WO2020140407A1 - 基于云安全的云桌面登陆方法、装置、设备和存储介质 - Google Patents

基于云安全的云桌面登陆方法、装置、设备和存储介质 Download PDF

Info

Publication number
WO2020140407A1
WO2020140407A1 PCT/CN2019/092901 CN2019092901W WO2020140407A1 WO 2020140407 A1 WO2020140407 A1 WO 2020140407A1 CN 2019092901 W CN2019092901 W CN 2019092901W WO 2020140407 A1 WO2020140407 A1 WO 2020140407A1
Authority
WO
WIPO (PCT)
Prior art keywords
cloud desktop
account
uuid
user
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2019/092901
Other languages
English (en)
French (fr)
Inventor
张鑫
张睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Publication of WO2020140407A1 publication Critical patent/WO2020140407A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Definitions

  • This application relates to the field of cloud security technology, and in particular, to a cloud desktop login method, device, device, and storage medium based on cloud security.
  • Cloud desktop is a distributed cloud computing storage technology that integrates the essence of the Internet and relies on a high degree of encryption algorithm to provide users at all levels of the Internet with the most convenient, richest, safest and most intimate services. Cloud desktop can publish data space and management services to the operator in a desktop way.
  • a cloud desktop login method based on cloud security including:
  • the user terminal receives the cloud desktop login request sent by the user, the cloud desktop login request contains a universal unique identification code UUID, the user terminal obtains an IM account from the instant messaging IM software, and sends the IM account and the UUID to the cloud Desktop authentication server;
  • the cloud desktop authentication server receives the IM account and the UUID, and sends a verification request to the IM server, where the verification request includes the IM account and the UUID;
  • the IM server After receiving the verification request, the IM server verifies the IM account, and when the verification is passed, returns the IM account and the corresponding password to the cloud desktop authentication server, the cloud desktop authentication server Send the UUID, the IM account number and password to the cloud desktop resource server;
  • the cloud desktop resource server After receiving the IM account and password, the cloud desktop resource server verifies the IM account and password, and when the verification is passed, returns the user resource corresponding to the IM account to the cloud desktop authentication server;
  • the cloud desktop authentication server After receiving the user resource, the cloud desktop authentication server returns the user resource to the cloud desktop login requester corresponding to the UUID, and displays the user resource through the cloud desktop login requester.
  • a cloud desktop login device based on cloud security including:
  • the user terminal is set to receive a cloud desktop login request sent by the user, the cloud desktop login request contains a universal unique identification code UUID, the user terminal obtains an IM account from the instant messaging IM software, and The IM account and the UUID are sent to the cloud desktop authentication server;
  • Sending a verification request module configured to receive the IM account and the UUID by the cloud desktop authentication server, and send a verification request to the IM server, the verification request including the IM account and the UUID;
  • the first verification module is configured to verify the IM account after the IM server receives the verification request, and when the verification is passed, return the IM account and the corresponding password to the cloud desktop authentication server After that, the cloud desktop authentication server sends the UUID, the IM account number and password to the cloud desktop resource server;
  • the second verification module is configured to, after receiving the IM account and password, the cloud desktop resource server verifies the IM account and password, and when the verification is passed, returns the user resource corresponding to the IM account Give the cloud desktop authentication server;
  • Displaying a user resource module configured to, after receiving the user resource, the cloud desktop authentication server returns the user resource to the cloud desktop login requester corresponding to the UUID, and the cloud desktop login requester User resources for display.
  • a computer device includes a memory and a processor.
  • the memory stores computer-readable instructions.
  • the processor causes the processor to perform the following steps:
  • the user terminal receives the cloud desktop login request sent by the user, the cloud desktop login request contains a universal unique identification code UUID, the user terminal obtains an IM account from the instant messaging IM software, and sends the IM account and the UUID to the cloud Desktop authentication server;
  • the cloud desktop authentication server receives the IM account and the UUID, and sends a verification request to the IM server, where the verification request includes the IM account and the UUID;
  • the IM server After receiving the verification request, the IM server verifies the IM account, and when the verification is passed, returns the IM account and the corresponding password to the cloud desktop authentication server, the cloud desktop authentication server Send the UUID, the IM account number and password to the cloud desktop resource server;
  • the cloud desktop resource server After receiving the IM account and password, the cloud desktop resource server verifies the IM account and password, and when the verification is passed, returns the user resource corresponding to the IM account to the cloud desktop authentication server;
  • the cloud desktop authentication server After receiving the user resource, the cloud desktop authentication server returns the user resource to the cloud desktop login requester corresponding to the UUID, and displays the user resource through the cloud desktop login requester.
  • a storage medium storing computer-readable instructions, which when executed by one or more processors, causes the one or more processors to perform the following steps:
  • the user terminal receives the cloud desktop login request sent by the user, the cloud desktop login request contains a universal unique identification code UUID, the user terminal obtains an IM account from the instant messaging IM software, and sends the IM account and the UUID to the cloud Desktop authentication server;
  • the cloud desktop authentication server receives the IM account and the UUID, and sends a verification request to the IM server, where the verification request includes the IM account and the UUID;
  • the IM server After receiving the verification request, the IM server verifies the IM account, and when the verification is passed, returns the IM account and the corresponding password to the cloud desktop authentication server, the cloud desktop authentication server Send the UUID, the IM account number and password to the cloud desktop resource server;
  • the cloud desktop resource server After receiving the IM account and password, the cloud desktop resource server verifies the IM account and password, and when the verification is passed, returns the user resource corresponding to the IM account to the cloud desktop authentication server;
  • the cloud desktop authentication server After receiving the user resource, the cloud desktop authentication server returns the user resource to the cloud desktop login requester corresponding to the UUID, and displays the user resource through the cloud desktop login requester.
  • the cloud security-based cloud desktop login method, device, computer equipment, and storage medium described above include a user terminal receiving a cloud desktop login request sent by a user.
  • the cloud desktop login request includes a universal unique identification code UUID.
  • the cloud desktop authentication server receives the IM account and the UUID, and sends a verification request to the IM server, the verification request Contains the IM account and the UUID; after receiving the verification request, the IM server verifies the IM account, and when the verification is passed, returns the IM account and the corresponding password to the
  • the cloud desktop authentication server sends the UUID, the IM account and password to the cloud desktop resource server; after receiving the IM account and password, the cloud desktop resource server The account and password are verified, and when the verification is passed, the user resource corresponding to the IM account is returned to the cloud desktop authentication server; after receiving the user resource, the cloud
  • This application combines cloud desktop login with enterprise IM software, through the interaction between multiple servers in the background, to achieve the purpose of user one-click login, avoiding the tedious operation process when the user logs in to the cloud desktop system, and also guarantees twice The verification process takes into account security and user experience.
  • FIG. 1 is a flowchart of a cloud desktop login method based on cloud security in an embodiment of the present application
  • FIG. 2 is a flowchart of step S1 in an embodiment
  • FIG. 3 is another flowchart of step S1 in an embodiment
  • FIG. 4 is a structural diagram of a cloud desktop login device based on cloud security in an embodiment of the present application.
  • FIG. 1 is a flowchart of a cloud desktop login method based on cloud security in an embodiment of the present application. As shown in FIG. 1, a cloud desktop login method based on cloud security includes the following steps:
  • Step S1 Receive a cloud desktop login request: the user terminal receives the cloud desktop login request sent by the user.
  • the cloud desktop login request contains a universal unique identification code UUID.
  • the user terminal obtains the IM account from the instant messaging IM software, converts the IM account and UUID Send to the cloud desktop authentication server.
  • the user terminal in this step may be a handheld smart device such as a mobile phone or a tablet computer.
  • the user terminal is embedded with an application APP and a code scanning script with a code scanning function.
  • Application APP includes instant messaging IM software, IM software, that is Instant Messaging software, refers to the business that can send and receive Internet messages in real time.
  • IM software can also use other enterprise authentication systems, such as voiceprint software, face recognition software, etc.
  • Cloud desktop login methods generally include web desktop cloud desktop login and user terminal cloud desktop login.
  • cloud desktop login methods there are two different ways for the user terminal to receive the cloud desktop login request sent by the user in this step:
  • step S1 includes:
  • Step S101 Generate a QR code request:
  • the cloud desktop portal receives the scan code login request sent by the user, and sends a QR code generation request to the QR code server.
  • the cloud desktop portal website can set a login request button, the user clicks the login request button, sends a scan code login request, and the cloud desktop portal website receives this request .
  • Step S102 Generate and return a QR code: After receiving the QR code generation request, the QR code server generates a QR code, and returns the QR code to the cloud desktop portal website.
  • the QR code contains the unified resources of the cloud desktop authentication server Locator URL address and UUID.
  • the QR code server is used to generate a QR code according to the request of the cloud desktop portal.
  • the QR code contains the URL address of the cloud desktop authentication server corresponding to the cloud desktop portal, and a randomly generated UUID.
  • the session ID of the session control code of the desktop portal forms the mapping relationship, and the uniqueness of the UUID needs to be guaranteed.
  • other servers use the UUID to retrieve the sessionID, and obtain the link to the cloud desktop portal through the sessionID. Return specific data.
  • Step S103 displaying: the cloud desktop portal displays the QR code, and waits for the user to scan the code.
  • the cloud desktop portal displays the QR code returned from the QR code server through an interactive interface for users to scan the code through the user terminal. While waiting for the user to scan the code, the displayed QR code has a life cycle, such as a time threshold of 30 seconds, 2 minutes, etc. After this time threshold is exceeded, the QR code is defined as a failed QR code, and it needs to be sent to the QR code again.
  • the QR code server requests to generate a new QR code:
  • the QR code server After displaying the QR code on the cloud desktop portal, it is timed by a timer. When the counting time exceeds the preset time threshold and the cloud desktop portal does not receive any return result, it sends the QR code to the QR code server again Code request, receive another QR code returned by the QR code server, replace and display the QR code, and wait for the user to scan the code.
  • the time threshold can be preset in the timer.
  • the timer is used to count and send a trigger signal to the cloud desktop portal website.
  • the cloud desktop portal website receives the trigger signal, and if no return result is received, the The code server sends a request to generate a QR code.
  • the UUID in the new QR code received by the cloud desktop portal is different from the UUID in the original QR code, ensuring the uniqueness of the QR code.
  • Step S104 Obtain user scan code information: The user terminal receives the cloud desktop login request sent by the user.
  • the cloud desktop login request contains the user scan code information obtained by the user through the user terminal scan code, and the user scan code information includes the URL address and UUID.
  • the user scans the QR code displayed on the cloud desktop portal through the code scanning script in the user terminal, and the user terminal obtains the user scan code information, which is defined as receiving the cloud desktop login request sent by the user.
  • IM software is embedded in the user terminal in this step. This IM software can be obtained after the user downloads and installs it, or it can be obtained through automatic download and installation of the user terminal.
  • the scan code script is preferably embedded in the IM software of the user, and the user scans the two-dimensional code through the scan code script in the embedded IM software.
  • Step S105 Encryption: The user terminal obtains the IM account from the IM software, encrypts the IM account and UUID to generate a ciphertext, and sends the ciphertext to the cloud desktop authentication server corresponding to the URL address.
  • the IM account corresponding to the IM software is stored in the storage medium of the user terminal, and the user terminal obtains the IM account directly from the storage medium.
  • this step also encrypts the IM account and UUID through a preset public key Process and generate the cipher text to send to the cloud desktop authentication server corresponding to the URL address.
  • the public key in this step may use a public key based on the 3DES algorithm.
  • a cloud desktop login request is made through a cloud desktop portal website, a page for directly logging in by scanning a code is provided, and login is requested by scanning a code on a user terminal.
  • the user operation is simple and convenient, and there is no need to enter a user name and password, thereby improving user experience. .
  • step S1 includes:
  • step S111 receiving the request: the mobile terminal receives the cloud desktop login request sent by the user through the preset login interface, and the login interface is embedded in the IM software.
  • IM software is embedded in the user terminal in this step.
  • This IM software can be obtained after the user downloads and installs it, or it can be obtained through automatic download and installation of the user terminal.
  • the IM software is preset with a login interface for triggering cloud desktop login. When users use it, they open the IM software in the user terminal, select the workbench, and click the cloud desktop icon on the login interface to send a cloud desktop login request.
  • Step S112 Encryption: The mobile terminal obtains the IM account and UUID from the IM software, encrypts the IM account and UUID to generate a ciphertext, and sends the ciphertext to the cloud desktop authentication server associated with the login interface.
  • the IM account corresponding to the IM software is stored in the storage medium of the user terminal, the user terminal obtains the IM account directly from the storage medium, and the IM software of each user terminal has a unique UUID assigned by the server to the IM software, The user terminal also obtains this unique UUID from the storage medium.
  • the IM account and UUID are also encrypted through the public key, and the cipher text is generated and sent to the cloud desktop authentication server corresponding to the URL address.
  • the cloud desktop authentication server associated with different IM software is different, so the mobile terminal sends the ciphertext to the corresponding cloud desktop authentication server according to the different login interface.
  • the IM software is Happy Ping An APP.
  • the Happy Ping An APP has a built-in login interface, and the mobile terminal sends a ciphertext carrying the IM account number and UUID to the Ping An cloud desktop authentication server.
  • the user directly requests to log in to the cloud desktop through the user terminal.
  • the user only needs to click the cloud desktop icon on the login interface and directly request with one key.
  • the user operation is simple and convenient, and there is no need to enter a username and password. User experience.
  • Step S2 Send a verification request:
  • the cloud desktop authentication server receives the IM account and UUID, and sends a verification request to the IM server.
  • the verification request includes the IM account and UUID.
  • the cloud desktop authentication server receives the IM account and UUID sent by the mobile terminal.
  • the IM account and UUID are cipher text, the following methods are also performed:
  • step S2 includes:
  • Step S201 Decryption: The cloud desktop authentication server receives the ciphertext sent by the mobile terminal, decrypts the ciphertext, and obtains the IM account number and UUID.
  • step S1 the IM account and UUID are encrypted before transmission. Therefore, in this step, after receiving the data sent by the mobile terminal, the data is also decrypted.
  • the private key paired with the public key used for encryption can be used for decryption.
  • the user terminal and the cloud desktop authentication server agree on the same set of encryption and decryption algorithms.
  • the encrypted text encrypted by the user terminal is decrypted by the cloud desktop authentication server to obtain the IM account and UUID.
  • Step S202 sending a request: the cloud desktop authentication server sends an authentication request containing the IM account number and UUID to the IM server.
  • the cloud desktop authentication server cannot verify the IM account, so it sends a verification request to the IM server corresponding to the IM software, requesting the IM server to verify whether the IM account is in the login state.
  • the cloud desktop authentication server decrypts the corresponding public key to obtain the IM account and UUID, and sends it to the IM server, requesting the IM server to verify the IM account.
  • Step S3 the first verification: after receiving the verification request, the IM server verifies the IM account.
  • the IM account and the corresponding password are returned to the cloud desktop authentication server.
  • the account number and password are sent to the cloud desktop resource server.
  • the IM server is a server of IM software. All IM accounts are stored in the IM server, and the current login status of all IM accounts is marked. When the IM server verifies the IM account, it is mainly to verify whether the IM account is in the login state. In the status, the verification is passed; otherwise, the verification is considered to have failed, and the login failure result is returned.
  • step S3 includes:
  • Step S301 judging the login status: the IM server judges whether the IM account is in the login status. If it is in the non-login status, it is defined as verification failure, and then the login failure information is returned to the cloud desktop login requester corresponding to the UUID. If the verification is passed, the password corresponding to the IM account is queried, the IM account and the corresponding password are encrypted to generate a ciphertext, and the ciphertext is returned to the cloud desktop authentication server.
  • the IM server stores the current login status of all IM accounts registered in the IM software. After receiving the verification request, the IM server searches the IM account in the storage medium to obtain the login status corresponding to the IM account. If it is not logged in, the mobile terminal is considered The IM software in is offline, and the cloud desktop login operation cannot be performed through the IM account, which is defined as verification failure. At this time, the IM server directly returns the login failure information to the cloud desktop login requester corresponding to the UUID.
  • This cloud desktop login requester may be a cloud Desktop portals can also be IM software for mobile terminals.
  • the prompt content of the login failure information may be a prompt that the IM software has not logged in, informing the user that they need to log in to the IM account before they can make a cloud desktop login request.
  • the login status corresponding to the IM account is the login status, and the IM software in the mobile terminal is considered online, which is defined as passing verification and obtaining the password corresponding to the IM account from the storage medium.
  • the IM account and password are encrypted by the public key, and then returned to the cloud desktop authentication server through the intranet.
  • Step S302 Decrypt and send account secret information:
  • the cloud desktop authentication server receives the ciphertext sent by the IM server, decrypts the ciphertext, obtains the IM account and password, and sends the UUID, IM account, and password to the cloud desktop resource server.
  • This step corresponds to the data returned by the IM server after encrypting the IM account and password in step S301.
  • the cloud desktop authentication server uses the private key paired with the public key used for encryption to decrypt.
  • the user terminal, the cloud desktop authentication server and the IM server can agree on the same set of encryption and decryption algorithms.
  • the cloud desktop authentication server only needs to store the same decryption algorithm in the storage medium and can send the ciphertext sent by the user terminal and the IM server Perform decryption to obtain the corresponding decrypted data.
  • the cloud desktop authentication server in this step needs to send it to the cloud desktop resource server for the second verification to verify whether the password corresponding to the IM account and the password corresponding to the IM account stored in the cloud desktop resource server are Consistent.
  • the IM account and password are transferred to the cloud desktop resource server through the interface call method.
  • This embodiment is the first verification process for the cloud desktop login.
  • the cloud desktop authentication server implements the first verification of the cloud desktop login through the IM server.
  • the IM server returns to the cloud desktop authentication server Before returning the IM account and corresponding password, in order to ensure the safe transmission of data, the IM account and password are also encrypted to increase the security of the account secret.
  • Step S4 the second verification: after receiving the IM account and password, the cloud desktop resource server verifies the IM account and password. When the verification is passed, the user resource corresponding to the IM account is returned to the cloud desktop authentication server.
  • the cloud desktop resource server stores all IM accounts and corresponding user resources.
  • the cloud desktop resource server verifies the IM account and password, it verifies through the domain control server connected to it:
  • step S4 includes:
  • Step S401 Send a verification account password:
  • the cloud desktop resource server sends the IM account number and password to the domain control server, and performs verification through the domain control server.
  • the cloud desktop resource server does not verify the account password itself, but verifies the account password through the domain control server.
  • the domain control server is the AD server.
  • the domain control server stores the cloud desktop login account and the corresponding cloud desktop password.
  • the cloud desktop login account is the same as the IM account.
  • Step S402 verify account consistency: after receiving the IM account and password, the domain control server verifies whether the IM account and password are consistent with the built-in IM account and the corresponding cloud desktop password. If they are inconsistent, it is defined as verification failure. The login failure information is returned to the cloud desktop login requester corresponding to the UUID. If they are consistent, it is defined as passing verification, and the verification passing result is returned to the cloud desktop resource server.
  • the domain control server has a very fast query speed, it can be used to store static data such as user information.
  • the domain control server After receiving the IM account and password, the domain control server matches the IM account with the built-in account. If the account contains a consistent account, the password is matched with the cloud desktop password to determine whether they are consistent. If there is no matching account, or the password is inconsistent, and the verification is not passed, then the login failure information is returned to the cloud desktop login requester corresponding to the UUID, where the cloud desktop login requester can be a cloud desktop portal or a mobile phone IM software of the terminal.
  • the prompt content of the login failure information may be a prompt that the IM account password is inconsistent with the cloud desktop account password.
  • the domain control server returns the verified result to the cloud desktop resource server.
  • Step S403 returning user resources:
  • the cloud desktop resource server obtains the user resources corresponding to the IM account from the database, and returns the user resources to the cloud desktop authentication server.
  • the cloud desktop authentication server stores user resources corresponding to all cloud desktop accounts.
  • the cloud desktop account in this step is the IM account, and the two are the same. Therefore, when the cloud desktop authentication server receives the verification result returned by the domain control server, it considers that the IM account has passed the double verification, and returns the user resources corresponding to the IM account to the cloud desktop authentication server, and returns to the cloud desktop login through the cloud desktop authentication server The requesting party will display.
  • This embodiment is the second verification process for the cloud desktop login.
  • the cloud desktop authentication server completes the second verification through the domain control server connected to the cloud desktop resource server. After the verification is passed, the cloud desktop resource server returns the user resources for subsequent use. Show to users to view and interact.
  • Step S5 displaying user resources: after receiving the user resources, the cloud desktop authentication server returns the user resources to the cloud desktop login requester corresponding to the UUID, and displays the user resources through the cloud desktop login requester.
  • the cloud desktop authentication server After the double verification is passed through the interaction of each server, the cloud desktop authentication server generates a resource list of user resources and associates the UUID, and then sends the resource list to the cloud desktop login requester corresponding to the UUID.
  • the cloud desktop authentication server sends the resource list to the cloud desktop portal website, and displays the user resources through the cloud desktop portal website.
  • the cloud desktop authentication server sends the resource list to the user terminal, and displays the user resources through the user terminal. Users only need to click on user resources to enter the cloud desktop system and complete the login process.
  • the embodiment of the present application is based on the cloud security cloud desktop login method, which uses two different login methods: QR code scanning and embedded login interface in IM software, combined with the trusted IM software in the user terminal, to achieve one-key login
  • QR code scanning and embedded login interface in IM software combined with the trusted IM software in the user terminal
  • the double verification of the cloud desktop is completed in the interaction of each server, and the user can directly log in to the cloud desktop, which improves the user experience.
  • a cloud desktop login device based on cloud security. As shown in FIG. 4, it includes the following module: receiving a cloud desktop login request module, which is set to receive a cloud desktop login request sent by a user from a user terminal.
  • the cloud desktop login request contains a universal unique identification code UUID
  • the user terminal obtains an IM account from the instant messaging IM software, and sends the IM account and the UUID to the cloud desktop authentication server;
  • a verification request module is sent, which is set to The cloud desktop authentication server receives the IM account and the UUID, and sends a verification request to the IM server, where the verification request includes the IM account and the UUID;
  • the first verification module is set as the IM server After receiving the verification request, verify the IM account, and when the verification is passed, return the IM account and the corresponding password to the cloud desktop authentication server, the cloud desktop authentication server returns the UUID 2.
  • the IM account and password are sent to the cloud desktop resource server; the second verification module is set to verify that the IM account and password are verified by the cloud desktop resource server after receiving the IM account and password.
  • the user resource corresponding to the IM account is returned to the cloud desktop authentication server; the display user resource module is set to return the user resource to the cloud desktop authentication server after receiving the user resource
  • the cloud desktop login requester corresponding to the UUID displays the user resources through the cloud desktop login requester.
  • the cloud desktop login request receiving module includes: a QR code request unit, which is configured to receive a scan code login request sent by the user on the cloud desktop portal, and send a QR code generation request to the QR code server; return two Dimension code unit, set as the QR code server receives the QR code generation request, generates a QR code, and returns the QR code to the cloud desktop portal.
  • the QR code contains the URL address of the cloud desktop authentication server.
  • UUID display the QR code unit, set to the cloud desktop portal to display the QR code, and wait for the user to scan the code; receive login request unit, set to the user terminal receives the cloud desktop login request sent by the user, cloud desktop login The request contains the user scan code information obtained by the user through the user terminal scan code.
  • the user scan code information includes the URL address and UUID; the ciphertext unit is set to the user terminal to obtain the IM account from the IM software, and the IM account and UUID
  • the encrypted text is generated after encryption, and the encrypted text is sent to the cloud desktop authentication server corresponding to the URL address.
  • the QR code display unit is also set to display the QR code after the cloud desktop portal displays the timer.
  • the cloud desktop portal does not receive
  • send a QR code generation request to the QR code server again, receive another QR code returned by the QR code server, replace and display the QR code, and wait for the user to scan the code.
  • the cloud desktop login request receiving module further includes: a request receiving unit configured to receive a cloud desktop login request sent by a user through a preset login interface of the mobile terminal, the login interface is embedded in the IM software; encryption and The sending unit is configured to obtain an IM account and UUID from the IM software on the mobile terminal, encrypt the IM account and UUID to generate a ciphertext, and send the ciphertext to the cloud desktop authentication server associated with the login interface.
  • a request receiving unit configured to receive a cloud desktop login request sent by a user through a preset login interface of the mobile terminal, the login interface is embedded in the IM software
  • encryption and The sending unit is configured to obtain an IM account and UUID from the IM software on the mobile terminal, encrypt the IM account and UUID to generate a ciphertext, and send the ciphertext to the cloud desktop authentication server associated with the login interface.
  • the verification request sending module includes: a receiving and decrypting unit, which is set to receive a ciphertext sent by a mobile phone terminal by the cloud desktop authentication server, and decrypt the ciphertext to obtain an IM account number and UUID; sending a verification request unit, setting Send a verification request containing the IM account number and UUID to the IM server for the cloud desktop authentication server.
  • the first verification module includes: a login status determination unit, which is set to the IM server to determine whether the IM account is in the login status. If it is in the non-login status, which is defined as verification failure, log in to the cloud desktop corresponding to the UUID The requester returns the login failure information.
  • a login status determination unit which is set to the IM server to determine whether the IM account is in the login status. If it is in the non-login status, which is defined as verification failure, log in to the cloud desktop corresponding to the UUID The requester returns the login failure information.
  • the password corresponding to the IM account is queried, the IM account and the corresponding password are encrypted to generate a ciphertext, and the ciphertext is returned to the cloud desktop authentication server; decryption and The sending unit is set to the cloud desktop authentication server to receive the cipher text sent by the IM server, decrypt the cipher text to obtain the IM account and password, and send the UUID, IM account and password to the cloud desktop resource server.
  • the second verification module includes: sending an account secret unit, which is set to the cloud desktop resource server to send the IM account and password to the domain control server for verification through the domain control server; and verifying the account secret unit, which is set to After receiving the IM account and password, the domain control server verifies that the IM account and password are consistent with the built-in IM account and the corresponding cloud desktop password.
  • a computer device which includes a memory and a processor.
  • the memory stores computer readable instructions.
  • the processor executes the computer readable instructions to implement the above Steps in the cloud desktop login method based on cloud security of an embodiment.
  • a storage medium storing computer-readable instructions.
  • the one or more processors execute the cloud security based on the foregoing embodiments Steps in the cloud desktop login method.
  • the storage medium may be a non-volatile storage medium.
  • the program may be stored in a computer-readable storage medium, and the storage medium may include: Read only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请涉及云安全技术领域,尤其涉及一种基于云安全的云桌面登陆方法、装置、设备和存储介质。该方法包括:用户终端接收云桌面登陆请求,请求中包含有UUID,用户终端获取IM账号,将IM账号和UUID发送给云桌面认证服务器;云桌面认证服务器向IM服务器发送验证请求;IM服务器进行验证通过时,将密码返回给云桌面认证服务器,云桌面认证服务器将UUID、IM账号和密码发送给云桌面资源服务器;云桌面资源服务器对IM账号和密码进行验证通过时,将用户资源返回给云桌面认证服务器;云桌面认证服务器将用户资源返回给UUID对应的云桌面登陆请求方进行展示。本申请将云桌面登陆与IM软件结合,通过多个服务器之间的交互,实现用户一键登陆的目的。

Description

基于云安全的云桌面登陆方法、装置、设备和存储介质
本申请要求于2019年01月02日提交中国专利局、申请号为201910000471.5、发明名称为“基于云安全的云桌面登陆方法、装置、设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及云安全技术领域,尤其涉及一种基于云安全的云桌面登陆方法、装置、设备和存储介质。
背景技术
云桌面是一种基于分布式云计算存储技术,集成互联网精华应用,依托高度加密算法,为互联网各个层次用户提供最简便、最丰富、最安全、最贴心的服务。云桌面可以把数据空间、管理服务,提供桌面化的方式发布给操作者。
但是无论应用于手机端云桌面,还是应用于web端云桌面,通常需要登陆系统,在登陆验证过程中,云桌面后台认证信息交互复杂,需要双因子认证,为了满足安全登陆的需求,登陆前仍然需要用户输入大量信息,登陆操作非常繁琐,用户体验很差。
发明内容
有鉴于此,有必要针对云桌面登陆时,云桌面后台认证信息交互复杂,用户登陆操作非常繁琐,用户体验很差的问题,提供一种基于云安全的云桌面登陆方法、装置、设备和存储介质。
一种基于云安全的云桌面登陆方法,包括:
用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器;
所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验证请求,所述验证请求中包含有所述IM账号和所述UUID;
所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器后,所述云 桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器;
所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器;
所述云桌面认证服务器接收到所述用户资源后,将所述用户资源返回给所述UUID对应的云桌面登陆请求方,通过所述云桌面登陆请求方将所述用户资源进行展示。
一种基于云安全的云桌面登陆装置,包括:
接收云桌面登陆请求模块,设置为用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器;
发送验证请求模块,设置为所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验证请求,所述验证请求中包含有所述IM账号和所述UUID;
第一次验证模块,设置为所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器后,所述云桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器;
第二次验证模块,设置为所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器;
展示用户资源模块,设置为所述云桌面认证服务器接收到所述用户资源后,将所述用户资源返回给所述UUID对应的云桌面登陆请求方,通过所述云桌面登陆请求方将所述用户资源进行展示。
一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器执行以下步骤:
用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器;
所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验证请求,所述验证请求中包含有所述IM账号和所述UUID;
所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器后,所述云桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器;
所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器;
所述云桌面认证服务器接收到所述用户资源后,将所述用户资源返回给所述UUID对应的云桌面登陆请求方,通过所述云桌面登陆请求方将所述用户资源进行展示。
一种存储有计算机可读指令的存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器;
所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验证请求,所述验证请求中包含有所述IM账号和所述UUID;
所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器后,所述云桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器;
所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器;
所述云桌面认证服务器接收到所述用户资源后,将所述用户资源返回给所述UUID对应的云桌面登陆请求方,通过所述云桌面登陆请求方将所述用户资源进行展示。
上述基于云安全的云桌面登陆方法、装置、计算机设备和存储介质,包括用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器;所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验证请求,所述验证请求中包含有所述IM账号和所述UUID;所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器 后,所述云桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器;所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器;所述云桌面认证服务器接收到所述用户资源后,将所述用户资源返回给所述UUID对应的云桌面登陆请求方,通过所述云桌面登陆请求方将所述用户资源进行展示。本申请将云桌面登陆与企业IM软件结合,通过后台多个服务器之间的交互,实现用户一键登陆的目的,避免了用户在登陆云桌面系统时的繁琐操作过程,且还保证了两次验证的过程,兼顾了安全性和用户体验。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本申请的限制。
图1为本申请一个实施例中的基于云安全的云桌面登陆方法的流程图;
图2为一个实施例中步骤S1的一种流程图;
图3为一个实施例中步骤S1的另一种流程图;
图4为本申请一个实施例中基于云安全的云桌面登陆装置的结构图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本技术领域技术人员可以理解,除非特意声明,这里使用的单数形式“一”、“一个”、“所述”和“该”也可包括复数形式。应该进一步理解的是,本申请的说明书中使用的措辞“包括”是指存在所述特征、整数、步骤、操作、元件和/或组件,但是并不排除存在或添加一个或多个其他特征、整数、步骤、操作、元件、组件和/或它们的组。
图1为本申请一个实施例中的基于云安全的云桌面登陆方法的流程图,如图1所示,一种基于云安全的云桌面登陆方法,包括以下步骤:
步骤S1,接收云桌面登陆请求:用户终端接收用户发送的云桌面登陆请求,云桌面登陆请求中包含有通用唯一识别码UUID,用户终端从即时通讯IM软件中 获取IM账号,将IM账号和UUID发送给云桌面认证服务器。
本步骤的用户终端可以是手机、平板电脑等手持式智能设备,用户终端内嵌有应用程序APP和具有扫码功能的扫码脚本。应用程序APP包括即时通讯IM软件,IM软件,即Instant Messaging软件,是指能够即时发送和接收互联网消息等的业务。如QQ软件、微信软件、支付宝软件或快乐平安APP等。IM软件也可以采用其他企业认证系统,如声纹软件、人脸识别软件等。
云桌面登陆方式一般包含web网页端云桌面登陆和用户终端的云桌面登陆。针对两种不同的云桌面登陆方式,本步骤用户终端接收用户发送的云桌面登陆请求时有两种不同的方式:
在一个实施例中,步骤S1,如图2所示,包括:
步骤S101,生成二维码请求:云桌面门户网站接收用户发送的扫码登陆请求,向二维码服务器发送生成二维码请求。
当云桌面登陆方式为web网页端云桌面登陆时,用户打开云桌面门户网站,云桌面门户网站可以设置登陆请求按键,用户点击登陆请求按键,发送扫码登陆请求,云桌面门户网站接收此请求。
步骤S102,生成并返回二维码:二维码服务器接收生成二维码请求后,生成二维码,将二维码返回给云桌面门户网站,二维码中含有云桌面认证服务器的统一资源定位符URL地址和UUID。
二维码服务器用于根据云桌面门户网站的请求,生成一个二维码,此二维码中含有此云桌面门户网站对应的云桌面认证服务器URL地址、随机生成的一个UUID,此UUID与云桌面门户网站的会话控制编码seesionID形成映射关系,且需保证UUID的唯一性,在后续工作中,其他服务器通过UUID来检索seesionID,通过seesionID得到此云桌面门户网站的链接,向此云桌面门户网站返回具体数据。
步骤S103,展示:云桌面门户网站将二维码进行展示,并等待用户扫码。
云桌面门户网站通过交互界面,将从二维码服务器返回的二维码进行展示,供用户通过用户终端进行扫码操作。在等待用户扫码时,展示的二维码具有生命周期,例如30秒、2分钟等时间阈值,在超过此时间阈值后,此二维码被定义为失效二维码,还需再次向二维码服务器请求生成新的二维码:
云桌面门户网站将二维码进行展示后,通过计时器进行计时,当计时时间超过预设的时间阈值,云桌面门户网站未收到任何返回结果时,再次向二维码服务器发送生成二维码请求,接收二维码服务器返回的另一个二维码,对二维 码进行更换和展示,并等待用户扫码。
时间阈值可以预先设置在计时器中,通过计时器进行计时并向云桌面门户网站发送触发信号,云桌面门户网站接收到触发信号,且在未收到任何返回结果的情况下,再次向二维码服务器发送生成二维码请求,云桌面门户网站接收到的新的二维码中的UUID与原二维码中的UUID不同,保证了二维码的唯一性。
步骤S104,获取用户扫码信息:用户终端接收到用户发送的云桌面登陆请求,云桌面登陆请求中包含有用户通过用户终端扫码后得到的用户扫码信息,用户扫码信息包含URL地址和UUID。
用户通过用户终端中的扫码脚本对云桌面门户网站展示的二维码进行扫码,用户终端获得用户扫码信息,定义为接收到用户发送的云桌面登陆请求。本步骤的用户终端内嵌有IM软件,此IM软件可以通过用户下载安装后获得,也可以通过用户终端自动下载安装的方式获得。此扫码脚本优选内嵌在用户中的IM软件中,用户通过内嵌的IM软件中的扫码脚本对二维码进行扫码。
步骤S105,加密:用户终端从IM软件中获取IM账号,将IM账号和UUID通过加密后生成密文,将密文发送给URL地址对应的云桌面认证服务器。
用户终端的存储介质中保存有IM软件对应的IM账号,用户终端直接从存储介质中获取IM账号,为了保证数据传输的安全稳定,本步骤还对IM账号和UUID通过预设的公钥进行加密处理,生成密文发送给URL地址对应的云桌面认证服务器。本步骤中的公钥可以采用基于3DES算法的公钥。
本实施例通过云桌面门户网站进行云桌面的登陆请求,提供扫码一键直接登陆的页面,通过用户终端扫码的方式请求登陆,用户操作简单方便,无需输入用户名密码,提高用户体验度。
在一个实施例中,步骤S1,如图3所示,包括:
步骤S111,接收请求:手机终端通过预设的登陆界面接收用户发送的云桌面登陆请求,登陆界面内嵌在IM软件中。
本步骤的用户终端内嵌有IM软件,此IM软件可以通过用户下载安装后获得,也可以通过用户终端自动下载安装的方式获得。在IM软件中预先设置有用于触发云桌面登陆的登陆界面,用户使用时,通过打开用户终端中的IM软件,选择工作台,点击登陆界面上的云桌面图标,发送云桌面登陆请求。
步骤S112,加密:手机终端从IM软件中获取IM账号和UUID,将IM账号和UUID通过加密后生成密文,将密文发送给登陆界面关联的云桌面认证服务器。
与步骤S105相同,用户终端的存储介质中保存有IM软件对应的IM账号, 用户终端直接从存储介质中获取IM账号,且每个用户终端的IM软件均有服务器分配给IM软件的唯一UUID,用户终端同时还从存储介质中获取此唯一UUID。为了保证数据传输的安全稳定,本步骤还对IM账号和UUID通过公钥进行加密处理,生成密文发送给URL地址对应的云桌面认证服务器。
不同的IM软件关联的云桌面认证服务器不同,因此手机终端根据登陆界面的不同,向对应云桌面认证服务器发送密文。例如IM软件为快乐平安APP,快乐平安APP中内置有登陆界面,则手机终端向平安的云桌面认证服务器发送携带有IM账号和UUID的密文。
本实施例通过云桌面嵌入式登陆方式,用户直接通过用户终端请求登陆云桌面,用户只需点击登陆界面上的云桌面图标,一键直接请求,用户操作简单方便,无需输入用户名密码,提高用户体验度。
步骤S2,发送验证请求:云桌面认证服务器接收IM账号和UUID,向IM服务器发送验证请求,验证请求中包含有IM账号和UUID。
云桌面认证服务器接收手机终端发送的IM账号和UUID,当IM账号和UUID为密文时,还进行如下方式:
在一个实施例中,步骤S2,包括:
步骤S201,解密:云桌面认证服务器接收手机终端发送的密文,将密文进行解密,得到IM账号和UUID。
为了保证数据传输的安全稳定,步骤S1中在对IM账号和UUID传输前,对其进行了加密处理,因此本步骤,在接收到手机终端发送的数据后,还对数据进行解密处理。解密时,可以采用与加密采用的公钥配对的私钥进行解密。用户终端和云桌面认证服务器约定共识同一套加解密算法,用户终端加密的密文,云桌面认证服务器进行解密处理,得到IM账号和UUID。
步骤S202,发送请求:云桌面认证服务器向IM服务器发送包含有IM账号和UUID的验证请求。
云桌面认证服务器无法验证IM账号,因此其向IM软件对应的IM服务器发送验证请求,请求IM服务器验证IM账号是否处于登陆状态。
本实施例针对手机终端发送加密数据时,云桌面认证服务器通过对应的公钥进行解密,得到IM账号和UUID,并发送给IM服务器,请求IM服务器验证IM账号。
步骤S3,第一次验证:IM服务器接收到验证请求后,对IM账号进行验证,当验证通过时,将IM账号及对应的密码返回给云桌面认证服务器后,云桌面认 证服务器将UUID、IM账号和密码发送给云桌面资源服务器。
IM服务器是IM软件的服务器,IM服务器中存储有所有IM账号,且标记有所有IM账号当前的登陆情况,IM服务器对IM账号进行验证时,主要是验证IM账号是否处于登陆状态,若为登录状态,则验证通过,否则,认为验证失败,返回登陆失败结果。
在一个实施例中,步骤S3,包括:
步骤S301,判断登陆状态:IM服务器判断IM账号是否为登陆状态,若为非登陆状态,定义为验证失败,则向UUID对应的云桌面登陆请求方返回登陆失败信息,若为登陆状态,定义为验证通过,则查询IM账号对应的密码,将IM账号及对应的密码加密后生成密文,将密文返回给云桌面认证服务器。
IM服务器存储有所有注册于IM软件的IM账号的当前登陆状态,IM服务器接收到验证请求后,搜索存储介质中的IM账号,获取IM账号对应的登陆状态,若为非登陆状态,认为手机终端中的IM软件离线,无法通过IM账号进行云桌面的登陆操作,定义为验证失败,此时IM服务器直接对UUID对应的云桌面登陆请求方返回登陆失败信息,此云桌面登陆请求方可以是云桌面门户网站,也可以是手机终端的IM软件。登陆失败信息的提示内容可以是IM软件未登陆等提示,告知用户需要先登陆IM账号,才能进行云桌面登陆请求。IM账号对应的登陆状态为登陆状态,认为手机终端中的IM软件在线,定义为验证通过,从存储介质中获取IM账号对应的密码。
为了增加密码的安全性,在IM服务器返回IM账号和密码前,还对IM账号和密码通过公钥进行加密后,通过内网方式返回给云桌面认证服务器。
步骤S302,解密及发送账密信息:云桌面认证服务器接收IM服务器发送的密文,将密文进行解密,得到IM账号和密码,将UUID、IM账号和密码发送给云桌面资源服务器。
本步骤对应步骤S301中IM服务器对IM账号和密码进行加密后返回的数据,云桌面认证服务器采用与加密采用的公钥配对的私钥进行解密。此时,用户终端、云桌面认证服务器和IM服务器可以约定共识同一套加解密算法,云桌面认证服务器只需在存储介质中保存同一份解密算法,均可对用户终端和IM服务器发送的密文进行解密,得到对应的解密数据。
本步骤的云桌面认证服务器在得到IM账号和密码后,还需要将其发送给云桌面资源服务器进行第二次验证,验证IM账号对应的密码与云桌面资源服务器存储的IM账号对应的密码是否一致。在发送IM账号和密码时,通过接口调用 的方式,将IM账号和密码传递给云桌面资源服务器。
本实施例是对云桌面登陆的第一次验证过程,云桌面认证服务器通过IM服务器实现云桌面登陆的第一次验证,在验证过程中,当验证通过后,IM服务器向云桌面认证服务器返回IM账号和对应密码,在返回之前,为了保证数据的安全传输,还对IM账号和密码进行加密处理,增加了账密的安全性。
步骤S4,第二次验证:云桌面资源服务器接收到IM账号和密码后,对IM账号和密码进行验证,当验证通过时,则将IM账号对应的用户资源返回给云桌面认证服务器。
云桌面资源服务器中存储有所有IM账号及对应的用户资源,云桌面资源服务器在对IM账号和密码进行验证时,通过与其连接的域控服务器进行验证:
在一个实施例中,步骤S4,包括:
步骤S401,发送验证账密:云桌面资源服务器将IM账号和密码发送给域控服务器,通过域控服务器进行验证。
本步骤中的云桌面资源服务器自身不对账密进行验证,而是通过域控服务器验证账密,域控服务器即为AD服务器,域控服务器保存有云桌面登陆账号和对应的云桌面密码,其中云桌面登陆账号与IM账号一致。
步骤S402,验证账密一致性:域控服务器接收到IM账号和密码后,验证IM账号和密码与内置的IM账号及对应的云桌面密码是否一致,若不一致,则定义为验证不通过,则向UUID对应的云桌面登陆请求方返回登陆失败信息,若一致,则定义为验证通过,将验证通过结果返回给云桌面资源服务器。
域控服务器由于查询速度非常快,因此可用于存储用户信息等静态数据。域控服务器收到IM账号和密码后,将IM账号与内置的账号进行匹配,若匹配到含有一致的账号,则将密码和云桌面密码进行匹配,判断是否一致。若匹配不到含有一致的账号,或者密码不一致,认为验证不通过,则向UUID对应的云桌面登陆请求方返回登陆失败信息,其中云桌面登陆请求方可以是云桌面门户网站,也可以是手机终端的IM软件。登陆失败信息的提示内容可以是IM账号密码与云桌面账号密码不一致等提示。当IM账号和密码都一致后,定义为验证通过,域控服务器将验证通过结果返回给云桌面资源服务器。
步骤S403,返回用户资源:云桌面资源服务器接收到验证通过结果后,从数据库中获取IM账号对应的用户资源,将用户资源返回给云桌面认证服务器。
云桌面认证服务器中存储有所有云桌面账号对应的用户资源,本步骤的云桌面账号即为IM账号,两者一致。因此当云桌面认证服务器收到域控服务器返 回验证通过结果后,认为IM账号已经通过了双重验证,将IM账号对应的用户资源返回给云桌面认证服务器,通过云桌面认证服务器返回给云桌面登陆请求方进行展示。
本实施例是对云桌面登陆的第二次验证过程,云桌面认证服务器通过云桌面资源服务器连接的域控服务器完成第二次验证,当验证通过后,云桌面资源服务器返回用户资源,供后续展示给用户查看与互动。
步骤S5,展示用户资源:云桌面认证服务器接收到用户资源后,将用户资源返回给UUID对应的云桌面登陆请求方,通过云桌面登陆请求方将用户资源进行展示。
经各服务器交互通过双重验证通过后,云桌面认证服务器将用户资源生成资源列表,并关联UUID后,将资源列表发送给UUID对应的云桌面登陆请求方。当云桌面登陆请求方为云桌面门户网站时,云桌面认证服务器将资源列表发送给云桌面门户网站,通过云桌面门户网站将用户资源进行展示。当云桌面登陆请求方为用户终端时,云桌面认证服务器将资源列表发送给用户终端,通过用户终端将用户资源进行展示。用户只需点击用户资源,就可进入云桌面系统,完成登陆过程。
本申请实施例基于云安全的云桌面登陆方法,采用二维码扫码和在IM软件中内嵌登陆界面两种不同的登陆方式,结合用户终端内可信任的IM软件,实现一键登陆的目的,用户无需输入任何用户名和密码,云桌面的双重验证都在各服务器的交互中完成,用户可直接实现云桌面登陆,提高了用户体验度。
在一个实施例中,提出了一种基于云安全的云桌面登陆装置,如图4所示,包括如下模块:接收云桌面登陆请求模块,设置为用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器;发送验证请求模块,设置为所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验证请求,所述验证请求中包含有所述IM账号和所述UUID;第一次验证模块,设置为所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器后,所述云桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器;第二次验证模块,设置为所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器;展示用户 资源模块,设置为所述云桌面认证服务器接收到所述用户资源后,将所述用户资源返回给所述UUID对应的云桌面登陆请求方,通过所述云桌面登陆请求方将所述用户资源进行展示。
在一个实施例中,接收云桌面登陆请求模块,包括:二维码请求单元,设置为云桌面门户网站接收用户发送的扫码登陆请求,向二维码服务器发送生成二维码请求;返回二维码单元,设置为二维码服务器接收生成二维码请求后,生成二维码,将二维码返回给云桌面门户网站,二维码中含有云桌面认证服务器的统一资源定位符URL地址和UUID;展示二维码单元,设置为云桌面门户网站将二维码进行展示,并等待用户扫码;接收登陆请求单元,设置为用户终端接收到用户发送的云桌面登陆请求,云桌面登陆请求中包含有用户通过用户终端扫码后得到的用户扫码信息,用户扫码信息包含URL地址和UUID;发送密文单元,设置为用户终端从IM软件中获取IM账号,将IM账号和UUID通过加密后生成密文,将密文发送给URL地址对应的云桌面认证服务器。
在一个实施例中,展示二维码单元,还设置为云桌面门户网站将二维码进行展示后,通过计时器进行计时,当计时时间超过预设的时间阈值,云桌面门户网站未收到任何返回结果时,再次向二维码服务器发送生成二维码请求,接收二维码服务器返回的另一个二维码,对二维码进行更换和展示,并等待用户扫码。
在一个实施例中,接收云桌面登陆请求模块,还包括:接收请求单元,设置为手机终端通过预设的登陆界面接收用户发送的云桌面登陆请求,登陆界面内嵌在IM软件中;加密及发送单元,设置为手机终端从IM软件中获取IM账号和UUID,将IM账号和UUID通过加密后生成密文,将密文发送给登陆界面关联的云桌面认证服务器。
在一个实施例中,发送验证请求模块,包括:接收及解密单元,设置为云桌面认证服务器接收手机终端发送的密文,将密文进行解密,得到IM账号和UUID;发送验证请求单元,设置为云桌面认证服务器向IM服务器发送包含有IM账号和UUID的验证请求。
在一个实施例中,第一次验证模块,包括:判断登陆状态单元,设置为IM服务器判断IM账号是否为登陆状态,若为非登陆状态,定义为验证失败,则向UUID对应的云桌面登陆请求方返回登陆失败信息,若为登陆状态,定义为验证通过,则查询IM账号对应的密码,将IM账号及对应的密码加密后生成密文,将密文返回给云桌面认证服务器;解密及发送单元,设置为云桌面认证服务器 接收IM服务器发送的密文,将密文进行解密,得到IM账号和密码,将UUID、IM账号和密码发送给云桌面资源服务器。
在一个实施例中,第二次验证模块,包括:发送账密单元,设置为云桌面资源服务器将IM账号和密码发送给域控服务器,通过域控服务器进行验证;验证账密单元,设置为域控服务器接收到IM账号和密码后,验证IM账号和密码与内置的IM账号及对应的云桌面密码是否一致,若不一致,则定义为验证不通过,则向UUID对应的云桌面登陆请求方返回登陆失败信息,若一致,则定义为验证通过,将验证通过结果返回给云桌面资源服务器;返回资源单元,设置为云桌面资源服务器接收到验证通过结果后,从数据库中获取IM账号对应的用户资源,将用户资源返回给云桌面认证服务器。
在一个实施例中,提出了一种计算机设备,包括存储器和处理器,存储器中存储有计算机可读指令,计算机可读指令被处理器执行时,使得处理器执行计算机可读指令时实现上述各实施例的基于云安全的云桌面登陆方法中的步骤。
在一个实施例中,提出了一种存储有计算机可读指令的存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行上述各实施例的基于云安全的云桌面登陆方法中的步骤。其中,存储介质可以为非易失性存储介质。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:只读存储器(ROM,Read Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁盘或光盘等。
以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请一些示例性实施例,其描述较为具体和详细,但并不能因此而理解为对本申请专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种基于云安全的云桌面登陆方法,包括:
    用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器;
    所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验证请求,所述验证请求中包含有所述IM账号和所述UUID;
    所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器后,所述云桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器;
    所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器;
    所述云桌面认证服务器接收到所述用户资源后,将所述用户资源返回给所述UUID对应的云桌面登陆请求方,通过所述云桌面登陆请求方将所述用户资源进行展示。
  2. 根据权利要求1所述的基于云安全的云桌面登陆方法,其中,所述用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器,包括:
    云桌面门户网站接收用户发送的扫码登陆请求,向二维码服务器发送生成二维码请求;
    所述二维码服务器接收所述生成二维码请求后,生成二维码,将所述二维码返回给所述云桌面门户网站,所述二维码中含有所述云桌面认证服务器的统一资源定位符URL地址和UUID;
    所述云桌面门户网站将所述二维码进行展示,并等待用户扫码;
    所述用户终端接收到用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有用户通过所述用户终端扫码后得到的用户扫码信息,所述用户扫码信息包含所述URL地址和所述UUID;
    所述用户终端从所述IM软件中获取IM账号,将所述IM账号和所述UUID通过加密后生成密文,将密文发送给所述URL地址对应的云桌面认证服务器。
  3. 根据权利要求2所述的基于云安全的云桌面登陆方法,其中,所述云桌 面门户网站将所述二维码进行展示,并等待用户扫码,包括:
    所述云桌面门户网站将所述二维码进行展示后,通过计时器进行计时,当计时时间超过预设的时间阈值,所述云桌面门户网站未收到任何返回结果时,再次向所述二维码服务器发送生成二维码请求,接收所述二维码服务器返回的另一个二维码,对所述二维码进行更换和展示,并等待用户扫码。
  4. 根据权利要求1所述的基于云安全的云桌面登陆方法,其中,所述用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器,包括:
    所述手机终端通过预设的登陆界面接收用户发送的云桌面登陆请求,所述登陆界面内嵌在所述IM软件中;
    所述手机终端从所述IM软件中获取IM账号和UUID,将所述IM账号和所述UUID通过加密后生成密文,将密文发送给所述登陆界面关联的所述云桌面认证服务器。
  5. 根据权利要求2所述的基于云安全的云桌面登陆方法,其中,所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验证请求,所述验证请求中包含有所述IM账号和所述UUID,包括:
    所述云桌面认证服务器接收所述手机终端发送的密文,将密文进行解密,得到所述IM账号和所述UUID;
    所述云桌面认证服务器向IM服务器发送包含有所述IM账号和所述UUID的验证请求。
  6. 根据权利要求1所述的基于云安全的云桌面登陆方法,其中,所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器后,所述云桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器,包括:
    所述IM服务器判断所述IM账号是否为登陆状态,若为非登陆状态,定义为验证失败,则向所述UUID对应的云桌面登陆请求方返回登陆失败信息,若为登陆状态,定义为验证通过,则查询所述IM账号对应的密码,将所述IM账号及对应的密码加密后生成密文,将密文返回给所述云桌面认证服务器;
    所述云桌面认证服务器接收所述IM服务器发送的密文,将密文进行解密,得到所述IM账号和密码,将所述UUID、所述IM账号和密码发送给所述云桌面 资源服务器。
  7. 根据权利要求1所述的基于云安全的云桌面登陆方法,其中,所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器,包括:
    所述云桌面资源服务器将所述IM账号和密码发送给域控服务器,通过所述域控服务器进行验证;
    所述域控服务器接收到所述IM账号和密码后,验证所述IM账号和密码与内置的IM账号及对应的云桌面密码是否一致,若不一致,则定义为验证不通过,则向所述UUID对应的云桌面登陆请求方返回登陆失败信息,若一致,则定义为验证通过,将验证通过结果返回给所述云桌面资源服务器;
    所述云桌面资源服务器接收到验证通过结果后,从数据库中获取所述IM账号对应的用户资源,将所述用户资源返回给所述云桌面认证服务器。
  8. 一种基于云安全的云桌面登陆装置,包括:
    接收云桌面登陆请求模块,设置为用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器;
    发送验证请求模块,设置为所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验证请求,所述验证请求中包含有所述IM账号和所述UUID;
    第一次验证模块,设置为所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器后,所述云桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器;
    第二次验证模块,设置为所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器;
    展示用户资源模块,设置为所述云桌面认证服务器接收到所述用户资源后,将所述用户资源返回给所述UUID对应的云桌面登陆请求方,通过所述云桌面登陆请求方将所述用户资源进行展示。
  9. 根据权利要求8所述的基于云安全的云桌面登陆装置,其中,所述接收 云桌面登陆请求模块,包括:
    二维码请求单元,设置为云桌面门户网站接收用户发送的扫码登陆请求,向二维码服务器发送生成二维码请求;
    返回二维码单元,设置为所述二维码服务器接收所述生成二维码请求后,生成二维码,将所述二维码返回给所述云桌面门户网站,所述二维码中含有所述云桌面认证服务器的统一资源定位符URL地址和UUID;
    展示二维码单元,设置为所述云桌面门户网站将所述二维码进行展示,并等待用户扫码;
    接收登陆请求单元,设置为所述用户终端接收到用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有用户通过所述用户终端扫码后得到的用户扫码信息,所述用户扫码信息包含所述URL地址和所述UUID;
    发送密文单元,设置为所述用户终端从所述IM软件中获取IM账号,将所述IM账号和所述UUID通过加密后生成密文,将密文发送给所述URL地址对应的云桌面认证服务器。
  10. 根据权利要求9所述的基于云安全的云桌面登陆装置,其中,所述展示二维码单元,还设置为所述云桌面门户网站将所述二维码进行展示后,通过计时器进行计时,当计时时间超过预设的时间阈值,所述云桌面门户网站未收到任何返回结果时,再次向所述二维码服务器发送生成二维码请求,接收所述二维码服务器返回的另一个二维码,对所述二维码进行更换和展示,并等待用户扫码。
  11. 根据权利要求8所述的基于云安全的云桌面登陆装置,其中,所述接收云桌面登陆请求模块,还包括:
    接收请求单元,设置为所述手机终端通过预设的登陆界面接收用户发送的云桌面登陆请求,所述登陆界面内嵌在所述IM软件中;
    加密及发送单元,设置为所述手机终端从所述IM软件中获取IM账号和UUID,将所述IM账号和所述UUID通过加密后生成密文,将密文发送给所述登陆界面关联的所述云桌面认证服务器。
  12. 根据权利要求9所述的基于云安全的云桌面登陆装置,其中,所述发送验证请求模块,包括:
    接收及解密单元,设置为所述云桌面认证服务器接收所述手机终端发送的密文,将密文进行解密,得到所述IM账号和所述UUID;
    发送验证请求单元,设置为所述云桌面认证服务器向IM服务器发送包含有所述IM账号和所述UUID的验证请求。
  13. 根据权利要求8所述的基于云安全的云桌面登陆装置,其中,所述第一次验证模块,包括:
    判断登陆状态单元,设置为所述IM服务器判断所述IM账号是否为登陆状态,若为非登陆状态,定义为验证失败,则向所述UUID对应的云桌面登陆请求方返回登陆失败信息,若为登陆状态,定义为验证通过,则查询所述IM账号对应的密码,将所述IM账号及对应的密码加密后生成密文,将密文返回给所述云桌面认证服务器;
    解密及发送单元,设置为所述云桌面认证服务器接收所述IM服务器发送的密文,将密文进行解密,得到所述IM账号和密码,将所述UUID、所述IM账号和密码发送给所述云桌面资源服务器。
  14. 根据权利要求8所述的基于云安全的云桌面登陆装置,其中,所述第二次验证模块,包括:
    发送账密单元,设置为所述云桌面资源服务器将所述IM账号和密码发送给域控服务器,通过所述域控服务器进行验证;
    验证账密单元,设置为所述域控服务器接收到所述IM账号和密码后,验证所述IM账号和密码与内置的IM账号及对应的云桌面密码是否一致,若不一致,则定义为验证不通过,则向所述UUID对应的云桌面登陆请求方返回登陆失败信息,若一致,则定义为验证通过,将验证通过结果返回给所述云桌面资源服务器;
    返回资源单元,设置为所述云桌面资源服务器接收到验证通过结果后,从数据库中获取所述IM账号对应的用户资源,将所述用户资源返回给所述云桌面认证服务器。
  15. 一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器执行以下步骤:
    用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器;
    所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验 证请求,所述验证请求中包含有所述IM账号和所述UUID;
    所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器后,所述云桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器;
    所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器;
    所述云桌面认证服务器接收到所述用户资源后,将所述用户资源返回给所述UUID对应的云桌面登陆请求方,通过所述云桌面登陆请求方将所述用户资源进行展示。
  16. 根据权利要求15所述的计算机设备,其中,所述用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器时,使得所述处理器执行以下步骤:
    云桌面门户网站接收用户发送的扫码登陆请求,向二维码服务器发送生成二维码请求;
    所述二维码服务器接收所述生成二维码请求后,生成二维码,将所述二维码返回给所述云桌面门户网站,所述二维码中含有所述云桌面认证服务器的统一资源定位符URL地址和UUID;
    所述云桌面门户网站将所述二维码进行展示,并等待用户扫码;
    所述用户终端接收到用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有用户通过所述用户终端扫码后得到的用户扫码信息,所述用户扫码信息包含所述URL地址和所述UUID;
    所述用户终端从所述IM软件中获取IM账号,将所述IM账号和所述UUID通过加密后生成密文,将密文发送给所述URL地址对应的云桌面认证服务器。
  17. 根据权利要求15所述的计算机设备,其中,所述用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器时,使得所述处理器执行以下步骤:
    所述手机终端通过预设的登陆界面接收用户发送的云桌面登陆请求,所述登陆界面内嵌在所述IM软件中;
    所述手机终端从所述IM软件中获取IM账号和UUID,将所述IM账号和所述UUID通过加密后生成密文,将密文发送给所述登陆界面关联的所述云桌面认证服务器。
  18. 一种存储有计算机可读指令的存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
    用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器;
    所述云桌面认证服务器接收所述IM账号和所述UUID,向IM服务器发送验证请求,所述验证请求中包含有所述IM账号和所述UUID;
    所述IM服务器接收到所述验证请求后,对所述IM账号进行验证,当验证通过时,将所述IM账号及对应的密码返回给所述云桌面认证服务器后,所述云桌面认证服务器将所述UUID、所述IM账号和密码发送给云桌面资源服务器;
    所述云桌面资源服务器接收到所述IM账号和密码后,对所述IM账号和密码进行验证,当验证通过时,则将所述IM账号对应的用户资源返回给所述云桌面认证服务器;
    所述云桌面认证服务器接收到所述用户资源后,将所述用户资源返回给所述UUID对应的云桌面登陆请求方,通过所述云桌面登陆请求方将所述用户资源进行展示。
  19. 根据权利要求18所述的存储介质,其中,所述用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器时,使得一个或多个处理器执行以下步骤:
    云桌面门户网站接收用户发送的扫码登陆请求,向二维码服务器发送生成二维码请求;
    所述二维码服务器接收所述生成二维码请求后,生成二维码,将所述二维码返回给所述云桌面门户网站,所述二维码中含有所述云桌面认证服务器的统一资源定位符URL地址和UUID;
    所述云桌面门户网站将所述二维码进行展示,并等待用户扫码;
    所述用户终端接收到用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有用户通过所述用户终端扫码后得到的用户扫码信息,所述用户扫码信息 包含所述URL地址和所述UUID;
    所述用户终端从所述IM软件中获取IM账号,将所述IM账号和所述UUID通过加密后生成密文,将密文发送给所述URL地址对应的云桌面认证服务器。
  20. 根据权利要求18所述的存储介质,其中,所述用户终端接收用户发送的云桌面登陆请求,所述云桌面登陆请求中包含有通用唯一识别码UUID,所述用户终端从即时通讯IM软件中获取IM账号,将IM账号和所述UUID发送给云桌面认证服务器时,使得一个或多个处理器执行以下步骤:
    所述手机终端通过预设的登陆界面接收用户发送的云桌面登陆请求,所述登陆界面内嵌在所述IM软件中;
    所述手机终端从所述IM软件中获取IM账号和UUID,将所述IM账号和所述UUID通过加密后生成密文,将密文发送给所述登陆界面关联的所述云桌面认证服务器。
PCT/CN2019/092901 2019-01-02 2019-06-26 基于云安全的云桌面登陆方法、装置、设备和存储介质 Ceased WO2020140407A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910000471.5 2019-01-02
CN201910000471.5A CN109873805B (zh) 2019-01-02 2019-01-02 基于云安全的云桌面登陆方法、装置、设备和存储介质

Publications (1)

Publication Number Publication Date
WO2020140407A1 true WO2020140407A1 (zh) 2020-07-09

Family

ID=66917410

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/092901 Ceased WO2020140407A1 (zh) 2019-01-02 2019-06-26 基于云安全的云桌面登陆方法、装置、设备和存储介质

Country Status (2)

Country Link
CN (1) CN109873805B (zh)
WO (1) WO2020140407A1 (zh)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948652A (zh) * 2021-04-19 2021-06-11 中国石油化工股份有限公司 基于二维码的石化装置数据展示方法及系统
CN113297595A (zh) * 2021-06-09 2021-08-24 北京沃东天骏信息技术有限公司 提权处理方法、装置、存储介质与电子设备
CN113609540A (zh) * 2021-08-03 2021-11-05 深圳市闪联信息技术有限公司 一种电子设备的usb接口可信管理方法及系统
CN113992346A (zh) * 2021-09-16 2022-01-28 深圳市证通电子股份有限公司 一种基于国密加固的安全云桌面的实现方法
CN114201744A (zh) * 2021-12-09 2022-03-18 南京轩智信息科技有限公司 一种第三方扫码的文印认证方法
CN114625987A (zh) * 2022-02-23 2022-06-14 湖南新云网科技有限公司 二维码地址生成方法、装置、设备及计算机存储介质
CN114979235A (zh) * 2022-04-22 2022-08-30 福建升腾资讯有限公司 一种基于云桌面数据共享的方法及服务器
CN115688085A (zh) * 2021-07-28 2023-02-03 博泰车联网科技(上海)股份有限公司 一种编译文件管理方法、装置及存储介质
CN115694946A (zh) * 2022-10-26 2023-02-03 西安雷风电子科技有限公司 一种idv云终端安全管理、资源调度系统及方法
CN116760589A (zh) * 2023-06-09 2023-09-15 招银云创信息技术有限公司 云管理平台的管理方法及相关设备
WO2024174738A1 (zh) * 2023-02-20 2024-08-29 中兴通讯股份有限公司 云桌面的访问方法、服务器、云桌面系统及存储介质

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109873805B (zh) * 2019-01-02 2021-06-25 平安科技(深圳)有限公司 基于云安全的云桌面登陆方法、装置、设备和存储介质
CN110401674B (zh) * 2019-08-19 2022-05-17 泰康保险集团股份有限公司 数据访问方法、装置、系统、电子设备及计算机可读介质
CN113515330B (zh) * 2020-04-10 2024-04-26 南方电网科学研究院有限责任公司 一种基于国产密码技术的云桌面安全认证方法、系统
CN112261011B (zh) * 2020-09-30 2023-06-16 上海仲速网络科技股份有限公司 基于二维码识别的云桌面认证方法
CN112291269B (zh) * 2020-11-30 2023-03-03 南方电网科学研究院有限责任公司 一种云桌面认证方法、装置、电子设备和可读存储介质
CN113452711B (zh) * 2021-06-29 2023-07-14 新华三大数据技术有限公司 云桌面的单点登录方法及网络设备
CN115017535A (zh) * 2022-01-24 2022-09-06 河北机电职业技术学院 云桌面操作系统的访问方法、装置、电子设备及存储介质
CN115883104B (zh) * 2022-11-30 2023-07-21 北京时代亿信科技股份有限公司 终端设备的安全登录方法及装置、非易失性存储介质
CN116318952A (zh) * 2023-03-10 2023-06-23 统信软件技术有限公司 基于云桌面的授权方法、装置、计算设备及存储介质
CN119442194A (zh) * 2023-08-02 2025-02-14 杭州阿里云飞天信息技术有限公司 云桌面的登陆方法、电子设备和存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350717A (zh) * 2007-07-18 2009-01-21 中国移动通信集团公司 一种通过即时通信软件登录第三方服务器的方法及系统
CN103001974A (zh) * 2012-12-26 2013-03-27 百度在线网络技术(北京)有限公司 基于二维码的登录控制方法、系统和装置
US20150244699A1 (en) * 2014-02-21 2015-08-27 Liveensure, Inc. Method for peer to peer mobile context authentication
CN108965232A (zh) * 2017-05-17 2018-12-07 佳能株式会社 信息处理系统、控制方法及其存储介质
CN109873805A (zh) * 2019-01-02 2019-06-11 平安科技(深圳)有限公司 基于云安全的云桌面登陆方法、装置、设备和存储介质

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8006300B2 (en) * 2006-10-24 2011-08-23 Authernative, Inc. Two-channel challenge-response authentication method in random partial shared secret recognition system
CN101350797B (zh) * 2008-09-17 2011-11-30 腾讯科技(深圳)有限公司 简化用户操作的网站登录方法、系统、客户端和服务器
CN102651739B (zh) * 2011-02-28 2016-01-13 阿里巴巴集团控股有限公司 登录验证方法、系统及im服务器
CN103384237B (zh) * 2012-05-04 2017-02-22 华为技术有限公司 一种共享IaaS业务云账号的方法、及共享平台和网络装置
CN102857516B (zh) * 2012-09-27 2016-08-03 腾讯科技(深圳)有限公司 一种媒体资源分享方法及相关设备、系统
CN103780641B (zh) * 2012-10-17 2017-08-15 中国电信股份有限公司 接入云桌面的方法、家庭网关和系统
CN103067397B (zh) * 2012-12-31 2017-06-13 华为技术有限公司 一种桌面云系统的安全认证方法、接入网关及认证服务器
CN105991575A (zh) * 2015-02-10 2016-10-05 北京神州泰岳信息安全技术有限公司 云桌面的登陆方法及系统
CN104902028B (zh) * 2015-06-19 2019-02-15 广州密码科技有限公司 一种一键登录认证方法、装置及系统
CN107332808B (zh) * 2016-04-29 2021-06-29 中兴通讯股份有限公司 一种云桌面认证的方法、服务器及终端
CN105847277A (zh) * 2016-04-29 2016-08-10 乐视控股(北京)有限公司 用于第三方应用的服务账号共享管理方法及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350717A (zh) * 2007-07-18 2009-01-21 中国移动通信集团公司 一种通过即时通信软件登录第三方服务器的方法及系统
CN103001974A (zh) * 2012-12-26 2013-03-27 百度在线网络技术(北京)有限公司 基于二维码的登录控制方法、系统和装置
US20150244699A1 (en) * 2014-02-21 2015-08-27 Liveensure, Inc. Method for peer to peer mobile context authentication
CN108965232A (zh) * 2017-05-17 2018-12-07 佳能株式会社 信息处理系统、控制方法及其存储介质
CN109873805A (zh) * 2019-01-02 2019-06-11 平安科技(深圳)有限公司 基于云安全的云桌面登陆方法、装置、设备和存储介质

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948652A (zh) * 2021-04-19 2021-06-11 中国石油化工股份有限公司 基于二维码的石化装置数据展示方法及系统
CN112948652B (zh) * 2021-04-19 2024-03-26 中国石油化工股份有限公司 基于二维码的石化装置数据展示方法及系统
CN113297595A (zh) * 2021-06-09 2021-08-24 北京沃东天骏信息技术有限公司 提权处理方法、装置、存储介质与电子设备
CN115688085A (zh) * 2021-07-28 2023-02-03 博泰车联网科技(上海)股份有限公司 一种编译文件管理方法、装置及存储介质
CN113609540A (zh) * 2021-08-03 2021-11-05 深圳市闪联信息技术有限公司 一种电子设备的usb接口可信管理方法及系统
CN113992346B (zh) * 2021-09-16 2024-01-26 深圳市证通电子股份有限公司 一种基于国密加固的安全云桌面的实现方法
CN113992346A (zh) * 2021-09-16 2022-01-28 深圳市证通电子股份有限公司 一种基于国密加固的安全云桌面的实现方法
CN114201744A (zh) * 2021-12-09 2022-03-18 南京轩智信息科技有限公司 一种第三方扫码的文印认证方法
CN114625987A (zh) * 2022-02-23 2022-06-14 湖南新云网科技有限公司 二维码地址生成方法、装置、设备及计算机存储介质
CN114979235A (zh) * 2022-04-22 2022-08-30 福建升腾资讯有限公司 一种基于云桌面数据共享的方法及服务器
CN114979235B (zh) * 2022-04-22 2024-01-30 福建升腾资讯有限公司 一种基于云桌面数据共享的方法及服务器
CN115694946A (zh) * 2022-10-26 2023-02-03 西安雷风电子科技有限公司 一种idv云终端安全管理、资源调度系统及方法
WO2024174738A1 (zh) * 2023-02-20 2024-08-29 中兴通讯股份有限公司 云桌面的访问方法、服务器、云桌面系统及存储介质
CN116760589A (zh) * 2023-06-09 2023-09-15 招银云创信息技术有限公司 云管理平台的管理方法及相关设备

Also Published As

Publication number Publication date
CN109873805A (zh) 2019-06-11
CN109873805B (zh) 2021-06-25

Similar Documents

Publication Publication Date Title
CN109873805B (zh) 基于云安全的云桌面登陆方法、装置、设备和存储介质
US11431501B2 (en) Coordinating access authorization across multiple systems at different mutual trust levels
CN104967604B (zh) 登录方法和系统
US9871791B2 (en) Multi factor user authentication on multiple devices
US10637855B2 (en) Enhanced authentication for secure communications
US9401909B2 (en) System for and method of providing single sign-on (SSO) capability in an application publishing environment
US8984605B2 (en) Multi-factor authentication
US12526272B2 (en) Method and system for verification of identify of a user
CN110048848B (zh) 通过被动客户端发送会话令牌的方法、系统和存储介质
CN110069909B (zh) 一种免密登录第三方系统的方法及装置
CN113742676A (zh) 一种登录管理方法、装置、服务器、系统及存储介质
US20170279798A1 (en) Multi-factor authentication system and method
WO2015143855A1 (zh) 一种对数据资源进行访问的方法、装置和系统
JP7422241B2 (ja) パスワード回復方法、システム、クラウドサーバー及び電子デバイス
JP7079528B2 (ja) サービス提供システム及びサービス提供方法
CN107395566B (zh) 认证方法及装置
CN118381626B (zh) 应用间的认证方法、设备及可读存储介质
KR101651607B1 (ko) 익명 아이디를 사용하는 원클릭 사용자 인증 방법 및 시스템
CN115550047B (zh) 免配置的接口权限验证方法、装置及系统
CN114218542B (zh) 访客身份审核方法及系统
CN105871788B (zh) 一种登录服务器的密码生成方法及装置
CN114117404A (zh) 一种用户认证方法、装置、设备、系统及存储介质
CN119383013B (zh) 认证登录系统的方法、装置、设备及存储介质
CN110248166B (zh) 视频信息的处理方法、客户端、电子设备及存储介质
AU2014101079A4 (en) Secure communication method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19907618

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19907618

Country of ref document: EP

Kind code of ref document: A1