WO2023045548A1 - 云桌面的认证管理方法和系统、电子设备、可读存储介质 - Google Patents

云桌面的认证管理方法和系统、电子设备、可读存储介质 Download PDF

Info

Publication number
WO2023045548A1
WO2023045548A1 PCT/CN2022/108227 CN2022108227W WO2023045548A1 WO 2023045548 A1 WO2023045548 A1 WO 2023045548A1 CN 2022108227 W CN2022108227 W CN 2022108227W WO 2023045548 A1 WO2023045548 A1 WO 2023045548A1
Authority
WO
WIPO (PCT)
Prior art keywords
data center
authentication
client terminal
user
personal information
Prior art date
Application number
PCT/CN2022/108227
Other languages
English (en)
French (fr)
Inventor
崔丕锁
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2023045548A1 publication Critical patent/WO2023045548A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present disclosure relates to the technical field of cloud computing.
  • the disclosure provides a cloud desktop authentication management method and system, electronic equipment, and a computer-readable storage medium.
  • the present disclosure provides a cloud desktop authentication management method, which is applied to a data center server or a data center system.
  • the authentication management method includes: receiving a first login authentication request sent by a first client terminal, wherein the The first login authentication request includes: user personal information; sending the first acquisition request to the multi-data center unified authentication server or multi-data center unified authentication system, and from the multi-data center unified authentication server or multi-data center unified authentication
  • the authorization system acquires a token corresponding to the user's personal information, wherein the first acquisition request includes: the user's personal information; and returns a first session identifier to the first client terminal.
  • the present disclosure provides an electronic device, including: at least one processor; a memory, at least one program is stored on the memory, and when the at least one program is executed by the at least one processor, the above-mentioned cloud desktop is realized Authentication management method.
  • the present disclosure provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the authentication management method of the cloud desktop is implemented.
  • the present disclosure provides an authentication management system for cloud desktops, including: a first client terminal, configured to send a first login authentication request to a data center server or a data center system, and receive the data center server or data
  • the first session identifier sent by the central system wherein the first login authentication request includes: user personal information; a data center server or a data center system, which is used to receive the first login authentication request sent by the first client terminal Request, in response to the first login authentication request, send a first acquisition request to the multi-data center unified authentication server or multi-data center unified authentication system, and from the multi-data center unified authentication server or multi-data center unified authentication
  • the authorization system acquires a token corresponding to the user's personal information, and returns a first session identifier to the first client terminal, wherein the first acquisition request includes the user's personal information; and the multi-data center unified authentication server or a multi-data center unified authentication system, which is used to receive the first acquisition request sent by the data center server or the data center system
  • FIG. 1 is a flow chart of a method for authentication management of a cloud desktop according to an embodiment of the present disclosure
  • FIG. 2 is an interactive schematic diagram of a cloud desktop authentication management method according to an embodiment of the present disclosure
  • FIG. 3 is a block diagram of a cloud desktop authentication management device according to an embodiment of the present disclosure.
  • Fig. 4 is a block diagram of a cloud desktop authentication management system according to an embodiment of the present disclosure.
  • FIG. 1 is a flow chart of a cloud desktop authentication management method according to an embodiment of the present disclosure.
  • a cloud desktop authentication management method is applied to a data center server or a data center system, and the method includes steps 100 and 101 .
  • step 100 a first login authentication request sent by a first client terminal is received, wherein the first login authentication request includes: user personal information.
  • the first client terminal can be set in any hardware device, such as a mobile terminal, a personal computer, and the like.
  • the user's personal information may be any personal information of the user, such as a username and password for logging into the cloud desktop.
  • a first acquisition request is sent to the multi-data center unified authentication server or the multi-data center unified authentication system, and the token corresponding to the user's personal information is obtained from the multi-data center unified authentication server or the multi-data center unified authentication system. card, and return the first session identifier to the first client terminal, where the first acquisition request includes: user personal information.
  • the session identifier indicates a session between the client terminal and the data center server or data center system.
  • the multi-data center unified authentication server or the multi-data center unified authentication system authenticates the user according to the user's personal information in the first acquisition request, and then authenticates the user.
  • the token corresponding to the user's personal information is sent to the data center server or data center system, and when the authentication fails, the token corresponding to the user's personal information is not sent to the data center server or data center system, but can be sent to The data center server or the data center system sends information indicating authentication failure.
  • the authentication management method further includes: after obtaining the token corresponding to the user's personal information from the multi-data center unified authentication server or the multi-data center unified authentication system, locally cache the token corresponding to the user's personal information token.
  • the data center server or data center system when the data center server or data center system receives the token returned by the multi-data center unified authentication server or the multi-data center unified authentication system, it can also receive the multi-data center unified authentication server or the multi-data The valid time of the token sent by the central unified authentication system, after the valid time of receiving the token elapses, the token becomes invalid, and the token needs to be obtained from the multi-data center unified authentication server or the multi-data center unified authentication system again.
  • the authentication management method further includes: receiving a second login authentication request sent by the second client terminal, wherein the second login authentication request includes user personal information (the user personal information is the same as that sent by the first client terminal.
  • the user’s personal information included in the first login authentication request is the same); determine whether there is a token corresponding to the user’s personal information in the local cache;
  • the unified authentication server or multi-data center unified authentication system sends a second acquisition request including the user's personal information, obtains the token corresponding to the user's personal information from the multi-data center unified authentication server or multi-data center unified authentication system, and sends
  • the second client returns a second session identifier.
  • the second session identifier is returned to the second client terminal;
  • the terminal returns the second session ID; if it is determined to return the second session ID to the second client terminal, continue to perform the step of returning the second session ID to the second client terminal.
  • determining whether to return the second session identifier to the second client terminal according to the preset client terminal management strategy includes: determining whether to allow multiple client terminals to log in simultaneously according to the preset client terminal management strategy; When two client terminals log in at the same time, return the second session identifier to the second client terminal.
  • the embodiment of the present disclosure does not limit the client terminal management policy, and the user can set it according to actual needs.
  • the authentication management method further includes: after returning the first session identifier to the first client terminal, if the first client terminal does not receive an operation instruction within a preset time, making the first session identifier invalidated.
  • Making the first session identifier invalid refers to disconnecting the session link between the first client terminal and the data center server or data center system.
  • the authentication method further includes: after returning the second session identifier to the second client terminal, in the case that the second client terminal does not receive an operation instruction within a preset time, invalidating the second session identifier .
  • Invalidating the second session identifier means disconnecting the session link between the second client terminal and the data center server or data center system.
  • the data center server or the data center system obtains the token corresponding to the user's personal information from the multi-data center unified authentication server or the multi-data center unified authentication system, and the multiple The data center unified authentication server or the multi-data center unified authentication system realizes the authentication of multiple users in a unified manner, and does not need to perform authentication in each data center.
  • the authentication process is relatively simple, which avoids the possibility of multiple data centers. There will be cases of repeated authentication and authentication.
  • the data center server or data center system maintains the token corresponding to the user's personal information instead of the client terminal to maintain the token corresponding to the user's personal information, so that multiple client terminals can log in to the cloud at the same time Desktop, when multiple client terminals use the same user personal information to log in to the cloud desktop at the same time, it is only necessary to authenticate the user's personal information once, which reduces the pressure of authentication and improves the stability of the system.
  • Fig. 2 is an interactive schematic diagram of a cloud desktop authentication management method according to an embodiment of the present disclosure.
  • the cloud desktop authentication management method includes steps 200 to 207 .
  • step 200 the client terminal 1 sends a login authentication request to the data center server, wherein the login authentication request includes: user personal information.
  • the user's personal information includes: the user name and password for logging in to the cloud desktop.
  • the data center server sends an acquisition request to a multi-data center unified authentication server, wherein the acquisition request includes: user personal information.
  • step 202 the multi-data center unified authentication server returns a token corresponding to the user's personal information to the data center server.
  • step 203 the data center server locally caches the token corresponding to the user's personal information, and returns the first session identifier (SessionID1) to the client terminal one.
  • step 204 the client terminal 2 sends a login authentication request to the data center server, wherein the login authentication request includes: user personal information.
  • step 205 the data center server returns the second session identifier (SessionID2) to the client terminal two.
  • step 206 as soon as the client terminal does not receive an operation instruction within a preset time, the first session identifier becomes invalid.
  • step 207 the client terminal 2 does not receive an operation instruction within a preset time, and the second session identifier becomes invalid.
  • the present disclosure provides an electronic device, including: at least one processor; and a memory, at least one program is stored in the memory, and when the at least one program is executed by the at least one processor, the authentication management method of the above-mentioned cloud desktop is implemented.
  • Processor is a device with data processing capability, which includes but not limited to central processing unit (CPU), etc.; memory is a device with data storage capability, which includes but not limited to random access memory (RAM, more specifically SDRAM, DDR etc.), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory (FLASH).
  • RAM random access memory
  • ROM read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • FLASH flash memory
  • the processor and the memory are connected to each other through a bus, and further connected to other components of the computing device.
  • the present disclosure provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, any authentication management method of the above-mentioned cloud desktop is realized.
  • Fig. 3 is a block diagram of an authentication management device for a cloud desktop according to an embodiment of the present disclosure.
  • the authentication management device (such as a data center server) of a cloud desktop according to an embodiment of the present disclosure includes: a communication module 301, which is configured to receive a first login authentication request sent by a first client terminal, wherein the first login authentication request Including: user personal information; an acquisition module 302, which is used to send the first acquisition request to a multi-data center unified authentication server or a multi-data center unified authentication system, and from a multi-data center unified authentication server or a multi-data center unified authentication The system acquires a token corresponding to the user's personal information, wherein the first acquisition request includes: the user's personal information; the communication module 301 is further configured to: return the first session identifier to the client terminal.
  • a communication module 301 which is configured to receive a first login authentication request sent by a first client terminal, wherein the first login authentication request Including: user personal information
  • an acquisition module 302 which is used to send the first acquisition request to a multi-data center unified authentication server or a multi-data
  • the obtaining module 302 is further configured to: receive a second login authentication request sent by the second client terminal, wherein the second login authentication request includes user personal information (the user personal information is the same as that of the first client terminal The first login authentication request sent includes the same user personal information); determine whether the token corresponding to the user personal information is cached locally; The central unified authentication server or the multi-data center unified authentication system sends the second acquisition request including the user's personal information, and obtains the token corresponding to the user's personal information from the multi-data center unified authentication server or the multi-data center unified authentication system, Return the second session identifier to the second client.
  • the communication module 301 is further configured to: return the second session identifier to the second client terminal if the token corresponding to the user's personal information is cached locally.
  • the communication module 301 is further configured to: determine whether to return the second session identifier to the second client terminal according to a preset client terminal management policy; and if it is determined to return the second session identifier to the fierce client terminal, Continue to execute the step of returning the second session identifier to the second client terminal.
  • the communication module 301 is specifically configured to determine whether to return the second session identifier to the second client terminal according to a preset client terminal management policy in the following manner: determine whether to allow multiple sessions according to a preset client terminal management policy. Simultaneous login of multiple client terminals; if multiple client terminals are allowed to log in at the same time, return the second session identifier to the second client terminal.
  • the communication module 301 is further configured to: invalidate the first session identifier when the first client terminal is not operated within a preset time.
  • the implementation process of the authentication management device for the cloud desktop is the same as the implementation process of the authentication management method for the cloud desktop in the foregoing embodiment, and will not be repeated here.
  • Fig. 4 is a block diagram of a cloud desktop authentication management system according to an embodiment of the present disclosure.
  • the cloud desktop authentication management system includes: a first client terminal 401 , a data center server or data center system 402 and a multi-data center unified authentication server or multi-data center unified authentication system 403 .
  • the first client terminal 401 is used to send a first login authentication request to the data center server or data center system 402, wherein the first login authentication request includes: user personal information; A session ID.
  • the data center server or data center system 402 is used to receive the first login authentication request sent by the first client terminal 401; respond to the first login authentication request to the multi-data center unified authentication server or multi-data center unified authentication system 403 Send the first acquisition request, wherein the first acquisition request includes the user's personal information; obtain the token corresponding to the user's personal information from the multi-data center unified authentication server or the multi-data center unified authentication system 403; send the first client terminal 401 Returns the first session ID.
  • the multi-data center unified authentication server or multi-data center unified authentication system 403 is used to receive the first acquisition request sent by the data center server or data center system; authenticate the user according to the user's personal information in the first acquisition request, and authenticate When the authorization is passed, the token corresponding to the user's personal information is sent to the data center server or data center system.
  • the data center server or data center system 402 is further configured to: receive a second login authentication request sent by a second client terminal (not shown), wherein the second login authentication request includes user personal information (the user's personal information is the same as the user's personal information included in the first login authentication request sent by the first client terminal); determine whether the local cache has a token corresponding to the user's personal information; there is no local cache corresponding to the user's personal information
  • the system acquires a token corresponding to the user's personal information, and returns the second session identifier to the second client.
  • the data center server or the data center system 402 is further configured to: return the second session identifier to the second client terminal if the token corresponding to the user's personal information is cached locally.
  • the data center server or data center system 402 is further configured to: determine whether to return the second session identifier to the second client terminal according to a preset client terminal management policy; In the case of the session ID, continue to execute the step of returning the second session ID to the second client terminal.
  • the data center server or data center system 402 is configured to determine whether to return the second session identifier to the second client terminal according to a preset client terminal management strategy in the following manner: according to a preset client terminal management strategy Determine whether multiple client terminals are allowed to log in at the same time; if multiple client terminals are allowed to log in at the same time, return the second session identifier to the second client terminal.
  • the data center server or data center system 402 is further configured to: invalidate the first session identifier when the first client terminal is not operated within a preset time.
  • the data center system and the multi-data center unified authentication system may be clusters, such as distributed clusters, multi-site multi-center clusters, and the like.
  • the implementation process of the authentication management system for the above cloud desktop is the same as the implementation process of the aforementioned authentication management method for the cloud desktop, and will not be repeated here.
  • the functional modules/units in the system, and the device can be implemented as software, firmware, hardware, and an appropriate combination thereof.
  • the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be composed of several physical components. Components cooperate to execute.
  • Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application-specific integrated circuit .
  • Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media).
  • computer storage media includes both volatile and nonvolatile media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data. permanent, removable and non-removable media.
  • Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, tape, magnetic disk storage or other magnetic storage, or may be used Any other medium that stores desired information and can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本公开提供了一种云桌面的认证管理方法和系统、电子设备、计算机可读存储介质,云桌面的认证管理方法包括:接收客户终端发送的登录鉴权请求;其中,所述登录鉴权请求包括:用户个人信息;从多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取所述用户个人信息对应的令牌;向所述客户终端返回第一会话标识。

Description

云桌面的认证管理方法和系统、电子设备、可读存储介质 技术领域
本公开涉及云计算技术领域。
背景技术
随着云计算技术的发展,特别是随着远程办公的需求越来越大,云桌面相关的部署越来越多,更多的企业采用私有或公有云桌面系统来完善远程办公场景,满足日常办公的需要。
随着云桌面基群的规模越来越大,多数据中心的搭建是一个非常重要的场景,而为了用户接入的需要,需要对用户进行鉴权,目前的鉴权方法需要分别在各个数据中心中进行鉴权认证,鉴权认证过程比较繁琐,而且多个数据中心可能会有重复鉴权认证的情况。
发明内容
本公开提供一种云桌面的认证管理方法和系统、电子设备、计算机可读存储介质。
第一方面,本公开提供一种云桌面的认证管理方法,应用于数据中心服务器或数据中心系统,该认证管理方法包括:接收第一客户终端发送的第一登录鉴权请求,其中,所述第一登录鉴权请求包括:用户个人信息;向多数据中心统一鉴权服务器或多数据中心统一鉴权系统发送第一获取请求,从所述多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与所述用户个人信息对应的令牌,其中,所述第一获取请求包括:所述用户个人信息;向所述第一客户终端返回第一会话标识。
第二方面,本公开提供一种电子设备,包括:至少一个处理器;存储器,存储器上存储有至少一个程序,当所述至少一个程序被所述至少一个处理器执行时,实现上述云桌面的认证管理方法。
第三方面,本公开提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现上述云桌面的认证管理方法。
第四方面,本公开提供一种云桌面的认证管理系统,包括:第一客户终端,其用于向数据中心服务器或数据中心系统发送第一登录鉴权请求,接收所述数据中心服务器或数据中心系统发送的第一会话标识,其中,所述第一登录鉴权请求包括:用户个人信息;数据中心服务器或数据中心系统,其用于接收所述第一客户终端发送的第一登录鉴权请求,响应于所述第一登录鉴权请求向多数据中心统一鉴权服务器或多数据中心统一鉴权系统发送第一获取请求,从所述多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与所述用户个人信息对应的令牌,向所述第一客户终端返回第一会话标识,其中,所述第一获取请求包括用户个人信息;以及所述多数据中心统一鉴权服务器或多数据中心统一鉴权系统,其用于接收所述数据中心服务器或所述数据中心系统发送的所述第一获取请求,根据所述第一获取请求中的所述用户个人信息对用户进行鉴权,并在鉴权通过时向所述数据中心服务器或数据中心系统发送与所述用户个人信息对应的所述令牌。
附图说明
图1为根据本公开的实施例的云桌面的认证管理方法的流程图;
图2为根据本公开的实施例的云桌面的认证管理方法的交互示意图;
图3为根据本公开的实施例的云桌面的认证管理装置的组成框图;
图4为根据本公开的实施例的云桌面的认证管理系统的组成框图。
具体实施方式
为使本领域的技术人员更好地理解本公开的技术方案,下面结 合附图对本公开提供的云桌面的认证管理方法和系统、电子设备、计算机可读存储介质进行详细描述。
在下文中将参考附图更充分地描述示例实施例,但是所述示例实施例可以以不同形式来体现且不应当被解释为限于本文阐述的实施例。反之,提供这些实施例的目的在于使本公开透彻和完整,并将使本领域技术人员充分理解本公开的范围。
在不冲突的情况下,本公开各实施例及实施例中的各特征可相互组合。
如本文所使用的,术语“和/或”包括至少一个相关列举条目的任何和所有组合。
本文所使用的术语仅用于描述特定实施例,且不意欲限制本公开。如本文所使用的,单数形式“一个”和“该”也意欲包括复数形式,除非上下文另外清楚指出。还将理解的是,当本说明书中使用术语“包括”和/或“由……制成”时,指定存在所述特征、整体、步骤、操作、元件和/或组件,但不排除存在或添加至少一个其它特征、整体、步骤、操作、元件、组件和/或其群组。
除非另外限定,否则本文所用的所有术语(包括技术和科学术语)的含义与本领域普通技术人员通常理解的含义相同。还将理解,诸如那些在常用字典中限定的那些术语应当被解释为具有与其在相关技术以及本公开的背景下的含义一致的含义,且将不解释为具有理想化或过度形式上的含义,除非本文明确如此限定。
图1为根据本公开的实施例的云桌面的认证管理方法的流程图。
参照图1,根据本公开的实施例的云桌面的认证管理方法,应用于数据中心服务器或数据中心系统,该方法包括步骤100和101。
在步骤100,接收第一客户终端发送的第一登录鉴权请求,其中,第一登录鉴权请求包括:用户个人信息。
根据本公开的实施例,第一客户终端可以设置在任何硬件设备中,例如移动终端、个人电脑等。
根据本公开的实施例,用户个人信息可以是用户的任何个人信息,如登录云桌面的用户名、密码等。
在步骤101,向多数据中心统一鉴权服务器或多数据中心统一鉴权系统发送第一获取请求,从多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与用户个人信息对应的令牌,向第一客户终端返回第一会话标识,其中,第一获取请求包括:用户个人信息。
根据本公开的实施例,会话标识指示客户终端和数据中心服务器或数据中心系统之间的会话。
根据本公开的实施例,多数据中心统一鉴权服务器或多数据中心统一鉴权系统在接收到第一获取请求后,根据第一获取请求中的用户个人信息对用户进行鉴权,在鉴权通过时,向数据中心服务器或数据中心系统发送与用户个人信息对应的令牌,在鉴权不通过时,不向数据中心服务器或数据中心系统发送与用户个人信息对应的令牌,而可以向数据中心服务器或数据中心系统发送表示鉴权失败的信息。
根据本公开的实施例的认证管理方法还包括:在从多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与用户个人信息对应的令牌后,在本地缓存与用户个人信息对应的令牌。
根据本公开的实施例,数据中心服务器或数据中心系统在接收多数据中心统一鉴权服务器或多数据中心统一鉴权系统返回的令牌时,还可以接收多数据中心统一鉴权服务器或多数据中心统一鉴权系统发送的令牌有效时间,在接收到令牌的有效时间逝去后,令牌失效,需要重新从多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取令牌。
根据本公开的实施例的认证管理方法还包括:接收第二客户终端发送的第二登录鉴权请求,其中,第二登录鉴权请求包括用户个人信息(该用户个人信息与第一客户终端发送的第一登录鉴权请求包括的用户个人信息相同);确定本地是否缓存有与用户个人信息对应的令牌;在本地没有缓存有与用户个人信息对应的令牌的情况下,向多数据中心统一鉴权服务器或多数据中心统一鉴权系统发送包括用户个人信息的第二获取请求,从多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与用户个人信息对应的令牌,向所述第二客户端返回第二会话标识。
根据本公开的实施例,在本地缓存有与用户个人信息对应的令牌的情况下,向第二客户终端返回第二会话标识;或者,根据预先设置的客户终端管理策略确定是否向第二客户终端返回第二会话标识;在确定向第二客户终端返回第二会话标识的情况下,继续执行向第二客户终端返回第二会话标识的步骤。
根据本公开的实施例,根据预先设置的客户终端管理策略确定是否向第二客户终端返回第二会话标识包括:根据预先设置的客户终端管理策略确定是否允许多个客户终端同时登陆;在允许多个客户终端同时登陆的情况下,向第二客户终端返回第二会话标识。
本公开实施例对客户终端管理策略不作限定,用户可以根据实际需要进行设置。
根据本公开的实施例的认证管理方法还包括:在向第一客户终端返回第一会话标识后,在第一客户终端在预设时间内未接收到操作指令的情况下,使第一会话标识失效。使第一会话标识失效是指将第一客户终端和数据中心服务器或数据中心系统之间的会话链接断开。
根据本公开的实施例的认证方法还包括:在向第二客户终端返回第二会话标识后,在第二客户终端在预设时间内未接收到操作指令的情况下,使第二会话标识失效。使第二会话标识失效是将指第二客户终端和数据中心服务器或数据中心系统之间的会话链接断开。
根据本公开的实施例的云桌面的认证管理方法,由数据中心服务器或数据中心系统从多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与用户个人信息对应的令牌,由多数据中心统一鉴权服务器或多数据中心统一鉴权系统统一实现对多个用户的鉴权,不需要在各个数据中心中进行鉴权认证,鉴权认证过程比较简单,避免了多个数据中心可能会有重复鉴权认证的情况。
根据本公开的实施例,由数据中心服务器或数据中心系统维护与用户个人信息对应的令牌,而不是由客户终端来维护与用户个人信息对应的令牌,使得多个客户终端可以同时登陆云桌面,在多个客户终端使用相同的用户个人信息同时登陆云桌面时,仅需要对用户个人信息进行鉴权一次即可,减少了鉴权的压力,提升了系统的稳定性。
图2为根据本公开的实施例的云桌面的认证管理方法的交互示意图。
如图2所示,云桌面的认证管理方法包括步骤200至207。
在步骤200,客户终端一向数据中心服务器发送登录鉴权请求,其中,登录鉴权请求包括:用户个人信息。
本步骤中,用户个人信息包括:登录云桌面的用户名、密码。
在步骤201,数据中心服务器向多数据中心统一鉴权服务器发送获取请求,其中,获取请求包括:用户个人信息。
在步骤202,多数据中心统一鉴权服务器向数据中心服务器返回与用户个人信息对应的令牌。
在步骤203,数据中心服务器在本地缓存与用户个人信息对应的令牌,并向客户终端一返回第一会话标识(SessionID1)。
在步骤204,客户终端二向数据中心服务器发送登录鉴权请求,其中,登录鉴权请求包括:用户个人信息。
在步骤205,数据中心服务器向客户终端二返回第二会话标识(SessionID2)。
在步骤206,客户终端一在预设时间内未接收到操作指令,第一会话标识失效。
在步骤207,客户终端二在预设时间内未接收到操作指令,第二会话标识失效。
本公开提供一种电子设备,包括:至少一个处理器;存储器,存储器上存储有至少一个程序,当至少一个程序被至少一个处理器执行时,实现上述云桌面的认证管理方法。
处理器为具有数据处理能力的器件,其包括但不限于中央处理器(CPU)等;存储器为具有数据存储能力的器件,其包括但不限于随机存取存储器(RAM,更具体如SDRAM、DDR等)、只读存储器(ROM)、带电可擦可编程只读存储器(EEPROM)、闪存(FLASH)。
根据本公开的实施例,处理器、存储器通过总线相互连接,进而与计算设备的其它组件连接。
本公开提供一种计算机可读存储介质,计算机可读存储介质上 存储有计算机程序,计算机程序被处理器执行时实现上述任意一种云桌面的认证管理方法。
图3为根据本公开的实施例的云桌面的认证管理装置的组成框图。
根据本公开的实施例的云桌面的认证管理装置(如数据中心服务器)包括:通信模块301,其用于接收第一客户终端发送的第一登录鉴权请求,其中,第一登录鉴权请求包括:用户个人信息;获取模块302,其用于向多数据中心统一鉴权服务器或多数据中心统一鉴权系统发送第一获取请求,从多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与用户个人信息对应的令牌,其中,第一获取请求包括:用户个人信息;通信模块301还用于:向客户终端返回第一会话标识。
根据本公开的实施例,获取模块302还用于:接收第二客户终端发送的第二登录鉴权请求,其中,第二登录鉴权请求包括用户个人信息(该用户个人信息与第一客户终端发送的第一登录鉴权请求包括的用户个人信息相同);确定本地是否缓存有与用户个人信息对应的令牌;在本地没有缓存有与用户个人信息对应的令牌的情况下,向多数据中心统一鉴权服务器或多数据中心统一鉴权系统发送包括用户个人信息的第二获取请求,从多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与用户个人信息对应的令牌,向第二客户端返回第二会话标识。
根据本公开的实施例,通信模块301还用于:在本地缓存有与用户个人信息对应的令牌的情况下,向第二客户终端返回第二会话标识。
根据本公开的实施例,通信模块301还用于:根据预先设置的客户终端管理策略确定是否向第二客户终端返回第二会话标识;在确定向fierce客户终端返回第二会话标识的情况下,继续执行向第二客户终端返回第二会话标识的步骤。
根据本公开的实施例,通信模块301具体用于采用以下方式实现根据预先设置的客户终端管理策略确定是否向第二客户终端返回 第二会话标识:根据预先设置的客户终端管理策略确定是否允许多个客户终端同时登陆;在允许多个客户终端同时登陆的情况下,向第二客户终端返回第二会话标识。
根据本公开的实施例,通信模块301还用于:在第一客户终端在预设时间内未操作的情况下,使第一会话标识失效。
上述云桌面的认证管理装置的实现过程与前述实施例的云桌面的认证管理方法的实现过程相同,这里不再赘述。
图4为根据本公开的实施例的云桌面的认证管理系统的组成框图。
根据本公开的实施例的云桌面的认证管理系统包括:第一客户终端401和数据中心服务器或数据中心系统402和多数据中心统一鉴权服务器或多数据中心统一鉴权系统403。
第一客户终端401用于向数据中心服务器或数据中心系统402发送第一登录鉴权请求,其中,第一登录鉴权请求包括:用户个人信息;接收数据中心服务器或数据中心系统402发送的第一会话标识。
数据中心服务器或数据中心系统402用于接收第一客户终端401发送的第一登录鉴权请求;响应于第一登录鉴权请求向多数据中心统一鉴权服务器或多数据中心统一鉴权系统403发送第一获取请求,其中,第一获取请求包括用户个人信息;从多数据中心统一鉴权服务器或多数据中心统一鉴权系统403获取与用户个人信息对应的令牌;向第一客户终端401返回第一会话标识。
多数据中心统一鉴权服务器或多数据中心统一鉴权系统403用于接收数据中心服务器或数据中心系统发送的第一获取请求;根据第一获取请求中的用户个人信息对用户进行鉴权,鉴权通过时,向数据中心服务器或数据中心系统发送与用户个人信息对应的令牌。
根据本公开的实施例,数据中心服务器或数据中心系统402还用于:接收第二客户终端(未示出)发送的第二登录鉴权请求,其中,第二登录鉴权请求包括用户个人信息(该用户个人信息与第一客户终端发送的第一登录鉴权请求包括的用户个人信息相同);确定本地是否缓存有与用户个人信息对应的令牌;在本地没有缓存有与用户个人 信息对应的令牌的情况下,向多数据中心统一鉴权服务器或多数据中心统一鉴权系统403发送包括用户个人信息的第二获取请求,从多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与用户个人信息对应的令牌,向第二客户端返回第二会话标识。
根据本公开的实施例,数据中心服务器或数据中心系统402还用于:在本地缓存有与用户个人信息对应的令牌的情况下,向第二客户终端返回第二会话标识。
根据本公开的实施例,数据中心服务器或数据中心系统402还用于:根据预先设置的客户终端管理策略确定是否向第二客户终端返回第二会话标识;在确定向第二客户终端返回第二会话标识的情况下,继续执行向第二客户终端返回第二会话标识的步骤。
根据本公开的实施例,数据中心服务器或数据中心系统402用于采用以下方式实现根据预先设置的客户终端管理策略确定是否向第二客户终端返回第二会话标识:根据预先设置的客户终端管理策略确定是否允许多个客户终端同时登陆;在允许多个客户终端同时登陆的情况下,向第二客户终端返回第二会话标识。
根据本公开的实施例,数据中心服务器或数据中心系统402还用于:在第一客户终端在预设时间内未操作的情况下,使第一会话标识失效。
本公开对数据中心系统、多数据中心统一鉴权系统的物理实现不作限定,例如数据中心系统、多数据中心统一鉴权系统可以是集群,如分布式集群、多地多中心集群等等。
上述云桌面的认证管理系统的实现过程与前述的云桌面的认证管理方法的实现过程相同,这里不再赘述。
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些物理组件或所有物理组件可以被实施为由处理器,如 中央处理器、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其它数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其它存储器技术、CD-ROM、数字多功能盘(DVD)或其它光盘存储、磁盒、磁带、磁盘存储或其它磁存储器、或者可以用于存储期望的信息并且可以被计算机访问的任何其它的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其它传输机制之类的调制数据信号中的其它数据,并且可包括任何信息递送介质。
本文已经公开了示例实施例,并且虽然采用了具体术语,但它们仅用于并仅应当被解释为一般说明性含义,并且不用于限制的目的。在一些实例中,对本领域技术人员显而易见的是,除非另外明确指出,否则可单独使用与特定实施例相结合描述的特征、特性和/或元素,或可与其它实施例相结合描述的特征、特性和/或元件组合使用。因此,本领域技术人员将理解,在不脱离由所附的权利要求阐明的本公开的范围的情况下,可进行各种形式和细节上的改变。

Claims (9)

  1. 一种云桌面的认证管理方法,应用于数据中心服务器或数据中心系统,该认证管理方法包括:
    接收第一客户终端发送的第一登录鉴权请求,其中,所述第一登录鉴权请求包括:用户个人信息;
    向多数据中心统一鉴权服务器或多数据中心统一鉴权系统发送第一获取请求,从所述多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与所述用户个人信息对应的令牌,其中,所述第一获取请求包括:所述用户个人信息;
    向所述第一客户终端返回第一会话标识。
  2. 根据权利要求1所述的云桌面的认证管理方法,还包括:
    接收第二客户端系统发送的第二登录鉴权请求,其中,所述第二登录鉴权请求包括所述用户个人信息;
    确定本地是否缓存有与所述用户个人信息对应的令牌;
    在本地没有缓存有与所述用户个人信息对应的令牌的情况下,向所述多数据中心统一鉴权服务器或多数据中心统一鉴权系统发送包括第二获取请求,从所述多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与所述用户个人信息对应的令牌,向所述第二客户端返回第二会话标识,其中,所述第二获取请求包括所述用户个人信息。
  3. 根据权利要求2所述的云桌面的认证管理方法,还包括:
    在本地缓存有与所述用户个人信息对应的令牌的情况下,向所述第二客户终端返回所述第二会话标识。
  4. 根据权利要求2或3所述的云桌面的认证管理方法,还包括:
    在向所述第二客户终端返回第二会话标识之前,根据预先设置的客户终端管理策略确定是否向所述第二客户终端返回所述第二会 话标识;
    在确定向所述第二客户终端返回所述第二会话标识的情况下,执行所述向所述第二客户终端返回所述第二会话标识的步骤。
  5. 根据权利要求4所述的云桌面的认证管理方法,其中,所述根据预先设置的客户终端管理策略确定是否向所述第二客户终端返回所述第二会话标识包括:
    根据所述预先设置的客户终端管理策略确定是否允许多个客户终端同时登陆;
    在允许多个客户终端同时登陆的情况下,向所述第二客户终端返回所述第二会话标识。
  6. 根据权利要求1所述的云桌面的认证管理方法,还包括:
    在向所述第一客户终端返回第一会话标识后,在所述第一客户终端在预设时间内未接收到操作指令的情况下,使所述第一会话标识失效。
  7. 一种电子设备,包括:
    至少一个处理器;
    存储器,所述存储器上存储有至少一个程序,当所述至少一个程序被所述至少一个处理器执行时,实现权利要求1-6任意一项所述的云桌面的认证管理方法。
  8. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-6任意一项所述的云桌面的认证管理方法。
  9. 一种云桌面的认证管理系统,包括:
    第一客户终端,其用于向数据中心服务器或数据中心系统发送第一登录鉴权请求,接收所述数据中心服务器或数据中心系统发送的 第一会话标识,其中,所述第一登录鉴权请求包括:用户个人信息;
    数据中心服务器或数据中心系统,其用于接收所述第一客户终端发送的第一登录鉴权请求,响应于所述第一登录鉴权请求向多数据中心统一鉴权服务器或多数据中心统一鉴权系统发送第一获取请求,从所述多数据中心统一鉴权服务器或多数据中心统一鉴权系统获取与所述用户个人信息对应的令牌,向所述第一客户终端返回第一会话标识,其中,所述第一获取请求包括用户个人信息;以及
    所述多数据中心统一鉴权服务器或多数据中心统一鉴权系统,其用于接收所述数据中心服务器或所述数据中心系统发送的所述第一获取请求,根据所述第一获取请求中的所述用户个人信息对用户进行鉴权,并在鉴权通过时向所述数据中心服务器或数据中心系统发送与所述用户个人信息对应的所述令牌。
PCT/CN2022/108227 2021-09-23 2022-07-27 云桌面的认证管理方法和系统、电子设备、可读存储介质 WO2023045548A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111118045.5 2021-09-23
CN202111118045.5A CN115865383A (zh) 2021-09-23 2021-09-23 云桌面的认证管理方法和系统、电子设备、可读存储介质

Publications (1)

Publication Number Publication Date
WO2023045548A1 true WO2023045548A1 (zh) 2023-03-30

Family

ID=85652408

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/108227 WO2023045548A1 (zh) 2021-09-23 2022-07-27 云桌面的认证管理方法和系统、电子设备、可读存储介质

Country Status (2)

Country Link
CN (1) CN115865383A (zh)
WO (1) WO2023045548A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857484A (zh) * 2011-07-01 2013-01-02 阿里巴巴集团控股有限公司 一种实现单点登录的方法、系统及装置
CN106375270A (zh) * 2015-07-24 2017-02-01 华为技术有限公司 令牌生成并认证的方法及认证服务器
CN109587126A (zh) * 2018-11-26 2019-04-05 平安科技(深圳)有限公司 用户鉴权方法和系统
US20200007530A1 (en) * 2018-06-28 2020-01-02 Oracle International Corporation Session Synchronization Across Multiple Devices in an Identity Cloud Service

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857484A (zh) * 2011-07-01 2013-01-02 阿里巴巴集团控股有限公司 一种实现单点登录的方法、系统及装置
CN106375270A (zh) * 2015-07-24 2017-02-01 华为技术有限公司 令牌生成并认证的方法及认证服务器
US20200007530A1 (en) * 2018-06-28 2020-01-02 Oracle International Corporation Session Synchronization Across Multiple Devices in an Identity Cloud Service
CN109587126A (zh) * 2018-11-26 2019-04-05 平安科技(深圳)有限公司 用户鉴权方法和系统

Also Published As

Publication number Publication date
CN115865383A (zh) 2023-03-28

Similar Documents

Publication Publication Date Title
CN110291757B (zh) 用于提供简化帐户注册服务、用户认证服务的方法及利用其的认证服务器
US10735182B2 (en) Apparatus, system, and methods for a blockchain identity translator
CA3020059C (en) Method and device for registering biometric identity and authenticating biometric identity
US11201778B2 (en) Authorization processing method, device, and system
US9800573B1 (en) Authentication on a computing device
CN111832000B (zh) 一种单点登录方法、系统、设备及计算机可读存储介质
US20180060868A1 (en) Systems and methods for remote verification of users
US7788729B2 (en) Method and system for integrating multiple identities, identity mechanisms and identity providers in a single user paradigm
US10135824B2 (en) Method and system for determining whether a terminal logging into a website is a mobile terminal
WO2018233536A1 (zh) 一种认证方法、基于区块链的认证数据处理方法及设备
US11792179B2 (en) Computer readable storage media for legacy integration and methods and systems for utilizing same
US11277404B2 (en) System and data processing method
US20210014064A1 (en) Method and apparatus for managing user authentication in a blockchain network
US8370914B2 (en) Transition from WS-Federation passive profile to active profile
US11444954B2 (en) Authentication/authorization server, client, service providing system, access management method, and medium
US9916308B2 (en) Information processing system, document managing server, document managing method, and storage medium
US11163499B2 (en) Method, apparatus and system for controlling mounting of file system
US20140143836A1 (en) Extended OAuth Architecture
KR20220019834A (ko) 디바이스로의 보안 자격증명 전송을 인증하는 방법 및 시스템
US20230325521A1 (en) Data processing method and apparatus based on blockchain network, device, and storage medium
WO2023045548A1 (zh) 云桌面的认证管理方法和系统、电子设备、可读存储介质
JP6848275B2 (ja) プログラム、認証システム及び認証連携システム
US11349671B2 (en) Authenticating communication
US11477189B2 (en) Primary domain and secondary domain authentication
CN117411725B (zh) 门户应用认证方法、装置、及计算机设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22871606

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE