WO2018000891A1 - 一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统 - Google Patents

一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统 Download PDF

Info

Publication number
WO2018000891A1
WO2018000891A1 PCT/CN2017/080095 CN2017080095W WO2018000891A1 WO 2018000891 A1 WO2018000891 A1 WO 2018000891A1 CN 2017080095 W CN2017080095 W CN 2017080095W WO 2018000891 A1 WO2018000891 A1 WO 2018000891A1
Authority
WO
WIPO (PCT)
Prior art keywords
access device
server
security policy
data
security
Prior art date
Application number
PCT/CN2017/080095
Other languages
English (en)
French (fr)
Inventor
许天锡
陈普
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2018000891A1 publication Critical patent/WO2018000891A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to the field of security, and in particular, to a method, an apparatus, and a virtual desktop management system for virtual desktop security control.
  • a virtual desktop infrastructure mainly includes a virtual desktop management system, a server, and an access device.
  • the virtual desktop management system is used to implement the management and control functions of the virtual desktop remote access.
  • the virtualization software is deployed in the server to form at least one virtual machine, and the administrator can pre-assign the server or the virtual machine to the user in the virtual desktop management system. Users can configure different permissions.
  • the management system can group multiple assigned servers or virtual machines into a desktop group.
  • the desktop group controls the operation rights of remote access of servers or virtual machines in the desktop group, such as whether it is allowed during remote connection.
  • the server or virtual machine uses an external device such as a Universal Serial Bus flash register.
  • the implementation of the security control policy depends on the user's operational rights and the operational rights of the server or virtual machine to allow remote access.
  • the access control relationship between the user and the server or virtual machine that has been assigned by the user cannot be satisfied.
  • the access security is differentiated. The purpose of information security of enterprise business cannot be effectively guaranteed.
  • the embodiment of the invention provides a method and a device for virtual desktop security control, and a virtual desktop management system, which can preset a security control policy in the management node, and the type of the user and the type of the access device carried by the management node according to each connection request. Compare the remote desktop type with the security control policy to determine the typical scenario that matches the current connection request and the security policy corresponding to the matching typical scenario, so as to implement differentiated control on different connection requests and improve information security of enterprise services. .
  • a method for virtual desktop security control wherein a security control policy is preset in a management node, where the security control policy includes at least one typical scenario and corresponding to each of the at least one typical scenario.
  • the security policy, each of the at least one typical scenario is a combination of a user type, an access device type, and a remote desktop type, each of the security policies including at least one security control item; the method includes:
  • the management node acquires a user type, an access device type, and a remote desktop type carried by the connection request;
  • the management node compares the user type, the access device type, and the remote desktop type carried in the connection request with the at least one typical scenario in the security control policy, and determines a typical scenario that matches the connection request. And a security policy corresponding to the matched typical scenario;
  • indication information Sending, by the management node, indication information to the access device according to the determined security policy, where the indication information
  • the information is used to indicate that the access device establishes a connection with the server.
  • the administrator can also preset a security control policy in the virtual desktop management system through the management node.
  • the security control policy may be preset according to the user type, the access device type, and the remote desktop type, where the security control policy includes a credit level, a security policy, and a typical scenario.
  • the administrator can determine the typical scenario according to the user type, access device type, and remote desktop type. Each typical scenario corresponds to a security policy, and each security policy corresponds to a credit level.
  • the security control policy may also be preset according to the user type, the access device type, the remote desktop type, and the access network environment type.
  • the security control policy preset by the administrator may be stored in a file or database table preset in the management node, or may be stored in other storage forms, which is not limited by the present invention.
  • the administrator can add or update the credit level, security policy, and typical scenario according to the service requirement, so as to adapt to the change of the information security requirements of the enterprise. It should be noted that the updated security control policy only takes effect on the updated new connection request.
  • connection request carries the user type, the access device type, the access network environment type, and the remote desktop type and the preset security control policy, if there is no matching typical scenario, the preset default security may be implemented.
  • a virtual desktop is a type of remote desktop. After a user and a virtual machine are allocated in a virtual desktop management system, the user can access the access type through any type of access device.
  • the network environment sends a request to connect to the virtual machine to the virtual desktop management system, and the credit level is valid only for the current connection request.
  • the administrator presets the security control policy in the management node, that is, the combination of the user type, the access device type, and the remote desktop type constitutes at least one typical scenario, and each typical scenario corresponds to a security policy.
  • the user requests to connect to the remote desktop through the access device, the user compares the user type, the access device type, and the remote desktop type carried in the connection request with the typical scenario in the security control policy to determine the connection request.
  • a matching scenario and a security policy corresponding to a matching typical scenario implementing different security control items on the access device and the server according to the determined security policy, and relying on the user's operation authority and the server or
  • the virtual machine allows the security control of the remote access operation authority, and can implement differentiated security control for the connection request in different scenarios, and improve the information security of the virtual desktop infrastructure.
  • the method further includes:
  • the management node sends the determined security policy to the server, where the determined security policy includes collecting at least one of global positioning system data, camera data, and microphone data of the access device;
  • the management node saves the access device data.
  • the access device obtains the access device data according to the determined security policy, specifically:
  • the access device collects the access device data according to the determined security policy requirements
  • the access device sends the access device data to the server.
  • the method further includes:
  • the management node Sending, by the management node, the determined security policy to the server, the determined security policy including at least one of file system redirection, clipboard redirection, and digital watermark, so that the server is based on the Determined security policy:
  • a watermark is added to the image sent by the server to the access device.
  • the method further includes:
  • a watermark is added to the image of the access device.
  • the Global Positioning System (GPS) data, the camera data, and the microphone data of the access device are collected and stored in the management node for the requirements of the security policy matched with the current connection request.
  • collecting and saving access device data can periodically perform security auditing on connection requests in the virtual desktop management system to improve enterprise information security.
  • different security control items are implemented on the access device and the server respectively, thereby solving the problem that the prior art cannot implement differentiated control in different access scenarios, thereby improving Information security for corporate business.
  • a preset score segment is set for each credit level, and the type of the user carried in the connection request is connected.
  • Each type of labeling score in the device type, access network environment type, and remote desktop type such as 5 points when the access device is a mobile device, 10 points when the access device is a personal computer, and a thin client; 5 points, 10 points for special users; 10 points for intranet access; 5 points for external network access; 5 points for ordinary virtual machines; 10 points for special virtual machines, for accessing information types, for this connection
  • the user type, the access device type, the access network environment type, and the remote desktop type carried in the request are scored, the total score of the connection request and the preset score segment are compared, and the score segment matching the current connection request is determined.
  • the security policy corresponding to the score segment the security policy is implemented on the access device and the server, and the foregoing method can also be used to solve the problem that the connection request cannot be distinguished in the prior art.
  • the size of the sequence numbers of the above processes does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiments of the present invention.
  • the implementation process constitutes any limitation.
  • the security control method by presetting a security control policy in the management node, according to the type of the user, the type of the access device, the type of the remote desktop, and the preset carried in each connection request.
  • the security control policy is compared with the prior art, and the security policy corresponding to the current connection request and the security policy corresponding to the typical scenario are determined, and different security policies are implemented on the access device and the server in the connection request. Compared with the problem, it can solve the problem that the security of the connection request cannot be controlled differently in different access scenarios, and the information security of the enterprise is improved.
  • the access device collects access device data such as GPS data, camera data, and microphone data, and can perform security audit on the connection request with lower credit level in the virtual desktop infrastructure, thereby enhancing The protection of enterprise business information security.
  • an embodiment of the present invention provides a method for virtual desktop security control, where the method includes:
  • the access device sends a connection request to the management node, the connection request is used by the access device to establish a connection with the server, so that the management node determines a security policy of the connection request, and the determined security policy Sent to the server;
  • the determined security policy includes collecting at least one of global positioning system data, camera data, and microphone data;
  • the access device collects access device data according to the requirements of the security policy of the connection request
  • the access device sends the access device data to the server.
  • the camera data or microphone data collected by the access device may be real-time data or data stored in the access device; on the other hand, the camera data or microphone data collected by the access device may be a complete
  • the data may also be part of the complete data, and the invention is not limited.
  • the access device interface may provide corresponding prompt and judgment information, and if the user selects to allow the collection of the access device data, the backhaul is Access device data, and allow the user to continue to complete the operation of logging in to the virtual machine; if the user chooses not to collect the access device data, the connection request is interrupted.
  • the determining the security policy further includes at least one of a file system redirection, a clipboard redirection, and a digital watermark.
  • the access device is based on the security policy of the connection request:
  • a watermark is added to the image of the access device.
  • the access device may collect access device data such as GPS data, camera data, and microphone data in the access device based on the requirements of the security policy determined by the management node, and may obtain a credit level in the virtual desktop infrastructure. Low connectivity requests for security audits to improve information security for business operations.
  • an embodiment of the present invention provides a method for virtual desktop security control, where the method includes:
  • a security policy sent by the management node receives, by the server, a security policy sent by the management node, where the security policy includes at least one of global positioning system data, camera data, and microphone data;
  • the server sends the access device to the management node, so that the management node saves the access device data.
  • the security policy further includes: at least one of file system redirection, clipboard redirection, and digital watermark,
  • the server is based on the security policy:
  • a watermark is added to the image sent by the server to the access device.
  • the server may implement different security control items based on the security policy determined by the management node, and send the security policy to the access device, and send the access device data returned by the access device to the management.
  • the node saves the access device data by the management node.
  • the virtual desktop management system can implement different security policies according to the access information of the access device, and store the access device returned by the access device. The data facilitates subsequent security audits of connection requests with lower credit ratings and improves information security of enterprise services.
  • the present invention provides a virtual desktop management system, where the virtual desktop management system includes: a server, a management node, and an access device:
  • the management node is configured to: preset a security control policy, where the security control policy includes at least one typical scenario and a security policy corresponding to each of the at least one typical scenario, where each of the at least one typical scenario is a user type a combination of an access device type and a remote desktop type, each of the security policies including at least one security control item;
  • the management node is further configured to: acquire a user type, an access device type, and a remote desktop type carried by the connection request sent by the access device; and use the user type and the access device type carried by the connection request, Comparing the remote desktop type with the at least one typical scenario in the security control policy, determining a typical scenario that matches the connection request, and a security policy corresponding to the matched typical scenario; according to the determined security policy Sending indication information to the access device, where the indication information is used to indicate that the access device establishes a connection with the server;
  • the access device is configured to send a connection request to the management node, where the connection request is used by the access device to establish a connection with a server, and is further configured to: receive the indication information sent by the management node, The indication information is used to indicate that the access device establishes a connection with the server.
  • the server is configured to establish a connection with the access device according to the indication information.
  • the method further includes:
  • the management node is further configured to send the determined security policy to the server, where the security policy of the connection request includes collecting at least one of global positioning system data, camera data, and microphone data; receiving the server to send Access device data, the access device data is obtained by the server to notify the access device according to the determined security policy; and the access device data is saved;
  • the server is further configured to receive the determined security policy sent by the management node, send the determined security policy to the virtual machine, and send the access device data to the management node;
  • the access device is further configured to receive the determined security policy sent by the server, collect the access device data according to the determined security policy requirement, and send the access device data to the server.
  • the management node can compare with the typical scenario in the security control policy according to the user type, the access device type, and the remote desktop type. And determining a typical scenario that matches the current connection request and a security policy corresponding to the matched typical scenario, and implementing a connection request for different scenarios compared with the security of the connection request controlled by the user or the virtual machine operation authority in the prior art.
  • Differentiate control to enhance the information security protection of the enterprise on the other hand, according to the requirements of the security policy, the access device data such as GPS data, camera data, microphone data, etc. can be collected in the access device, which can be used in the virtual desktop infrastructure.
  • a connection request with a lower credit rating performs a security audit to improve the information security of the enterprise business.
  • the present invention provides a management node, where the management node includes a processor, a memory, a communication interface, and a system bus, and the processor, the memory, and the communication interface are connected through a system bus and complete communication with each other.
  • the memory is used to store computer execution instructions, and when the virtual desktop management system is running, the Executing a computer-executable instruction in the memory to perform a first aspect, a first possible implementation of the first aspect, and any of the third possible implementation of the first aspect with hardware resources in the virtual desktop management system One of the methods described.
  • the management node can according to the user type, the access device type, the access network environment type, and the remote type carried in the connection request.
  • the desktop type is matched with the preset security control policy to determine the security policy of the connection request.
  • the access device collects the access device data such as GPS data, camera data, and microphone data, and can perform security audit on the connection request with lower credit level in the virtual desktop infrastructure. Improve information security for business operations.
  • the present invention provides an access device, where the access device includes a processor, a memory, a communication interface, and a system bus, and the processor, the memory, and the communication interface are connected through a system bus and complete each other.
  • Communication in the memory for storing computer execution instructions, when the virtual desktop management system is running, the processor executes computer execution instructions in the memory to perform second with hardware resources in the virtual desktop management system.
  • the access device may determine the security policy requirements based on the management node, collect access device data such as GPS data, camera data, and microphone data in the access device, and transmit the data to the management node for saving, and the existing technology.
  • the access device data such as GPS data, camera data, and microphone data in the access device
  • the connection request in the virtual desktop infrastructure can be periodically audited, thereby improving the information security of the enterprise service.
  • the present invention provides a server, where the server includes a processor, a memory, a communication interface, and a system bus, and the processor, the memory, and the communication interface are connected through a system bus and complete communication with each other.
  • a memory for storing computer execution instructions wherein the virtual desktop management system executes, the processor executes computer execution instructions in the memory to perform third aspect and third with hardware resources in the virtual desktop management system.
  • the server may implement different security control items based on the security policy determined by the management node, and send the security policy to the access device, and send the access device data returned by the access device to the management node, where the management node saves the connection.
  • the virtual desktop management system can implement different security policies according to the access information of the access device, and store the access device data returned by the access device, so that the subsequent credit level is lower.
  • the connection request performs a security audit to improve the information security of the enterprise business.
  • a computer readable medium for storing a computer program, the computer program comprising instructions for performing the method of the first aspect or any of the possible implementations of the first aspect.
  • the management node can access the user type, access device type, and access carried in the connection request.
  • the network environment type and the remote desktop type are matched with the preset security control policies to determine the security policy of the connection request.
  • the connection request for different scenarios is differentiated and the information of the enterprise is enhanced.
  • Security protection on the other hand, according to the requirements of the security policy, collecting access data such as GPS data, camera data, and microphone data in the access device can secure the connection request with lower credit level in the virtual desktop infrastructure. Audit, in order to improve the information security of business operations.
  • FIG. 1 is a schematic diagram of a virtual desktop infrastructure in the prior art
  • FIG. 2 is a schematic flowchart of a method for virtual desktop security control according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart diagram of another virtual desktop security control method according to an embodiment of the present disclosure.
  • FIG. 4 is a schematic diagram of a virtual desktop management system according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a management node according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of an access device according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic diagram of a virtual machine according to an embodiment of the present invention.
  • VDI virtual desktop infrastructure
  • the virtual desktop infrastructure includes a virtual desktop management system, an access gateway, an access device, and a server, where the access device includes a personal computer.
  • PC Personal Computer
  • TC Thin Client
  • the virtual desktop management system is used to implement management and control functions of remote desktop access.
  • the virtual desktop management system may include a management node, a domain server, a log server, a network access server, a license authentication server, and other types of management components.
  • Each management component in the management system may be deployed by a server or a virtual machine.
  • the present invention is not limited.
  • the remote desktop can be the operating system installed on the server or the operating system of the virtual machine formed by the virtualization software on the server.
  • the remote desktop can be divided into multiple types according to its attributes. For example, it can be divided into an office-type remote desktop and a conference-type remote desktop for connecting to the conference according to the role of the remote desktop; or according to the data center where the remote desktop is located.
  • Network planning divided into ordinary remote desktops and special remote desktops; can also be divided into secure remote desktops and ordinary remote desktops according to whether the operating system performs encryption processing.
  • the administrator can assign the server or virtual machine to the user in the virtual desktop management system in advance, and record the distribution relationship.
  • the virtual desktop management system will be on the webpage.
  • the interface displays all the information about the server or virtual machine that has been assigned to the user.
  • the user can select any server or virtual machine to access.
  • the user can be divided into ordinary users and special users according to different rights.
  • the virtual desktop management system allocates a common virtual machine and a special virtual machine to the common user A, and assigns a special virtual machine to the special user B, and the user A uses the account and password to provide the network access server.
  • the web interface is logged in, all the virtual machines that have been assigned to user A are displayed on the web interface, and the user can select any virtual machine to access.
  • the management system sends the security policy to the access device and the virtual space that the user needs to access. After the access device and the virtual machine that the user needs to access to implement the security policy control, the user can log in to the virtual machine for office operations.
  • a virtual desktop agent is deployed in each remote desktop and access device.
  • the virtual desktop agent in the remote desktop is the server, and the virtual desktop agent in the access device is the client.
  • the management system can be docked through the desktop agent.
  • the device and the remote desktop are managed and monitored. Between the remote desktop and the access device, the virtual desktop protocol can also be processed through the desktop agent.
  • the user can use the access device to communicate with the virtual desktop management system and the remote desktop via the access gateway through the access gateway to implement the virtual desktop remote access function.
  • different access network environment types can be distinguished according to the access gateway. For example, the network type of the virtual desktop is divided into an internal network and an external network according to the security of the local area network.
  • the security control policy may be preset according to the user type, the access device type, and the remote desktop type, where the security control policy includes a credit level, a security policy, and a typical scenario.
  • the administrator can determine the typical scenario according to the user type, access device type, and remote desktop type. Each typical scenario corresponds to a security policy, and each security policy corresponds to a credit level.
  • the security control policy may also be preset according to the user type, the access device type, the remote desktop type, and the access network environment type.
  • Table 1 is a specific content of one embodiment of a security control policy.
  • the administrator presets the security control policy in the management node according to the user type, access network environment type, access device type, and remote desktop type. If the user type is assumed to include ordinary users and special users, the access network The environment includes intranet and extranet; access devices include mobile devices, personal computers, and thin clients; remote desktops are virtual machines, and types of remote desktops include ordinary virtual machines and special virtual machines; examples of typical scenarios are shown in Table 1. Show:
  • Typical scenario 1 A special user accesses a special virtual machine on the external network by using a mobile device.
  • the typical scenario qualification conditions include user type, access network environment, access device, and remote desktop type.
  • the connection request for the typical scenario is implemented.
  • Corresponding security policy which means that users are not allowed to access remote desktops, and the credit level is the lowest.
  • Typical scenario 2 A special user accesses a common virtual machine on the external network by using a mobile device.
  • the typical scenario qualifications include the user type, the access network environment, the access device, and the remote desktop type.
  • the connection request for the typical scenario is implemented. Its corresponding security policy has a very low credit rating.
  • Typical scenario 3 Using a mobile device to access a virtual machine on the external network, the user type and the remote desktop type are not limited.
  • the typical scenario includes: the ordinary user uses the mobile device to access the ordinary virtual machine on the external network, and the ordinary user uses the mobile device.
  • the network access special virtual machine
  • the special user uses the mobile device to access the ordinary virtual machine on the external network
  • the special user uses the mobile device to access the special virtual machine on the external network, wherein the special user uses the mobile device to access the special virtual machine on the external network as the credit level.
  • the special user uses the mobile device to access the common virtual machine on the external network.
  • the typical scenario is very low. In addition to the above two scenarios, you need to use the mobile device to access the common virtual machine on the external network.
  • a common user uses a mobile device to connect to a special virtual machine in a typical virtual machine to perform a security policy corresponding to its typical scenario.
  • the credit level is low.
  • Typical scenario 4 Using a thin client to access a special virtual machine on the external network, without limiting the user type, the typical scenario includes: the ordinary user uses the thin client to access the special virtual machine on the external network and the special user thin client is connected to the external network.
  • the security policy is implemented in the connection request of the typical scenario, and the authorization level is medium.
  • Typical scenario 5 Using a personal computer to access a virtual machine on the internal network, the user type and the virtual machine type are not limited.
  • the typical scenario includes: ordinary users use a personal computer to access an ordinary virtual machine on the intranet, and a common user uses a personal computer.
  • special users use personal computers to access ordinary virtual machines on the intranet, special users use personal computers to access special virtual machines on the intranet, and the above typical scenarios are not typical with other security control strategies. If the scenarios overlap, the corresponding security policy is implemented for the connection request of the above typical scenario, and the credit level is high.
  • Typical scenario 6 Using a thin client to access a virtual machine on the internal network, without limiting the user type and virtual machine type, the typical scenario includes: ordinary users use thin clients to access ordinary virtual machines and ordinary users on the intranet. Thin The client accesses the special virtual machine on the internal network, the special user uses the thin client to access the ordinary virtual machine on the internal network, and the special user uses the thin client to access the special virtual machine on the internal network, and the above typical scenarios are not related to the security control strategy. If other typical scenarios are repeated, the corresponding security policy is implemented for the connection request of the above typical scenario, and the credit level is extremely high.
  • each typical scenario in Table 1 can be a combination of user type, access device type, access network environment type, and remote desktop type.
  • Each typical scenario corresponds to a security policy, and each security policy includes at least one security. Control item.
  • the typical scenario listed in Table 1 is only an example.
  • a corresponding typical scenario may be established according to the information security requirements of a specific service scenario, and the present invention is not limited.
  • a detailed description will be made by taking the security control policy shown in Table 1 as an example.
  • the predefined minimum, very low, low, medium, high, and extremely high credit levels are six, and the lower the credit level, the more security controls are implemented for the access device and server of the connection request.
  • the security control item identifier in the security policy is ON, indicating that the access device or server that requests the connection needs to perform the function of the corresponding security control item; if the security control item identifier is off, it indicates the access device of the current connection request. Or the server does not need to perform the function of the corresponding security control item.
  • security control items may be included in the security policy:
  • the access device transmits its GPS positioning data back to the management node.
  • GPS Global Positioning System
  • the access device collects the camera data and transmits it back to the management node.
  • the microphone data is returned: the access device collects the microphone data and transmits it back to the management node.
  • Digital Watermark Add a digital watermark to the image.
  • Clipboard redirection used to transfer the data of the clipboard in the access device to the server or transfer the data of the clipboard in the server to the access device, so that the data can be mutually accessed between the access device and the server. copy.
  • File redirection It is used to map the file system of the access device to the server or to map the file system of the server to the access device, so that the mapped file system can be read and written between the access device and the server.
  • the security control strategy shown in Table 1 is merely an example and does not constitute a limitation of the present invention.
  • the clipboard redirection and file redirection functions can be controlled by one-way policy, and different control methods can be adopted, that is, between the access device and the server, one direction is opened and the other direction is closed.
  • the server passes the contents of the clipboard to the access device, and the content of the access device is not passed to the server.
  • different credit levels and security policies may be adopted according to whether the user storage read/write permission or the unlocking administrator authority in the IOS operating system has been cracked.
  • different policies may be set according to specific information security requirements, and the present invention is not limited.
  • security control policy preset by the administrator may be stored in a file or database table preset in the management node, or may be stored in other storage forms, which is not limited by the present invention.
  • the administrator can add or update the credit level, security policy, and typical scenario according to the service requirement, so as to adapt to the change of the information security requirements of the enterprise. It should be noted that the updated security control policy only takes effect on the updated new connection request.
  • FIG. 2 details the virtual machine desktop security control method provided by the present invention, and the method includes:
  • each of the security policies including at least one security a control item, wherein each of the security policies includes at least one security control item.
  • the security control policy may further include a credit level.
  • the credit level is used to identify a security control level of the current connection request, and each of the at least one typical scenario corresponds to one of the credit levels.
  • the management node may preset the security policy to preset the security policy according to the type of the access network environment.
  • the administrator can preset typical scenarios, security policies, and credit levels in the security control policy shown in Table 1 in the management node.
  • the management node receives a connection request sent by an access device.
  • connection request is used by the access device to establish a connection with a server.
  • the management node acquires a user type, an access device type, and a remote desktop type carried by the connection request.
  • the management node may further acquire an access network environment type carried by the connection request.
  • the access message of the virtual desktop management system to obtain the connection request includes the special user, the mobile device, the external network, and the common virtual machine.
  • the management node compares the user type, the access device type, and the remote desktop type carried in the connection request acquired in step S202 with a typical scenario in the security control policy, if one of the typical scenarios is If the matching is performed, the security policy that is required to be implemented in the current connection request is the matching security policy.
  • the credit level is the matching level corresponding to the typical scenario.
  • the security control policy shown in Table 1 if a special user uses a mobile device to send a connection request for accessing a normal virtual machine on the external network, compared with the typical scenario of each credit level in Table 1, the credit level is extremely low.
  • the typical scenarios are matched, that is, the typical scenario in which the special user uses the mobile device to access the ordinary virtual machine on the external network matches, and the security policy corresponding to the matching typical scenario is determined as the security policy of the connection request, and the credit level thereof. Very low.
  • the security policy corresponding to the typical scenario is the security policy of the connection request, and the credit level is low.
  • connection request carries the user type, the access device type, the access network environment type, and the remote desktop type and the preset security control policy, if there is no matching typical scenario, the preset default security may be implemented.
  • the management node can preset the default security policy to the security policy corresponding to the typical scenario of using a thin client to access a special virtual machine on the external network.
  • the default credit level is medium, if the ordinary user uses the mobile device.
  • the management node compares the user type, the access device type, the access network environment type, the remote desktop type, and the typical scenarios listed in Table 1 in the connection request. If a match is made, the access device and the server of the connection request are implemented with a predefined default security policy, that is, the security policy corresponding to the typical scenario "Using the thin client to access the special virtual machine on the external network" is implemented. For the middle.
  • a virtual desktop is a type of remote desktop. After a user and a virtual machine are allocated in a virtual desktop management system, the user can access the access type through any type of access device.
  • the network environment sends a request to connect to the virtual machine to the virtual desktop management system, and the credit level is valid only for the current connection request.
  • the management node determines that the current scenario of the connection request is a security policy corresponding to the use of the mobile device to access the virtual machine on the external network, and the credit level is low.
  • the management node determines that the current scenario of the connection request is a security policy corresponding to the use of the thin client to access the virtual machine on the intranet.
  • the credit rating is high.
  • the management node sends the indication information to the access device according to the security policy, where the indication information is used to indicate that the access device establishes a connection with the server.
  • the management node when the security policy allows the access device to establish a connection with the virtual machine, the management node sends indication information to the access device, where the indication information is used to indicate the access device and The virtual machine establishes a connection. If the security policy determined by the management node according to the access information and the security control policy does not allow the access device to establish a connection with the server, the connection request ends.
  • the management node determines that the security policy of the connection request is to restrict access. , the special user shown is not allowed to connect to the ordinary virtual machine, and the connection request is ended.
  • the access device establishes a connection with the server.
  • a communication connection is established between the desktop agent of the access device and the desktop agent of the server.
  • connection established by the access device with the server is only a communication connection between the desktop agents, and is used for transmitting instructions between the management node and the desktop agent. After the virtual machine and the access device need to implement the corresponding security policy, the user can log in to the operating system of the remote desktop.
  • the administrator presets the security control policy in the management node, that is, according to the combination of the user type, the access device type, and the remote desktop type, at least one typical scenario is formed, and each typical scenario corresponds to one.
  • a security policy is used to compare the user type, the access device type, and the remote desktop type carried in the connection request with the typical scenario in the security control policy when the user establishes a connection with the remote desktop through the access device.
  • a typical scenario that matches the current connection request and a security policy corresponding to the matched typical scenario implement different security control items on the access device and the server according to the determined security policy, and rely on the user in the prior art.
  • the operation authority and the security control of the operation permission of the server or the virtual machine to allow remote access can differentiate the security of the connection request in different scenarios and improve the information security of the virtual desktop infrastructure.
  • the specific implementation process of the determined security policy is as shown in FIG. 3, and the method includes:
  • the management node sends the determined security policy to a server.
  • the determined security policy is a security policy determined by the method in FIG. 2.
  • the management node sends the following security policy to the server:
  • the server sends the determined security policy to an access device.
  • the server and the access device communicate through a desktop agent, and the desktop agent in the server sends the determined security policy in step S301 to a desktop agent in the access device.
  • the access device collects access device data according to the determined security policy requirement.
  • the determined security policy includes collecting at least one of GPS data, camera data, and microphone data, and the access device collects access device data according to the requirements in the determined security policy.
  • different security policies can be configured in the preset security control policy as shown in Table 1 according to the requirements of the specific service scenario, and whether the access device data needs to be returned.
  • the GPS module in the access device collects the GPS address information of the access device and sends it to the server through the desktop proxy;
  • the camera and/or microphone module in the access device is used to collect the camera image and/or microphone sound of the access device and send it to the desktop agent in the virtual machine.
  • the access device data may further include an access device MAC address.
  • the camera data or microphone data collected by the access device may be real-time data or data stored in the access device; on the other hand, the camera data or microphone data collected by the access device may be a complete
  • the data may also be part of the complete data, and the invention is not limited.
  • the access device interface may provide corresponding prompt and judgment information, and if the user selects to allow the collection of the access device data, the backhaul is Access device data, and allow the user to continue to complete the operation of logging in to the virtual machine; if the user chooses not to collect the access device data, the connection request is interrupted.
  • the access device sends the access device data to the server.
  • the server sends the access device data to the management node.
  • the management node saves the access device data.
  • the management node saves the access device data returned by the access device, and records the access device data of the connection request of the access device for periodic security auditing of the system.
  • the access device implements the determined security policy.
  • the access device turns on or off the corresponding function on the access device according to the determined security policy requirement, that is, whether the access device client file system is mapped to the server, whether to connect The content of the incoming device clipboard is passed to the server, and whether a watermark is added to the image of the access device.
  • the access device if the access device carries the connection type, the user type, the access device type, the access network type, and the typical scenario, the special user uses the mobile device to access the common virtual network on the external network.
  • the machine is matched, and the credit level is extremely low, based on the requirements of the security policy corresponding to the matching typical scenario: the access device needs to add a watermark to the image of the access device, and the access device client file does not need to be
  • the system maps to the server, and does not need to pass the contents of the access device clipboard to the server; if the access device carries the connection request
  • the type of the user, the access device type, and the access network type are matched with the typical scenario "Using a personal computer to access the virtual machine on the intranet", based on the requirements of the matching security policy corresponding to the typical scenario: the access device needs Passing the contents of the clipboard to the server does not require adding a watermark to the image of the access device, and does not need to map the file system to the server
  • the server implements the determined security policy.
  • the server turns on or off the corresponding function on the server according to the determined security policy requirement, that is, whether to map the file system to the access device, whether to deliver the content of the server clipboard to the access device, and whether the device is transmitting Add a watermark to the image of the server accessing the device.
  • the server is based on the typical scenario of the matching.
  • the connection request of the access device is determined to match the typical scenario of using the personal computer to access the virtual machine on the intranet, the server needs to map the file system to the access device based on the security policy corresponding to the matching typical scenario. There is no need to pass the content in the clipboard to the access device, nor to add a watermark to the picture of the server passed to the access device.
  • the GPS data, the camera data, and the microphone data of the access device are collected and stored in the management node for the requirements of the security policy matched with the current connection request, and compared with the prior art, the acquisition is performed.
  • Saving access device data can periodically perform security audits on connection requests in the virtual desktop management system to improve enterprise information security.
  • different security control items are implemented on the access device and the server respectively, thereby solving the problem that the prior art cannot implement differentiated control in different access scenarios, thereby improving Information security for corporate business.
  • a preset score segment may also be set for each typical scenario, that is, a user type and an access device type.
  • Each combination of the access network environment type and the remote desktop type sets a preset score segment and is specific to each of the user type, the access device type, the access network environment type, and the remote desktop type carried in the connection request.
  • Type labeling scores such as 5 points when the access device is a mobile device, 10 points when the access device is a personal computer or a thin client; 5 points for ordinary users, 10 points for special users; 10 points for intranet access The external network access is marked with 5 points; the ordinary virtual machine is marked with 5 points; the special virtual machine is marked with 10 points.
  • the management node When the management node receives the connection request, it obtains the user type, the access device type, the access network environment type, and the remote desktop type carried in the connection request, and scores the score, and compares the total score of the connection request with each a preset score segment corresponding to a typical scenario, determining a score segment matching the current connection request and a security policy corresponding to the score segment, and implementing the security policy on the access device and the server, by using the above method,
  • the invention solves the problem that the prior art cannot distinguish different connection requests for differentiated security control, and improves the information security of the enterprise.
  • the size of the sequence numbers of the above processes does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiments of the present invention.
  • the implementation process constitutes any limitation.
  • the security control method provided by the embodiment of the present invention, by presetting a security control policy in the management node, according to the type of the user, the type of the access device, the type of the remote desktop, and the preset carried in each connection request.
  • the security control policy is compared to determine the typical scenario that matches the current connection request and the security corresponding to the typical scenario.
  • the policy implements different security policies for the access device and the server in the connection request, and solves the problem that the security of the connection request cannot be controlled differently in different access scenarios, and the problem is improved. Enterprise information security.
  • the access device data in the connection request is archived and saved, which facilitates security auditing and enhances the security protection of remote desktop access.
  • FIG. 4 is a schematic diagram of a virtual desktop management system 400 according to an embodiment of the present invention.
  • the virtual desktop management system includes: a management node 401, a server 402, and an access device 403, and the method includes:
  • the management node 401 is configured to preset a security control policy, where the security control policy includes at least one typical scenario and a security policy corresponding to each of the at least one typical scenario, where each of the at least one typical scenario is a user. a combination of a type, an access device type, and a remote desktop type, each of the security policies including at least one security control item;
  • the management node 401 is further configured to: acquire a user type, an access device type, and a remote desktop type carried by the connection request sent by the access device; and use the user type and the access device type carried by the connection request. Comparing the remote desktop type with the at least one typical scenario in the security control policy, determining a typical scenario that matches the connection request, and a security policy corresponding to the matched typical scenario; The policy sends the indication information to the access device, where the indication information is used to indicate that the access device establishes a connection with the server;
  • the access device 403 is configured to send a connection request to the management node, where the connection request is used by the access device to establish a connection with a server;
  • the access device 403 is further configured to: receive the indication information that is sent by the management node, where the indication information is used to indicate that the access device establishes a connection with the server.
  • the server 402 is configured to establish a connection with the access device according to the indication information.
  • the management node 401 is further configured to: send the determined security policy to the server, where the security policy of the connection request includes collecting at least one of global positioning system data, camera data, and microphone data. Receiving access device data sent by the server, the access device data is obtained by the server notifying the access device according to the determined security policy;
  • the server 402 is further configured to receive the determined security policy sent by the management node, send the determined security policy to the virtual machine, and send the access device data to the management node;
  • the access device 403 is further configured to receive the determined security policy sent by the server, collect the access device data according to the determined security policy requirement, and send the access device data to the Said server.
  • virtual desktop management system 400 is used to perform the method as described in any of FIG. 2 to FIG. 3, and details are not described herein again.
  • the virtual desktop management system 400 can compare the user type, the access device type, the remote desktop type, and the security control policy. Determining a typical scenario that matches the current connection request and a security policy corresponding to the matched typical scenario, and implementing a connection request for different scenarios compared with the security of the connection request controlled by the user or the virtual machine operation authority only in the prior art. Differentiated control enhances the information security protection of the enterprise; on the other hand, according to the requirements of the security policy, the access device collects GPS device data, camera data, microphone data, MAC address and other access device data, which can be used for the virtual desktop basis.
  • the connection request with lower credit level in the architecture is security audited, so as to improve the information security of the enterprise business.
  • FIG. 5 is a schematic diagram of a management node 500 according to the present invention.
  • the management node 500 includes a processor 501, a memory 502, a communication interface 503, a system bus 504, the processor 501, a memory 502, and The communication interfaces 503 are connected and communicate with each other through a system bus 504 for storing computer execution instructions.
  • the processor 501 executes the memory 502.
  • the computer executes instructions to perform any of the methods described in Figures 2 through 3 using hardware resources in the virtual desktop management system.
  • the processor 501 may be a CPU, and the processor 501 may also be other general-purpose processors, digital signal processors (DSPs), application specific integrated circuits (ASICs), and off-the-shelf programmable gate arrays. (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 502 can include read only memory and random access memory and provides instructions and data to the processor 510.
  • a portion of the memory 502 can also include a non-volatile random access memory.
  • the memory 502 can also store information of the device type.
  • the system bus 504 may include a power bus, a control bus, a status signal bus, and the like in addition to the data bus. However, for clarity of description, various buses are labeled as system bus 504 in the figure.
  • the management node 500 can preset and according to the user type, access device type, and remote desktop type carried in the connection request.
  • the security control policy is matched to determine the security policy of the connection request.
  • the connection request for different scenarios is differentiated and controlled, and the information security protection of the enterprise is enhanced; on the other hand, according to security
  • the requirements of the policy are to collect access data of GPS data, camera data, microphone data, MAC address, etc. in the access device, and perform security audit on the connection request with lower credit level in the virtual desktop infrastructure, thereby improving the enterprise. Business information security.
  • FIG. 6 is a schematic diagram of an access device 600.
  • the access device 600 includes a processor 601, a memory 602, a communication interface 603, a system bus 604, the processor 601, a memory 602, and a communication interface.
  • 603 is connected and communicates with each other through a system bus 604 for storing computer execution instructions.
  • the processor 601 executes computer execution in the memory 602. Instructions to make:
  • connection request is used by the access device to establish a connection with the server, so that the management node determines a security policy of the connection request, and sends the security policy of the request to the The server;
  • the processor 601 may be a CPU, and the processor 601 may also be other general-purpose processors, digital signal processors (DSPs), application specific integrated circuits (ASICs), and off-the-shelf programmable gate arrays. (FPGA) Or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, and the like.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 602 can include read only memory and random access memory and provides instructions and data to the processor 510. A portion of the memory 602 may also include a non-volatile random access memory. For example, the memory 602 can also store information of the device type.
  • the system bus 604 can include a power bus, a control bus, a status signal bus, and the like in addition to the data bus. However, for clarity of description, various buses are labeled as system bus 604 in the figure.
  • the security policy of the connection request further includes at least one of file system redirection, clipboard redirection, and digital watermark.
  • the access device is based on the security policy of the connection request:
  • a watermark is added to the image of the access device.
  • the access device 600 may determine, according to the requirement of the security policy, the access device 600 collects access device data such as GPS data, camera data, microphone data, and MAC address, and returns the data to the management node for saving.
  • access device data such as GPS data, camera data, microphone data, and MAC address
  • the server 700 includes a processor 701, a memory 702, a communication interface 703, and a system bus 704.
  • the processor 701, the memory 702, and the communication interface 703 pass through
  • the system bus 704 is connected to and completes communication with each other.
  • the memory 702 is configured to store computer execution instructions.
  • the processor 701 executes computer execution instructions in the memory 702 to enable :
  • the processor 701 may be a CPU, and the processor 701 may also be other general-purpose processors, digital signal processors (DSPs), application specific integrated circuits (ASICs), and off-the-shelf programmable gate arrays. (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 702 can include read only memory and random access memory and provides instructions and data to the processor 510. A portion of the memory 702 can also include a non-volatile random access memory. For example, the memory 702 can also store information of the device type.
  • the system bus 704 can include a power bus, a control bus, a status signal bus, and the like in addition to the data bus. However, for clarity of description, various buses are labeled as system bus 704 in the figure.
  • the security policy further includes: at least one of file system redirection, clipboard redirection, and digital watermark,
  • the server is based on the security policy:
  • a watermark is added to the image sent by the server to the access device.
  • the server 700 may implement different security control items based on the security policy determined by the management node, and send the security policy to the access device, and send the access device data returned by the access device to the management node.
  • the access node saves the access device data.
  • the management node may perform a connection request for different scenarios according to the security policy determined by the user type, the access device type, and the remote desktop type carried in the connection request. Implement differentiated controls to improve information security for business operations.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present invention which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Abstract

本发明提供一种虚拟桌面安全控制的方法,在管理节点中预置安全控制策略,安全控制策略包括至少一个典型场景及与每个典型场景所对应的安全策略,每个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个安全策略包括至少一个安全控制项;所述方法包括:接收接入设备发送的连接请求,连接请求用于接入设备请求与服务器建立连接;获取连接请求所携带的用户类型、接入设备类型、远程桌面类型,并与安全控制策略中典型场景进行比较,确定与连接请求匹配的典型场景以及与匹配的典型场景对应的安全策略;根据确定的安全策略向接入设备发送指示信息,指示信息用于指示接入设备与服务器建立连接,以此提高企业业务的信息安全。

Description

一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统 技术领域
本发明涉及安全领域,尤其涉及一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统。
背景技术
随着远程桌面和虚拟化技术的发展,越来越多的企业选择使用虚拟桌面进行日常办公,以此提高企业办公资源的管理效率。
现有技术中,虚拟桌面基础架构(Virtual Desktop Infrastructure,VDI)中主要包括虚拟桌面管理系统、服务器和接入设备。虚拟桌面管理系统用于实现虚拟桌面远程访问的管理和控制功能,服务器中部署虚拟化软件形成至少一个虚拟机,管理员可以在虚拟桌面管理系统中预先将服务器或虚拟机分配给用户,每个用户可以配置不同的权限,管理系统可以将多个已分配的服务器或虚拟机组成桌面组,通过桌面组控制桌面组中服务器或虚拟机的远程访问的操作权限,如在远程连接过程中是否允许服务器或虚拟机使用通用串行总线(Universal Serial Bus)闪存寄存器等外置设备。由此,用户远程访问服务器或虚拟机时,安全控制策略的实施依赖于用户的操作权限,以及服务器或虚拟机允许远程访问的操作权限。但是,对于虚拟桌面应用场景的不断扩大,仅通过用户、以及该用户已分配的服务器或虚拟机之间的权限控制关系已经无法满足在差异化接入场景下,对接入安全进行差异化控制的目的,企业业务的信息安全无法达到有效保障。
发明内容
本发明实施例提供了一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统,可以在管理节点中预置安全控制策略,管理节点根据每次连接请求所携带的用户类型、接入设备类型和远程桌面类型与安全控制策略进行比较,确定与本次连接请求匹配的典型场景及与该匹配的典型场景对应的安全策略,以此对不同连接请求实施差异化控制,提高企业业务的信息安全。
为了达到上述目的,本发明采用如下技术方案:
第一方面,提供一种虚拟桌面安全控制的方法,其特征在于,在管理节点中预置安全控制策略,所述安全控制策略包括至少一个典型场景及与每个所述至少一个典型场景所对应的安全策略,每个所述至少一个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个所述安全策略包括至少一个安全控制项;所述方法包括:
所述管理节点接收接入设备发送的连接请求,所述连接请求用于所述接入设备请求与服务器建立连接;
所述管理节点获取所述连接请求所携带的用户类型、接入设备类型、远程桌面类型;
所述管理节点将所述连接请求所携带的用户类型、接入设备类型、远程桌面类型与所述安全控制策略中的所述至少一个典型场景进行比较,确定与所述连接请求匹配的典型场景以及与所述匹配的典型场景对应的安全策略;
所述管理节点根据所述确定的安全策略向所述接入设备发送指示信息,所述指示信 息用于指示所述接入设备与所述服务器建立连接。
具体地,管理员还可以通过管理节点在虚拟桌面管理系统中预置安全控制策略。具体地,可以根据用户类型、接入设备类型和远程桌面类型预置安全控制策略,其中,安全控制策略中包括授信级别、安全策略和典型场景。管理员可以根据具体实施过程中业务场景的需求,根据用户类型、接入设备类型和远程桌面类型确定典型场景,每个典型场景对应一种安全策略,每个安全策略又对应一个授信级别。
可选地,还可以根据用户类型、接入设备类型、远程桌面类型和接入网络环境类型预置安全控制策略。
值得说明的是,管理员预置的安全控制策略可以保存在管理节点中预置定义的文件或数据库表中,也可以以其他存储形式存储,本发明不作限制。
可选地,管理员在管理节点预置安全控制策略后,可以根据业务需求添加或更新授信级别、安全策略和典型场景,以此适应企业对信息安全要求的变化。需要说明的是,更新后的安全控制策略仅对更新后的新的连接请求生效。
可选地,若将连接请求中携带用户类型、接入设备类型、接入网络环境类型和远程桌面类型与预置安全控制策略比较后,无匹配的典型场景,则可以实施预置默认的安全策略。
本领域技术人员应理解的是,虚拟桌面为远程桌面的一种,虚拟桌面管理系统中建立用户和虚拟机的分配关系后,用户可以通过任一种接入设备通过任一种类型的接入网络环境向虚拟桌面管理系统发送连接虚拟机的请求,授信级别仅对本次连接请求生效。
通过上述描述内容可知,管理员在管理节点中预置安全控制策略,即按照用户类型、接入设备类型和远程桌面类型的组合构成至少一个典型场景,每种典型场景对应一种安全策略,当用户通过接入设备请求与远程桌面建立连接时,根据本次连接请求中所携带的用户类型、接入设备类型和远程桌面类型与安全控制策略中的典型场景进行比较,确定与本次连接请求相匹配的典型场景及与匹配的典型场景所对应的安全策略,按照确定的安全策略的要求对接入设备和服务器实施不同的安全控制项,与现有技术中依赖用户的操作权限以及服务器或虚拟机允许远程访问的操作权限的安全控制,能够对不同场景下连接请求进行差异化安全控制,提升虚拟桌面基础架构的信息安全。
结合第一方面的可能实现方式,在第一方面的第一种可能方式中,所述方法还包括:
所述管理节点向所述服务器发送所述确定的安全策略,所述确定的安全策略包括采集所述接入设备的全球定位系统数据、摄像头数据、麦克风数据中的至少一种;
所述管理节点接收所述服务器发送的接入设备数据,所述接入设备数据为所述服务器通知所述接入设备按照所述确定的安全策略获得;
所述管理节点保存所述接入设备数据。
结合第一方面的第一种可能实现方式,在第一方面的第二种可能实现方式中,所述接入设备按照所述确定的安全策略获得所述接入设备数据具体为:
所述接入设备接收所述服务器发送的所述确定的安全策略;
所述接入设备按照所述确定的安全策略的要求采集所述接入设备数据;
所述接入设备向所述服务器发送所述接入设备数据。
结合第一方面的可能实现方式,在第一方面的第三种可能实现方式中,所述方法还包括:
所述管理节点向所述服务器发送所述确定的安全策略,所述确定的安全策略包括文件系统重定向、剪切板重定向、数字水印中的至少一项,以使得所述服务器基于所述确定的安全策略:
将所述服务器的文件系统映射给所述接入设备;或
将所述服务器的剪切板内容传递给所述接入设备;或
在所述服务器发送给所述接入设备的图像中添加水印。
结合第一方面的第三种可能实现方式,在第一方面的第四种可能实现方式中,所述方法还包括:
所述服务器向所述接入设备发送所述确定的安全策略,以使得所述接入设备基于所述确定的安全策略:
将所述接入设备的文件系统映射给所述服务器;或
将所述接入设备剪切板内容传递给所述服务器;或
在所述接入设备的图像中添加水印。
通过上述内容的描述,针对与本次连接请求相匹配的安全策略的要求,采集接入设备的全球定位系统(Global Positioning System,GPS)数据、摄像头数据、麦克风数据,并保存在管理节点中,与现有技术相比,采集并保存接入设备数据可以周期性对虚拟桌面管理系统中的连接请求进行安全审计,提高企业信息安全。另一方面,针对每次连接请求,对接入设备和服务器分别实施不同的安全控制项,以此解决了现有技术中无法在不同接入场景下实现差异化控制的问题,由此,提高了企业业务的信息安全。
可选地,在本发明的另一种可能的实施例中,在预置的安全控制策略中,对每种授信级别设定预置的分数段,针对连接请求中所携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型中每种类型标注分数,如接入设备为移动设备时标注5分,接入设备为个人计算机、瘦客户机时标注10分;普通用户标注5分,特殊用户标注10分;内网接入标注10分;外网接入标注5分;普通虚拟机标注5分;特殊虚拟机标注10分,通过获取接入信息类型,对本次连接请求所携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型进行打分,比较本次连接请求的总分和预置的分数段,确定与本次连接请求相匹配的分数段及与该分数段对应的安全策略,对接入设备和服务器实施该安全策略,利用上述方法,同样可以解决现有技术中无法区分不同连接请求进行差异化安全控制的问题,提高了企业的信息安全。
应理解,在本发明的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。
综上所述,本发明实施例提供的安全控制的方法,通过在管理节点中预置安全控制策略,根据每次连接请求中所携带的用户类型、接入设备类型、远程桌面类型与预置的安全控制策略相比较,确定与本次连接请求相匹配的典型场景及该典型场景对应的安全策略,对本次连接请求中的接入设备和服务器实施不同的安全策略,与现有技术相比,解决了在不同接入场景下无法对连接请求的安全进行差异化控制的问题,提高了企业的信息安全。另外,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,增强了企业业务信息安全的保护力度。
第二方面,本发明实施例提供一种虚拟桌面安全控制的方法,所述方法包括:
接入设备向管理节点发送连接请求,所述连接请求用于所述接入设备请求与服务器建立连接,以使得所述管理节点确定所述连接请求的安全策略,并将所述确定的安全策略发送给所述服务器;
所述接入设备接收所述服务器发送的所述确定的安全策略,所述确定的安全策略包括采集全球定位系统数据、摄像头数据、麦克风数据中的至少一种;
所述接入设备按照所述连接请求的安全策略的要求采集接入设备数据;
所述接入设备将所述接入设备数据发送给所述服务器。
值得说明的是,接入设备采集的摄像头数据或麦克风数据可以是实时数据,也可以是接入设备中已存储的数据;另一方面,接入设备采集的摄像头数据或麦克风数据可以是一段完整的数据,也可以是完整数据中的一部分,本发明不作限制。
可选地,当接入设备接收到的安全策略中要求回传接入设备数据时,接入设备界面可以给出相应的提示和判断信息,若用户选择允许采集接入设备数据时,回传接入设备数据,并允许用户继续完成登陆虚拟机的操作;若用户选择不允许采集接入设备数据时,中断本次连接请求。
结合第二方面可能的实现方式,在第二方面的第一种可能的实现方式中,所述确定的安全策略还包括文件系统重定向、剪切板重定向、数字水印中的至少一项,则
所述接入设备基于所述连接请求的安全策略:
将所述接入设备的文件系统映射给所述服务器;或
将所述接入设备剪切板内容传递给所述服务器;或
在所述接入设备的图像中添加水印。
通过上述内容的描述,接入设备可以基于管理节点确定的安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。
第三方面,本发明实施例提供一种虚拟桌面安全控制的方法,所述方法包括:
服务器接收管理节点发送的安全策略,所述安全策略包括全球定位系统数据、摄像头数据、麦克风数据中的至少一种;
所述服务器将所述安全策略发送给所述接入设备,以使得所述接入设备按照所述安全策略的要求采集接入设备数据;
所述服务器接收所述接入设备发送的所述接入设备数据;
所述服务器将所述接入设备发送给所述管理节点,以使得所述管理节点保存所述接入设备数据。
结合第三方面的可能实现方式,在第三方面的第一种可能实现方式中,所述安全策略还包括:文件系统重定向、剪切板重定向、数字水印中的至少一项,则
所述服务器基于所述安全策略:
将所述服务器的文件系统映射给所述接入设备;或
将所述服务器的剪切板内容传递给所述接入设备;或
在所述服务器发送给所述接入设备的图像中添加水印。
通过上述内容的描述,服务器可以基于管理节点确定的安全策略实施不同安全控制项,并将所述安全策略发送给接入设备,并将接入设备返回的接入设备数据发送给管理 节点,由管理节点保存所述接入设备数据,与现有技术相比,虚拟桌面管理系统可以根据接入设备的接入信息实施不同的安全策略,并存储接入设备回传的接入设备数据,便于后续对授信级别较低的连接请求进行安全审计,提高企业业务的信息安全。
第四方面,本发明提供一种虚拟桌面管理系统,所述虚拟桌面管理系统包括:服务器、管理节点、接入设备:
所述管理节点用于,预置安全控制策略,所述安全控制策略包括至少一个典型场景及与每个所述至少一个典型场景所对应的安全策略,每个所述至少一个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个所述安全策略包括至少一个安全控制项;
所述管理节点,还用于:获取所述接入设备发送的连接请求所携带的用户类型、接入设备类型、远程桌面类型;将所述连接请求所携带的用户类型、接入设备类型、远程桌面类型与所述安全控制策略中的所述至少一个典型场景进行比较,确定与所述连接请求匹配的典型场景以及与所述匹配的典型场景对应的安全策略;根据所述确定的安全策略向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接;
所述接入设备,用于向所述管理节点发送连接请求,所述连接请求用于所述接入设备请求与服务器建立连接;还用于:接收所述管理节点发送的所述指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接。
所述服务器,用于根据所述指示信息与所述接入设备建立连接。
结合第四方面的可能实现方式,在第四方面的第一种可能实现方式中,所述方法还包括:
所述管理节点,还用于向所述服务器发送所述确定的安全策略,所述连接请求的安全策略包括采集全球定位系统数据、摄像头数据、麦克风数据中的至少一种;接收所述服务器发送的接入设备数据,所述接入设备数据为所述服务器通知所述接入设备按照所述确定的安全策略的要求获得;保存所述接入设备数据;
所述服务器,还用于接收所述管理节点发送的所述确定的安全策略;向所述虚拟机发送所述确定的安全策略;将所述接入设备数据发送给所述管理节点;
所述接入设备,还用于接收所述服务器发送的所述确定的安全策略;按照所述确定的安全策略的要求采集所述接入设备数据;将所述接入设备数据发送给所述服务器。
通过在管理节点中预置安全控制策略,当用户通过不同接入设备请求与服务器建立连接时,管理节点可以根据用户类型、接入设备类型和远程桌面类型与安全控制策略中的典型场景进行比较,确定与本次连接请求匹配的典型场景及该匹配的典型场景对应的安全策略,与现有技术中仅通过用户或虚拟机操作权限控制连接请求的安全相比,实现对不同场景的连接请求进行差异化控制,增强了企业的信息安全保护;另一方面,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。
第五方面,本发明提供一种管理节点,所述管理节点包括处理器、存储器、通信接口、系统总线,所述处理器、存储器和通信接口之间通过系统总线连接并完成相互间的通信,所述存储器中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处 理器执行所述存储器中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行第一方面、第一方面第一种可能实现方式和第一方面第三种可能实现方式中的任意一项所述的方法。
通过在管理节点中预置安全控制策略,当用户通过不同接入设备请求与服务器建立连接时,管理节点可以根据连接请求中所携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型与预置的安全控制策略进行匹配,确定本次连接请求的安全策略,与现有技术相比,实现对不同场景的连接请求进行差异化控制,增强了企业的信息安全保护力度;另一方面,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。
第六方面,本发明提供一种接入设备,所述接入设备包括处理器、存储器、通信接口、系统总线,所述处理器、存储器和通信接口之间通过系统总线连接并完成相互间的通信,所述存储器中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器执行所述存储器中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行第二方面和第二方面的第一种可能实现方式中的所述的方法。
通过以上内容的描述,接入设备可以基于管理节点确定安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,回传给管理节点保存,与现有技术相比,通过管理节点中保存接入设备数据,可以周期性对虚拟桌面基础架构中的连接请求进行安全审计,以此,提高企业业务的信息安全。
第七方面,本发明提供一种服务器,所述服务器包括处理器、存储器、通信接口、系统总线,所述处理器、存储器和通信接口之间通过系统总线连接并完成相互间的通信,所述存储器中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器执行所述存储器中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行第三方面和第三方面第一种可能实现方式中的所述的方法。
服务器可以基于管理节点确定的安全策略实施不同安全控制项,并将所述安全策略发送给接入设备,并将接入设备返回的接入设备数据发送给管理节点,由管理节点保存所述接入设备数据,与现有技术相比,虚拟桌面管理系统可以根据接入设备的接入信息实施不同的安全策略,并存储接入设备回传的接入设备数据,便于后续对授信级别较低的连接请求进行安全审计,提高企业业务的信息安全。
第八方面,提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行第一方面或第一方面的任意可能的实现方式中的方法的指令。
综上所述,通过在管理节点中预置安全控制策略,当用户通过不同接入设备请求与服务器建立连接时,管理节点可以根据连接请求中所携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型与预置的安全控制策略进行匹配,确定本次连接请求的安全策略,与现有技术相比,实现对不同场景的连接请求进行差异化控制,增强了企业的信息安全保护力度;另一方面,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。
附图说明
为了更清楚地说明本发明实施例的技术方案,下面将对本发明实施例中所需要使用的附图作简单地介绍,显而易见地,下面所描述的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为现有技术中虚拟桌面基础架构的示意图;
图2为本发明实施例提供的一种虚拟桌面安全控制的方法的流程示意图;
图3为本发明实施例提供的另一种虚拟桌面安全控制方法的流程示意图;
图4为本发明实施例提供的一种虚拟桌面管理系统的示意图;
图5为本发明实施例提供的一种管理节点的示意图;
图6为本发明实施例提供的一种接入设备的示意图;
图7为本发明实施例提供的一种虚拟机的示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明的一部分实施例,而不是全部实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都应属于本发明保护的范围。
图1为虚拟桌面基础架构(Virtual Desktop Infrastructure,VDI)的示意图,如图所示,虚拟桌面基础架构包括虚拟桌面管理系统、接入网关、接入设备和服务器,其中,接入设备包括个人计算机(Personal Computer,PC)、瘦客户机(Thin Client,TC)、移动设备。
虚拟桌面管理系统用于实现远程桌面访问的管理和控制功能,虚拟桌面管理系统中可以包括管理节点、域服务器、日志服务器、网络接入服务器、许可认证服务器,也可以包括其他类型的管理组件,管理系统中各管理组件可以采用服务器部署,也可以采用虚拟机部署,本发明均不作限制。
用户可以通过虚拟桌面管理系统访问远程桌面,远程桌面可以是服务器上安装的操作系统,也可以是服务器上部署虚拟化软件所形成的虚拟机的操作系统。具体地,远程桌面可以根据其属性划分成多种类型,例如,可以按照远程桌面的作用,划分为办公类远程桌面和用于连接会议的会议类远程桌面;也可以按照远程桌面所在数据中心的网络规划,划分为普通远程桌面和特殊远程桌面;还可以按照操作系统是否进行加密处理划分为安全远程桌面和普通远程桌面。
管理员可以预先在虚拟桌面管理系统中将服务器或虚拟机分配给用户,并记录分配关系,当用户利用账号和密码通过网络接入服务器所提供的网页界面登陆时,虚拟桌面管理系统会在网页界面显示所有已分配给该用户的服务器或虚拟机信息,用户可以选择任一服务器或虚拟机进行访问,其中,用户可以根据权限不同划分为普通用户和特殊用户。
示例地,虚拟桌面管理系统分别给普通用户A分配一台普通虚拟机和一台特殊虚拟机,给特殊用户B分配一台特殊虚拟机,则用户A利用账号和密码在网络接入服务器提供的网页界面登陆时,在网页界面显示所有已分配给用户A的2台虚拟机,用户可以选择任一台虚拟机进行访问。管理系统会将安全策略发送给接入设备和用户需要访问的虚 拟机,在接入设备和用户需要访问的虚拟机实施安全策略的控制项后,用户可以登陆虚拟机内部进行办公操作。
在每个远程桌面和接入设备中分别部署了虚拟桌面代理,其中,远程桌面中的虚拟桌面代理为服务端,接入设备中的虚拟桌面代理为客户端;管理系统可以通过桌面代理对接入设备和远程桌面进行管理和监控,远程桌面和接入设备之间,也可以通过桌面代理完成虚拟桌面协议的处理。
由此,用户可以利用接入设备通过以太网经由接入网关与虚拟桌面管理系统和远程桌面相通信,实现虚拟桌面远程访问功能。在具体实施过程中,根据接入网关的不同可以区分不同的接入网络环境类型,例如将虚拟桌面的网络类型按照局域网的安全性划分为内网和外网。
此外,管理员还可以在管理节点中预置安全控制策略。具体地,可以根据用户类型、接入设备类型和远程桌面类型预置安全控制策略,其中,安全控制策略中包括授信级别、安全策略和典型场景。管理员可以根据具体实施过程中业务场景的需求,根据用户类型、接入设备类型和远程桌面类型确定典型场景,每个典型场景对应一种安全策略,每个安全策略又对应一个授信级别。
可选地,还可以根据用户类型、接入设备类型、远程桌面类型和接入网络环境类型预置安全控制策略。
示例地,表1为安全控制策略的一个实施例的具体内容。
表1安全控制策略
Figure PCTCN2017080095-appb-000001
Figure PCTCN2017080095-appb-000002
如表1所示,管理员根据用户类型、接入网络环境类型、接入设备类型和远程桌面类型在管理节点中预置安全控制策略,若假设用户类型包括普通用户和特殊用户;接入网络环境包括内网和外网;接入设备包括移动设备、个人电脑、瘦客户机;远程桌面为虚拟机,远程桌面的类型包括普通虚拟机和特殊虚拟机;则典型场景的示例如表1所示:
典型场景一:特殊用户使用移动设备在外网接入特殊虚拟机,其典型场景限定条件包括用户类型、接入网络环境、接入设备和远程桌面类型四种,则对该典型场景的连接请求实施对应的安全策略,即不允许用户访问远程桌面,其授信级别为最低。
典型场景二:特殊用户使用移动设备在外网接入普通虚拟机,其典型场景限定条件包括用户类型、接入网络环境、接入设备和远程桌面类型四种,则对该典型场景的连接请求实施其对应的安全策略,其授信级别为极低。
典型场景三:使用移动设备在外网接入虚拟机,并未限定用户类型和远程桌面类型,则该典型场景具体包括:普通用户使用移动设备在外网接入普通虚拟机、普通用户使用移动设备在外网接入特殊虚拟机、特殊用户使用移动设备在外网接入普通虚拟机和特殊用户使用移动设备在外网接入特殊虚拟机,其中,特殊用户使用移动设备在外网接入特殊虚拟机为授信级别为最低的典型场景,特殊用户使用移动设备在外网接入普通虚拟机为授信级别为极低的典型场景,则除以上两种场景外,需要对普通用户使用移动设备在外网接入普通虚拟机、普通用户使用移动设备在外网接入特殊虚拟机两种典型场景的连接请求实施与其典型场景对应的安全策略,其授信级别为低。
典型场景四:使用瘦客户机在外网接入特殊虚拟机,未限定用户类型,则该典型场景具体包括:普通用户使用瘦客户机在外网接入特殊虚拟机和特殊用户瘦客户机在外网接入特殊虚拟机,且未与安全控制策略中其他典型场景重复,则对上述典型场景的连接请求实施对应的安全策略,其授信级别为中。
典型场景五:使用个人电脑在内网接入虚拟机,未限定用户类型和虚拟机类型,其该典型场景具体包括:普通用户使用个人电脑在内网接入普通虚拟机、普通用户使用个人电脑在内网接入特殊虚拟机、特殊用户使用个人电脑在内网接入普通虚拟机、特殊用户使用个人电脑在内网接入特殊虚拟机,且以上典型场景未与其他安全控制策略中的典型场景重叠,则对上述典型场景的连接请求实施其对应的安全策略,其授信级别为高。
典型场景六:使用瘦客户机在内网接入虚拟机,未限定用户类型和虚拟机类型,则该典型场景具体包括:普通用户使用瘦客户机在内网接入普通虚拟机、普通用户使用瘦 客户机在内网接入特殊虚拟机、特殊用户使用瘦客户机在内网接入普通虚拟机、特殊用户使用瘦客户机在内网接入特殊虚拟机,且以上典型场景未与安全控制策略中的其他典型场景重复,则对上述典型场景的连接请求实施对应的安全策略,其授信级别为极高。
值得说明的是,表1中典型场景可以为用户类型、接入设备类型、接入网络环境类型和远程桌面类型的组合,每种典型场景对应一种安全策略,每个安全策略包括至少一个安全控制项。
此外,表1中所列举的典型场景仅为一种示例,具体实施过程中可以根据具体业务场景的信息安全要求建立相应的典型场景,本发明不作限制。在本发明的以下具体描述中,将以表1所示安全控制策略为例进行详细的描述。
进一步地,预定义最低、极低、低、中、高、极高共六种授信级别,授信级别越低,则对本次连接请求的接入设备和服务器实施的安全控制项越多,每种安全策略中的安全控制项标识为开,则表示本次连接请求的接入设备或服务器需要执行对应安全控制项的功能;安全控制项标识为关,则表示本次连接请求的接入设备或服务器不需要执行对应安全控制项的功能。
具体地,在安全策略中可以包括如下安全控制项:
回传全球定位系统(Global Positioning System,GPS)数据:接入设备将其GPS定位数据回传给管理节点。
回传摄像头数据:接入设备采集摄像头数据回传给管理节点。
回传麦克风数据:接入设备采集麦克风数据回传给管理节点。
数字水印:在图像中添加数字水印。
剪切板重定向:用于将接入设备中剪切板的数据传递到服务器中或将服务器中剪切板的数据传递到接入设备,以便接入设备和服务器之间可以实现数据的相互拷贝。
文件重定向:用于将接入设备的文件系统映射给服务器或将服务器的文件系统映射给接入设备,以便接入设备和服务器之间可以使用所映射的文件系统进行读写操作。
值得说明的是,表1中所示安全控制策略仅为一种举例,不构成本发明的一种限制。另外,剪切板重定向和文件重定向功能可以是单向策略控制的,可以采取不同的控制方法,即接入设备和服务器之间,一个方向开,另一个方向关。例如,服务器将剪切板的内容传递到接入设备,接入设备的内容不传递到服务器。除此之外,还可以添加其他可能的安全控制项,或其他安全策略组合。比如,如果使用IOS操作系统的移动设备或操作系统为Android的移动设备连接服务器时,可根据是否已经破解IOS操作系统中用户存储读写权限或解锁管理员权限,采取不同授信级别和安全策略,具体实施过程中,可以根据具体信息安全要求设定不同策略,本发明不作限制。
还值得说明的是,管理员预置的安全控制策略可以保存在管理节点中预置定义的文件或数据库表中,也可以以其他存储形式存储,本发明不作限制。
可选地,管理员在管理节点预置安全控制策略后,可以根据业务需求添加或更新授信级别、安全策略和典型场景,以此适应企业对信息安全要求的变化。需要说明的是,更新后的安全控制策略仅对更新后的新的连接请求生效。
接下来,结合上述描述内容,图2详细介绍了本发明所提供的虚拟机桌面安全控制方法,所述方法包括:
S201、在管理节点中预置安全控制策略,所述安全控制策略中包括至少一个典型场 景及与每个所述至少一个典型场景所对应的安全策略,每个所述至少一个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个所述安全策略包括至少一个安全控制项,其中,每个所述安全策略中包括至少一个安全控制项。
可选地,所述安全控制策略还可以包括授信级别。
具体地,所述授信级别用于标识本次连接请求的安全控制级别,每个所述至少一个典型场景对应一个所述授信级别。
可选地,管理节点还可以根据接入网络环境类型预置安全控制策略预置安全策略。
示例地,管理员可以在管理节点中预置如表1所示安全控制策略中典型场景、安全策略和授信级别。
S202、所述管理节点接收接入设备发送的连接请求。
具体地,所述连接请求用于所述接入设备请求与服务器建立连接。
S203、所述管理节点获取所述连接请求所携带的用户类型、接入设备类型、远程桌面类型。
可选地,所述管理节点还可以获取所述连接请求所携带的接入网络环境类型。
示例地,若特殊用户使用移动设备在外网向虚拟桌面管理系统发送接入普通虚拟机的请求消息,则虚拟桌面管理系统获取连接请求的接入消息中包括特殊用户、移动设备、外网和普通虚拟机。
S204、将所述连接请求所携带的用户类型、接入设备类型、远程桌面类型与所述安全控制策略中的所述至少一个典型场景进行比较,确定与所述连接请求匹配的典型场景以及与所述匹配的典型场景对应的安全策略。
具体地,所述管理节点根据步骤S202中获取的连接请求所携带的用户类型、接入设备类型、远程桌面类型,将其与安全控制策略中典型场景进行比较,若与其中一种典型场景相匹配,则确定本次连接请求需要实施的安全策略为匹配的典型场景对应的安全策略,其授信级别为匹配的典型场景所对应的授信级别。
示例地,如表1所示的安全控制策略,若特殊用户使用移动设备在外网发送接入普通虚拟机的连接请求,与表1中各个授信级别的典型场景比较,与授信级别为极低的典型场景相匹配,即与“特殊用户使用移动设备在外网接入普通虚拟机”的典型场景相匹配,则确定该匹配的典型场景对应的安全策略为本次连接请求的安全策略,其授信级别为极低。若普通用户使用移动设备在外网发送接入普通虚拟机的连接请求,与表1中安全控制策略中的典型场景比较,与“使用移动设备在外网接入虚拟机”相匹配,则确定该匹配的典型场景对应的安全策略为本次连接请求的安全策略,其授信级别为低。
可选地,若将连接请求中携带用户类型、接入设备类型、接入网络环境类型和远程桌面类型与预置安全控制策略比较后,无匹配的典型场景,则可以实施预置默认的安全策略。
示例地,管理节点可以预置默认的安全策略为典型场景“使用瘦客户机在外网接入特殊虚拟机”所对应的安全策略,则默认的授信级别为中,若普通用户使用移动设备在内网发送接入普通虚拟机的连接请求,则管理节点比较本次连接请求所携带的用户类型、接入设备类型、接入网络环境类型、远程桌面类型与表1中所列举的典型场景确定无一相匹配,则对本次连接请求的接入设备和服务器实施预定义默认的安全策略,即实施典型场景“使用瘦客户机在外网接入特殊虚拟机”所对应的安全策略,其授信级别为中。
本领域技术人员应理解的是,虚拟桌面为远程桌面的一种,虚拟桌面管理系统中建立用户和虚拟机的分配关系后,用户可以通过任一种接入设备通过任一种类型的接入网络环境向虚拟桌面管理系统发送连接虚拟机的请求,授信级别仅对本次连接请求生效。
示例地,普通用户A通过移动设备在外网连接特殊虚拟机时,管理节点确定本次连接请求实施典型场景为“使用移动设备在外网接入虚拟机”所对应的安全策略,其授信级别为低;当普通用户A再次通过瘦客户机在内网连接特殊虚拟机时,管理节点确定本次连接请求实施典型场景为“使用瘦客户机在内网接入虚拟机”所对应的安全策略,其授信级别为高。
S205、所述管理节点按照所述安全策略向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接。
具体地,当所述安全策略允许所述接入设备与所述虚拟机建立连接时,所述管理节点向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述虚拟机建立连接。若管理节点根据接入信息和安全控制策略确定的安全策略不允许接入设备与服务器建立连接时,则本次连接请求结束。
示例地,如表1所示安全控制策略,若特殊用户使用移动设备在外网向虚拟桌面管理系统发送接入特殊虚拟机的连接请求,则管理节点确定本次连接请求的安全策略是限制接入,不允许所示特殊用户连接所述普通虚拟机,会结束本次连接请求。
进一步地,所述接入设备与所述服务器建立连接。
具体地,所述接入设备的桌面代理与所述服务器的桌面代理间建立通信连接。
本领域的技术人员应理解的是,在虚拟桌面基础架构中,所述接入设备与所述服务器所建立的连接仅为桌面代理间的通信连接,用于传输管理节点和桌面代理间的指令、消息,此时,虚拟机和接入设备需要实施对应的安全策略后,用户才能登陆远程桌面的操作系统内部。
通过上述步骤S201至步骤S205描述的内容,管理员在管理节点中预置安全控制策略,即按照用户类型、接入设备类型和远程桌面类型的组合构成至少一个典型场景,每种典型场景对应一种安全策略,当用户通过接入设备请求与远程桌面建立连接时,根据本次连接请求中所携带的用户类型、接入设备类型和远程桌面类型与安全控制策略中的典型场景进行比较,确定与本次连接请求相匹配的典型场景及与匹配的典型场景所对应的安全策略,按照确定的安全策略的要求对接入设备和服务器实施不同的安全控制项,与现有技术中依赖用户的操作权限以及服务器或虚拟机允许远程访问的操作权限的安全控制,能够对不同场景下连接请求进行差异化安全控制,提升虚拟桌面基础架构的信息安全。
进一步地,所述确定的安全策略的具体实施过程如图3所示,所述方法包括:
S301、管理节点向服务器发送所述确定的安全策略。
具体地,所述确定的安全策略为图2中所述方法确定的安全策略。
示例地,如表1所示的安全控制策略,若特殊用户使用移动设备在外网接入普通虚拟机,则管理节点会向服务器发送如下安全策略:
回传GPS数据;
回传摄像头数据;
回传麦克风数据;
图像中添加数字水印;
关闭剪切板重定向功能;
关闭文件系统重定向功能。
S302、所述服务器向接入设备发送所述确定的安全策略。
具体地,所述服务器和所述接入设备通过桌面代理相通信,所述服务器中桌面代理向所述接入设备中的桌面代理发送步骤S301中的所述确定的安全策略。
S303、所述接入设备根据所述确定的安全策略的要求采集接入设备数据。
具体地,所述确定的安全策略包括采集GPS数据、摄像头数据、麦克风数据中的至少一种,所述接入设备根据所述确定的安全策略中的要求采集接入设备数据。在具体实施过程中,可以根据具体业务场景的需求,在如表1所示的预置的安全控制策略中配置不同安全策略,要求是否需要回传接入设备数据。
示例地,若与连接请求相匹配的典型场景所对应的安全策略要求回传GPS数据、摄像头数据、麦克风数据,则:
当接入设备有GPS设备时,接入设备中的GPS模块采集接入设备的GPS地址信息,通过桌面代理发送给服务器;
当接入设备有摄像头和/或麦克风时,接入设备中的摄像头和/或麦克风模块用于采集接入设备的摄像头图像和/或麦克风声音,发送给虚拟机中的桌面代理。
可选地,接入设备数据还可以包括接入设备MAC地址。
值得说明的是,接入设备采集的摄像头数据或麦克风数据可以是实时数据,也可以是接入设备中已存储的数据;另一方面,接入设备采集的摄像头数据或麦克风数据可以是一段完整的数据,也可以是完整数据中的一部分,本发明不作限制。
可选地,当接入设备接收到的安全策略中要求回传接入设备数据时,接入设备界面可以给出相应的提示和判断信息,若用户选择允许采集接入设备数据时,回传接入设备数据,并允许用户继续完成登陆虚拟机的操作;若用户选择不允许采集接入设备数据时,中断本次连接请求。
S304、所述接入设备向所述服务器发送所述接入设备数据。
S305、所述服务器将所述接入设备数据发送给所述管理节点。
S306、所述管理节点保存所述接入设备数据。
具体地,所述管理节点保存所述接入设备回传的接入设备数据,对每次接入设备的连接请求的接入设备数据进行记录,以便进行系统的定期安全审计。
S307、所述接入设备实施所述确定的安全策略。
具体地,所述接入设备基于所述确定的安全策略的要求,在所述接入设备上开启或关闭对应功能,即是否将所述接入设备客户端文件系统映射给服务器、是否把接入设备剪贴板的内容传递给服务器、是否在接入设备的图像中添加水印。
示例地,如表1所示安全控制策略,若接入设备本次连接请求所携带的用户类型、接入设备类型、接入网络类型与典型场景“特殊用户使用移动设备在外网接入普通虚拟机”相匹配,授信级别为极低,则基于匹配的典型场景所对应的安全策略的要求:接入设备需要在接入设备的图像中添加水印,不需要将所述接入设备客户端文件系统映射给服务器,不需要把接入设备剪贴板的内容传递给服务器;若接入设备本次连接请求所携 带的用户类型、接入设备类型、接入网络类型与典型场景“使用个人电脑在内网接入虚拟机”相匹配,则基于匹配的典型场景所对应的安全策略的要求:接入设备需要将剪切板的内容传递给服务器,不需要在接入设备的图像中添加水印,不需要将文件系统映射给服务器。
S308、所述服务器实施所述确定的安全策略。
具体地,服务器基于所述确定的安全策略的要求,在服务器上开启或关闭对应功能,即是否把文件系统映射给接入设备、是否把服务器剪贴板的内容传递到接入设备、是否在传递给接入设备的服务器的图像中添加水印。
示例地,如表1所示安全控制策略,若接入设备本次连接请求确定与“特殊用户使用移动设备在外网接入普通虚拟机”的典型场景相匹配,则服务器基于该匹配的典型场景所对应的安全策略:需要在传递给接入设备的服务器的图像中添加水印,不需要将文件系统映射给接入设备,也不需要将剪切板中内容传递给接入设备。若接入设备本次连接请求确定与“使用个人电脑在内网接入虚拟机”的典型场景相匹配,则服务器基于该匹配的典型场景对应的安全策略,需要将文件系统映射给接入设备,不需要将剪切板中的内容传递给接入设备,也不需要在传递给接入设备的服务器的图片中添加水印。
通过上述内容的描述,针对与本次连接请求相匹配的安全策略的要求,采集接入设备的GPS数据、摄像头数据、麦克风数据,并保存在管理节点中,与现有技术相比,采集并保存接入设备数据可以周期性对虚拟桌面管理系统中的连接请求进行安全审计,提高企业信息安全。另一方面,针对每次连接请求,对接入设备和服务器分别实施不同的安全控制项,以此解决了现有技术中无法在不同接入场景下实现差异化控制的问题,由此,提高了企业业务的信息安全。
可选地,在本发明的另一种可能的实施例中,在预置的安全控制策略中,也可以对每种典型场景设定预置的分数段,即对用户类型、接入设备类型、接入网络环境类型和远程桌面类型的每种组合设定预置的分数段,并针对连接请求中所携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型中每种类型标注分数,如接入设备为移动设备时标注5分,接入设备为个人计算机、瘦客户机时标注10分;普通用户标注5分,特殊用户标注10分;内网接入标注10分;外网接入标注5分;普通虚拟机标注5分;特殊虚拟机标注10分。当管理节点接收到连接请求时,通过获取连接请求中携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型,并对其进行打分,比较本次连接请求的总分和每种典型场景所对应的预置的分数段,确定与本次连接请求相匹配的分数段及与该分数段对应的安全策略,对接入设备和服务器实施该安全策略,利用上述方法,同样可以解决现有技术中无法区分不同连接请求进行差异化安全控制的问题,提高了企业的信息安全。
应理解,在本发明的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。
综上所述,本发明实施例提供的安全控制的方法,通过在管理节点中预置安全控制策略,根据每次连接请求中所携带的用户类型、接入设备类型、远程桌面类型与预置的安全控制策略相比较,确定与本次连接请求相匹配的典型场景及该典型场景对应的安全 策略,对本次连接请求中的接入设备和服务器实施不同的安全策略,与现有技术相比,解决了在不同接入场景下无法对连接请求的安全进行差异化控制的问题,提高了企业的信息安全。另外,通过安全策略中配置回传接入设备数据的功能,对连接请求中的接入设备数据进行备案保存,便于进行安全审计,也增强了远程桌面访问的安全保护力度。
图4为本发明实施例中一种虚拟桌面管理系统400的示意图,如图所示,所述虚拟桌面管理系统包括:管理节点401、服务器402、接入设备403,所述方法包括:
所述管理节点401,用于预置安全控制策略,所述安全控制策略包括至少一个典型场景及与每个所述至少一个典型场景所对应的安全策略,每个所述至少一个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个所述安全策略包括至少一个安全控制项;
所述管理节点401,还用于:获取所述接入设备发送的连接请求所携带的用户类型、接入设备类型、远程桌面类型;将所述连接请求所携带的用户类型、接入设备类型、远程桌面类型与所述安全控制策略中的所述至少一个典型场景进行比较,确定与所述连接请求匹配的典型场景以及与所述匹配的典型场景对应的安全策略;根据所述确定的安全策略向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接;
所述接入设备403,用于向所述管理节点发送连接请求,所述连接请求用于所述接入设备请求与服务器建立连接;
所述接入设备403,还用于:接收所述管理节点发送的所述指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接。
所述服务器402,用于根据所述指示信息与所述接入设备建立连接。
可选地,所述管理节点401,还用于:向所述服务器发送所述确定的安全策略,所述连接请求的安全策略包括采集全球定位系统数据、摄像头数据、麦克风数据中的至少一种;接收所述服务器发送的接入设备数据,所述接入设备数据为所述服务器通知所述接入设备按照所述确定的安全策略的要求获得;
所述服务器402,还用于接收所述管理节点发送的所述确定的安全策略;向所述虚拟机发送所述确定的安全策略;将所述接入设备数据发送给所述管理节点;
所述接入设备403,还用于接收所述服务器发送的所述确定的安全策略;按照所述确定的安全策略的要求采集所述接入设备数据;将所述接入设备数据发送给所述服务器。
值得说明的是,上述虚拟桌面管理系统400用于执行如图2至图3任一所述方法,在此不再赘述。
通过在管理节点中预置安全控制策略,当用户通过不同接入设备请求与服务器建立连接时,虚拟桌面管理系统400可以根据用户类型、接入设备类型、远程桌面类型与安全控制策略进行比较,确定与本次连接请求匹配的典型场景及该匹配的典型场景对应的安全策略,与现有技术中仅通过用户或虚拟机操作权限控制连接请求的安全相比,实现对不同场景的连接请求进行差异化控制,增强了企业的信息安全保护;另一方面,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据、MAC地址等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。
上文中结合图1至图4,详细描述了根据本发明实施例所提供的虚拟桌面安全控制的方法,下面将结合图5至图6,描述根据本发明实施例所提供的虚拟桌面安全控制的装置。
图5为本发明提供的一种管理节点500的示意图,如图所示,所述管理节点500包括处理器501、存储器502、通信接口503、系统总线504,所述处理器501、存储器502和通信接口503之间通过系统总线504连接并完成相互间的通信,所述存储器502中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器501执行所述存储器502中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行图2至图3中描述的任意一项方法。
应理解,在本发明实施例中,该处理器501可以是CPU,该处理器501还可以是其他通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
该存储器502可以包括只读存储器和随机存取存储器,并向处理器510提供指令和数据。存储器502的一部分还可以包括非易失性随机存取存储器。例如,存储器502还可以存储设备类型的信息。
该系统总线504除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为系统总线504。
通过在管理节点中预置安全控制策略,当用户通过不同接入设备请求与服务器建立连接时,管理节点500可以根据连接请求中所携带的用户类型、接入设备类型和远程桌面类型与预置的安全控制策略进行匹配,确定本次连接请求的安全策略,与现有技术相比,实现对不同场景的连接请求进行差异化控制,增强了企业的信息安全保护力度;另一方面,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据、MAC地址等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。
图6为一种接入设备600的示意图,如图所示,所述接入设备600包括处理器601、存储器602、通信接口603、系统总线604,所述处理器601、存储器602和通信接口603之间通过系统总线604连接并完成相互间的通信,所述存储器602中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器601执行所述存储器602中的计算机执行指令,以使得:
向管理节点发送连接请求,所述连接请求用于所述接入设备请求与服务器建立连接,以使得所述管理节点确定所述连接请求的安全策略,并将所述接请求的安全策略发送给所述服务器;
接收所述服务器发送的所述连接请求的安全策略,所述连接请求的安全策略包括采集全球定位系统数据、摄像头数据、麦克风数据中的至少一种;
按照所述连接请求的安全策略的要求采集接入设备数据;
将所述接入设备数据发送给所述服务器。
应理解,在本发明实施例中,该处理器601可以是CPU,该处理器601还可以是其他通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA) 或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
该存储器602可以包括只读存储器和随机存取存储器,并向处理器510提供指令和数据。存储器602的一部分还可以包括非易失性随机存取存储器。例如,存储器602还可以存储设备类型的信息。
该系统总线604除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为系统总线604。
可选地,所述连接请求的安全策略还包括文件系统重定向、剪切板重定向、数字水印中的至少一项,则
所述接入设备基于所述连接请求的安全策略:
将所述接入设备的文件系统映射给所述服务器;或
将所述接入设备剪切板内容传递给所述服务器;或
在所述接入设备的图像中添加水印。
通过以上内容的描述,接入设备600可以基于管理节点确定安全策略的要求,在接入设备600中采集GPS数据、摄像头数据、麦克风数据、MAC地址等接入设备数据,回传给管理节点保存,与现有技术相比,通过管理节点中保存接入设备数据,可以周期性对虚拟桌面基础架构中的连接请求进行安全审计,以此,提高企业业务的信息安全。
图7为服务器700的示意图,如图所示,所述服务器700包括:包括处理器701、存储器702、通信接口703、系统总线704,所述处理器701、存储器702和通信接口703之间通过系统总线704连接并完成相互间的通信,所述存储器702中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器701执行所述存储器702中的计算机执行指令,以使得:
接收管理节点发送的安全策略,所述安全策略包括全球定位系统数据、摄像头数据、麦克风数据中的至少一种;
将所述安全策略发送给所述接入设备,以使得所述接入设备按照所述安全策略的要求采集接入设备数据;
接收所述接入设备发送的所述接入设备数据;
将所述接入设备发送给所述管理节点,以使得所述管理节点保存所述接入设备数据。
应理解,在本发明实施例中,该处理器701可以是CPU,该处理器701还可以是其他通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
该存储器702可以包括只读存储器和随机存取存储器,并向处理器510提供指令和数据。存储器702的一部分还可以包括非易失性随机存取存储器。例如,存储器702还可以存储设备类型的信息。
该系统总线704除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为系统总线704。
可选地,所述安全策略还包括:文件系统重定向、剪切板重定向、数字水印中的至少一项,则
所述服务器基于所述安全策略:
将所述服务器的文件系统映射给所述接入设备;或
将所述服务器的剪切板内容传递给所述接入设备;或
在所述服务器发送给所述接入设备的图像中添加水印。
通过上述内容的描述,服务器700可以基于管理节点确定的安全策略实施不同安全控制项,并将所述安全策略发送给接入设备,并将接入设备返回的接入设备数据发送给管理节点,由管理节点保存所述接入设备数据,与现有技术相比,管理节点可以根据连接请求所携带的用户类型、接入设备类型、远程桌面类型所确定的安全策略,对不同场景的连接请求实施差异化控制,提高企业业务的信息安全。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应所述以权利要求的保护范围为准。

Claims (14)

  1. 一种虚拟桌面安全控制的方法,其特征在于,在管理节点中预置安全控制策略,所述安全控制策略包括至少一个典型场景及与每个所述至少一个典型场景所对应的安全策略,每个所述至少一个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个所述安全策略包括至少一个安全控制项;所述方法包括:
    所述管理节点接收接入设备发送的连接请求,所述连接请求用于所述接入设备请求与服务器建立连接;
    所述管理节点获取所述连接请求所携带的用户类型、接入设备类型、远程桌面类型;
    所述管理节点将所述连接请求所携带的用户类型、接入设备类型、远程桌面类型与所述安全控制策略中的所述至少一个典型场景进行比较,确定与所述连接请求匹配的典型场景以及与所述匹配的典型场景对应的安全策略;
    所述管理节点根据所述确定的安全策略向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接。
  2. 根据权利要求1所述方法,其特征在于,所述方法还包括:
    所述管理节点向所述服务器发送所述确定的安全策略,所述确定的安全策略包括采集所述接入设备的全球定位系统数据、摄像头数据、麦克风数据中的至少一种;
    所述管理节点接收所述服务器发送的接入设备数据,所述接入设备数据为所述服务器通知所述接入设备按照所述确定的安全策略获得;
    所述管理节点保存所述接入设备数据。
  3. 根据权利要求2所述方法,其特征在于,所述接入设备按照所述确定的安全策略获得所述接入设备数据具体为:
    所述接入设备接收所述服务器发送的所述确定的安全策略;
    所述接入设备按照所述确定的安全策略的要求采集所述接入设备数据;
    所述接入设备向所述服务器发送所述接入设备数据。
  4. 根据权利要求1所述方法,其特征在于,所述方法还包括:
    所述管理节点向所述服务器发送所述确定的安全策略,所述确定的安全策略包括文件系统重定向、剪切板重定向、数字水印中的至少一项,以使得所述服务器基于所述确定的安全策略:
    将所述服务器的文件系统映射给所述接入设备;或
    将所述服务器的剪切板内容传递给所述接入设备;或
    在所述服务器发送给所述接入设备的图像中添加水印。
  5. 根据权利要求4所述方法,其特征在于,所述方法还包括:
    所述服务器向所述接入设备发送所述确定的安全策略,以使得所述接入设备基于所述确定的安全策略:
    将所述接入设备的文件系统映射给所述服务器;或
    将所述接入设备剪切板内容传递给所述服务器;或
    在所述接入设备的图像中添加水印。
  6. 一种虚拟桌面安全控制的方法,其特征在于,所述方法包括:
    接入设备向管理节点发送连接请求,所述连接请求用于所述接入设备请求与服务器 建立连接,以使得所述管理节点确定所述连接请求的安全策略,并将所述确定的安全策略发送给所述服务器;
    所述接入设备接收所述服务器发送的所述确定的安全策略,所述确定的安全策略包括采集全球定位系统数据、摄像头数据、麦克风数据中的至少一种;
    所述接入设备按照所述连接请求的安全策略的要求采集接入设备数据;
    所述接入设备将所述接入设备数据发送给所述服务器。
  7. 根据权利要求6所述方法,其特征在于,所述确定的安全策略还包括文件系统重定向、剪切板重定向、数字水印中的至少一项,则
    所述接入设备基于所述连接请求的安全策略:
    将所述接入设备的文件系统映射给所述服务器;或
    将所述接入设备剪切板内容传递给所述服务器;或
    在所述接入设备的图像中添加水印。
  8. 一种虚拟桌面安全控制的方法,其特征在于,所述方法包括:
    服务器接收管理节点发送的安全策略,所述安全策略包括全球定位系统数据、摄像头数据、麦克风数据中的至少一种;
    所述服务器将所述安全策略发送给所述接入设备,以使得所述接入设备按照所述安全策略的要求采集接入设备数据;
    所述服务器接收所述接入设备发送的所述接入设备数据;
    所述服务器将所述接入设备发送给所述管理节点,以使得所述管理节点保存所述接入设备数据。
  9. 根据权利要求8所述方法,其特征在于,所述安全策略还包括:文件系统重定向、剪切板重定向、数字水印中的至少一项,则
    所述服务器基于所述安全策略:
    将所述服务器的文件系统映射给所述接入设备;或
    将所述服务器的剪切板内容传递给所述接入设备;或
    在所述服务器发送给所述接入设备的图像中添加水印。
  10. 一种虚拟桌面管理系统,其特征在于,所述虚拟桌面管理系统包括:服务器、管理节点、接入设备:
    所述管理节点用于,预置安全控制策略,所述安全控制策略包括至少一个典型场景及与每个所述至少一个典型场景所对应的安全策略,每个所述至少一个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个所述安全策略包括至少一个安全控制项;
    所述管理节点,还用于:获取所述接入设备发送的连接请求所携带的用户类型、接入设备类型、远程桌面类型;将所述连接请求所携带的用户类型、接入设备类型、远程桌面类型与所述安全控制策略中的所述至少一个典型场景进行比较,确定与所述连接请求匹配的典型场景以及与所述匹配的典型场景对应的安全策略;根据所述确定的安全策略向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接;
    所述接入设备,用于向所述管理节点发送连接请求,所述连接请求用于所述接入设备请求与服务器建立连接;
    所述接入设备,还用于:接收所述管理节点发送的所述指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接。
    所述服务器,用于根据所述指示信息与所述接入设备建立连接。
  11. 根据权利要求10所述方法,其特征在于,所述方法还包括:
    所述管理节点,还用于向所述服务器发送所述确定的安全策略,所述确定的安全策略包括采集全球定位系统数据、摄像头数据、麦克风数据中的至少一种;接收所述服务器发送的接入设备数据,所述接入设备数据为所述服务器通知所述接入设备按照所述确定的安全策略的要求获得;保存所述接入设备数据;
    所述服务器,还用于接收所述管理节点发送的所述确定的安全策略;向所述虚拟机发送所述确定的安全策略;将所述接入设备数据发送给所述管理节点;
    所述接入设备,还用于接收所述服务器发送的所述确定的安全策略;按照所述确定的安全策略的要求采集所述接入设备数据;将所述接入设备数据发送给所述服务器。
  12. 一种管理节点,其特征在于,所述管理节点包括处理器、存储器、通信接口、系统总线,所述处理器、存储器和通信接口之间通过系统总线连接并完成相互间的通信,所述存储器中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器执行所述存储器中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行权利要求1、2和4中任意一项所述的方法。
  13. 一种接入设备,其特征在于,所述接入设备包括处理器、存储器、通信接口、系统总线,所述处理器、存储器和通信接口之间通过系统总线连接并完成相互间的通信,所述存储器中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器执行所述存储器中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行权利要求6和7所述的方法。
  14. 一种服务器,其特征在于,所述服务器包括处理器、存储器、通信接口、系统总线,所述处理器、存储器和通信接口之间通过系统总线连接并完成相互间的通信,所述存储器中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器执行所述存储器中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行权利要求8和9所述的方法。
PCT/CN2017/080095 2016-06-28 2017-04-11 一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统 WO2018000891A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610488502.2 2016-06-28
CN201610488502.2A CN107547480A (zh) 2016-06-28 2016-06-28 一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统

Publications (1)

Publication Number Publication Date
WO2018000891A1 true WO2018000891A1 (zh) 2018-01-04

Family

ID=60785841

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/080095 WO2018000891A1 (zh) 2016-06-28 2017-04-11 一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统

Country Status (2)

Country Link
CN (1) CN107547480A (zh)
WO (1) WO2018000891A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572839A (zh) * 2021-07-23 2021-10-29 段采标 一种工控机的远程控制方法、装置及系统
CN116015852A (zh) * 2022-12-26 2023-04-25 国网江苏省电力有限公司扬州供电分公司 一种基于国家电网信息的虚拟云桌面安全管理方法
CN116896583A (zh) * 2023-07-17 2023-10-17 博智安全科技股份有限公司 一种远程控制方法、装置、电子设备及存储介质

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310135B (zh) * 2018-12-12 2023-03-14 中兴通讯股份有限公司 一种基于虚拟桌面的水印添加方法及装置
CN111314286B (zh) * 2019-12-20 2022-11-01 杭州迪普科技股份有限公司 安全访问控制策略的配置方法及装置
CN111277670A (zh) * 2020-03-09 2020-06-12 西安万像电子科技有限公司 远程控制系统及方法
CN112311851B (zh) * 2020-09-25 2022-04-01 新华三大数据技术有限公司 一种网络策略配置方法及装置
CN112714185B (zh) * 2020-12-30 2022-03-18 威创集团股份有限公司 一种接入坐席系统
CN113630390B (zh) * 2021-07-23 2023-09-01 国网湖北省电力有限公司荆州供电公司 基于大数据的终端设备的网络安全通信方法及装置
CN114389876A (zh) * 2022-01-13 2022-04-22 平安普惠企业管理有限公司 安全策略实施方法、装置、设备及存储介质
CN114416251A (zh) * 2022-01-14 2022-04-29 阿里巴巴(中国)有限公司 云桌面管理方法及计算机存储介质
CN115643109B (zh) * 2022-12-21 2023-03-14 四川汉科计算机信息技术有限公司 一种基于虚拟化平台的远程控制方法、系统、设备、介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127633A (zh) * 2006-08-15 2008-02-20 华为技术有限公司 一种实现移动台安全控制的方法及其系统
CN103812829A (zh) * 2012-11-08 2014-05-21 华为技术有限公司 一种提高远程桌面安全性的方法、远程桌面服务器及系统
US20140283071A1 (en) * 2013-03-12 2014-09-18 Spikes, Inc. Application malware isolation via hardware separation
CN104618435A (zh) * 2014-12-29 2015-05-13 北京奇虎科技有限公司 实现远程桌面的方法及远程桌面管理系统
CN104685507A (zh) * 2012-10-21 2015-06-03 迈克菲股份有限公司 向虚拟云基础结构提供虚拟安全装置架构

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2813945A1 (en) * 2013-06-14 2014-12-17 Tocario GmbH Method and system for enabling access of a client device to a remote desktop
CN104753930B (zh) * 2015-03-17 2016-10-05 成都盛思睿信息技术有限公司 基于安全网关的云桌面管理系统及其安全访问控制方法
CN105049414A (zh) * 2015-06-03 2015-11-11 北京朋创天地科技有限公司 一种面向虚拟桌面的数据流控制方法及信息安全装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127633A (zh) * 2006-08-15 2008-02-20 华为技术有限公司 一种实现移动台安全控制的方法及其系统
CN104685507A (zh) * 2012-10-21 2015-06-03 迈克菲股份有限公司 向虚拟云基础结构提供虚拟安全装置架构
CN103812829A (zh) * 2012-11-08 2014-05-21 华为技术有限公司 一种提高远程桌面安全性的方法、远程桌面服务器及系统
US20140283071A1 (en) * 2013-03-12 2014-09-18 Spikes, Inc. Application malware isolation via hardware separation
CN104618435A (zh) * 2014-12-29 2015-05-13 北京奇虎科技有限公司 实现远程桌面的方法及远程桌面管理系统

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572839A (zh) * 2021-07-23 2021-10-29 段采标 一种工控机的远程控制方法、装置及系统
CN116015852A (zh) * 2022-12-26 2023-04-25 国网江苏省电力有限公司扬州供电分公司 一种基于国家电网信息的虚拟云桌面安全管理方法
CN116896583A (zh) * 2023-07-17 2023-10-17 博智安全科技股份有限公司 一种远程控制方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN107547480A (zh) 2018-01-05

Similar Documents

Publication Publication Date Title
WO2018000891A1 (zh) 一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统
US10021143B2 (en) Method and apparatus for multi-tenancy secrets management in multiple data security jurisdiction zones
AU2020200073B2 (en) Method and apparatus for multi-tenancy secrets management
US10158615B2 (en) Location-enforced data management in complex multi-region computing
WO2021073151A1 (zh) 基于多网通信的数据传输方法及相关设备
US20120311575A1 (en) System and method for enforcing policies for virtual machines
US10445524B2 (en) Compromise free cloud data encryption and security
US11443303B2 (en) Method for routing to mesh network content utilizing blockchain technology
EP2609517B1 (en) Constant access gateway and de-duplicated data cache server
US20120300940A1 (en) Dynamic key management
US10567373B2 (en) Establishing security over converged Ethernet with TCP credential appropriation
US20190272291A1 (en) Apparatus, method, and storage medium for managing data
WO2020042798A1 (zh) 密码运算、创建工作密钥的方法、密码服务平台及设备
US10366240B1 (en) Authorization to access a server in the cloud without obtaining an initial secret
CN105069383A (zh) 一种云桌面usb存储外设管控的方法及系统
US8776057B2 (en) System and method for providing evidence of the physical presence of virtual machines
US20190139133A1 (en) System for periodically updating backings for resource requests
CN112242979A (zh) 基于区块链系统的ip地址前缀认证方法和设备
US9619840B2 (en) Backing management
US11647020B2 (en) Satellite service for machine authentication in hybrid environments
US11621944B2 (en) Systems and methods for anonymous and consistent data routing in a client-server architecture
CN104023081B (zh) 网协ip硬盘的数据处理方法及ip硬盘
WO2015139571A1 (en) Data protection
EP3757845A1 (en) Systems and methods for anonymous and consistent data routing in a client-server architecture
CN107517268A (zh) 一种基于san存储的数据操作方法、装置及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17818888

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17818888

Country of ref document: EP

Kind code of ref document: A1