CN107547480A - A kind of method, apparatus and virtual desktop management system of virtual desktop security control - Google Patents
A kind of method, apparatus and virtual desktop management system of virtual desktop security control Download PDFInfo
- Publication number
- CN107547480A CN107547480A CN201610488502.2A CN201610488502A CN107547480A CN 107547480 A CN107547480 A CN 107547480A CN 201610488502 A CN201610488502 A CN 201610488502A CN 107547480 A CN107547480 A CN 107547480A
- Authority
- CN
- China
- Prior art keywords
- access device
- server
- security policy
- data
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本发明提供一种虚拟桌面安全控制的方法,在管理节点中预置安全控制策略,安全控制策略包括至少一个典型场景及与每个典型场景所对应的安全策略,每个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个安全策略包括至少一个安全控制项;所述方法包括:接收接入设备发送的连接请求,连接请求用于接入设备请求与服务器建立连接;获取连接请求所携带的用户类型、接入设备类型、远程桌面类型,并与安全控制策略中典型场景进行比较,确定与连接请求匹配的典型场景以及与匹配的典型场景对应的安全策略;根据确定的安全策略向接入设备发送指示信息,指示信息用于指示接入设备与服务器建立连接,以此提高企业业务的信息安全。
The present invention provides a method for virtual desktop security control. A security control policy is preset in a management node. The security control policy includes at least one typical scenario and a security strategy corresponding to each typical scenario. Each typical scenario is a user type, A combination of access device type and remote desktop type, each security policy includes at least one security control item; the method includes: receiving a connection request sent by the access device, the connection request is used for the access device to request to establish a connection with the server; The user type, access device type, and remote desktop type carried in the connection request are compared with the typical scenarios in the security control policy to determine the typical scenario matching the connection request and the security policy corresponding to the matching typical scenario; according to the determined The security policy sends instruction information to the access device, and the instruction information is used to instruct the access device to establish a connection with the server, thereby improving the information security of the enterprise business.
Description
技术领域technical field
本发明涉及安全领域,尤其涉及一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统。The invention relates to the security field, in particular to a virtual desktop security control method, device and virtual desktop management system.
背景技术Background technique
随着远程桌面和虚拟化技术的发展,越来越多的企业选择使用虚拟桌面进行日常办公,以此提高企业办公资源的管理效率。With the development of remote desktop and virtualization technologies, more and more enterprises choose to use virtual desktops for daily office work, so as to improve the management efficiency of enterprise office resources.
现有技术中,虚拟桌面基础架构(Virtual Desktop Infrastructure,VDI)中主要包括虚拟桌面管理系统、服务器和接入设备。虚拟桌面管理系统用于实现虚拟桌面远程访问的管理和控制功能,服务器中部署虚拟化软件形成至少一个虚拟机,管理员可以在虚拟桌面管理系统中预先将服务器或虚拟机分配给用户,每个用户可以配置不同的权限,管理系统可以将多个已分配的服务器或虚拟机组成桌面组,通过桌面组控制桌面组中服务器或虚拟机的远程访问的操作权限,如在远程连接过程中是否允许服务器或虚拟机使用通用串行总线(Universal Serial Bus)闪存寄存器等外置设备。由此,用户远程访问服务器或虚拟机时,安全控制策略的实施依赖于用户的操作权限,以及服务器或虚拟机允许远程访问的操作权限。但是,对于虚拟桌面应用场景的不断扩大,仅通过用户、以及该用户已分配的服务器或虚拟机之间的权限控制关系已经无法满足在差异化接入场景下,对接入安全进行差异化控制的目的,企业业务的信息安全无法达到有效保障。In the prior art, a virtual desktop infrastructure (Virtual Desktop Infrastructure, VDI) mainly includes a virtual desktop management system, a server, and an access device. The virtual desktop management system is used to realize the management and control functions of virtual desktop remote access. The virtualization software is deployed in the server to form at least one virtual machine. The administrator can pre-allocate the server or virtual machine to the user in the virtual desktop management system. Users can configure different permissions. The management system can form multiple assigned servers or virtual machines into a desktop group, and control the remote access operation permissions of servers or virtual machines in the desktop group through the desktop group, such as whether to allow remote access during the remote connection process. Servers or virtual machines use external devices such as Universal Serial Bus (Universal Serial Bus) flash memory registers. Therefore, when a user remotely accesses a server or a virtual machine, the implementation of the security control policy depends on the user's operation authority and the operation authority of the server or virtual machine to allow remote access. However, for the continuous expansion of virtual desktop application scenarios, only through the authority control relationship between the user and the server or virtual machine assigned to the user can no longer meet the needs of differentiated control of access security in differentiated access scenarios. The information security of enterprise business cannot be effectively guaranteed.
发明内容Contents of the invention
本发明实施例提供了一种虚拟桌面安全控制的方法、装置和虚拟桌面管理系统,可以在管理节点中预置安全控制策略,管理节点根据每次连接请求所携带的用户类型、接入设备类型和远程桌面类型与安全控制策略进行比较,确定与本次连接请求匹配的典型场景及与该匹配的典型场景对应的安全策略,以此对不同连接请求实施差异化控制,提高企业业务的信息安全。Embodiments of the present invention provide a virtual desktop security control method, device, and virtual desktop management system, which can preset a security control policy in a management node, and the management node can use the user type and access device type carried in each connection request Compare with the remote desktop type and security control strategy, determine the typical scenario matching this connection request and the security strategy corresponding to the matching typical scenario, so as to implement differentiated control for different connection requests and improve the information security of enterprise business .
为了达到上述目的,本发明采用如下技术方案:In order to achieve the above object, the present invention adopts following technical scheme:
第一方面,提供一种虚拟桌面安全控制的方法,其特征在于,在管理节点中预置安全控制策略,所述安全控制策略包括至少一个典型场景及与每个所述至少一个典型场景所对应的安全策略,每个所述至少一个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个所述安全策略包括至少一个安全控制项;所述方法包括:In the first aspect, a method for virtual desktop security control is provided, wherein a security control policy is preset in the management node, and the security control policy includes at least one typical scenario and each of the at least one typical scenario corresponds to security policy, each of the at least one typical scenario is a combination of user type, access device type, and remote desktop type, and each of the security policies includes at least one security control item; the method includes:
所述管理节点接收接入设备发送的连接请求,所述连接请求用于所述接入设备请求与服务器建立连接;The management node receives a connection request sent by the access device, and the connection request is used for the access device to request to establish a connection with the server;
所述管理节点获取所述连接请求所携带的用户类型、接入设备类型、远程桌面类型;The management node acquires the user type, access device type, and remote desktop type carried in the connection request;
所述管理节点将所述连接请求所携带的用户类型、接入设备类型、远程桌面类型与所述安全控制策略中的所述至少一个典型场景进行比较,确定与所述连接请求匹配的典型场景以及与所述匹配的典型场景对应的安全策略;The management node compares the user type, access device type, and remote desktop type carried in the connection request with the at least one typical scenario in the security control policy, and determines a typical scenario that matches the connection request and a security policy corresponding to the typical matching scenario;
所述管理节点根据所述确定的安全策略向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接。The management node sends indication information to the access device according to the determined security policy, where the indication information is used to instruct the access device to establish a connection with the server.
具体地,管理员还可以通过管理节点在虚拟桌面管理系统中预置安全控制策略。具体地,可以根据用户类型、接入设备类型和远程桌面类型预置安全控制策略,其中,安全控制策略中包括授信级别、安全策略和典型场景。管理员可以根据具体实施过程中业务场景的需求,根据用户类型、接入设备类型和远程桌面类型确定典型场景,每个典型场景对应一种安全策略,每个安全策略又对应一个授信级别。Specifically, the administrator can also preset security control policies in the virtual desktop management system through the management node. Specifically, security control policies can be preset according to user types, access device types, and remote desktop types, where the security control policies include credit levels, security policies, and typical scenarios. Administrators can determine typical scenarios according to the requirements of business scenarios in the specific implementation process, according to user types, access device types, and remote desktop types. Each typical scenario corresponds to a security policy, and each security policy corresponds to a credit level.
可选地,还可以根据用户类型、接入设备类型、远程桌面类型和接入网络环境类型预置安全控制策略。Optionally, security control policies can also be preset according to user type, access device type, remote desktop type, and access network environment type.
值得说明的是,管理员预置的安全控制策略可以保存在管理节点中预置定义的文件或数据库表中,也可以以其他存储形式存储,本发明不作限制。It is worth noting that the security control policy preset by the administrator can be stored in a file or database table that is preset and defined in the management node, or can be stored in other storage forms, which is not limited by the present invention.
可选地,管理员在管理节点预置安全控制策略后,可以根据业务需求添加或更新授信级别、安全策略和典型场景,以此适应企业对信息安全要求的变化。需要说明的是,更新后的安全控制策略仅对更新后的新的连接请求生效。Optionally, after the administrator presets security control policies on the management node, he can add or update credit levels, security policies, and typical scenarios according to business needs, so as to adapt to changes in information security requirements of enterprises. It should be noted that the updated security control policy only takes effect for the updated new connection request.
可选地,若将连接请求中携带用户类型、接入设备类型、接入网络环境类型和远程桌面类型与预置安全控制策略比较后,无匹配的典型场景,则可以实施预置默认的安全策略。Optionally, if there is no matching typical scenario after comparing the user type, access device type, access network environment type, and remote desktop type carried in the connection request with the preset security control policy, the preset default security control policy can be implemented. Strategy.
本领域技术人员应理解的是,虚拟桌面为远程桌面的一种,虚拟桌面管理系统中建立用户和虚拟机的分配关系后,用户可以通过任一种接入设备通过任一种类型的接入网络环境向虚拟桌面管理系统发送连接虚拟机的请求,授信级别仅对本次连接请求生效。Those skilled in the art should understand that virtual desktops are a type of remote desktops. After the allocation relationship between users and virtual machines is established in the virtual desktop management system, users can use any type of access device to access The network environment sends a request to connect to the virtual machine to the virtual desktop management system, and the credit level is only valid for this connection request.
通过上述描述内容可知,管理员在管理节点中预置安全控制策略,即按照用户类型、接入设备类型和远程桌面类型的组合构成至少一个典型场景,每种典型场景对应一种安全策略,当用户通过接入设备请求与远程桌面建立连接时,根据本次连接请求中所携带的用户类型、接入设备类型和远程桌面类型与安全控制策略中的典型场景进行比较,确定与本次连接请求相匹配的典型场景及与匹配的典型场景所对应的安全策略,按照确定的安全策略的要求对接入设备和服务器实施不同的安全控制项,与现有技术中依赖用户的操作权限以及服务器或虚拟机允许远程访问的操作权限的安全控制,能够对不同场景下连接请求进行差异化安全控制,提升虚拟桌面基础架构的信息安全。From the above description, it can be seen that the administrator presets security control policies in the management node, that is, at least one typical scenario is formed according to the combination of user type, access device type, and remote desktop type. Each typical scenario corresponds to a security policy. When When a user requests to establish a connection with a remote desktop through an access device, compare the user type, access device type, and remote desktop type carried in the connection request with the typical scenarios in the security control policy to determine whether the connection request is related to the current connection request. Matching typical scenarios and security policies corresponding to the matching typical scenarios, implement different security control items on access devices and servers according to the requirements of the determined security policies, which is different from the existing technology that relies on user operation rights and server or The security control of the operating authority of the virtual machine that allows remote access can perform differentiated security control on connection requests in different scenarios, and improve the information security of the virtual desktop infrastructure.
结合第一方面的可能实现方式,在第一方面的第一种可能方式中,所述方法还包括:With reference to the possible implementation manner of the first aspect, in the first possible manner of the first aspect, the method further includes:
所述管理节点向所述服务器发送所述确定的安全策略,所述确定的安全策略包括采集所述接入设备的全球定位系统数据、摄像头数据、麦克风数据中的至少一种;The management node sends the determined security policy to the server, and the determined security policy includes collecting at least one of global positioning system data, camera data, and microphone data of the access device;
所述管理节点接收所述服务器发送的接入设备数据,所述接入设备数据为所述服务器通知所述接入设备按照所述确定的安全策略获得;The management node receives the access device data sent by the server, and the access device data is obtained by the server notifying the access device according to the determined security policy;
所述管理节点保存所述接入设备数据。The management node saves the access device data.
结合第一方面的第一种可能实现方式,在第一方面的第二种可能实现方式中,所述接入设备按照所述确定的安全策略获得所述接入设备数据具体为:With reference to the first possible implementation manner of the first aspect, in the second possible implementation manner of the first aspect, the obtaining of the access device data by the access device according to the determined security policy is specifically:
所述接入设备接收所述服务器发送的所述确定的安全策略;The access device receives the determined security policy sent by the server;
所述接入设备按照所述确定的安全策略的要求采集所述接入设备数据;The access device collects the access device data according to the requirements of the determined security policy;
所述接入设备向所述服务器发送所述接入设备数据。The access device sends the access device data to the server.
结合第一方面的可能实现方式,在第一方面的第三种可能实现方式中,所述方法还包括:With reference to the possible implementation of the first aspect, in a third possible implementation of the first aspect, the method further includes:
所述管理节点向所述服务器发送所述确定的安全策略,所述确定的安全策略包括文件系统重定向、剪切板重定向、数字水印中的至少一项,以使得所述服务器基于所述确定的安全策略:The management node sends the determined security policy to the server, the determined security policy includes at least one of file system redirection, clipboard redirection, and digital watermark, so that the server based on the Determined security policy:
将所述服务器的文件系统映射给所述接入设备;或mapping the file system of the server to the access device; or
将所述服务器的剪切板内容传递给所述接入设备;或passing the content of the server's clipboard to the access device; or
在所述服务器发送给所述接入设备的图像中添加水印。Adding a watermark to the image sent by the server to the access device.
结合第一方面的第三种可能实现方式,在第一方面的第四种可能实现方式中,所述方法还包括:With reference to the third possible implementation manner of the first aspect, in a fourth possible implementation manner of the first aspect, the method further includes:
所述服务器向所述接入设备发送所述确定的安全策略,以使得所述接入设备基于所述确定的安全策略:The server sends the determined security policy to the access device, so that the access device: based on the determined security policy:
将所述接入设备的文件系统映射给所述服务器;或mapping the file system of the access device to the server; or
将所述接入设备剪切板内容传递给所述服务器;或passing the clipboard content of the access device to the server; or
在所述接入设备的图像中添加水印。Adding a watermark to the image of the access device.
通过上述内容的描述,针对与本次连接请求相匹配的安全策略的要求,采集接入设备的全球定位系统(Global Positioning System,GPS)数据、摄像头数据、麦克风数据,并保存在管理节点中,与现有技术相比,采集并保存接入设备数据可以周期性对虚拟桌面管理系统中的连接请求进行安全审计,提高企业信息安全。另一方面,针对每次连接请求,对接入设备和服务器分别实施不同的安全控制项,以此解决了现有技术中无法在不同接入场景下实现差异化控制的问题,由此,提高了企业业务的信息安全。Through the description of the above content, according to the requirements of the security policy matching this connection request, collect the Global Positioning System (Global Positioning System, GPS) data, camera data, and microphone data of the access device, and save them in the management node. Compared with the existing technology, collecting and saving access device data can periodically conduct security audits on connection requests in the virtual desktop management system, thereby improving enterprise information security. On the other hand, for each connection request, different security control items are implemented on the access device and the server, thereby solving the problem in the prior art that differentiated control cannot be achieved in different access scenarios, thereby improving The information security of enterprise business.
可选地,在本发明的另一种可能的实施例中,在预置的安全控制策略中,对每种授信级别设定预置的分数段,针对连接请求中所携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型中每种类型标注分数,如接入设备为移动设备时标注5分,接入设备为个人计算机、瘦客户机时标注10分;普通用户标注5分,特殊用户标注10分;内网接入标注10分;外网接入标注5分;普通虚拟机标注5分;特殊虚拟机标注10分,通过获取接入信息类型,对本次连接请求所携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型进行打分,比较本次连接请求的总分和预置的分数段,确定与本次连接请求相匹配的分数段及与该分数段对应的安全策略,对接入设备和服务器实施该安全策略,利用上述方法,同样可以解决现有技术中无法区分不同连接请求进行差异化安全控制的问题,提高了企业的信息安全。Optionally, in another possible embodiment of the present invention, in the preset security control policy, a preset score segment is set for each credit level, and for the user type, access Mark points for each type of access device type, access network environment type, and remote desktop type. For example, if the access device is a mobile device, mark 5 points; if the access device is a personal computer or thin client, mark 10 points; ordinary users mark 5 points, 10 points for special users; 10 points for intranet access; 5 points for external network access; 5 points for ordinary virtual machines; 10 points for special virtual machines. Score the user type, access device type, access network environment type and remote desktop type carried in the request, compare the total score of this connection request with the preset score segment, and determine the score segment that matches this connection request And the security policy corresponding to the score segment, implement the security policy on the access device and server, using the above method, can also solve the problem in the prior art that different connection requests cannot be differentiated for differentiated security control, and improve the information security of the enterprise. Safety.
应理解,在本发明的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。It should be understood that in various embodiments of the present invention, the sequence numbers of the above-mentioned processes do not mean the order of execution, and the execution order of each process should be determined by its functions and internal logic, rather than by the embodiment of the present invention. The implementation process constitutes any limitation.
综上所述,本发明实施例提供的安全控制的方法,通过在管理节点中预置安全控制策略,根据每次连接请求中所携带的用户类型、接入设备类型、远程桌面类型与预置的安全控制策略相比较,确定与本次连接请求相匹配的典型场景及该典型场景对应的安全策略,对本次连接请求中的接入设备和服务器实施不同的安全策略,与现有技术相比,解决了在不同接入场景下无法对连接请求的安全进行差异化控制的问题,提高了企业的信息安全。另外,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,增强了企业业务信息安全的保护力度。To sum up, the security control method provided by the embodiment of the present invention presets the security control strategy in the management node, according to the user type, access device type, remote desktop type and preset Compared with the security control strategy of the current connection request, determine the typical scenario that matches this connection request and the security strategy corresponding to the typical scenario, and implement different security strategies for the access device and server in this connection request, which is comparable to the existing technology. Compared with this method, it solves the problem that the security of connection requests cannot be controlled differently in different access scenarios, and improves the information security of enterprises. In addition, according to the requirements of the security policy, access device data such as GPS data, camera data, and microphone data are collected in the access device, and security audits can be performed on connection requests with lower credit levels in the virtual desktop infrastructure. Strengthen the protection of enterprise business information security.
第二方面,本发明实施例提供一种虚拟桌面安全控制的方法,所述方法包括:In a second aspect, an embodiment of the present invention provides a method for virtual desktop security control, the method comprising:
接入设备向管理节点发送连接请求,所述连接请求用于所述接入设备请求与服务器建立连接,以使得所述管理节点确定所述连接请求的安全策略,并将所述确定的安全策略发送给所述服务器;The access device sends a connection request to the management node, the connection request is used for the access device to request to establish a connection with the server, so that the management node determines the security policy of the connection request, and uses the determined security policy sent to said server;
所述接入设备接收所述服务器发送的所述确定的安全策略,所述确定的安全策略包括采集全球定位系统数据、摄像头数据、麦克风数据中的至少一种;The access device receives the determined security policy sent by the server, and the determined security policy includes collecting at least one of global positioning system data, camera data, and microphone data;
所述接入设备按照所述连接请求的安全策略的要求采集接入设备数据;The access device collects access device data according to the requirements of the security policy of the connection request;
所述接入设备将所述接入设备数据发送给所述服务器。The access device sends the access device data to the server.
值得说明的是,接入设备采集的摄像头数据或麦克风数据可以是实时数据,也可以是接入设备中已存储的数据;另一方面,接入设备采集的摄像头数据或麦克风数据可以是一段完整的数据,也可以是完整数据中的一部分,本发明不作限制。It is worth noting that the camera data or microphone data collected by the access device can be real-time data or data stored in the access device; on the other hand, the camera data or microphone data collected by the access device can be a complete The data may also be a part of the complete data, which is not limited in the present invention.
可选地,当接入设备接收到的安全策略中要求回传接入设备数据时,接入设备界面可以给出相应的提示和判断信息,若用户选择允许采集接入设备数据时,回传接入设备数据,并允许用户继续完成登陆虚拟机的操作;若用户选择不允许采集接入设备数据时,中断本次连接请求。Optionally, when the security policy received by the access device requires the data of the access device to be returned, the interface of the access device can give corresponding prompts and judgment information. If the user chooses to allow the collection of access device data, the return Access the device data, and allow the user to continue to complete the operation of logging in to the virtual machine; if the user chooses not to allow the collection of access device data, the connection request is interrupted.
结合第二方面可能的实现方式,在第二方面的第一种可能的实现方式中,所述确定的安全策略还包括文件系统重定向、剪切板重定向、数字水印中的至少一项,则With reference to the possible implementation of the second aspect, in the first possible implementation of the second aspect, the determined security policy further includes at least one of file system redirection, clipboard redirection, and digital watermarking, but
所述接入设备基于所述连接请求的安全策略:The access device is based on the security policy of the connection request:
将所述接入设备的文件系统映射给所述服务器;或mapping the file system of the access device to the server; or
将所述接入设备剪切板内容传递给所述服务器;或passing the clipboard content of the access device to the server; or
在所述接入设备的图像中添加水印。Adding a watermark to the image of the access device.
通过上述内容的描述,接入设备可以基于管理节点确定的安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。Through the above description, the access device can collect GPS data, camera data, microphone data and other access device data in the access device based on the requirements of the security policy determined by the management node. Perform security audits on low connection requests to improve the information security of enterprise business.
第三方面,本发明实施例提供一种虚拟桌面安全控制的方法,所述方法包括:In a third aspect, an embodiment of the present invention provides a method for virtual desktop security control, the method comprising:
服务器接收管理节点发送的安全策略,所述安全策略包括全球定位系统数据、摄像头数据、麦克风数据中的至少一种;The server receives the security policy sent by the management node, and the security policy includes at least one of global positioning system data, camera data, and microphone data;
所述服务器将所述安全策略发送给所述接入设备,以使得所述接入设备按照所述安全策略的要求采集接入设备数据;The server sends the security policy to the access device, so that the access device collects access device data according to the requirements of the security policy;
所述服务器接收所述接入设备发送的所述接入设备数据;The server receives the access device data sent by the access device;
所述服务器将所述接入设备发送给所述管理节点,以使得所述管理节点保存所述接入设备数据。The server sends the access device to the management node, so that the management node saves the access device data.
结合第三方面的可能实现方式,在第三方面的第一种可能实现方式中,所述安全策略还包括:文件系统重定向、剪切板重定向、数字水印中的至少一项,则With reference to the possible implementation of the third aspect, in the first possible implementation of the third aspect, the security policy further includes: at least one of file system redirection, clipboard redirection, and digital watermarking, then
所述服务器基于所述安全策略:The server based on the security policy:
将所述服务器的文件系统映射给所述接入设备;或mapping the file system of the server to the access device; or
将所述服务器的剪切板内容传递给所述接入设备;或passing the content of the server's clipboard to the access device; or
在所述服务器发送给所述接入设备的图像中添加水印。Adding a watermark to the image sent by the server to the access device.
通过上述内容的描述,服务器可以基于管理节点确定的安全策略实施不同安全控制项,并将所述安全策略发送给接入设备,并将接入设备返回的接入设备数据发送给管理节点,由管理节点保存所述接入设备数据,与现有技术相比,虚拟桌面管理系统可以根据接入设备的接入信息实施不同的安全策略,并存储接入设备回传的接入设备数据,便于后续对授信级别较低的连接请求进行安全审计,提高企业业务的信息安全。Through the description of the above content, the server can implement different security control items based on the security policy determined by the management node, and send the security policy to the access device, and send the access device data returned by the access device to the management node. The management node saves the access device data. Compared with the prior art, the virtual desktop management system can implement different security policies according to the access information of the access device, and store the access device data returned by the access device to facilitate Subsequent security audits are performed on connection requests with lower credit levels to improve the information security of enterprise business.
第四方面,本发明提供一种虚拟桌面管理系统,所述虚拟桌面管理系统包括:服务器、管理节点、接入设备:In a fourth aspect, the present invention provides a virtual desktop management system. The virtual desktop management system includes: a server, a management node, and an access device:
所述管理节点用于,预置安全控制策略,所述安全控制策略包括至少一个典型场景及与每个所述至少一个典型场景所对应的安全策略,每个所述至少一个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个所述安全策略包括至少一个安全控制项;The management node is used to preset a security control strategy, the security control strategy includes at least one typical scenario and a security strategy corresponding to each of the at least one typical scenario, and each of the at least one typical scenario is a user type . A combination of access device type and remote desktop type, each of the security policies includes at least one security control item;
所述管理节点,还用于:获取所述接入设备发送的连接请求所携带的用户类型、接入设备类型、远程桌面类型;将所述连接请求所携带的用户类型、接入设备类型、远程桌面类型与所述安全控制策略中的所述至少一个典型场景进行比较,确定与所述连接请求匹配的典型场景以及与所述匹配的典型场景对应的安全策略;根据所述确定的安全策略向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接;The management node is further configured to: obtain the user type, access device type, and remote desktop type carried in the connection request sent by the access device; Comparing the remote desktop type with the at least one typical scenario in the security control policy, determining a typical scenario matching the connection request and a security policy corresponding to the matching typical scenario; according to the determined security policy sending indication information to the access device, where the indication information is used to instruct the access device to establish a connection with the server;
所述接入设备,用于向所述管理节点发送连接请求,所述连接请求用于所述接入设备请求与服务器建立连接;还用于:接收所述管理节点发送的所述指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接。The access device is configured to send a connection request to the management node, where the connection request is used for the access device to request to establish a connection with a server; and is also configured to: receive the indication information sent by the management node, The indication information is used to instruct the access device to establish a connection with the server.
所述服务器,用于根据所述指示信息与所述接入设备建立连接。The server is configured to establish a connection with the access device according to the indication information.
结合第四方面的可能实现方式,在第四方面的第一种可能实现方式中,所述方法还包括:With reference to the possible implementation manner of the fourth aspect, in the first possible implementation manner of the fourth aspect, the method further includes:
所述管理节点,还用于向所述服务器发送所述确定的安全策略,所述连接请求的安全策略包括采集全球定位系统数据、摄像头数据、麦克风数据中的至少一种;接收所述服务器发送的接入设备数据,所述接入设备数据为所述服务器通知所述接入设备按照所述确定的安全策略的要求获得;保存所述接入设备数据;The management node is further configured to send the determined security policy to the server, the security policy of the connection request includes collecting at least one of global positioning system data, camera data, and microphone data; The access device data, the access device data is obtained by the server notifying the access device according to the requirements of the determined security policy; saving the access device data;
所述服务器,还用于接收所述管理节点发送的所述确定的安全策略;向所述虚拟机发送所述确定的安全策略;将所述接入设备数据发送给所述管理节点;The server is further configured to receive the determined security policy sent by the management node; send the determined security policy to the virtual machine; send the access device data to the management node;
所述接入设备,还用于接收所述服务器发送的所述确定的安全策略;按照所述确定的安全策略的要求采集所述接入设备数据;将所述接入设备数据发送给所述服务器。The access device is further configured to receive the determined security policy sent by the server; collect the data of the access device according to the requirements of the determined security policy; send the data of the access device to the server.
通过在管理节点中预置安全控制策略,当用户通过不同接入设备请求与服务器建立连接时,管理节点可以根据用户类型、接入设备类型和远程桌面类型与安全控制策略中的典型场景进行比较,确定与本次连接请求匹配的典型场景及该匹配的典型场景对应的安全策略,与现有技术中仅通过用户或虚拟机操作权限控制连接请求的安全相比,实现对不同场景的连接请求进行差异化控制,增强了企业的信息安全保护;另一方面,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。By presetting the security control policy in the management node, when the user requests to establish a connection with the server through different access devices, the management node can compare the typical scenarios in the security control policy according to the user type, access device type and remote desktop type , determine the typical scenario matching this connection request and the security policy corresponding to the matching typical scenario, compared with the prior art that only controls the security of the connection request through user or virtual machine operation authority, realizes the connection request for different scenarios Carry out differentiated control to enhance the information security protection of the enterprise; on the other hand, according to the requirements of the security policy, collect GPS data, camera data, microphone data and other access device data in the access device, which can be used in the virtual desktop infrastructure. Security audits are performed on connection requests with lower credit levels to improve the information security of enterprise business.
第五方面,本发明提供一种管理节点,所述管理节点包括处理器、存储器、通信接口、系统总线,所述处理器、存储器和通信接口之间通过系统总线连接并完成相互间的通信,所述存储器中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器执行所述存储器中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行第一方面、第一方面第一种可能实现方式和第一方面第三种可能实现方式中的任意一项所述的方法。In a fifth aspect, the present invention provides a management node, the management node includes a processor, a memory, a communication interface, and a system bus, and the processor, memory, and communication interface are connected through the system bus and complete mutual communication, The memory is used to store computer-executable instructions, and when the virtual desktop management system is running, the processor executes the computer-executable instructions in the memory to utilize hardware resources in the virtual desktop management system to perform the first aspect, The method described in any one of the first possible implementation manner of the first aspect and the third possible implementation manner of the first aspect.
通过在管理节点中预置安全控制策略,当用户通过不同接入设备请求与服务器建立连接时,管理节点可以根据连接请求中所携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型与预置的安全控制策略进行匹配,确定本次连接请求的安全策略,与现有技术相比,实现对不同场景的连接请求进行差异化控制,增强了企业的信息安全保护力度;另一方面,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。By presetting the security control policy in the management node, when the user requests to establish a connection with the server through different access devices, the management node can according to the user type, access device type, access network environment type and remote The desktop type is matched with the preset security control strategy to determine the security strategy for this connection request. Compared with the existing technology, it realizes differential control of connection requests in different scenarios and enhances the information security protection of the enterprise; On the one hand, according to the requirements of the security policy, access device data such as GPS data, camera data, and microphone data are collected in the access device, and security audits can be performed on connection requests with lower credit levels in the virtual desktop infrastructure. In this way, Improve the information security of enterprise business.
第六方面,本发明提供一种接入设备,所述接入设备包括处理器、存储器、通信接口、系统总线,所述处理器、存储器和通信接口之间通过系统总线连接并完成相互间的通信,所述存储器中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器执行所述存储器中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行第二方面和第二方面的第一种可能实现方式中的所述的方法。In a sixth aspect, the present invention provides an access device, the access device includes a processor, a memory, a communication interface, and a system bus, and the processor, memory, and communication interface are connected through the system bus and complete mutual communication. Communication, the memory is used to store computer-executable instructions, and when the virtual desktop management system is running, the processor executes the computer-executable instructions in the memory to utilize hardware resources in the virtual desktop management system to execute the second aspect and the method described in the first possible implementation manner of the second aspect.
通过以上内容的描述,接入设备可以基于管理节点确定安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,回传给管理节点保存,与现有技术相比,通过管理节点中保存接入设备数据,可以周期性对虚拟桌面基础架构中的连接请求进行安全审计,以此,提高企业业务的信息安全。Through the above description, the access device can collect GPS data, camera data, microphone data and other access device data in the access device based on the requirements of the security policy determined by the management node, and send it back to the management node for storage, which is different from the existing technology In contrast, by saving the access device data in the management node, the security audit of the connection request in the virtual desktop infrastructure can be periodically performed, thereby improving the information security of the enterprise business.
第七方面,本发明提供一种服务器,所述服务器包括处理器、存储器、通信接口、系统总线,所述处理器、存储器和通信接口之间通过系统总线连接并完成相互间的通信,所述存储器中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器执行所述存储器中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行第三方面和第三方面第一种可能实现方式中的所述的方法。In a seventh aspect, the present invention provides a server, the server includes a processor, a memory, a communication interface, and a system bus, and the processor, the memory, and the communication interface are connected through the system bus and complete mutual communication, and the The memory is used to store computer-executable instructions. When the virtual desktop management system is running, the processor executes the computer-executable instructions in the memory to utilize hardware resources in the virtual desktop management system to perform the third aspect and the third aspect. The method described in the first possible implementation manner of the aspect.
服务器可以基于管理节点确定的安全策略实施不同安全控制项,并将所述安全策略发送给接入设备,并将接入设备返回的接入设备数据发送给管理节点,由管理节点保存所述接入设备数据,与现有技术相比,虚拟桌面管理系统可以根据接入设备的接入信息实施不同的安全策略,并存储接入设备回传的接入设备数据,便于后续对授信级别较低的连接请求进行安全审计,提高企业业务的信息安全。The server can implement different security control items based on the security policy determined by the management node, and send the security policy to the access device, and send the access device data returned by the access device to the management node, and the management node saves the access device Compared with the existing technology, the virtual desktop management system can implement different security policies according to the access information of the access device, and store the access device data returned by the access device, which is convenient for subsequent verification of the lower credit level. Perform security audits on connection requests to improve the information security of enterprise services.
第八方面,提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行第一方面或第一方面的任意可能的实现方式中的方法的指令。In an eighth aspect, there is provided a computer-readable medium for storing a computer program, where the computer program includes instructions for executing the method in the first aspect or any possible implementation manner of the first aspect.
综上所述,通过在管理节点中预置安全控制策略,当用户通过不同接入设备请求与服务器建立连接时,管理节点可以根据连接请求中所携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型与预置的安全控制策略进行匹配,确定本次连接请求的安全策略,与现有技术相比,实现对不同场景的连接请求进行差异化控制,增强了企业的信息安全保护力度;另一方面,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。To sum up, by presetting the security control strategy in the management node, when a user requests to establish a connection with the server through different access devices, the management node can The network environment type and remote desktop type are matched with the preset security control strategy to determine the security strategy for this connection request. Compared with the existing technology, it realizes differential control of connection requests in different scenarios and enhances the information of the enterprise. Security protection; on the other hand, according to the requirements of the security policy, access device data such as GPS data, camera data, microphone data, etc. are collected in the access device, so that connection requests with lower credit levels in the virtual desktop infrastructure can be secured. Audit, in order to improve the information security of enterprise business.
附图说明Description of drawings
为了更清楚地说明本发明实施例的技术方案,下面将对本发明实施例中所需要使用的附图作简单地介绍,显而易见地,下面所描述的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following will briefly introduce the accompanying drawings required in the embodiments of the present invention. Obviously, the accompanying drawings described below are only some embodiments of the present invention. For Those of ordinary skill in the art can also obtain other drawings based on these drawings without making creative efforts.
图1为现有技术中虚拟桌面基础架构的示意图;FIG. 1 is a schematic diagram of a virtual desktop infrastructure in the prior art;
图2为本发明实施例提供的一种虚拟桌面安全控制的方法的流程示意图;FIG. 2 is a schematic flowchart of a method for virtual desktop security control provided by an embodiment of the present invention;
图3为本发明实施例提供的另一种虚拟桌面安全控制方法的流程示意图;FIG. 3 is a schematic flow chart of another virtual desktop security control method provided by an embodiment of the present invention;
图4为本发明实施例提供的一种虚拟桌面管理系统的示意图;FIG. 4 is a schematic diagram of a virtual desktop management system provided by an embodiment of the present invention;
图5为本发明实施例提供的一种管理节点的示意图;FIG. 5 is a schematic diagram of a management node provided by an embodiment of the present invention;
图6为本发明实施例提供的一种接入设备的示意图;FIG. 6 is a schematic diagram of an access device provided by an embodiment of the present invention;
图7为本发明实施例提供的一种虚拟机的示意图。FIG. 7 is a schematic diagram of a virtual machine provided by an embodiment of the present invention.
具体实施方式detailed description
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明的一部分实施例,而不是全部实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都应属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.
图1为虚拟桌面基础架构(Virtual Desktop Infrastructure,VDI)的示意图,如图所示,虚拟桌面基础架构包括虚拟桌面管理系统、接入网关、接入设备和服务器,其中,接入设备包括个人计算机(Personal Computer,PC)、瘦客户机(Thin Client,TC)、移动设备。Figure 1 is a schematic diagram of a virtual desktop infrastructure (Virtual Desktop Infrastructure, VDI). As shown in the figure, the virtual desktop infrastructure includes a virtual desktop management system, an access gateway, an access device and a server, wherein the access device includes a personal computer (Personal Computer, PC), thin client (Thin Client, TC), mobile device.
虚拟桌面管理系统用于实现远程桌面访问的管理和控制功能,虚拟桌面管理系统中可以包括管理节点、域服务器、日志服务器、网络接入服务器、许可认证服务器,也可以包括其他类型的管理组件,管理系统中各管理组件可以采用服务器部署,也可以采用虚拟机部署,本发明均不作限制。The virtual desktop management system is used to implement the management and control functions of remote desktop access. The virtual desktop management system may include management nodes, domain servers, log servers, network access servers, license authentication servers, and other types of management components. Each management component in the management system can be deployed by a server or by a virtual machine, which is not limited in the present invention.
用户可以通过虚拟桌面管理系统访问远程桌面,远程桌面可以是服务器上安装的操作系统,也可以是服务器上部署虚拟化软件所形成的虚拟机的操作系统。具体地,远程桌面可以根据其属性划分成多种类型,例如,可以按照远程桌面的作用,划分为办公类远程桌面和用于连接会议的会议类远程桌面;也可以按照远程桌面所在数据中心的网络规划,划分为普通远程桌面和特殊远程桌面;还可以按照操作系统是否进行加密处理划分为安全远程桌面和普通远程桌面。Users can access the remote desktop through the virtual desktop management system. The remote desktop can be the operating system installed on the server, or the operating system of the virtual machine formed by deploying virtualization software on the server. Specifically, remote desktops can be divided into multiple types according to their attributes. For example, according to the functions of remote desktops, they can be divided into office-type remote desktops and conference-type remote desktops for connecting meetings; Network planning is divided into common remote desktop and special remote desktop; it can also be divided into secure remote desktop and common remote desktop according to whether the operating system is encrypted.
管理员可以预先在虚拟桌面管理系统中将服务器或虚拟机分配给用户,并记录分配关系,当用户利用账号和密码通过网络接入服务器所提供的网页界面登陆时,虚拟桌面管理系统会在网页界面显示所有已分配给该用户的服务器或虚拟机信息,用户可以选择任一服务器或虚拟机进行访问,其中,用户可以根据权限不同划分为普通用户和特殊用户。Administrators can pre-allocate servers or virtual machines to users in the virtual desktop management system, and record the assignment relationship. The interface displays information about all servers or virtual machines that have been assigned to the user. Users can choose any server or virtual machine to access. Users can be divided into ordinary users and special users according to different permissions.
示例地,虚拟桌面管理系统分别给普通用户A分配一台普通虚拟机和一台特殊虚拟机,给特殊用户B分配一台特殊虚拟机,则用户A利用账号和密码在网络接入服务器提供的网页界面登陆时,在网页界面显示所有已分配给用户A的2台虚拟机,用户可以选择任一台虚拟机进行访问。管理系统会将安全策略发送给接入设备和用户需要访问的虚拟机,在接入设备和用户需要访问的虚拟机实施安全策略的控制项后,用户可以登陆虚拟机内部进行办公操作。For example, the virtual desktop management system allocates a common virtual machine and a special virtual machine to common user A, and a special virtual machine to special user B, then user A uses the account and password to access the When logging in to the web interface, all 2 virtual machines assigned to user A are displayed on the web interface, and the user can select any virtual machine to access. The management system will send the security policy to the access device and the virtual machine that the user needs to access. After the control items of the security policy are implemented on the access device and the virtual machine that the user needs to access, the user can log in to the virtual machine for office operations.
在每个远程桌面和接入设备中分别部署了虚拟桌面代理,其中,远程桌面中的虚拟桌面代理为服务端,接入设备中的虚拟桌面代理为客户端;管理系统可以通过桌面代理对接入设备和远程桌面进行管理和监控,远程桌面和接入设备之间,也可以通过桌面代理完成虚拟桌面协议的处理。A virtual desktop agent is deployed in each remote desktop and access device, where the virtual desktop agent in the remote desktop is the server, and the virtual desktop agent in the access device is the client; the management system can be connected through the desktop agent The access device and the remote desktop can be managed and monitored, and the virtual desktop protocol can also be processed through the desktop proxy between the remote desktop and the access device.
由此,用户可以利用接入设备通过以太网经由接入网关与虚拟桌面管理系统和远程桌面相通信,实现虚拟桌面远程访问功能。在具体实施过程中,根据接入网关的不同可以区分不同的接入网络环境类型,例如将虚拟桌面的网络类型按照局域网的安全性划分为内网和外网。Thus, the user can use the access device to communicate with the virtual desktop management system and the remote desktop through the access gateway through the Ethernet, so as to realize the remote access function of the virtual desktop. In the specific implementation process, different access network environment types can be distinguished according to different access gateways, for example, the network type of the virtual desktop is divided into intranet and extranet according to the security of the local area network.
此外,管理员还可以在管理节点中预置安全控制策略。具体地,可以根据用户类型、接入设备类型和远程桌面类型预置安全控制策略,其中,安全控制策略中包括授信级别、安全策略和典型场景。管理员可以根据具体实施过程中业务场景的需求,根据用户类型、接入设备类型和远程桌面类型确定典型场景,每个典型场景对应一种安全策略,每个安全策略又对应一个授信级别。In addition, administrators can also preset security control policies in the management node. Specifically, security control policies can be preset according to user types, access device types, and remote desktop types, where the security control policies include credit levels, security policies, and typical scenarios. Administrators can determine typical scenarios according to the requirements of business scenarios in the specific implementation process, according to user types, access device types, and remote desktop types. Each typical scenario corresponds to a security policy, and each security policy corresponds to a credit level.
可选地,还可以根据用户类型、接入设备类型、远程桌面类型和接入网络环境类型预置安全控制策略。Optionally, security control policies can also be preset according to user type, access device type, remote desktop type, and access network environment type.
示例地,表1为安全控制策略的一个实施例的具体内容。Exemplarily, Table 1 is the specific content of an embodiment of the security control policy.
表1安全控制策略Table 1 Security Control Strategy
如表1所示,管理员根据用户类型、接入网络环境类型、接入设备类型和远程桌面类型在管理节点中预置安全控制策略,若假设用户类型包括普通用户和特殊用户;接入网络环境包括内网和外网;接入设备包括移动设备、个人电脑、瘦客户机;远程桌面为虚拟机,远程桌面的类型包括普通虚拟机和特殊虚拟机;则典型场景的示例如表1所示:As shown in Table 1, the administrator presets security control policies in the management node according to the user type, access network environment type, access device type, and remote desktop type. If it is assumed that the user types include ordinary users and special users; The environment includes intranet and extranet; access devices include mobile devices, personal computers, and thin clients; remote desktops are virtual machines, and the types of remote desktops include ordinary virtual machines and special virtual machines; examples of typical scenarios are shown in Table 1 Show:
典型场景一:特殊用户使用移动设备在外网接入特殊虚拟机,其典型场景限定条件包括用户类型、接入网络环境、接入设备和远程桌面类型四种,则对该典型场景的连接请求实施对应的安全策略,即不允许用户访问远程桌面,其授信级别为最低。Typical scenario 1: A special user uses a mobile device to access a special virtual machine on the external network. The limiting conditions for the typical scenario include user type, access network environment, access device, and remote desktop type. The connection request for this typical scenario is implemented The corresponding security policy does not allow users to access the remote desktop, and its authorization level is the lowest.
典型场景二:特殊用户使用移动设备在外网接入普通虚拟机,其典型场景限定条件包括用户类型、接入网络环境、接入设备和远程桌面类型四种,则对该典型场景的连接请求实施其对应的安全策略,其授信级别为极低。Typical Scenario 2: A special user uses a mobile device to access a common virtual machine on the external network. The limiting conditions for the typical scenario include user type, access network environment, access device, and remote desktop type. The connection request for this typical scenario is implemented The corresponding security policy has an extremely low credit level.
典型场景三:使用移动设备在外网接入虚拟机,并未限定用户类型和远程桌面类型,则该典型场景具体包括:普通用户使用移动设备在外网接入普通虚拟机、普通用户使用移动设备在外网接入特殊虚拟机、特殊用户使用移动设备在外网接入普通虚拟机和特殊用户使用移动设备在外网接入特殊虚拟机,其中,特殊用户使用移动设备在外网接入特殊虚拟机为授信级别为最低的典型场景,特殊用户使用移动设备在外网接入普通虚拟机为授信级别为极低的典型场景,则除以上两种场景外,需要对普通用户使用移动设备在外网接入普通虚拟机、普通用户使用移动设备在外网接入特殊虚拟机两种典型场景的连接请求实施与其典型场景对应的安全策略,其授信级别为低。Typical scenario three: use a mobile device to access a virtual machine from the external network, and the user type and remote desktop type are not limited. The typical scenario specifically includes: ordinary users use mobile devices to access ordinary Network access to special virtual machines, special users use mobile devices to access ordinary virtual machines on the external network, and special users use mobile devices to access special virtual machines on the external network. Among them, special users use mobile devices to access special virtual machines on the external network is the credit level is the lowest typical scenario, and a special user uses a mobile device to access a normal virtual machine on the external network is a typical scenario with an extremely low credit level. 1. The connection request of ordinary users using mobile devices to access special virtual machines on the external network. The security policies corresponding to the typical scenarios are implemented, and the credit level is low.
典型场景四:使用瘦客户机在外网接入特殊虚拟机,未限定用户类型,则该典型场景具体包括:普通用户使用瘦客户机在外网接入特殊虚拟机和特殊用户瘦客户机在外网接入特殊虚拟机,且未与安全控制策略中其他典型场景重复,则对上述典型场景的连接请求实施对应的安全策略,其授信级别为中。Typical scenario 4: Use a thin client to access a special virtual machine on the external network, and the user type is not limited. The typical scenario includes: ordinary users use a thin client to access a special virtual machine on the external If the virtual machine is connected to a special virtual machine and does not overlap with other typical scenarios in the security control policy, the corresponding security policy is implemented for the connection request in the above typical scenario, and its credit level is medium.
典型场景五:使用个人电脑在内网接入虚拟机,未限定用户类型和虚拟机类型,其该典型场景具体包括:普通用户使用个人电脑在内网接入普通虚拟机、普通用户使用个人电脑在内网接入特殊虚拟机、特殊用户使用个人电脑在内网接入普通虚拟机、特殊用户使用个人电脑在内网接入特殊虚拟机,且以上典型场景未与其他安全控制策略中的典型场景重叠,则对上述典型场景的连接请求实施其对应的安全策略,其授信级别为高。Typical scenario five: use a personal computer to access a virtual machine on the intranet, and the user type and virtual machine type are not limited. The typical scenario specifically includes: ordinary users use personal computers to access ordinary virtual machines on the intranet, Access to special virtual machines on the intranet, special users use personal computers to access ordinary virtual machines on the intranet, and special users use personal computers to access special virtual machines on the intranet, and the above typical scenarios are not the same as those typical in other security control strategies. If the scenarios overlap, the corresponding security policies are implemented for the connection requests in the above typical scenarios, and the credit level is high.
典型场景六:使用瘦客户机在内网接入虚拟机,未限定用户类型和虚拟机类型,则该典型场景具体包括:普通用户使用瘦客户机在内网接入普通虚拟机、普通用户使用瘦客户机在内网接入特殊虚拟机、特殊用户使用瘦客户机在内网接入普通虚拟机、特殊用户使用瘦客户机在内网接入特殊虚拟机,且以上典型场景未与安全控制策略中的其他典型场景重复,则对上述典型场景的连接请求实施对应的安全策略,其授信级别为极高。Typical scenario 6: Use a thin client to access a virtual machine on the intranet, and the user type and virtual machine type are not limited. The typical scenario specifically includes: ordinary users use a thin client to access ordinary Thin clients access special virtual machines on the intranet, special users use thin clients to access ordinary virtual machines on the intranet, special users use thin clients to access special virtual machines on the intranet, and the above typical scenarios are not related to security control If other typical scenarios in the policy are repeated, the corresponding security policy will be implemented for the connection requests in the above typical scenarios, and its credit level will be extremely high.
值得说明的是,表1中典型场景可以为用户类型、接入设备类型、接入网络环境类型和远程桌面类型的组合,每种典型场景对应一种安全策略,每个安全策略包括至少一个安全控制项。It is worth noting that the typical scenarios in Table 1 can be a combination of user type, access device type, access network environment type, and remote desktop type. Each typical scenario corresponds to a security policy, and each security policy includes at least one security policy. control item.
此外,表1中所列举的典型场景仅为一种示例,具体实施过程中可以根据具体业务场景的信息安全要求建立相应的典型场景,本发明不作限制。在本发明的以下具体描述中,将以表1所示安全控制策略为例进行详细的描述。In addition, the typical scenarios listed in Table 1 are only examples, and corresponding typical scenarios can be established according to the information security requirements of specific business scenarios during the specific implementation process, which is not limited by the present invention. In the following specific description of the present invention, the security control strategy shown in Table 1 will be taken as an example for detailed description.
进一步地,预定义最低、极低、低、中、高、极高共六种授信级别,授信级别越低,则对本次连接请求的接入设备和服务器实施的安全控制项越多,每种安全策略中的安全控制项标识为开,则表示本次连接请求的接入设备或服务器需要执行对应安全控制项的功能;安全控制项标识为关,则表示本次连接请求的接入设备或服务器不需要执行对应安全控制项的功能。Further, there are six pre-defined credit levels of minimum, very low, low, medium, high, and very high. The lower the credit level, the more security control items are implemented on the access device and server of the connection request. If the security control item flag in this security policy is on, it means that the access device or server of this connection request needs to perform the function of the corresponding security control item; if the security control item flag is off, it means that the access device of this connection request Or the server does not need to execute the function corresponding to the security control item.
具体地,在安全策略中可以包括如下安全控制项:Specifically, the following security control items can be included in the security policy:
回传全球定位系统(Global Positioning System,GPS)数据:接入设备将其GPS定位数据回传给管理节点。Returning Global Positioning System (Global Positioning System, GPS) data: the access device sends back its GPS positioning data to the management node.
回传摄像头数据:接入设备采集摄像头数据回传给管理节点。Returning camera data: The access device collects camera data and sends it back to the management node.
回传麦克风数据:接入设备采集麦克风数据回传给管理节点。Return microphone data: the access device collects microphone data and sends it back to the management node.
数字水印:在图像中添加数字水印。Digital Watermark: Add a digital watermark to the image.
剪切板重定向:用于将接入设备中剪切板的数据传递到服务器中或将服务器中剪切板的数据传递到接入设备,以便接入设备和服务器之间可以实现数据的相互拷贝。Clipboard redirection: It is used to transfer the data of the clipboard in the access device to the server or transfer the data of the clipboard in the server to the access device, so that data can be exchanged between the access device and the server copy.
文件重定向:用于将接入设备的文件系统映射给服务器或将服务器的文件系统映射给接入设备,以便接入设备和服务器之间可以使用所映射的文件系统进行读写操作。File redirection: used to map the file system of the access device to the server or map the file system of the server to the access device, so that the access device and the server can use the mapped file system for read and write operations.
值得说明的是,表1中所示安全控制策略仅为一种举例,不构成本发明的一种限制。另外,剪切板重定向和文件重定向功能可以是单向策略控制的,可以采取不同的控制方法,即接入设备和服务器之间,一个方向开,另一个方向关。例如,服务器将剪切板的内容传递到接入设备,接入设备的内容不传递到服务器。除此之外,还可以添加其他可能的安全控制项,或其他安全策略组合。比如,如果使用IOS操作系统的移动设备或操作系统为Android的移动设备连接服务器时,可根据是否已经破解IOS操作系统中用户存储读写权限或解锁管理员权限,采取不同授信级别和安全策略,具体实施过程中,可以根据具体信息安全要求设定不同策略,本发明不作限制。It should be noted that the security control strategy shown in Table 1 is only an example, and does not constitute a limitation of the present invention. In addition, clipboard redirection and file redirection functions can be controlled by one-way policies, and different control methods can be adopted, that is, between the access device and the server, one direction is enabled and the other direction is disabled. For example, the server transmits the content of the clipboard to the access device, but the content of the access device is not transmitted to the server. In addition, other possible security control items or other security policy combinations can be added. For example, if a mobile device using the IOS operating system or a mobile device whose operating system is Android connects to the server, different credit levels and security policies can be adopted according to whether the user storage read and write permissions in the IOS operating system have been cracked or the administrator permissions have been unlocked. During specific implementation, different policies may be set according to specific information security requirements, which are not limited by the present invention.
还值得说明的是,管理员预置的安全控制策略可以保存在管理节点中预置定义的文件或数据库表中,也可以以其他存储形式存储,本发明不作限制。It is also worth noting that the security control policy preset by the administrator can be stored in a file or database table that is preset and defined in the management node, or can be stored in other storage forms, which is not limited by the present invention.
可选地,管理员在管理节点预置安全控制策略后,可以根据业务需求添加或更新授信级别、安全策略和典型场景,以此适应企业对信息安全要求的变化。需要说明的是,更新后的安全控制策略仅对更新后的新的连接请求生效。Optionally, after the administrator presets security control policies on the management node, he can add or update credit levels, security policies, and typical scenarios according to business needs, so as to adapt to changes in information security requirements of enterprises. It should be noted that the updated security control policy only takes effect for the updated new connection request.
接下来,结合上述描述内容,图2详细介绍了本发明所提供的虚拟机桌面安全控制方法,所述方法包括:Next, in combination with the above description, FIG. 2 introduces in detail the virtual machine desktop security control method provided by the present invention, and the method includes:
S201、在管理节点中预置安全控制策略,所述安全控制策略中包括至少一个典型场景及与每个所述至少一个典型场景所对应的安全策略,每个所述至少一个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个所述安全策略包括至少一个安全控制项,其中,每个所述安全策略中包括至少一个安全控制项。S201. Preset a security control policy in the management node, the security control policy includes at least one typical scenario and a security policy corresponding to each of the at least one typical scenario, and each of the at least one typical scenario is a user type . A combination of an access device type and a remote desktop type, each of the security policies includes at least one security control item, wherein each of the security policies includes at least one security control item.
可选地,所述安全控制策略还可以包括授信级别。Optionally, the security control policy may also include a credit level.
具体地,所述授信级别用于标识本次连接请求的安全控制级别,每个所述至少一个典型场景对应一个所述授信级别。Specifically, the credit level is used to identify the security control level of this connection request, and each of the at least one typical scenario corresponds to one of the credit levels.
可选地,管理节点还可以根据接入网络环境类型预置安全控制策略预置安全策略。Optionally, the management node may also preset a security control policy according to an access network environment type and preset a security policy.
示例地,管理员可以在管理节点中预置如表1所示安全控制策略中典型场景、安全策略和授信级别。For example, the administrator can preset typical scenarios, security policies and credit levels in the security control policies shown in Table 1 on the management node.
S202、所述管理节点接收接入设备发送的连接请求。S202. The management node receives the connection request sent by the access device.
具体地,所述连接请求用于所述接入设备请求与服务器建立连接。Specifically, the connection request is used for the access device to request to establish a connection with the server.
S203、所述管理节点获取所述连接请求所携带的用户类型、接入设备类型、远程桌面类型。S203. The management node acquires the user type, access device type, and remote desktop type carried in the connection request.
可选地,所述管理节点还可以获取所述连接请求所携带的接入网络环境类型。Optionally, the management node may also acquire the access network environment type carried in the connection request.
示例地,若特殊用户使用移动设备在外网向虚拟桌面管理系统发送接入普通虚拟机的请求消息,则虚拟桌面管理系统获取连接请求的接入消息中包括特殊用户、移动设备、外网和普通虚拟机。For example, if a special user uses a mobile device to send a request message for accessing a normal virtual machine to the virtual desktop management system on the external network, the virtual desktop management system obtains a connection request message including the special user, the mobile device, the external network and the normal virtual machine. virtual machine.
S204、将所述连接请求所携带的用户类型、接入设备类型、远程桌面类型与所述安全控制策略中的所述至少一个典型场景进行比较,确定与所述连接请求匹配的典型场景以及与所述匹配的典型场景对应的安全策略。S204. Compare the user type, access device type, and remote desktop type carried in the connection request with the at least one typical scenario in the security control policy, and determine the typical scenario that matches the connection request and the The security policy corresponding to the matching typical scenario.
具体地,所述管理节点根据步骤S202中获取的连接请求所携带的用户类型、接入设备类型、远程桌面类型,将其与安全控制策略中典型场景进行比较,若与其中一种典型场景相匹配,则确定本次连接请求需要实施的安全策略为匹配的典型场景对应的安全策略,其授信级别为匹配的典型场景所对应的授信级别。Specifically, the management node compares the user type, access device type, and remote desktop type carried in the connection request obtained in step S202 with typical scenarios in the security control policy. match, it is determined that the security policy to be implemented for this connection request is the security policy corresponding to the matching typical scenario, and its credit level is the corresponding credit level of the matching typical scenario.
示例地,如表1所示的安全控制策略,若特殊用户使用移动设备在外网发送接入普通虚拟机的连接请求,与表1中各个授信级别的典型场景比较,与授信级别为极低的典型场景相匹配,即与“特殊用户使用移动设备在外网接入普通虚拟机”的典型场景相匹配,则确定该匹配的典型场景对应的安全策略为本次连接请求的安全策略,其授信级别为极低。若普通用户使用移动设备在外网发送接入普通虚拟机的连接请求,与表1中安全控制策略中的典型场景比较,与“使用移动设备在外网接入虚拟机”相匹配,则确定该匹配的典型场景对应的安全策略为本次连接请求的安全策略,其授信级别为低。For example, with the security control policy shown in Table 1, if a special user uses a mobile device to send a connection request to access a common virtual machine on the external network, compared with the typical scenarios of each credit level in Table 1, it is the same as the one with an extremely low credit level. If it matches the typical scenario, that is, it matches the typical scenario of "a special user uses a mobile device to access a common virtual machine on the external network", then it is determined that the security policy corresponding to the matching typical scenario is the security policy of this connection request, and its credit level is extremely low. If an ordinary user uses a mobile device to send a connection request to access an ordinary virtual machine on the external network, compared with the typical scenario in the security control policy in Table 1, and matches "using a mobile device to access a virtual machine on the external network", then determine the match The security policy corresponding to the typical scenario is the security policy of this connection request, and its credit level is low.
可选地,若将连接请求中携带用户类型、接入设备类型、接入网络环境类型和远程桌面类型与预置安全控制策略比较后,无匹配的典型场景,则可以实施预置默认的安全策略。Optionally, if there is no matching typical scenario after comparing the user type, access device type, access network environment type, and remote desktop type carried in the connection request with the preset security control policy, the preset default security control policy can be implemented. Strategy.
示例地,管理节点可以预置默认的安全策略为典型场景“使用瘦客户机在外网接入特殊虚拟机”所对应的安全策略,则默认的授信级别为中,若普通用户使用移动设备在内网发送接入普通虚拟机的连接请求,则管理节点比较本次连接请求所携带的用户类型、接入设备类型、接入网络环境类型、远程桌面类型与表1中所列举的典型场景确定无一相匹配,则对本次连接请求的接入设备和服务器实施预定义默认的安全策略,即实施典型场景“使用瘦客户机在外网接入特殊虚拟机”所对应的安全策略,其授信级别为中。For example, the management node can preset the default security policy as the security policy corresponding to the typical scenario "using a thin client to access a special virtual machine on the external network", and the default credit level is medium. network to send a connection request to access a common virtual machine, the management node compares the user type, access device type, access network environment type, and remote desktop type carried in this connection request with the typical scenarios listed in Table 1 to determine that no If they match, the predefined default security policy will be implemented on the access device and server of this connection request, that is, the security policy corresponding to the typical scenario "using a thin client to access a special virtual machine on the external network" will be implemented. for middle.
本领域技术人员应理解的是,虚拟桌面为远程桌面的一种,虚拟桌面管理系统中建立用户和虚拟机的分配关系后,用户可以通过任一种接入设备通过任一种类型的接入网络环境向虚拟桌面管理系统发送连接虚拟机的请求,授信级别仅对本次连接请求生效。Those skilled in the art should understand that virtual desktops are a type of remote desktops. After the allocation relationship between users and virtual machines is established in the virtual desktop management system, users can use any type of access device to access The network environment sends a request to connect to the virtual machine to the virtual desktop management system, and the credit level is only valid for this connection request.
示例地,普通用户A通过移动设备在外网连接特殊虚拟机时,管理节点确定本次连接请求实施典型场景为“使用移动设备在外网接入虚拟机”所对应的安全策略,其授信级别为低;当普通用户A再次通过瘦客户机在内网连接特殊虚拟机时,管理节点确定本次连接请求实施典型场景为“使用瘦客户机在内网接入虚拟机”所对应的安全策略,其授信级别为高。For example, when an ordinary user A connects to a special virtual machine on the external network through a mobile device, the management node determines that the security policy corresponding to the typical scenario of "using a mobile device to access a virtual machine on the external network" for this connection request is implemented by the management node, and its credit level is low. ; When ordinary user A connects to the special virtual machine through the intranet again through the thin client, the management node determines that the security policy corresponding to the typical scenario of "using the thin client to access the virtual machine on the intranet" for this connection request is determined by the management node. The credit level is high.
S205、所述管理节点按照所述安全策略向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接。S205. The management node sends indication information to the access device according to the security policy, where the indication information is used to instruct the access device to establish a connection with the server.
具体地,当所述安全策略允许所述接入设备与所述虚拟机建立连接时,所述管理节点向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述虚拟机建立连接。若管理节点根据接入信息和安全控制策略确定的安全策略不允许接入设备与服务器建立连接时,则本次连接请求结束。Specifically, when the security policy allows the access device to establish a connection with the virtual machine, the management node sends indication information to the access device, where the indication information is used to instruct the access device to establish a connection with the virtual machine. The virtual machine establishes a connection. If the security policy determined by the management node according to the access information and the security control policy does not allow the access device to establish a connection with the server, this connection request ends.
示例地,如表1所示安全控制策略,若特殊用户使用移动设备在外网向虚拟桌面管理系统发送接入特殊虚拟机的连接请求,则管理节点确定本次连接请求的安全策略是限制接入,不允许所示特殊用户连接所述普通虚拟机,会结束本次连接请求。For example, as shown in Table 1, if a special user uses a mobile device to send a connection request for accessing a special virtual machine to the virtual desktop management system on the external network, the management node determines that the security policy for this connection request is to restrict access , the special user shown is not allowed to connect to the normal virtual machine, and this connection request will end.
进一步地,所述接入设备与所述服务器建立连接。Further, the access device establishes a connection with the server.
具体地,所述接入设备的桌面代理与所述服务器的桌面代理间建立通信连接。Specifically, a communication connection is established between the desktop proxy of the access device and the desktop proxy of the server.
本领域的技术人员应理解的是,在虚拟桌面基础架构中,所述接入设备与所述服务器所建立的连接仅为桌面代理间的通信连接,用于传输管理节点和桌面代理间的指令、消息,此时,虚拟机和接入设备需要实施对应的安全策略后,用户才能登陆远程桌面的操作系统内部。Those skilled in the art should understand that, in the virtual desktop infrastructure, the connection established between the access device and the server is only a communication connection between the desktop agent, which is used to transmit instructions between the management node and the desktop agent , message, at this time, the virtual machine and the access device need to implement the corresponding security policy before the user can log into the operating system of the remote desktop.
通过上述步骤S201至步骤S205描述的内容,管理员在管理节点中预置安全控制策略,即按照用户类型、接入设备类型和远程桌面类型的组合构成至少一个典型场景,每种典型场景对应一种安全策略,当用户通过接入设备请求与远程桌面建立连接时,根据本次连接请求中所携带的用户类型、接入设备类型和远程桌面类型与安全控制策略中的典型场景进行比较,确定与本次连接请求相匹配的典型场景及与匹配的典型场景所对应的安全策略,按照确定的安全策略的要求对接入设备和服务器实施不同的安全控制项,与现有技术中依赖用户的操作权限以及服务器或虚拟机允许远程访问的操作权限的安全控制,能够对不同场景下连接请求进行差异化安全控制,提升虚拟桌面基础架构的信息安全。Through the content described in steps S201 to S205 above, the administrator presets security control policies in the management node, that is, at least one typical scenario is formed according to the combination of user type, access device type, and remote desktop type, and each typical scenario corresponds to a When a user requests to establish a connection with a remote desktop through an access device, the user type, access device type, and remote desktop type carried in this connection request are compared with typical scenarios in the security control policy to determine According to the typical scenario matching this connection request and the security policy corresponding to the matching typical scenario, different security control items are implemented on the access device and server according to the requirements of the determined security policy, which is different from the existing technology that relies on users The security control of the operation authority and the operation authority of the remote access of the server or virtual machine can implement differentiated security control on connection requests in different scenarios, and improve the information security of the virtual desktop infrastructure.
进一步地,所述确定的安全策略的具体实施过程如图3所示,所述方法包括:Further, the specific implementation process of the determined security policy is shown in Figure 3, the method includes:
S301、管理节点向服务器发送所述确定的安全策略。S301. The management node sends the determined security policy to the server.
具体地,所述确定的安全策略为图2中所述方法确定的安全策略。Specifically, the determined security policy is the security policy determined by the method in FIG. 2 .
示例地,如表1所示的安全控制策略,若特殊用户使用移动设备在外网接入普通虚拟机,则管理节点会向服务器发送如下安全策略:For example, with the security control policy shown in Table 1, if a special user uses a mobile device to access a common virtual machine on the external network, the management node will send the following security policy to the server:
回传GPS数据;Return GPS data;
回传摄像头数据;Return camera data;
回传麦克风数据;Return microphone data;
图像中添加数字水印;Add digital watermark to image;
关闭剪切板重定向功能;Turn off the clipboard redirection function;
关闭文件系统重定向功能。Turn off file system redirection.
S302、所述服务器向接入设备发送所述确定的安全策略。S302. The server sends the determined security policy to the access device.
具体地,所述服务器和所述接入设备通过桌面代理相通信,所述服务器中桌面代理向所述接入设备中的桌面代理发送步骤S301中的所述确定的安全策略。Specifically, the server and the access device communicate through a desktop agent, and the desktop agent in the server sends the security policy determined in step S301 to the desktop agent in the access device.
S303、所述接入设备根据所述确定的安全策略的要求采集接入设备数据。S303. The access device collects access device data according to requirements of the determined security policy.
具体地,所述确定的安全策略包括采集GPS数据、摄像头数据、麦克风数据中的至少一种,所述接入设备根据所述确定的安全策略中的要求采集接入设备数据。在具体实施过程中,可以根据具体业务场景的需求,在如表1所示的预置的安全控制策略中配置不同安全策略,要求是否需要回传接入设备数据。Specifically, the determined security policy includes collecting at least one of GPS data, camera data, and microphone data, and the access device collects access device data according to requirements in the determined security policy. In the specific implementation process, according to the needs of specific business scenarios, different security policies can be configured in the preset security control policies shown in Table 1, and it is required whether the access device data needs to be returned.
示例地,若与连接请求相匹配的典型场景所对应的安全策略要求回传GPS数据、摄像头数据、麦克风数据,则:For example, if the security policy corresponding to the typical scenario matching the connection request requires returning GPS data, camera data, and microphone data, then:
当接入设备有GPS设备时,接入设备中的GPS模块采集接入设备的GPS地址信息,通过桌面代理发送给服务器;When the access device has a GPS device, the GPS module in the access device collects the GPS address information of the access device and sends it to the server through the desktop agent;
当接入设备有摄像头和/或麦克风时,接入设备中的摄像头和/或麦克风模块用于采集接入设备的摄像头图像和/或麦克风声音,发送给虚拟机中的桌面代理。When the access device has a camera and/or a microphone, the camera and/or microphone module in the access device is used to collect the camera image and/or microphone sound of the access device and send it to the desktop agent in the virtual machine.
可选地,接入设备数据还可以包括接入设备MAC地址。Optionally, the access device data may also include the access device MAC address.
值得说明的是,接入设备采集的摄像头数据或麦克风数据可以是实时数据,也可以是接入设备中已存储的数据;另一方面,接入设备采集的摄像头数据或麦克风数据可以是一段完整的数据,也可以是完整数据中的一部分,本发明不作限制。It is worth noting that the camera data or microphone data collected by the access device can be real-time data or data stored in the access device; on the other hand, the camera data or microphone data collected by the access device can be a complete The data may also be a part of the complete data, which is not limited in the present invention.
可选地,当接入设备接收到的安全策略中要求回传接入设备数据时,接入设备界面可以给出相应的提示和判断信息,若用户选择允许采集接入设备数据时,回传接入设备数据,并允许用户继续完成登陆虚拟机的操作;若用户选择不允许采集接入设备数据时,中断本次连接请求。Optionally, when the security policy received by the access device requires the data of the access device to be returned, the interface of the access device can give corresponding prompts and judgment information. If the user chooses to allow the collection of access device data, the return Access the device data, and allow the user to continue to complete the operation of logging in to the virtual machine; if the user chooses not to allow the collection of access device data, the connection request is interrupted.
S304、所述接入设备向所述服务器发送所述接入设备数据。S304. The access device sends the access device data to the server.
S305、所述服务器将所述接入设备数据发送给所述管理节点。S305. The server sends the access device data to the management node.
S306、所述管理节点保存所述接入设备数据。S306. The management node saves the access device data.
具体地,所述管理节点保存所述接入设备回传的接入设备数据,对每次接入设备的连接请求的接入设备数据进行记录,以便进行系统的定期安全审计。Specifically, the management node saves the access device data sent back by the access device, and records the access device data of each connection request of the access device, so as to perform regular security audits of the system.
S307、所述接入设备实施所述确定的安全策略。S307. The access device implements the determined security policy.
具体地,所述接入设备基于所述确定的安全策略的要求,在所述接入设备上开启或关闭对应功能,即是否将所述接入设备客户端文件系统映射给服务器、是否把接入设备剪贴板的内容传递给服务器、是否在接入设备的图像中添加水印。Specifically, the access device enables or disables corresponding functions on the access device based on the determined security policy requirements, that is, whether to map the client file system of the access device to the server, whether to The contents of the clipboard of the device can be transferred to the server, and whether to add a watermark to the image of the connected device.
示例地,如表1所示安全控制策略,若接入设备本次连接请求所携带的用户类型、接入设备类型、接入网络类型与典型场景“特殊用户使用移动设备在外网接入普通虚拟机”相匹配,授信级别为极低,则基于匹配的典型场景所对应的安全策略的要求:接入设备需要在接入设备的图像中添加水印,不需要将所述接入设备客户端文件系统映射给服务器,不需要把接入设备剪贴板的内容传递给服务器;若接入设备本次连接请求所携带的用户类型、接入设备类型、接入网络类型与典型场景“使用个人电脑在内网接入虚拟机”相匹配,则基于匹配的典型场景所对应的安全策略的要求:接入设备需要将剪切板的内容传递给服务器,不需要在接入设备的图像中添加水印,不需要将文件系统映射给服务器。For example, as shown in Table 1, the security control policy, if the user type, access device type, and access network type carried in the connection request of the access device and the typical scenario "Special users use mobile devices to access ordinary virtual machine" and the credit level is extremely low, based on the requirements of the security policy corresponding to the typical matching scenario: the access device needs to add a watermark to the image of the access device, and there is no need to upload the client file of the access device to The system is mapped to the server, and there is no need to transfer the contents of the clipboard of the access device to the server; if the user type, access device type, and access network type carried in the connection request of the access device and the typical Intranet access virtual machine" is based on the requirements of the security policy corresponding to the matching typical scenario: the access device needs to pass the content of the clipboard to the server, and there is no need to add a watermark to the image of the access device. There is no need to map the file system to the server.
S308、所述服务器实施所述确定的安全策略。S308. The server implements the determined security policy.
具体地,服务器基于所述确定的安全策略的要求,在服务器上开启或关闭对应功能,即是否把文件系统映射给接入设备、是否把服务器剪贴板的内容传递到接入设备、是否在传递给接入设备的服务器的图像中添加水印。Specifically, based on the requirements of the determined security policy, the server enables or disables corresponding functions on the server, that is, whether to map the file system to the access device, whether to transfer the contents of the server clipboard to the access device, whether to transfer Add a watermark to the image on the server of the connected device.
示例地,如表1所示安全控制策略,若接入设备本次连接请求确定与“特殊用户使用移动设备在外网接入普通虚拟机”的典型场景相匹配,则服务器基于该匹配的典型场景所对应的安全策略:需要在传递给接入设备的服务器的图像中添加水印,不需要将文件系统映射给接入设备,也不需要将剪切板中内容传递给接入设备。若接入设备本次连接请求确定与“使用个人电脑在内网接入虚拟机”的典型场景相匹配,则服务器基于该匹配的典型场景对应的安全策略,需要将文件系统映射给接入设备,不需要将剪切板中的内容传递给接入设备,也不需要在传递给接入设备的服务器的图片中添加水印。For example, as shown in Table 1, if the security control policy shown in Table 1, if the connection request of the access device is determined to match the typical scenario of "a special user uses a mobile device to access a common virtual machine on the external network", the server will Corresponding security policy: It is necessary to add a watermark to the image delivered to the server of the access device, it is not necessary to map the file system to the access device, and it is not necessary to transfer the contents of the clipboard to the access device. If the connection request of the access device matches the typical scenario of "using a personal computer to access a virtual machine on the intranet", the server needs to map the file system to the access device based on the security policy corresponding to the matching typical scenario , there is no need to transfer the content in the clipboard to the access device, and there is no need to add a watermark to the picture delivered to the server of the access device.
通过上述内容的描述,针对与本次连接请求相匹配的安全策略的要求,采集接入设备的GPS数据、摄像头数据、麦克风数据,并保存在管理节点中,与现有技术相比,采集并保存接入设备数据可以周期性对虚拟桌面管理系统中的连接请求进行安全审计,提高企业信息安全。另一方面,针对每次连接请求,对接入设备和服务器分别实施不同的安全控制项,以此解决了现有技术中无法在不同接入场景下实现差异化控制的问题,由此,提高了企业业务的信息安全。Through the description of the above content, according to the requirements of the security policy matching this connection request, the GPS data, camera data, and microphone data of the access device are collected and stored in the management node. Compared with the existing technology, the collection and Saving access device data can periodically conduct security audits on connection requests in the virtual desktop management system, improving enterprise information security. On the other hand, for each connection request, different security control items are implemented on the access device and the server, thereby solving the problem in the prior art that differentiated control cannot be achieved in different access scenarios, thereby improving The information security of enterprise business.
可选地,在本发明的另一种可能的实施例中,在预置的安全控制策略中,也可以对每种典型场景设定预置的分数段,即对用户类型、接入设备类型、接入网络环境类型和远程桌面类型的每种组合设定预置的分数段,并针对连接请求中所携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型中每种类型标注分数,如接入设备为移动设备时标注5分,接入设备为个人计算机、瘦客户机时标注10分;普通用户标注5分,特殊用户标注10分;内网接入标注10分;外网接入标注5分;普通虚拟机标注5分;特殊虚拟机标注10分。当管理节点接收到连接请求时,通过获取连接请求中携带的用户类型、接入设备类型、接入网络环境类型和远程桌面类型,并对其进行打分,比较本次连接请求的总分和每种典型场景所对应的预置的分数段,确定与本次连接请求相匹配的分数段及与该分数段对应的安全策略,对接入设备和服务器实施该安全策略,利用上述方法,同样可以解决现有技术中无法区分不同连接请求进行差异化安全控制的问题,提高了企业的信息安全。Optionally, in another possible embodiment of the present invention, in the preset security control policy, a preset score segment can also be set for each typical scenario, that is, for user type, access device type , each combination of access network environment type and remote desktop type sets a preset score segment, and for each of the user type, access device type, access network environment type, and remote desktop type carried in the connection request Mark points by type, such as 5 points when the access device is a mobile device, 10 points when the access device is a personal computer or thin client; 5 points for ordinary users, 10 points for special users; 10 points for intranet access ; 5 points are marked for external network access; 5 points are marked for ordinary virtual machines; 10 points are marked for special virtual machines. When the management node receives the connection request, it obtains the user type, access device type, access network environment type, and remote desktop type carried in the connection request, and scores them, and compares the total score of this connection request with each According to the preset score segment corresponding to this typical scenario, determine the score segment that matches this connection request and the security policy corresponding to the score segment, and implement the security policy on the access device and server. Using the above method, you can also It solves the problem in the prior art that it is impossible to distinguish different connection requests for differentiated security control, and improves the information security of the enterprise.
应理解,在本发明的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。It should be understood that in various embodiments of the present invention, the sequence numbers of the above-mentioned processes do not mean the order of execution, and the execution order of each process should be determined by its functions and internal logic, rather than by the embodiment of the present invention. The implementation process constitutes any limitation.
综上所述,本发明实施例提供的安全控制的方法,通过在管理节点中预置安全控制策略,根据每次连接请求中所携带的用户类型、接入设备类型、远程桌面类型与预置的安全控制策略相比较,确定与本次连接请求相匹配的典型场景及该典型场景对应的安全策略,对本次连接请求中的接入设备和服务器实施不同的安全策略,与现有技术相比,解决了在不同接入场景下无法对连接请求的安全进行差异化控制的问题,提高了企业的信息安全。另外,通过安全策略中配置回传接入设备数据的功能,对连接请求中的接入设备数据进行备案保存,便于进行安全审计,也增强了远程桌面访问的安全保护力度。To sum up, the security control method provided by the embodiment of the present invention presets the security control strategy in the management node, according to the user type, access device type, remote desktop type and preset Compared with the security control strategy of the current connection request, determine the typical scenario that matches this connection request and the security strategy corresponding to the typical scenario, and implement different security strategies for the access device and server in this connection request, which is comparable to the existing technology. Compared with this method, it solves the problem that the security of connection requests cannot be controlled differently in different access scenarios, and improves the information security of enterprises. In addition, by configuring the function of returning access device data in the security policy, the access device data in the connection request is recorded and saved, which is convenient for security audit and also enhances the security protection of remote desktop access.
图4为本发明实施例中一种虚拟桌面管理系统400的示意图,如图所示,所述虚拟桌面管理系统包括:管理节点401、服务器402、接入设备403,所述方法包括:FIG. 4 is a schematic diagram of a virtual desktop management system 400 in an embodiment of the present invention. As shown in the figure, the virtual desktop management system includes: a management node 401, a server 402, and an access device 403. The method includes:
所述管理节点401,用于预置安全控制策略,所述安全控制策略包括至少一个典型场景及与每个所述至少一个典型场景所对应的安全策略,每个所述至少一个典型场景为用户类型、接入设备类型和远程桌面类型的组合,每个所述安全策略包括至少一个安全控制项;The management node 401 is configured to preset a security control policy, the security control policy includes at least one typical scenario and a security policy corresponding to each of the at least one typical scenario, and each of the at least one typical scenario is a user type, access device type, and remote desktop type, each of the security policies includes at least one security control item;
所述管理节点401,还用于:获取所述接入设备发送的连接请求所携带的用户类型、接入设备类型、远程桌面类型;将所述连接请求所携带的用户类型、接入设备类型、远程桌面类型与所述安全控制策略中的所述至少一个典型场景进行比较,确定与所述连接请求匹配的典型场景以及与所述匹配的典型场景对应的安全策略;根据所述确定的安全策略向所述接入设备发送指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接;The management node 401 is further configured to: obtain the user type, access device type, and remote desktop type carried in the connection request sent by the access device; Comparing the remote desktop type with the at least one typical scenario in the security control policy, determining a typical scenario matching the connection request and a security policy corresponding to the matching typical scenario; according to the determined security Sending instruction information to the access device by policy, where the instruction information is used to instruct the access device to establish a connection with the server;
所述接入设备403,用于向所述管理节点发送连接请求,所述连接请求用于所述接入设备请求与服务器建立连接;The access device 403 is configured to send a connection request to the management node, where the connection request is used for the access device to request to establish a connection with the server;
所述接入设备403,还用于:接收所述管理节点发送的所述指示信息,所述指示信息用于指示所述接入设备与所述服务器建立连接。The access device 403 is further configured to: receive the indication information sent by the management node, where the indication information is used to instruct the access device to establish a connection with the server.
所述服务器402,用于根据所述指示信息与所述接入设备建立连接。The server 402 is configured to establish a connection with the access device according to the indication information.
可选地,所述管理节点401,还用于:向所述服务器发送所述确定的安全策略,所述连接请求的安全策略包括采集全球定位系统数据、摄像头数据、麦克风数据中的至少一种;接收所述服务器发送的接入设备数据,所述接入设备数据为所述服务器通知所述接入设备按照所述确定的安全策略的要求获得;Optionally, the management node 401 is further configured to: send the determined security policy to the server, the security policy of the connection request includes collecting at least one of global positioning system data, camera data, and microphone data ; Receive the access device data sent by the server, the access device data is obtained by the server notifying the access device according to the requirements of the determined security policy;
所述服务器402,还用于接收所述管理节点发送的所述确定的安全策略;向所述虚拟机发送所述确定的安全策略;将所述接入设备数据发送给所述管理节点;The server 402 is further configured to receive the determined security policy sent by the management node; send the determined security policy to the virtual machine; send the access device data to the management node;
所述接入设备403,还用于接收所述服务器发送的所述确定的安全策略;按照所述确定的安全策略的要求采集所述接入设备数据;将所述接入设备数据发送给所述服务器。The access device 403 is further configured to receive the determined security policy sent by the server; collect the data of the access device according to the requirements of the determined security policy; send the data of the access device to the said server.
值得说明的是,上述虚拟桌面管理系统400用于执行如图2至图3任一所述方法,在此不再赘述。It is worth noting that the above-mentioned virtual desktop management system 400 is used to execute the method described in any one of FIG. 2 to FIG. 3 , which will not be repeated here.
通过在管理节点中预置安全控制策略,当用户通过不同接入设备请求与服务器建立连接时,虚拟桌面管理系统400可以根据用户类型、接入设备类型、远程桌面类型与安全控制策略进行比较,确定与本次连接请求匹配的典型场景及该匹配的典型场景对应的安全策略,与现有技术中仅通过用户或虚拟机操作权限控制连接请求的安全相比,实现对不同场景的连接请求进行差异化控制,增强了企业的信息安全保护;另一方面,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据、MAC地址等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。By presetting the security control policy in the management node, when the user requests to establish a connection with the server through different access devices, the virtual desktop management system 400 can compare the security control policy according to the user type, access device type, remote desktop type, Determine the typical scenario matching this connection request and the security policy corresponding to the matching typical scenario, compared with the prior art in which the security of the connection request is only controlled by the user or virtual machine operation authority, the connection request for different scenarios is implemented. Differentiated control enhances the information security protection of the enterprise; on the other hand, according to the requirements of the security policy, the access device data such as GPS data, camera data, microphone data, and MAC address are collected in the access device, which can control the virtual desktop infrastructure. The connection requests with lower credit levels in the architecture are subject to security audits, so as to improve the information security of enterprise business.
上文中结合图1至图4,详细描述了根据本发明实施例所提供的虚拟桌面安全控制的方法,下面将结合图5至图6,描述根据本发明实施例所提供的虚拟桌面安全控制的装置。The method for virtual desktop security control provided according to the embodiment of the present invention is described in detail above with reference to FIGS. device.
图5为本发明提供的一种管理节点500的示意图,如图所示,所述管理节点500包括处理器501、存储器502、通信接口503、系统总线504,所述处理器501、存储器502和通信接口503之间通过系统总线504连接并完成相互间的通信,所述存储器502中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器501执行所述存储器502中的计算机执行指令以利用所述虚拟桌面管理系统中的硬件资源执行图2至图3中描述的任意一项方法。FIG. 5 is a schematic diagram of a management node 500 provided by the present invention. As shown in the figure, the management node 500 includes a processor 501, a memory 502, a communication interface 503, and a system bus 504. The processor 501, the memory 502 and The communication interfaces 503 are connected through the system bus 504 to complete mutual communication. The memory 502 is used to store computer execution instructions. When the virtual desktop management system is running, the processor 501 executes the instructions in the memory 502. The computer executes instructions to use hardware resources in the virtual desktop management system to execute any one of the methods described in FIGS. 2 to 3 .
应理解,在本发明实施例中,该处理器501可以是CPU,该处理器501还可以是其他通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that, in the embodiment of the present invention, the processor 501 may be a CPU, and the processor 501 may also be other general-purpose processors, digital signal processors (DSPs), application-specific integrated circuits (ASICs), off-the-shelf programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
该存储器502可以包括只读存储器和随机存取存储器,并向处理器510提供指令和数据。存储器502的一部分还可以包括非易失性随机存取存储器。例如,存储器502还可以存储设备类型的信息。The memory 502 may include read-only memory and random-access memory, and provides instructions and data to the processor 510 . A portion of memory 502 may also include non-volatile random access memory. For example, memory 502 may also store device type information.
该系统总线504除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为系统总线504。In addition to the data bus, the system bus 504 may also include a power bus, a control bus, and a status signal bus. However, for clarity of illustration, the various buses are labeled as system bus 504 in the figure.
通过在管理节点中预置安全控制策略,当用户通过不同接入设备请求与服务器建立连接时,管理节点500可以根据连接请求中所携带的用户类型、接入设备类型和远程桌面类型与预置的安全控制策略进行匹配,确定本次连接请求的安全策略,与现有技术相比,实现对不同场景的连接请求进行差异化控制,增强了企业的信息安全保护力度;另一方面,根据安全策略的要求,在接入设备中采集GPS数据、摄像头数据、麦克风数据、MAC地址等接入设备数据,可以对虚拟桌面基础架构中授信级别较低的连接请求进行安全审计,以此,提高企业业务的信息安全。By presetting the security control policy in the management node, when a user requests to establish a connection with the server through different access devices, the management node 500 can compare the user type, access device type, and remote desktop type carried in the connection request with the preset Match the security control strategy of the current connection request to determine the security strategy of this connection request. Compared with the existing technology, it realizes the differential control of connection requests in different scenarios and enhances the information security protection of the enterprise; on the other hand, according to the security According to policy requirements, access device data such as GPS data, camera data, microphone data, and MAC address can be collected in access devices, and security audits can be performed on connection requests with lower credit levels in the virtual desktop infrastructure, thereby improving enterprise security. Business information security.
图6为一种接入设备600的示意图,如图所示,所述接入设备600包括处理器601、存储器602、通信接口603、系统总线604,所述处理器601、存储器602和通信接口603之间通过系统总线604连接并完成相互间的通信,所述存储器602中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器601执行所述存储器602中的计算机执行指令,以使得:FIG. 6 is a schematic diagram of an access device 600. As shown in the figure, the access device 600 includes a processor 601, a memory 602, a communication interface 603, and a system bus 604. The processor 601, the memory 602, and the communication interface 603 are connected to each other through a system bus 604 and communicate with each other. The memory 602 is used to store computer execution instructions. When the virtual desktop management system is running, the processor 601 executes the computer execution instructions in the memory 602. directive such that:
向管理节点发送连接请求,所述连接请求用于所述接入设备请求与服务器建立连接,以使得所述管理节点确定所述连接请求的安全策略,并将所述接请求的安全策略发送给所述服务器;Send a connection request to the management node, the connection request is used for the access device to request to establish a connection with the server, so that the management node determines the security policy of the connection request, and sends the security policy of the connection request to said server;
接收所述服务器发送的所述连接请求的安全策略,所述连接请求的安全策略包括采集全球定位系统数据、摄像头数据、麦克风数据中的至少一种;Receive the security policy of the connection request sent by the server, the security policy of the connection request includes collecting at least one of global positioning system data, camera data, and microphone data;
按照所述连接请求的安全策略的要求采集接入设备数据;Collect access device data according to the requirements of the security policy of the connection request;
将所述接入设备数据发送给所述服务器。Send the access device data to the server.
应理解,在本发明实施例中,该处理器601可以是CPU,该处理器601还可以是其他通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that, in the embodiment of the present invention, the processor 601 may be a CPU, and the processor 601 may also be other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASICs), off-the-shelf programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
该存储器602可以包括只读存储器和随机存取存储器,并向处理器510提供指令和数据。存储器602的一部分还可以包括非易失性随机存取存储器。例如,存储器602还可以存储设备类型的信息。The memory 602 may include read-only memory and random-access memory, and provides instructions and data to the processor 510 . A portion of memory 602 may also include non-volatile random access memory. For example, memory 602 may also store device type information.
该系统总线604除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为系统总线604。In addition to the data bus, the system bus 604 may also include a power bus, a control bus, and a status signal bus. However, for clarity of illustration, the various buses are labeled as system bus 604 in the figure.
可选地,所述连接请求的安全策略还包括文件系统重定向、剪切板重定向、数字水印中的至少一项,则Optionally, the security policy of the connection request further includes at least one of file system redirection, clipboard redirection, and digital watermarking, then
所述接入设备基于所述连接请求的安全策略:The access device is based on the security policy of the connection request:
将所述接入设备的文件系统映射给所述服务器;或mapping the file system of the access device to the server; or
将所述接入设备剪切板内容传递给所述服务器;或passing the clipboard content of the access device to the server; or
在所述接入设备的图像中添加水印。Adding a watermark to the image of the access device.
通过以上内容的描述,接入设备600可以基于管理节点确定安全策略的要求,在接入设备600中采集GPS数据、摄像头数据、麦克风数据、MAC地址等接入设备数据,回传给管理节点保存,与现有技术相比,通过管理节点中保存接入设备数据,可以周期性对虚拟桌面基础架构中的连接请求进行安全审计,以此,提高企业业务的信息安全。Through the above description, the access device 600 can collect GPS data, camera data, microphone data, MAC address and other access device data in the access device 600 based on the requirements of the management node to determine the security policy, and send it back to the management node for storage. , compared with the prior art, by storing the access device data in the management node, security audits can be periodically performed on the connection requests in the virtual desktop infrastructure, thereby improving the information security of the business of the enterprise.
图7为服务器700的示意图,如图所示,所述服务器700包括:包括处理器701、存储器702、通信接口703、系统总线704,所述处理器701、存储器702和通信接口703之间通过系统总线704连接并完成相互间的通信,所述存储器702中用于存储计算机执行指令,所述虚拟桌面管理系统运行时,所述处理器701执行所述存储器702中的计算机执行指令,以使得:7 is a schematic diagram of a server 700. As shown in the figure, the server 700 includes: a processor 701, a memory 702, a communication interface 703, and a system bus 704. The processor 701, the memory 702, and the communication interface 703 are connected through The system bus 704 connects and completes mutual communication, and the memory 702 is used to store computer-executable instructions. When the virtual desktop management system is running, the processor 701 executes the computer-executable instructions in the memory 702, so that :
接收管理节点发送的安全策略,所述安全策略包括全球定位系统数据、摄像头数据、麦克风数据中的至少一种;receiving a security policy sent by the management node, the security policy including at least one of global positioning system data, camera data, and microphone data;
将所述安全策略发送给所述接入设备,以使得所述接入设备按照所述安全策略的要求采集接入设备数据;sending the security policy to the access device, so that the access device collects access device data according to the requirements of the security policy;
接收所述接入设备发送的所述接入设备数据;receiving the access device data sent by the access device;
将所述接入设备发送给所述管理节点,以使得所述管理节点保存所述接入设备数据。sending the access device to the management node, so that the management node saves the access device data.
应理解,在本发明实施例中,该处理器701可以是CPU,该处理器701还可以是其他通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that, in the embodiment of the present invention, the processor 701 may be a CPU, and the processor 701 may also be other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASICs), off-the-shelf programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
该存储器702可以包括只读存储器和随机存取存储器,并向处理器510提供指令和数据。存储器702的一部分还可以包括非易失性随机存取存储器。例如,存储器702还可以存储设备类型的信息。The memory 702 may include read-only memory and random-access memory, and provides instructions and data to the processor 510 . A portion of memory 702 may also include non-volatile random access memory. For example, memory 702 may also store device type information.
该系统总线704除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为系统总线704。In addition to the data bus, the system bus 704 may also include a power bus, a control bus, and a status signal bus. However, for clarity of illustration, the various buses are labeled as system bus 704 in the figure.
可选地,所述安全策略还包括:文件系统重定向、剪切板重定向、数字水印中的至少一项,则Optionally, the security policy further includes: at least one of file system redirection, clipboard redirection, and digital watermarking, then
所述服务器基于所述安全策略:The server based on the security policy:
将所述服务器的文件系统映射给所述接入设备;或mapping the file system of the server to the access device; or
将所述服务器的剪切板内容传递给所述接入设备;或passing the content of the server's clipboard to the access device; or
在所述服务器发送给所述接入设备的图像中添加水印。Adding a watermark to the image sent by the server to the access device.
通过上述内容的描述,服务器700可以基于管理节点确定的安全策略实施不同安全控制项,并将所述安全策略发送给接入设备,并将接入设备返回的接入设备数据发送给管理节点,由管理节点保存所述接入设备数据,与现有技术相比,管理节点可以根据连接请求所携带的用户类型、接入设备类型、远程桌面类型所确定的安全策略,对不同场景的连接请求实施差异化控制,提高企业业务的信息安全。Through the above description, the server 700 can implement different security control items based on the security policy determined by the management node, and send the security policy to the access device, and send the access device data returned by the access device to the management node, The management node saves the access device data. Compared with the prior art, the management node can respond to connection requests in different scenarios according to the security policies determined by the user type, access device type, and remote desktop type carried in the connection request. Implement differentiated control to improve the information security of enterprise business.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。Those skilled in the art can appreciate that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present invention.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the essence of the technical solution of the present invention or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in various embodiments of the present invention. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes. .
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应所述以权利要求的保护范围为准。The above is only a specific embodiment of the present invention, but the scope of protection of the present invention is not limited thereto. Anyone skilled in the art can easily think of changes or substitutions within the technical scope disclosed in the present invention. Should be covered within the protection scope of the present invention. Therefore, the protection scope of the present invention should be based on the protection scope of the claims.
Claims (14)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610488502.2A CN107547480A (en) | 2016-06-28 | 2016-06-28 | A kind of method, apparatus and virtual desktop management system of virtual desktop security control |
| PCT/CN2017/080095 WO2018000891A1 (en) | 2016-06-28 | 2017-04-11 | Security control method and device for virtual desktop, and virtual desktop management system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610488502.2A CN107547480A (en) | 2016-06-28 | 2016-06-28 | A kind of method, apparatus and virtual desktop management system of virtual desktop security control |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107547480A true CN107547480A (en) | 2018-01-05 |
Family
ID=60785841
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201610488502.2A Withdrawn CN107547480A (en) | 2016-06-28 | 2016-06-28 | A kind of method, apparatus and virtual desktop management system of virtual desktop security control |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN107547480A (en) |
| WO (1) | WO2018000891A1 (en) |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111277670A (en) * | 2020-03-09 | 2020-06-12 | 西安万像电子科技有限公司 | Remote control system and method |
| CN111310135A (en) * | 2018-12-12 | 2020-06-19 | 中兴通讯股份有限公司 | Watermark adding method and device based on virtual desktop |
| CN111314286A (en) * | 2019-12-20 | 2020-06-19 | 杭州迪普科技股份有限公司 | Configuration method and device of security access control policy |
| CN112311851A (en) * | 2020-09-25 | 2021-02-02 | 新华三大数据技术有限公司 | Network policy configuration method and device |
| CN112714185A (en) * | 2020-12-30 | 2021-04-27 | 威创集团股份有限公司 | Access seat system |
| CN113630390A (en) * | 2021-07-23 | 2021-11-09 | 谭静 | Network security communication method and device of terminal equipment based on big data |
| CN114389876A (en) * | 2022-01-13 | 2022-04-22 | 平安普惠企业管理有限公司 | Security policy enforcement method, device, equipment and storage medium |
| CN114416251A (en) * | 2022-01-14 | 2022-04-29 | 阿里巴巴(中国)有限公司 | Cloud desktop management method and computer storage medium |
| CN115643109A (en) * | 2022-12-21 | 2023-01-24 | 四川汉科计算机信息技术有限公司 | Remote control method, system, equipment and medium based on virtualization platform |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113572839B (en) * | 2021-07-23 | 2024-07-19 | 段采标 | Remote control method, device and system of industrial personal computer |
| CN113505011B (en) * | 2021-09-08 | 2021-12-07 | 北京鲸鲮信息系统技术有限公司 | Permission synchronization method and device, electronic equipment and storage medium |
| CN116015852A (en) * | 2022-12-26 | 2023-04-25 | 国网江苏省电力有限公司扬州供电分公司 | A virtual cloud desktop security management method based on national grid information |
| CN116319764B (en) * | 2023-03-13 | 2025-07-18 | 阿里巴巴(中国)有限公司 | Cloud desktop security management and control method, device, storage medium and system |
| CN116896583B (en) * | 2023-07-17 | 2024-07-23 | 博智安全科技股份有限公司 | Remote control method, device, electronic equipment and storage medium |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103812829A (en) * | 2012-11-08 | 2014-05-21 | 华为技术有限公司 | Method and system for improving security of remote desktop, and remote desktop server |
| CN104753930A (en) * | 2015-03-17 | 2015-07-01 | 成都盛思睿信息技术有限公司 | Cloud desktop management system based on security gateway and security access control method thereof |
| CN105049414A (en) * | 2015-06-03 | 2015-11-11 | 北京朋创天地科技有限公司 | Dataflow control method facing virtual desktop and information safety device |
| CN105378659A (en) * | 2013-06-14 | 2016-03-02 | 托加里奥有限责任公司 | Method and system for enabling access of client device to remote desktop |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100571157C (en) * | 2006-08-15 | 2009-12-16 | 华为技术有限公司 | A method and system for realizing security control of mobile station |
| US9571507B2 (en) * | 2012-10-21 | 2017-02-14 | Mcafee, Inc. | Providing a virtual security appliance architecture to a virtual cloud infrastructure |
| US20140283071A1 (en) * | 2013-03-12 | 2014-09-18 | Spikes, Inc. | Application malware isolation via hardware separation |
| CN104618435B (en) * | 2014-12-29 | 2016-11-09 | 北京奇虎科技有限公司 | Method for realizing remote desktop and remote desktop management system |
-
2016
- 2016-06-28 CN CN201610488502.2A patent/CN107547480A/en not_active Withdrawn
-
2017
- 2017-04-11 WO PCT/CN2017/080095 patent/WO2018000891A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103812829A (en) * | 2012-11-08 | 2014-05-21 | 华为技术有限公司 | Method and system for improving security of remote desktop, and remote desktop server |
| CN105378659A (en) * | 2013-06-14 | 2016-03-02 | 托加里奥有限责任公司 | Method and system for enabling access of client device to remote desktop |
| CN104753930A (en) * | 2015-03-17 | 2015-07-01 | 成都盛思睿信息技术有限公司 | Cloud desktop management system based on security gateway and security access control method thereof |
| CN105049414A (en) * | 2015-06-03 | 2015-11-11 | 北京朋创天地科技有限公司 | Dataflow control method facing virtual desktop and information safety device |
Cited By (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111310135A (en) * | 2018-12-12 | 2020-06-19 | 中兴通讯股份有限公司 | Watermark adding method and device based on virtual desktop |
| CN111314286A (en) * | 2019-12-20 | 2020-06-19 | 杭州迪普科技股份有限公司 | Configuration method and device of security access control policy |
| CN111314286B (en) * | 2019-12-20 | 2022-11-01 | 杭州迪普科技股份有限公司 | Configuration method and device of security access control policy |
| CN111277670A (en) * | 2020-03-09 | 2020-06-12 | 西安万像电子科技有限公司 | Remote control system and method |
| CN112311851A (en) * | 2020-09-25 | 2021-02-02 | 新华三大数据技术有限公司 | Network policy configuration method and device |
| CN112311851B (en) * | 2020-09-25 | 2022-04-01 | 新华三大数据技术有限公司 | Network policy configuration method and device |
| CN112714185B (en) * | 2020-12-30 | 2022-03-18 | 威创集团股份有限公司 | Access seat system |
| CN112714185A (en) * | 2020-12-30 | 2021-04-27 | 威创集团股份有限公司 | Access seat system |
| CN113630390A (en) * | 2021-07-23 | 2021-11-09 | 谭静 | Network security communication method and device of terminal equipment based on big data |
| CN113630390B (en) * | 2021-07-23 | 2023-09-01 | 国网湖北省电力有限公司荆州供电公司 | Network security communication method and device of terminal equipment based on big data |
| CN114389876A (en) * | 2022-01-13 | 2022-04-22 | 平安普惠企业管理有限公司 | Security policy enforcement method, device, equipment and storage medium |
| CN114416251A (en) * | 2022-01-14 | 2022-04-29 | 阿里巴巴(中国)有限公司 | Cloud desktop management method and computer storage medium |
| CN115643109A (en) * | 2022-12-21 | 2023-01-24 | 四川汉科计算机信息技术有限公司 | Remote control method, system, equipment and medium based on virtualization platform |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2018000891A1 (en) | 2018-01-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107547480A (en) | A kind of method, apparatus and virtual desktop management system of virtual desktop security control | |
| US10567373B2 (en) | Establishing security over converged Ethernet with TCP credential appropriation | |
| US8042163B1 (en) | Secure storage access using third party capability tokens | |
| CN102170440B (en) | Method suitable for safely migrating data between storage clouds | |
| JP5516821B2 (en) | System and method for remote maintenance of multiple clients in an electronic network using virtualization and authentication | |
| CN103703443B (en) | Powerful permission management for computing application functions | |
| CN111600899A (en) | Micro-service access control method and device, electronic equipment and storage medium | |
| CN104168304B (en) | Single-node login system and method under VDI environment | |
| CN110417844A (en) | System and method for decentralized management of multi-owner nodes using blockchain | |
| WO2021073151A1 (en) | Multi-network communication-based data transmission method and related device | |
| US11695650B2 (en) | Secure count in cloud computing networks | |
| CN106911648B (en) | A kind of environment isolation method and equipment | |
| CN105069383A (en) | Virtual desktop USB (Universal Serial Bus) storage peripheral management and control method and system | |
| JP2006510991A (en) | Distributed content management system | |
| US10282461B2 (en) | Structure-based entity analysis | |
| CN114422258A (en) | A single sign-on method, medium and electronic device based on multi-authentication protocol | |
| CN102713925A (en) | Sensitive information leakage prevention system, sensitive information leakage prevention method and sensitive information leakage prevention program | |
| US20190139133A1 (en) | System for periodically updating backings for resource requests | |
| WO2018001023A1 (en) | Virtual desktop login method and device for cloud terminal | |
| CN104811473A (en) | Virtual nonvolatile storage medium establishing method and system and management system | |
| CN120982066A (en) | Bi-directional application programming interface for implementing operational action functions in unidirectional transport system | |
| CN102523267A (en) | Cloud backup system and method | |
| CN111092958B (en) | A node access method, device, system and storage medium | |
| CN105516134B (en) | A kind of authentication method and system of the system integration | |
| CN114090981B (en) | Access method and device for remote host |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180105 |
|
| WW01 | Invention patent application withdrawn after publication |