服务器还包括:
存储单元606,设置成:存储所述硬件编号、与所述硬件编号对应的公钥和用户信息。
具体的,系统管理员利用USB-KEY的SDK二次开发的工具,向USB-KEY中写入相应的用户信息,并导出对应的公钥,同时将此公钥和USB-KEY对应的硬件编号、用户信息存放在云桌面服务器端的数据库中。
本发明实施例通过云终端向云服务器发送加密数据和硬件编号;所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境,可以实现利用硬件设备和用户信息双因子认证,即使得每一个用户对应唯一的硬件设备,私钥存放在硬件设备中不能导出,从而保证用户信息的安全性。
本发明实施例进一步提供一种云系统。
参照图7,图7是本发明云系统第一实施例的系统结构图。所述系统包括云终端701及云服务器702;
所述云终端701,设置成:向云服务器702发送加密数据和硬件编号,以使得所述云服务器702根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取云终端701发送的第二用户信息;在所述云服务器702对比所述第一用户信息和所述第二用户信息相同的情况下,登录所述云服务器702提供的云桌面环境;
所述云服务器702,设置成:接收云终端701发送的加密数据和硬件编码;根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端701发送的第二用户信息;对比所述第一用户信息和所述第二用户信息,若相同,则向所述云终端701提供云桌面环境。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端701向云服务器702发起登陆验证请求,云终端701利用硬件设备USB-KEY内存储的私钥对存放的用户信息进行加密,得到加密后的用户信息,并将加密后的用户信息以及存储在USB-KEY中的硬件编号发送给云服务器702。所述硬件编号为所述USB-KEY的唯一标识。云服务器702根据所述硬件编号查找存储在云服务器数据库中的公钥和第一信息,并利用所述公钥解密所述加密后的用户信息,获取所述云终端701发送的第二用户信息。所述云服务器702对比分析所述第一用户信息和所述所述第二用户信息,若相同,则验证此用户为授权用户,为其提供云桌面环境。
可选地,所述云终端701还设置成:
向所述云服务器702发送登录请求,并接收所述云服务器702向所述云终端701发送第一随机字符串;
根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密,得到加密后的用户信息;
所述向云服务器702发送加密数据和硬件编号,包括:
向所述云服务器702发送所述加密后的用户信息和硬件编号,所述硬件编号为所述硬件设备的唯一标识。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端701向服务端发起登陆验证请求,服务端随机产生一个字符串发送给云终端701, 云终端701在接受用户输入正确的个人识别密码(Personal Identification Number,PIN码)后,在USB-KEY内利用私钥将这个随机字符串以及存放的用户信息进行加密。如果登录终端系统就自动登录云桌面,可以省略此次的输入PIN码操作。
云终端701将加密后数据以及相应的硬件编号通过网络发送到服务端,服务端利用硬件编号查找对应的公钥对加密数据进行解密,还原出随机字符串和用户信息。
云桌面服务器端对还原的数据进行检验,首先对随机字符串进行校验,校验通过后再次校验存放在服务端数据库中的用户信息,匹配正确后则提供相应的云桌面环境。
可选地,所述云终端701还包括检测单元;
所述检测单元,设置成:对硬件设备进行心跳检测,若未检测到所述硬件设备,则向云服务器702发送消息,使得所述云服务器702断开相应的云桌面环境。
所述云终端701还设置成::
根据硬件设备和个人识别密码PIN码登录云系统。
具体的,云终端701对USB-KEY进行心跳检测,如果用户在登陆云桌面后拔掉USB-KEY后,云终端701进行3次3秒检测,如果持续没有检测到USB-KEY,则发送消息给云桌面服务端,云桌面服务端断开相应的云桌面。
在传统的登录云桌面中,用户输入PIN码以及用户信息登录云系统后,在用户离开云桌面的情况下,其他用户也可以同样使用,从而有可能造成用户数据的泄露,而在本发明实施例利用硬件设备和用户信息双因子认证的情况下,若用户暂时不使用云桌面时,则可以拔出硬件设备,当云终端701检测到硬件设备未插入时,则向云服务器702发送断开相应云桌面的请求,使得用户数据在一定程度上得到保护。
可选地,所述云服务器702还设置成:
在所述云终端701根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密的情况下,根据所述公钥解密所述加密数据,获取云终端 701发送的第二随机字符串;
对比所述第一随机字符串和所述第二随机字符串,若相同,则执行步骤对比所述第一用户信息和所述第二用户信息,若相同,则向所述云终端701提供云桌面环境。
具体的,用户需要登录云桌面环境时,点击登录按钮后,云终端701向服务端发起登陆验证请求,服务端随机产生一个字符串发送给云终端701,云终端701在接受用户输入正确的个人识别密码(Personal Identification Number,PIN码)后,在USB-KEY内利用私钥将这个随机字符串以及存放的用户信息进行加密。如果登录终端系统就自动登录云桌面,可以省略此次的输入PIN码操作。
云终端701将加密后数据以及相应的硬件编号通过网络发送到服务端,服务端利用硬件编号查找对应的公钥对加密数据进行解密,还原出随机字符串和用户信息。
云桌面服务器端对还原的数据进行检验,首先对随机字符串进行校验,校验通过后再次校验存放在服务端数据库中的用户信息,匹配正确后则提供相应的云桌面环境。
可选地,所述云服务器702还设置成:
存储所述硬件编号、与所述硬件编号对应的公钥和用户信息。
本发明实施例通过云终端向云服务器发送加密数据和硬件编号;所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境,可以实现利用硬件设备和用户信息双因子认证,即使得每一个用户对应唯一的硬件设备,私钥存放在硬件设备中不能导出,从而保证用户信息的安全性。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。
工业实用性
本发明实施例通过云终端向云服务器发送加密数据和硬件编号;所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境,可以实现利用硬件设备和用户信息双因子认证,即使得每一个用户对应唯一的硬件设备,私钥存放在硬件设备中不能导出,从而保证用户信息的安全性。因此本发明具有很强的工业实用性。

Claims (20)

  1. 一种登录云终端的方法,包括:
    云终端向云服务器发送加密数据和硬件编号;
    所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;
    所述云服务器对比所述第一用户信息和所述第二用户信息,若相同,则所述云服务器向所述云终端提供云桌面环境。
  2. 如权利要求1所述的登录云终端的方法,其中,所述云终端向云服务器发送加密数据和硬件编号的步骤之前,该方法还包括:
    所述云终端向所述云服务器发送登录请求,所述云服务器向所述云终端返回第一随机字符串;
    所述云终端根据硬件设备USB中存储的私钥和所述第一随机字符串对用户信息进行加密,得到加密后的用户信息;
    所述云终端向云服务器发送加密数据和硬件编号的步骤包括:
    所述云终端向所述云服务器发送所述硬件编号和所述加密后的用户信息,所述硬件编号为所述硬件设备的唯一标识。
  3. 如权利要求2所述的登录云终端的方法,其中,所述云服务器对比所述第一用户信息和所述第二用户信息的步骤之前,该方法还包括:
    所述云服务器根据所述公钥解密所述加密数据,获取云终端发送的第二随机字符串;
    所述云服务器对比所述第一随机字符串和所述第二随机字符串,若相同,则执行对比所述第一用户信息和所述第二用户信息的步骤。
  4. 根据权利要求1至3中任意一项所述的登录云终端的方法,所述方法还包括:
    若所述第一用户信息和所述第二用户信息不相同,则所述云终端退出登录云桌面环境。
  5. 根据权利要求4所述的登录云终端的方法,所述方法还包括:
    若所述第一随机字符串和所述第二随机字符串不相同,则所述云终端退出登录云桌面环境。
  6. 一种登录云终端的方法,所述方法包括:
    向云服务器发送加密数据和硬件编号,并通知所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取云终端发送的第二用户信息;
    在所述云服务器对比所述第一用户信息和所述第二用户信息,且确认所述第一用户信息和所述第二用户信息相同的情况下,登录所述云服务器提供的云桌面环境。
  7. 根据权利要求6所述的登录云终端的方法,其中,所述向云服务器发送加密数据和硬件编号的步骤之前,该方法还包括:
    向所述云服务器发送登录请求,并接收所述云服务器向所述云终端发送第一随机字符串;
    根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密,得到加密后的用户信息;
    所述向云服务器发送加密数据和硬件编号的步骤包括:
    向所述云服务器发送所述加密后的用户信息和所述硬件编号,所述硬件编号为所述硬件设备的唯一标识。
  8. 根据权利要求6或7所述的登录云终端的方法,所述方法还包括:
    对硬件设备进行心跳检测,若未检测到所述硬件设备,则向云服务器发送消息,使得所述云服务器断开相应的云桌面环境。
  9. 根据权利要求8所述的登录云终端的方法,所述方法还包括:
    根据硬件设备和个人识别密码PIN码登录云系统。
  10. 一种登录云终端的方法,所述方法包括:
    接收云终端发送的加密数据和硬件编码;
    根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;
    对比所述第一用户信息和所述第二用户信息,若相同,则向所述云终端提供云桌面环境。
  11. 根据权利要求10所述的登录云终端的方法,其中,所述对比所述第一用户信息和所述第二用户信息的步骤之前,该方法还包括:
    在所述云终端根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密的情况下,根据所述公钥解密所述加密数据,获取云终端发送的第二随机字符串;
    对比所述第一随机字符串和所述第二随机字符串,若相同,则执行所述对比所述第一用户信息和所述第二用户信息的步骤。
  12. 根据权利要求10或11所述的登录云终端的方法,所述方法还包括:
    存储所述硬件编号、与所述硬件编号对应的公钥和用户信息。
  13. 一种云终端,所述云终端包括发送单元和登录单元,其中:
    所述发送单元设置成:向云服务器发送加密数据和硬件编号,以使得所述云服务器根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取云终端发送的第二用户信息;
    所述登录单元设置成:在所述云服务器对比所述第一用户信息和所述第二用户信息相同的情况下,登录所述云服务器提供的云桌面环境。
  14. 根据权利要求13所述的云终端,其中,所述云终端还包括发送接收单元和加密单元,其中:
    所述发送接收单元设置成:向所述云服务器发送登录请求,并接收所述云服务器向所述云终端发送第一随机字符串;
    所述加密单元设置成:根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密,得到加密后的用户信息;
    所述发送单元设置成按照如下方式向云服务器发送加密数据和硬件编号:
    向所述云服务器发送所述加密后的用户信息和所述硬件编号,所述硬件编号为所述硬件设备的唯一标识。
  15. 根据权利要求13或14所述的云终端,其中,所述云终端还包括检测单元;
    所述检测单元设置成:对硬件设备进行心跳检测,若未检测到所述硬件设备,则向云服务器发送消息,使得所述云服务器断开相应的云桌面环境。
  16. 根据权利要求15所述的云终端,其中,所述登录单元还设置成:
    根据硬件设备和个人识别密码PIN码登录云系统。
  17. 一种云服务器,所述云服务器包括接收单元、处理单元和第一对比单元,其中:
    所述接收单元设置成:接收云终端发送的加密数据和硬件编码;
    所述处理单元设置成:根据所述硬件编号查找公钥和第一用户信息,并根据所述公钥解密所述加密数据,获取所述云终端发送的第二用户信息;
    所述第一对比单元设置成:对比所述第一用户信息和所述第二用户信息,若相同,则向所述云终端提供云桌面环境。
  18. 根据权利要求17所述的云服务器,所述云服务器还包括获取单元和第二对比单元,其中:
    所述获取单元设置成:在所述云终端根据硬件设备中存储的私钥和所述第一随机字符串对用户信息进行加密的情况下,根据所述公钥解密所述加密数据,获取云终端发送的第二随机字符串;
    所述第二对比单元设置成:对比所述第一随机字符串和所述第二随机字符串,若相同,则执行所述对比所述第一用户信息和所述第二用户信息的步骤。
  19. 根据权利要求17或18所述的云服务器,所述云服务器还包括存储单元,其中:
    所述存储单元设置成:存储所述硬件编号、与所述硬件编号对应的公钥和用户信息。
  20. 一种云系统,所述云系统包括如权利要求13-16中任一项所述的云终端及如权利要求17-19所述的云服务器。
PCT/CN2015/070998 2014-11-06 2015-01-19 登录云终端的方法、云终端、云服务器及云系统 WO2015184812A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410623561.7 2014-11-06
CN201410623561.7A CN105635075A (zh) 2014-11-06 2014-11-06 登录云终端的方法、云终端、云服务器及云系统

Publications (1)

Publication Number Publication Date
WO2015184812A1 true WO2015184812A1 (zh) 2015-12-10

Family

ID=54766051

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/070998 WO2015184812A1 (zh) 2014-11-06 2015-01-19 登录云终端的方法、云终端、云服务器及云系统

Country Status (2)

Country Link
CN (1) CN105635075A (zh)
WO (1) WO2015184812A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112492028A (zh) * 2020-11-26 2021-03-12 中国人寿保险股份有限公司 云桌面登录方法、装置、电子设备及存储介质
CN113382001A (zh) * 2021-06-09 2021-09-10 湖南快乐阳光互动娱乐传媒有限公司 一种通信加密方法及相关装置
CN114866253A (zh) * 2022-04-27 2022-08-05 北京计算机技术及应用研究所 一种可靠的云主机登录系统及其实现的云主机登录方法

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107547592A (zh) * 2016-06-27 2018-01-05 中兴通讯股份有限公司 一种云桌面数据的同步方法及装置
CN110781481A (zh) * 2018-07-30 2020-02-11 中兴通讯股份有限公司 单点登录方法、客户端、服务器以及存储介质
CN110974295B (zh) * 2019-12-19 2022-05-31 上海深至信息科技有限公司 一种实现信息交互功能的超声检测方法及超声检测系统
CN111163164B (zh) * 2019-12-27 2022-09-13 山东乾云启创信息科技股份有限公司 一种基于鲲鹏芯片的云桌面安全传输方法及装置
CN111966982A (zh) * 2020-07-23 2020-11-20 西安雷风电子科技有限公司 基于生物特征鉴权的云桌面注册、登录方法及系统
CN115484346B (zh) * 2022-09-07 2023-08-01 中移互联网有限公司 云手机管理方法、系统及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102420692A (zh) * 2011-12-28 2012-04-18 广州杰赛科技股份有限公司 一种基于云计算的客户终端USBKey安全认证方法及其系统
CN102710605A (zh) * 2012-05-08 2012-10-03 重庆大学 一种云制造环境下的信息安全管控方法
CN102882858A (zh) * 2012-09-13 2013-01-16 江苏乐买到网络科技有限公司 一种用于云计算系统的外部数据传输方法
US20140164758A1 (en) * 2012-12-07 2014-06-12 Microsoft Corporation Secure cloud database platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102420692A (zh) * 2011-12-28 2012-04-18 广州杰赛科技股份有限公司 一种基于云计算的客户终端USBKey安全认证方法及其系统
CN102710605A (zh) * 2012-05-08 2012-10-03 重庆大学 一种云制造环境下的信息安全管控方法
CN102882858A (zh) * 2012-09-13 2013-01-16 江苏乐买到网络科技有限公司 一种用于云计算系统的外部数据传输方法
US20140164758A1 (en) * 2012-12-07 2014-06-12 Microsoft Corporation Secure cloud database platform

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112492028A (zh) * 2020-11-26 2021-03-12 中国人寿保险股份有限公司 云桌面登录方法、装置、电子设备及存储介质
CN112492028B (zh) * 2020-11-26 2024-02-09 中国人寿保险股份有限公司 云桌面登录方法、装置、电子设备及存储介质
CN113382001A (zh) * 2021-06-09 2021-09-10 湖南快乐阳光互动娱乐传媒有限公司 一种通信加密方法及相关装置
CN114866253A (zh) * 2022-04-27 2022-08-05 北京计算机技术及应用研究所 一种可靠的云主机登录系统及其实现的云主机登录方法
CN114866253B (zh) * 2022-04-27 2024-05-28 北京计算机技术及应用研究所 一种可靠的云主机登录系统及其实现的云主机登录方法

Also Published As

Publication number Publication date
CN105635075A (zh) 2016-06-01

Similar Documents

Publication Publication Date Title
WO2015184812A1 (zh) 登录云终端的方法、云终端、云服务器及云系统
KR102328725B1 (ko) 하나의 장치를 이용하여 다른 장치를 언로크하는 방법
TWI707244B (zh) 區塊鏈跨鏈的認證方法、系統、伺服器及可讀儲存媒體
EP3435591B1 (en) 1:n biometric authentication, encryption, signature system
US10469253B2 (en) Methods and apparatus for migrating keys
US20160205098A1 (en) Identity verifying method, apparatus and system, and related devices
WO2016086584A1 (zh) 一种解锁管理权限的方法和认证设备
CN103078863B (zh) 登录认证的方法、装置及系统
WO2015188424A1 (zh) 一种密钥存储设备及其使用方法
CN107733933B (zh) 一种基于生物识别技术的双因子身份认证的方法及系统
TW201540040A (zh) 授權方法、請求授權的方法及裝置
US9954828B1 (en) Protection of data stored in the cloud
EP3206329B1 (en) Security check method, device, terminal and server
US9313185B1 (en) Systems and methods for authenticating devices
CN105207776A (zh) 一种指纹认证方法及系统
US10686787B2 (en) Use of personal device for convenient and secure authentication
TW201409990A (zh) 利用指紋資訊認證的通信方法
TWI505126B (zh) 獲取金鑰的方法和裝置
CN103812651A (zh) 密码验证方法、装置及系统
KR101372090B1 (ko) 로그인 시스템 및 방법
Han et al. Biometric-Kerberos authentication scheme for secure mobile computing services
CN105227562A (zh) 基于身份验证的关键业务数据传输中介设备及其使用方法
Wang The solution design using USB key for network security authentication
TWI633231B (zh) Smart lock and smart lock control method
TWI241819B (en) Authentication system and authentication encryption method of wireless network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15802847

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15802847

Country of ref document: EP

Kind code of ref document: A1