[go: up one dir, main page]

CN117579674B - A remote control system and method - Google Patents

A remote control system and method Download PDF

Info

Publication number
CN117579674B
CN117579674B CN202410069099.4A CN202410069099A CN117579674B CN 117579674 B CN117579674 B CN 117579674B CN 202410069099 A CN202410069099 A CN 202410069099A CN 117579674 B CN117579674 B CN 117579674B
Authority
CN
China
Prior art keywords
password
target server
server
target
remote
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410069099.4A
Other languages
Chinese (zh)
Other versions
CN117579674A (en
Inventor
高远
祝天健
陈韬
邱鹏
纪政
杜锦
张健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Lab
Original Assignee
Zhejiang Lab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Lab filed Critical Zhejiang Lab
Priority to CN202410069099.4A priority Critical patent/CN117579674B/en
Publication of CN117579674A publication Critical patent/CN117579674A/en
Application granted granted Critical
Publication of CN117579674B publication Critical patent/CN117579674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本说明书公开了一种远程控制系统及方法,远程桌面管理平台生成目标服务器的口令,当用户设备接收到用目标服务器的口令时,生成口令解析请求远程桌面管理平台基于口令解析请求中携带的口令生成加密标识,用户设备将加密标识和目标服务器的口令通过中间服务器转发到目标服务器,基于接收到的口令生成口令验证请求,远程桌面管理平台响应口令验证请求,对口令进行验证,在口令有效时将口令有效消息发送给目标服务器,使得目标服务器与用户设备之间建立远程连接。可见,用户无需掌握目标服务器的标识或目标服务器安装的远程软件的标识,通过口令的方式在目标服务器与用户设备之间建立远程连接,提高了多人远程控制场景下目标服务器的安全性。

This specification discloses a remote control system and method. The remote desktop management platform generates the password of the target server. When the user device receives the password of the target server, the remote desktop management platform generates a password parsing request based on the password carried in the password parsing request. Generate an encrypted identity, the user device forwards the encrypted identity and the password of the target server to the target server through the intermediate server, generates a password verification request based on the received password, the remote desktop management platform responds to the password verification request, verifies the password, and when the password is valid Send a password valid message to the target server to establish a remote connection between the target server and the user device. It can be seen that the user does not need to know the identity of the target server or the identity of the remote software installed on the target server. A remote connection is established between the target server and the user device through a password, which improves the security of the target server in a multi-person remote control scenario.

Description

一种远程控制系统及方法A remote control system and method

技术领域Technical field

本说明书涉及计算机技术领域,尤其涉及一种远程控制系统及方法。This specification relates to the field of computer technology, and in particular, to a remote control system and method.

背景技术Background technique

随着网络技术的发展,工程师办公已经不再局限于个人电脑,而是越来越向云上发展。例如一些仿真计算项目依赖的图形化仿真软件,由于对服务器资源有较高的性能要求,使得这些软件一般安装在云端的工作站或服务器里。工程师通过远程桌面的方式连接到这些工作站或服务器,使用上面的仿真软件进行开发。With the development of network technology, engineers' work is no longer limited to personal computers, but is increasingly moving to the cloud. For example, some simulation computing projects rely on graphical simulation software. Due to their high performance requirements on server resources, these software are generally installed on cloud workstations or servers. Engineers connect to these workstations or servers through remote desktop and use the above simulation software for development.

目前,常见的远程连接方式通常需要输入目标服务器的互联网协议(InternetProtocol,IP)地址及密码,或者目标服务器上安装的远程软件的身份标识号码(IdentityDocument,ID)及密码,才能够实现远程控制。At present, common remote connection methods usually require entering the Internet Protocol (IP) address and password of the target server, or the Identity Document (ID) and password of the remote software installed on the target server to achieve remote control.

但是,无论输入的是目标服务器的IP及密码,或者是远程软件的ID及密码,在多人远程控制目标服务器的场景下,均会存在攻击者违规盗用IP/ID及密码的问题,造成目标服务器被违规使用。However, whether the IP and password of the target server or the ID and password of the remote software are entered, in the scenario where multiple people remotely control the target server, there will be the problem of the attacker illegally stealing the IP/ID and password, causing the target to The server is being used illegally.

发明内容Contents of the invention

本说明书提供一种远程控制系统及方法,以部分的解决现有技术存在的上述问题。This specification provides a remote control system and method to partially solve the above problems existing in the prior art.

本说明书采用下述技术方案:This manual adopts the following technical solutions:

本说明书提供了一种远程控制系统,所述系统包括:远程桌面管理平台、用户设备、目标服务器和中间服务器;This specification provides a remote control system, which includes: a remote desktop management platform, user equipment, a target server, and an intermediate server;

所述用户设备,用于响应于用户的输入,生成口令获取请求,并将所述口令获取请求发送给所述远程桌面管理平台;接收所述远程桌面管理平台发送的所述目标服务器对应的口令,并在用户界面中展示所述目标服务器对应的口令;当接收到所述用户通过所述用户设备安装的远程软件输入所述目标服务器对应的口令时,生成口令解析请求,并将所述口令解析请求发送给所述远程桌面管理平台;接收所述远程桌面管理平台返回的加密标识,将所述加密标识和所述目标服务器对应的口令发送给所述中间服务器;当与所述目标服务器建立远程连接时,通过所述中间服务器远程控制所述目标服务器;The user equipment is configured to generate a password acquisition request in response to user input, and send the password acquisition request to the remote desktop management platform; receive the password corresponding to the target server sent by the remote desktop management platform , and display the password corresponding to the target server in the user interface; when receiving the password corresponding to the target server input by the user through the remote software installed on the user equipment, a password parsing request is generated, and the password is Send the parsing request to the remote desktop management platform; receive the encrypted identification returned by the remote desktop management platform, and send the encrypted identification and the password corresponding to the target server to the intermediate server; when establishing a connection with the target server When connecting remotely, remotely control the target server through the intermediate server;

所述远程桌面管理平台,用于接收所述用户设备发送的口令获取请求,调用所述远程桌面管理平台的权限管理单元生成所述目标服务器对应的口令;将所述目标服务器对应的口令发送给所述用户设备;接收所述用户设备发送的口令解析请求,根据所述口令解析请求中携带的口令,确定目标服务器安装的远程软件的标识,并加密所述目标服务器上安装的远程软件的标识得到加密标识;将所述加密标识返回给所述用户设备;接收所述目标服务器发送的口令验证请求,并从所述口令验证请求中解析得到目标服务器的口令,调用所述权限管理单元验证所述目标服务器的口令是否有效,并在口令有效时生成口令有效消息,并将所述口令有效消息发送给所述目标服务器;The remote desktop management platform is configured to receive a password acquisition request sent by the user device, call the authority management unit of the remote desktop management platform to generate a password corresponding to the target server; and send the password corresponding to the target server to The user equipment; receives a password parsing request sent by the user equipment, determines the identity of the remote software installed on the target server based on the password carried in the password parsing request, and encrypts the identity of the remote software installed on the target server. Obtain the encrypted identification; return the encrypted identification to the user equipment; receive the password verification request sent by the target server, parse the password of the target server from the password verification request, and call the authority management unit to verify the password. Describe whether the password of the target server is valid, generate a password valid message when the password is valid, and send the password valid message to the target server;

所述中间服务器,用于接收所述用户设备发送的加密标识和所述目标服务器对应的口令,根据所述加密标识确定所述目标服务器,并将所述目标服务器对应的口令转发给所述目标服务器;The intermediate server is configured to receive the encryption identification sent by the user equipment and the password corresponding to the target server, determine the target server according to the encryption identification, and forward the password corresponding to the target server to the target. server;

所述目标服务器,用于接收所述中间服务器发送的所述目标服务器对应的口令,根据所述目标服务器对应的口令生成口令验证请求,并将所述口令验证请求发送给所述远程桌面管理平台;当接收到所述远程桌面管理平台返回的口令有效消息时,通过所述中间服务器与所述用户设备建立远程连接。The target server is configured to receive the password corresponding to the target server sent by the intermediate server, generate a password verification request according to the password corresponding to the target server, and send the password verification request to the remote desktop management platform ; When receiving the password valid message returned by the remote desktop management platform, establish a remote connection with the user device through the intermediate server.

本说明书提供了一种远程控制方法,所述方法应用于远程桌面管理平台,所述方法包括:This manual provides a remote control method, which is applied to a remote desktop management platform. The method includes:

接收用户设备发送的口令获取请求,调用所述远程桌面管理平台的权限管理单元生成目标服务器对应的口令;其中,所述口令获取请求是由所述用户设备响应于用户的输入生成并发送的;Receive a password acquisition request sent by the user device, and call the permission management unit of the remote desktop management platform to generate a password corresponding to the target server; wherein the password acquisition request is generated and sent by the user device in response to the user's input;

将所述目标服务器对应的口令发送给所述用户设备,以使所述用户设备在用户界面中展示所述目标服务器对应的口令,并在接收到所述用户通过所述用户设备安装的远程软件输入所述目标服务器对应的口令时生成口令解析请求,并发送;Send the password corresponding to the target server to the user equipment, so that the user equipment displays the password corresponding to the target server in the user interface, and after receiving the remote software installed by the user through the user equipment When the password corresponding to the target server is entered, a password parsing request is generated and sent;

接收所述用户设备发送的口令解析请求,根据所述口令解析请求中携带的口令,确定目标服务器安装的远程软件的标识,并加密所述目标服务器上安装的远程软件的标识得到加密标识;Receive the password parsing request sent by the user equipment, determine the identity of the remote software installed on the target server based on the password carried in the password parsing request, and encrypt the identity of the remote software installed on the target server to obtain the encrypted identity;

将所述加密标识返回给所述用户设备,以使所述用户设备将所述加密标识和所述目标服务器对应的口令发送给所述中间服务器,以便所述中间服务器根据所述加密标识确定目标服务器,并将所述目标服务器对应的口令转发给所述目标服务器,使得所述目标服务器根据所述目标服务器对应的口令生成口令验证请求并发送;Return the encrypted identification to the user equipment, so that the user equipment sends the encrypted identification and the password corresponding to the target server to the intermediate server, so that the intermediate server determines the target based on the encrypted identification. server, and forward the password corresponding to the target server to the target server, so that the target server generates and sends a password verification request based on the password corresponding to the target server;

接收所述目标服务器发送的口令验证请求,并从所述口令验证请求中解析得到目标服务器的口令,调用所述权限管理单元验证所述目标服务器的口令是否有效,并在口令有效时生成口令有效消息,并将所述口令有效消息发送给所述目标服务器,以使所述目标服务器与所述用户设备通过所述中间服务器建立远程连接,使得所述用户设备通过所述中间服务器远程控制所述目标服务器。Receive the password verification request sent by the target server, parse the password of the target server from the password verification request, call the authority management unit to verify whether the password of the target server is valid, and generate a password valid when the password is valid. message, and sends the password valid message to the target server, so that the target server and the user equipment establish a remote connection through the intermediate server, so that the user equipment remotely controls the target server.

本说明书提供了一种远程控制方法,所述方法应用于用户设备,所述方法包括:This specification provides a remote control method, which is applied to user equipment. The method includes:

响应于用户的输入,生成口令获取请求,并将所述口令获取请求发送给远程桌面管理平台,以使所述远程桌面管理平台调用权限管理单元生成目标服务器对应的口令,并返回;In response to the user's input, generate a password acquisition request, and send the password acquisition request to the remote desktop management platform, so that the remote desktop management platform calls the authority management unit to generate a password corresponding to the target server and returns;

接收所述远程桌面管理平台发送的所述目标服务器对应的口令,并在用户界面中展示所述目标服务器对应的口令;Receive the password corresponding to the target server sent by the remote desktop management platform, and display the password corresponding to the target server in the user interface;

当接收到所述用户通过所述用户设备安装的远程软件输入所述目标服务器对应的口令时,生成口令解析请求,并将所述口令解析请求发送给所述远程桌面管理平台,以使所述远程桌面管理平台根据所述口令解析请求中携带的口令,确定目标服务器安装的远程软件的标识,并加密所述目标服务器上安装的远程软件的标识得到加密标识,并返回所述加密标识;When it is received that the user inputs the password corresponding to the target server through the remote software installed on the user device, a password parsing request is generated and the password parsing request is sent to the remote desktop management platform so that the The remote desktop management platform determines the identity of the remote software installed on the target server based on the password carried in the password parsing request, encrypts the identity of the remote software installed on the target server to obtain the encrypted identity, and returns the encrypted identity;

接收所述远程桌面管理平台返回的加密标识,将所述加密标识和所述目标服务器对应的口令发送给所述中间服务器,使得所述中间服务器根据所述加密标识确定所述目标服务器,并将所述目标服务器对应的口令转发给所述目标服务器,以便所述目标服务器根据所述目标服务器对应的口令生成口令验证请求,并将所述口令验证请求发送给所述远程桌面管理平台,当所述远程桌面管理平台接收到口令验证请求时,从所述口令验证请求中解析得到目标服务器的口令,调用所述权限管理单元验证所述目标服务器的口令是否有效,并在口令有效时生成口令有效消息,并将所述口令有效消息发送给所述目标服务器,所述目标服务器在接收到所述远程桌面管理平台返回的口令有效消息时,通过所述中间服务器与所述用户设备建立远程连接;Receive the encrypted identification returned by the remote desktop management platform, and send the encrypted identification and the password corresponding to the target server to the intermediate server, so that the intermediate server determines the target server according to the encrypted identification, and sends the encrypted identification to the intermediate server. The password corresponding to the target server is forwarded to the target server, so that the target server generates a password verification request according to the password corresponding to the target server, and sends the password verification request to the remote desktop management platform. When the remote desktop management platform receives the password verification request, it parses the password of the target server from the password verification request, calls the authority management unit to verify whether the password of the target server is valid, and generates a password valid when the password is valid. message, and sends the password valid message to the target server. When receiving the password valid message returned by the remote desktop management platform, the target server establishes a remote connection with the user device through the intermediate server;

当与所述目标服务器建立远程连接时,通过所述中间服务器远程控制所述目标服务器。When a remote connection is established with the target server, the target server is remotely controlled through the intermediate server.

本说明书提供了一种远程控制装置,所述装置应用于远程桌面管理平台,所述装置包括:This specification provides a remote control device, which is used in a remote desktop management platform. The device includes:

口令生成模块,用于接收用户设备发送的口令获取请求,调用所述远程桌面管理平台的权限管理单元生成所述目标服务器对应的口令;其中,所述口令获取请求是由所述用户设备响应于用户的输入生成并发送的;A password generation module, configured to receive a password acquisition request sent by the user device, and call the authority management unit of the remote desktop management platform to generate a password corresponding to the target server; wherein the password acquisition request is made by the user device in response to User input is generated and sent;

口令发送模块,用于将所述目标服务器对应的口令发送给所述用户设备,以使所述用户设备在用户界面中展示所述目标服务器对应的口令,并在接收到所述用户通过所述用户设备安装的远程软件输入所述目标服务器对应的口令时生成口令解析请求,并发送;Password sending module, configured to send the password corresponding to the target server to the user equipment, so that the user equipment displays the password corresponding to the target server in the user interface, and after receiving the password passed by the user through the When the remote software installed on the user device inputs the password corresponding to the target server, a password parsing request is generated and sent;

加密标识确定模块,用于接收所述用户设备发送的口令解析请求,根据所述口令解析请求中携带的口令,确定目标服务器安装的远程软件的标识,并加密所述目标服务器上安装的远程软件的标识得到加密标识;An encryption identification determination module, configured to receive a password parsing request sent by the user equipment, determine the identification of the remote software installed on the target server based on the password carried in the password parsing request, and encrypt the remote software installed on the target server. The identification is encrypted;

加密标识发送模块,用于将所述加密标识返回给所述用户设备,以使所述用户设备将所述加密标识和所述目标服务器对应的口令发送给所述中间服务器,以便所述中间服务器根据所述加密标识确定目标服务器,并将所述目标服务器对应的口令转发给所述目标服务器,使得所述目标服务器根据所述目标服务器对应的口令生成口令验证请求并发送;An encrypted identification sending module, configured to return the encrypted identification to the user equipment, so that the user equipment sends the encrypted identification and the password corresponding to the target server to the intermediate server, so that the intermediate server Determine a target server according to the encryption identifier, and forward the password corresponding to the target server to the target server, so that the target server generates a password verification request based on the password corresponding to the target server and sends it;

口令验证模块,用于接收所述目标服务器发送的口令验证请求,并从所述口令验证请求中解析得到目标服务器的口令,调用所述权限管理单元验证所述目标服务器的口令是否有效,并在口令有效时生成口令有效消息,并将所述口令有效消息发送给所述目标服务器,以使所述目标服务器通过所述中间服务器与所述用户设备建立远程连接,使得所述用户设备通过所述中间服务器远程控制所述目标服务器。A password verification module, configured to receive a password verification request sent by the target server, parse the password verification request to obtain the password of the target server, call the authority management unit to verify whether the password of the target server is valid, and When the password is valid, a password valid message is generated, and the password valid message is sent to the target server, so that the target server establishes a remote connection with the user equipment through the intermediate server, so that the user equipment passes through the The intermediate server remotely controls the target server.

本说明书提供了一种远程控制装置,所述装置应用于用户设备,所述装置包括:This specification provides a remote control device, which is applied to user equipment. The device includes:

口令获取请求发送模块,用于响应于用户的输入,生成口令获取请求,并将所述口令获取请求发送给远程桌面管理平台,以使所述远程桌面管理平台调用权限管理单元生成目标服务器对应的口令,并返回;A password acquisition request sending module is configured to generate a password acquisition request in response to the user's input, and send the password acquisition request to the remote desktop management platform, so that the remote desktop management platform calls the authority management unit to generate the password acquisition request corresponding to the target server. Password and return;

口令接收模块,用于接收所述远程桌面管理平台发送的所述目标服务器对应的口令,并在用户界面中展示所述目标服务器对应的口令;A password receiving module, configured to receive the password corresponding to the target server sent by the remote desktop management platform, and display the password corresponding to the target server in the user interface;

口令解析请求生成模块,用于当接收到所述用户通过所述用户设备安装的远程软件输入所述目标服务器对应的口令时,生成口令解析请求,并将所述口令解析请求发送给所述远程桌面管理平台,以使所述远程桌面管理平台根据所述口令解析请求中携带的口令,确定目标服务器安装的远程软件的标识,并加密所述目标服务器上安装的远程软件的标识得到加密标识,并返回所述加密标识;A password parsing request generation module, configured to generate a password parsing request when the user inputs a password corresponding to the target server through the remote software installed on the user equipment, and send the password parsing request to the remote a desktop management platform, so that the remote desktop management platform determines the identity of the remote software installed on the target server based on the password carried in the password parsing request, and encrypts the identity of the remote software installed on the target server to obtain the encrypted identity, and return the encrypted identification;

加密标识接收模块,用于接收所述远程桌面管理平台返回的加密标识,将所述加密标识和所述目标服务器对应的口令发送给所述中间服务器,使得所述中间服务器根据所述加密标识确定所述目标服务器,并将所述目标服务器对应的口令转发给所述目标服务器,以便所述目标服务器根据所述目标服务器对应的口令生成口令验证请求,并将所述口令验证请求发送给所述远程桌面管理平台,当所述远程桌面管理平台接收到口令验证请求时,从所述口令验证请求中解析得到目标服务器的口令,调用所述权限管理单元验证所述目标服务器的口令是否有效,并在口令有效时生成口令有效消息,并将所述口令有效消息发送给所述目标服务器,所述目标服务器在接收到所述远程桌面管理平台返回的口令有效消息时,通过所述中间服务器与所述用户设备建立远程连接;An encryption identification receiving module, configured to receive an encryption identification returned by the remote desktop management platform, and send the encryption identification and the password corresponding to the target server to the intermediate server, so that the intermediate server determines the encryption identification based on the encryption identification. The target server, and forwards the password corresponding to the target server to the target server, so that the target server generates a password verification request based on the password corresponding to the target server, and sends the password verification request to the target server. The remote desktop management platform, when the remote desktop management platform receives the password verification request, parses the password of the target server from the password verification request, calls the authority management unit to verify whether the password of the target server is valid, and When the password is valid, a password valid message is generated, and the password valid message is sent to the target server. When the target server receives the password valid message returned by the remote desktop management platform, it communicates with the intermediate server through the intermediate server. The user device establishes a remote connection;

远程控制模块,用于当与所述目标服务器建立远程连接时,通过所述中间服务器远程控制所述目标服务器。A remote control module, configured to remotely control the target server through the intermediate server when establishing a remote connection with the target server.

本说明书提供了一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现上述远程控制方法。This specification provides a computer-readable storage medium. The storage medium stores a computer program. When the computer program is executed by a processor, the above remote control method is implemented.

本说明书提供了一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现上述远程控制方法。This specification provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor. When the processor executes the program, the above remote control method is implemented.

本说明书采用的上述至少一个技术方案能够达到以下有益效果:At least one of the above technical solutions adopted in this manual can achieve the following beneficial effects:

本说明书提供的远程控制系统中,远程桌面管理平台响应于口令获取请求生成目标服务器对应的口令,当用户设备接收到用户输入的目标服务器对应的口令时,生成口令解析请求并发送给远程桌面管理平台,远程桌面管理平台基于口令解析请求中携带的口令,生成加密标识,用户设备将加密标识和目标服务器的口令通过中间服务器转发到目标服务器,目标服务器基于接收到的口令生成口令验证请求,远程桌面管理平台响应口令验证请求,对目标服务器的口令进行验证,并在口令有效时将口令有效消息发送给目标服务器,使得目标服务器与用户设备之间建立远程连接,从而用户设备能够远程控制目标服务器。可见,通过上述方案,用户无需掌握目标服务器的标识或目标服务器安装的远程软件的标识,通过口令的方式在目标服务器与用户设备之间建立远程连接,提高了多人远程控制目标服务器场景下目标服务器的安全性。In the remote control system provided in this manual, the remote desktop management platform generates a password corresponding to the target server in response to a password acquisition request. When the user device receives the password corresponding to the target server input by the user, a password parsing request is generated and sent to the remote desktop management Platform, the remote desktop management platform generates an encrypted identification based on the password carried in the password parsing request. The user device forwards the encrypted identification and the password of the target server to the target server through the intermediate server. The target server generates a password verification request based on the received password. Remote The desktop management platform responds to the password verification request, verifies the password of the target server, and sends a password valid message to the target server when the password is valid, so that a remote connection is established between the target server and the user device, so that the user device can remotely control the target server. . It can be seen that through the above solution, the user does not need to know the identity of the target server or the identity of the remote software installed on the target server, and establishes a remote connection between the target server and the user device through a password, which improves the accuracy of the target server in the scenario where multiple people remotely control the target server. Server security.

附图说明Description of the drawings

此处所说明的附图用来提供对本说明书的进一步理解,构成本说明书的一部分,本说明书的示意性实施例及其说明用于解释本说明书,并不构成对本说明书的不当限定。在附图中:The drawings described here are used to provide a further understanding of this specification and constitute a part of this specification. The illustrative embodiments and descriptions of this specification are used to explain this specification and do not constitute an improper limitation of this specification. In the attached picture:

图1为本说明书中一种远程控制系统的示意图;Figure 1 is a schematic diagram of a remote control system in this manual;

图2为本说明书中一种远程控制方法的交互流程示意图;Figure 2 is a schematic diagram of the interaction flow of a remote control method in this manual;

图3为本说明书中一种远程控制方法的交互流程示意图;Figure 3 is a schematic diagram of the interaction flow of a remote control method in this manual;

图4为本说明书中一种远程控制方法的交互流程示意图;Figure 4 is a schematic diagram of the interaction flow of a remote control method in this specification;

图5为本说明书中一种远程控制方法的流程示意图;Figure 5 is a schematic flow chart of a remote control method in this specification;

图6为本说明书中一种远程控制方法的交互流程示意图;Figure 6 is a schematic diagram of the interaction flow of a remote control method in this specification;

图7为本说明书提供的一种远程控制装置的示意图;Figure 7 is a schematic diagram of a remote control device provided in this specification;

图8为本说明书提供的一种远程控制装置的示意图;Figure 8 is a schematic diagram of a remote control device provided in this specification;

图9为本说明书提供的对应于图2的电子设备示意图。FIG. 9 is a schematic diagram of the electronic device corresponding to FIG. 2 provided in this specification.

具体实施方式Detailed ways

为使本说明书的目的、技术方案和优点更加清楚,下面将结合本说明书具体实施例及相应的附图对本说明书技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本说明书保护的范围。In order to make the purpose, technical solutions and advantages of this specification more clear, the technical solutions of this specification will be clearly and completely described below in conjunction with specific embodiments of this specification and the corresponding drawings. Obviously, the described embodiments are only some of the embodiments of this specification, but not all of the embodiments. Based on the embodiments in this specification, all other embodiments obtained by those of ordinary skill in the art without creative efforts fall within the scope of protection of this specification.

另外,需要说明的是,本说明书中所有获取信号、信息或数据的动作都是在遵照所在地相应的数据保护法规政策的前提下,并获得由相应装置所有者给予授权的情况下进行的。In addition, it should be noted that all actions to obtain signals, information or data in this manual are performed under the premise of complying with the corresponding data protection laws and policies of the location and with authorization from the owner of the corresponding device.

需要说明的是,在不冲突的情况下,下述的实施例及实施方式中的特征可以相互组合。It should be noted that, as long as there is no conflict, the features in the following embodiments and implementation modes can be combined with each other.

随着网络技术的发展,工程师办公已经不再局限于个人电脑,而是越来越向云上发展。例如一些仿真计算项目依赖的图形化仿真软件,由于对服务器资源有较高的性能要求,使得这些软件一般安装在云端的工作站或服务器里。工程师通过远程桌面的方式连接到这些工作站或服务器,使用上面的仿真软件进行开发。With the development of network technology, engineers' work is no longer limited to personal computers, but is increasingly moving to the cloud. For example, some simulation computing projects rely on graphical simulation software. Due to their high performance requirements on server resources, these software are generally installed on cloud workstations or servers. Engineers connect to these workstations or servers through remote desktop and use the above simulation software for development.

目前常见的远程桌面连接方式有2种:There are currently two common remote desktop connection methods:

其一是采用操作系统自带的远程桌面连接功能。在这种连接方式中,需要输入目标服务器的IP和账户密码。一旦一个用户申请到目标服务器的使用权限后,那么该用户也就知道了该目标服务器的IP和账户密码,即使该用户的使用权限过期后,也可以私自远程连接该目标服务器,甚至做出篡改账户密码等危险行为。显然,在多人使用的场景下这种连接方式是非常不安全的。One is to use the remote desktop connection function that comes with the operating system. In this connection method, you need to enter the IP and account password of the target server. Once a user applies for permission to use the target server, the user also knows the IP and account password of the target server. Even after the user's permission expires, he can remotely connect to the target server privately and even make tampering. Account passwords and other dangerous behaviors. Obviously, this connection method is very unsafe in a multi-person scenario.

其二是通过第三方的远程桌面连接软件。通常情况下,在控制端电子设备(用户设备)以及被控端电子设备(目标服务器)上都需要安装远程软件。之后,用户通过用户设备远程连接目标服务器时,需要通过用户设备上安装的远程软件,输入目标服务器上安装的远程软件的ID和该ID对应的密码,并在验证通过后远程控制目标服务器。在多人使用的场景下,这种方式仍然有安全隐患。因为本质上来说,这种方式是以远程软件的ID和密码,替代了目标服务器的IP和账户密码。在用户申请到目标服务器的远程控制权限后,用户也就掌握了安装在该目标服务器上的远程软件的ID和密码,依然可以在权限到期后通过该远程软件私自连接目标服务器。虽然远程软件可以通过一次性密码的方式来减少风险,但远程软件ID这样的用于远程连接的核心信息仍然是无法更改且会被暴露出去的。考虑到一次性密码长度较短(一般6位以内)且无特殊字符,还是有较大破解或泄露风险的。所以该方式虽然有所改进,但依然有安全风险。The second is through third-party remote desktop connection software. Normally, remote software needs to be installed on both the control end electronic device (user device) and the controlled end electronic device (target server). Afterwards, when the user remotely connects to the target server through the user device, he or she needs to use the remote software installed on the user device, enter the ID of the remote software installed on the target server and the password corresponding to the ID, and remotely control the target server after passing the verification. In multi-person use scenarios, this method still has security risks. Because essentially, this method replaces the IP and account password of the target server with the ID and password of the remote software. After the user applies for the remote control permission of the target server, the user also knows the ID and password of the remote software installed on the target server, and can still privately connect to the target server through the remote software after the permission expires. Although remote software can reduce risks through one-time passwords, core information used for remote connections such as remote software IDs cannot be changed and will be exposed. Considering that the one-time password is short in length (generally within 6 characters) and has no special characters, there is still a high risk of being cracked or leaked. Therefore, although this method has been improved, it still has security risks.

可见,目前的远程桌面连接软件都是基于IP(或远程软件ID)加密码的方式来连接,这些核心信息必须透露给用户,用户才能连接上目标服务器。It can be seen that the current remote desktop connection software is based on IP (or remote software ID) and password. These core information must be disclosed to the user before the user can connect to the target server.

基于此,本说明书提供一种远程控制系统,如图1所示,该远程控制系统包括远程桌面管理平台、用户设备、目标服务器和中间服务器,其中,远程桌面管理平台是本说明书提供的一种通过无线通信技术提供向用户设备提供远程连接服务的服务平台,远程桌面管理平台旨在连接用户设备和目标服务器,并提供相应的工具或功能以更好的提供远程互联服务器,其核心功能单元包含权限管理单元、配置管理单元和资源管理单元,基于前述远程桌面管理平台的核心功能单元,可以覆盖从目标服务器资源管理,用户申请和审批,安全连接和管控,资源使用完毕回收等流程和功能。用户设备指的是由用户操作、用于远程控制目标服务器的电子设备,本说明书并不限制用户设备的具体类型,可以是个人电脑、平板电脑、智能手机等电子设备。目标服务器可以是计算资源丰富、性能较高的云端服务器,在目标服务器中可选地部署了仿真计算项目依赖的图像化仿真软件等。中间服务器是代理/中继服务器,用户设备和目标服务器之间通过中间服务器进行远程连接和远程控制,部署在用户设备的远程软件和部署在目标服务器的远程软件通过中间服务器交换信息,可以减少远程互联时的网络卡顿、数据泄露等安全问题。代理/中继服务器地址可以是公有云上的公用服务器,也可以是自己搭建的私有服务器。公有云服务器用于公网环境的远程连接,私有服务器用于内网环境的远程连接。Based on this, this specification provides a remote control system, as shown in Figure 1. The remote control system includes a remote desktop management platform, user equipment, a target server and an intermediate server. The remote desktop management platform is a remote control system provided by this specification. A service platform that provides remote connection services to user devices through wireless communication technology. The remote desktop management platform is designed to connect user devices and target servers, and provide corresponding tools or functions to better provide remote interconnection servers. Its core functional units include The permission management unit, configuration management unit and resource management unit are based on the core functional units of the aforementioned remote desktop management platform, which can cover processes and functions such as target server resource management, user application and approval, secure connection and control, and resource recycling after use. User equipment refers to electronic equipment operated by users and used to remotely control the target server. This manual does not limit the specific type of user equipment, which can be personal computers, tablets, smartphones and other electronic equipment. The target server can be a cloud server with rich computing resources and high performance, and the graphical simulation software that the simulation computing project depends on is optionally deployed in the target server. The intermediate server is a proxy/relay server. Remote connection and remote control are carried out between the user device and the target server through the intermediate server. The remote software deployed on the user device and the remote software deployed on the target server exchange information through the intermediate server, which can reduce the need for remote control. Security issues such as network lag and data leakage when connecting to the Internet. The proxy/relay server address can be a public server on the public cloud, or a private server built by yourself. Public cloud servers are used for remote connections in the public network environment, and private servers are used for remote connections in the intranet environment.

基于图1所示远程控制系统,本说明书提供一种远程控制方法,由远程监控系统中的远程桌面管理平台、用户设备、目标服务器和中间服务器执行。Based on the remote control system shown in Figure 1, this manual provides a remote control method, which is executed by the remote desktop management platform, user equipment, target server and intermediate server in the remote monitoring system.

以下结合附图,详细说明本说明书各实施例提供的技术方案。The technical solutions provided by each embodiment of this specification will be described in detail below with reference to the accompanying drawings.

图2为本说明书提供的一种远程控制方法的交互流程示意图。Figure 2 is a schematic diagram of the interaction flow of a remote control method provided in this specification.

S100:用户设备响应于用户的输入,生成口令获取请求,并将所述口令获取请求发送给远程桌面管理平台。S100: In response to the user's input, the user device generates a password acquisition request and sends the password acquisition request to the remote desktop management platform.

在本说明书中,用户可以在每一次请求远程控制同一目标服务器之前,都通过用户设备上安装的远程软件生成口令获取请求,也即,用户每一次远程控制目标服务器所使用的口令都不一样;或者,也可以在某一时段内只通过用户设备上安装的远程软件生成一次口令获取请求,也即,在这一时段内,用户远程控制目标服务器使用的是相同的口令。In this manual, the user can generate a password acquisition request through the remote software installed on the user device before each request to remotely control the same target server. That is, the password used by the user to remotely control the target server is different each time; Alternatively, the password acquisition request can be generated only once within a certain period of time through the remote software installed on the user's device. That is, within this period of time, the user uses the same password to remotely control the target server.

一般的,在用户设备响应用户的输入生成口令获取请求时,在用户设备展示的用户界面中,可以展示用户已获得控制权限的各目标服务器的信息,如目标服务器的名称。用户可以在已获得控制权限的各目标服务器中,选择当前需要进行远程控制的目标服务器,生成口令获取请求。因此,口令获取请求中可携带当前需要进行远程控制的目标服务器的信息,但该目标服务器的信息一般不是指目标服务器的IP地址,可以是目标服务器的名称等不会泄露目标服务器本身数据的信息。Generally, when the user device generates a password acquisition request in response to the user's input, the user interface displayed on the user device can display information about each target server for which the user has obtained control permission, such as the name of the target server. Users can select the target server that currently needs to be remotely controlled among the target servers that have obtained control permissions, and generate a password acquisition request. Therefore, the password acquisition request can carry information about the target server that currently needs to be remotely controlled. However, the information about the target server generally does not refer to the IP address of the target server. It can be the name of the target server and other information that will not leak the data of the target server itself. .

由此可见,在S100之前,用户需通过用户设备申请目标服务器的远程控制权限,具体可参照后续图6,此处先不赘述。It can be seen that before S100, the user needs to apply for the remote control permission of the target server through the user device. For details, please refer to Figure 6, which will not be described in detail here.

S102:远程桌面管理平台接收所述用户设备发送的口令获取请求,调用权限管理单元生成所述目标服务器对应的口令。S102: The remote desktop management platform receives the password acquisition request sent by the user device, and calls the authority management unit to generate a password corresponding to the target server.

在本说明书中,远程桌面管理平台响应于用户设备发送的口令获取请求,从口令获取请求中解析得到用户想要远程控制的目标服务器的信息,基于解析得到的目标服务器的信息,确定用户想要远程控制的是哪个目标服务器,从而调用权限管理单元生成该目标服务器对应的口令。In this specification, the remote desktop management platform responds to the password acquisition request sent by the user device, parses the password acquisition request to obtain the information of the target server that the user wants to remotely control, and determines the information of the target server that the user wants to remotely control based on the parsed information of the target server. Which target server is being remotely controlled, and the authority management unit is called to generate the password corresponding to the target server.

在本说明书中,目标服务器的口令可以不是根据目标服务器的标识(目标服务器的IP地址)或安装在目标服务器上的远程软件的标识(远程软件的ID)生成的,而是随机生成的字符串,这样,即使用户掌握了目标服务器的口令,也不会通过目标服务器的口令获知目标服务器的标识或者是安装在目标服务器上的远程软件的标识,从而,一旦目标服务器的口令过期无法使用,用户只能再次向远程桌面管理平台申请新的目标服务器的口令,而无法通过目标服务器的标识或者是安装在目标服务器上的远程软件的标识盗用目标服务器的远程控制权限。In this specification, the password of the target server may not be generated based on the identification of the target server (the IP address of the target server) or the identification of the remote software installed on the target server (the ID of the remote software), but a randomly generated string. , in this way, even if the user has the password of the target server, he will not know the identity of the target server or the identity of the remote software installed on the target server through the password of the target server. Therefore, once the password of the target server expires and cannot be used, the user will You can only apply for a new target server password from the remote desktop management platform again, but you cannot steal the remote control permissions of the target server through the target server's identity or the identity of the remote software installed on the target server.

如前所述,目标服务器的口令可以是随机生成的字符串,但为了使得用户通过目标服务器的口令能够远程控制目标服务器,远程桌面管理平台可以将随机生成字符串与目标服务器的标识或者是安装在目标服务器上的远程软件的标识进行绑定。As mentioned before, the password of the target server can be a randomly generated string, but in order to enable users to remotely control the target server through the password of the target server, the remote desktop management platform can combine the randomly generated string with the target server's identification or installation Bind with the identity of the remote software on the target server.

在本说明书中,权限管理单元生成的目标服务器对应的口令不包含目标服务器的标识、或者目标服务器安装的远程软件的标识等能够表征目标服务器的信息,但为了保证目标服务器与用户设备之间远程互联的安全性,可以将目标表服务器对应的口令和目标服务器的信息建立对应关系,以便在拥有控制权限的用户设备与目标服务器之间远程互联时基于目标服务器的口令验证有效性,因此,目标服务器的口令的生成方案可如下:In this specification, the password corresponding to the target server generated by the authority management unit does not include the identification of the target server, or the identification of the remote software installed on the target server, or other information that can characterize the target server. However, in order to ensure the remote connection between the target server and the user device, The security of the interconnection can establish a correspondence between the password corresponding to the target table server and the information of the target server, so that the validity of the password of the target server can be verified based on the password of the target server when the user device with control permissions and the target server are connected remotely. Therefore, the target The server password generation scheme can be as follows:

首先,从所述口令获取请求中获取用户信息,并从所述远程桌面管理平台的缓存中获取所述目标服务器的标识和所述目标服务器安装的远程软件的标识。First, user information is obtained from the password acquisition request, and the identifier of the target server and the identifier of the remote software installed by the target server are obtained from the cache of the remote desktop management platform.

之后,将所述用户信息、所述目标服务器的标识和所述目标服务器安装的远程软件的标识作为目标字段,并生成所述目标字段对应的字符串作为所述目标服务器的口令。Afterwards, the user information, the identification of the target server and the identification of the remote software installed on the target server are used as target fields, and a string corresponding to the target field is generated as the password of the target server.

其中,目标字段对应的字符串可以是随机生成的,生成方式可以是现有的任意类型的方式,本说明书对此不做限定。The string corresponding to the target field can be randomly generated, and the generation method can be any existing method. This specification does not limit this.

然后,以所述目标字段对应的字符串为键,以所述目标字段为值,以键值对的形式将所述目标字段以及所述目标字段对应的字符串存入所述远程桌面管理平台的缓存中。Then, using the string corresponding to the target field as a key and the target field as a value, the target field and the string corresponding to the target field are stored in the remote desktop management platform in the form of a key-value pair. in the cache.

从而,在远程桌面管理平台的缓存中,能够通过目标字段对应的字符串查找到目标字段。当远程桌面管理平台验证目标服务器的口令是否有效时,即可以接收到的口令为键,从缓存中查找相对应的值,若能够查到,则说明口令有效,若无法查到,则说明口令无效。Therefore, in the cache of the remote desktop management platform, the target field can be found through the string corresponding to the target field. When the remote desktop management platform verifies whether the password of the target server is valid, the received password is the key and the corresponding value is searched from the cache. If it can be found, it means that the password is valid. If it cannot be found, it means that the password is valid. invalid.

另外,确定目标服务器的口令对应的失效条件,并在满足失效条件时,将目标字段以及目标字段对应的字符串从缓存中删除。其中,目标服务器的口令对应的失效条件可以是在缓存中存储的时长大于预设时长阈值,或者是目标字段的查询次数大于预设次数阈值,当然也可以是其他失效条件,本说明书对此不做限定。In addition, the expiration condition corresponding to the password of the target server is determined, and when the expiration condition is met, the target field and the string corresponding to the target field are deleted from the cache. Among them, the expiration condition corresponding to the password of the target server can be that the duration of storage in the cache is greater than the preset duration threshold, or the number of queries in the target field is greater than the preset threshold. Of course, it can also be other expiration conditions. This manual does not cover this. Make limitations.

例如,目标服务器的口令的失效条件是在缓存中存储的时长大于24小时,一旦目标服务器的口令在缓存中存储的时长超过24小时,则该目标服务器的口令就会被从缓存中删除,这样,即使远程桌面管理平台接收到的该目标服务器的口令,也无法在缓存中查找到目标服务器的口令,或者是目标服务器的口令对应的目标服务器的标识等信息,从而记忆判断目标服务器的口令无效,用户也无权远程控制目标服务器。For example, the expiration condition for the password of the target server is that it is stored in the cache for more than 24 hours. Once the password of the target server is stored in the cache for more than 24 hours, the password of the target server will be deleted from the cache. , even if the remote desktop management platform receives the password of the target server, it cannot find the password of the target server in the cache, or the identification of the target server corresponding to the password of the target server, so that the password of the target server is invalid. , the user also does not have permission to remotely control the target server.

S104:将所述目标服务器对应的口令发送给所述用户设备。S104: Send the password corresponding to the target server to the user equipment.

S106:用户设备接收所述远程桌面管理平台发送的所述目标服务器对应的口令,并在用户界面中展示所述目标服务器对应的口令。S106: The user device receives the password corresponding to the target server sent by the remote desktop management platform, and displays the password corresponding to the target server in the user interface.

用户设备将接收到的目标服务器的口令展示在用户界面,用户即可掌握该目标服务器的口令,从而在远程控制目标服务器时通过输入该目标服务器的口令验证自身已经获得目标服务器的远程控制权限。The user device displays the received password of the target server on the user interface, and the user can master the password of the target server, and thereby verify that he has obtained the remote control authority of the target server by inputting the password of the target server when remotely controlling the target server.

S108:当接收到所述用户通过所述用户设备安装的远程软件输入所述目标服务器对应的口令时,生成口令解析请求。S108: When receiving the password corresponding to the target server input by the user through the remote software installed on the user device, generate a password resolution request.

在实际应用中,由于目标服务器的口令可以是随机生成的字符串,不包含目标服务器的标识或者是安装在目标服务器的远程软件的标识,因此,目标服务器的口令还需要通过远程桌面管理平台进行解析,才能够确定是否是合法有效的。因此,在用户设备接收到用于通过远程软件输入的目标服务器的口令时,根据用户输入的目标服务器的口令,生成口令解析请求,并将其发送给远程桌面管理平台进行解析。In practical applications, since the password of the target server can be a randomly generated string that does not contain the identification of the target server or the identification of the remote software installed on the target server, the password of the target server also needs to be set through the remote desktop management platform. Only through analysis can we determine whether it is legal and valid. Therefore, when the user device receives the password for the target server input through the remote software, a password parsing request is generated based on the password of the target server input by the user, and is sent to the remote desktop management platform for parsing.

S110:将所述口令解析请求发送给所述远程桌面管理平台。S110: Send the password parsing request to the remote desktop management platform.

S112:远程桌面管理平台接收所述用户设备发送的口令解析请求,根据所述口令解析请求中携带的口令,确定目标服务器安装的远程软件的标识,并加密所述目标服务器上安装的远程软件的标识得到加密标识。S112: The remote desktop management platform receives the password parsing request sent by the user device, determines the identity of the remote software installed on the target server based on the password carried in the password parsing request, and encrypts the remote software installed on the target server. The identity gets an encrypted identity.

具体的,远程桌面管理平台的缓存中可以保存有已经授权给用户远程控制的目标服务器的口令与目标服务器的标识和目标服务器安装的远程软件的标识,及其对应关系。因此,基于从口令解析请求中携带的口令,从远程桌面管理平台的缓存中查找与携带的口令对应的目标服务器安装的远程软件的标识,并采用预设的加密算法将查找到的目标服务器安装的远程软件的标识进行加密,得到加密标识。Specifically, the cache of the remote desktop management platform may store the password of the target server that has been authorized for remote control by the user, the identification of the target server, the identification of the remote software installed on the target server, and their corresponding relationships. Therefore, based on the password carried in the password parsing request, the identifier of the remote software installed on the target server corresponding to the carried password is searched from the cache of the remote desktop management platform, and the found target server is installed using a preset encryption algorithm. The identification of the remote software is encrypted to obtain the encrypted identification.

S114:将所述加密标识返回给所述用户设备。S114: Return the encrypted identification to the user equipment.

S116:用户设备接收所述远程桌面管理平台返回的加密标识,将所述加密标识和所述目标服务器对应的口令发送给所述中间服务器。S116: The user equipment receives the encrypted identification returned by the remote desktop management platform, and sends the encrypted identification and the password corresponding to the target server to the intermediate server.

S118:中间服务器接收所述用户设备发送的加密标识和所述目标服务器对应的口令,根据所述加密标识确定所述目标服务器,并将所述目标服务器对应的口令转发给所述目标服务器。S118: The intermediate server receives the encryption identifier sent by the user equipment and the password corresponding to the target server, determines the target server according to the encryption identifier, and forwards the password corresponding to the target server to the target server.

用户设备将加密标识以及目标服务器对应的口令发送给中间服务器,实际上是由中间服务器基于加密标识确定需要将用户设备发送的目标服务器对应的口令发送到哪个目标服务器处。中间服务器与远程桌面管理平台可以预先约定所使用的加密算法和解密算法,从而,中间服务器可以对加密标识采用相应的解密算法进行解密,从而基于解密后得到的目标服务器上安装的远程软件的标识,确定将用户设备发送的目标服务器的口令转发给哪个目标服务器。The user device sends the encryption identifier and the password corresponding to the target server to the intermediate server. In fact, the intermediate server determines to which target server the password corresponding to the target server sent by the user device needs to be sent based on the encryption identifier. The intermediate server and the remote desktop management platform can pre-agree on the encryption algorithm and decryption algorithm to be used. Therefore, the intermediate server can use the corresponding decryption algorithm to decrypt the encrypted identification, so as to obtain the identification of the remote software installed on the target server based on the decryption. , determine to which target server the password of the target server sent by the user device is forwarded.

由于目标服务器可预先在中间服务器进行信息注册,因此,中间服务器可以存储目标服务器的标识以及目标服务器安装的远程软件的标识。Since the target server can register information with the intermediate server in advance, the intermediate server can store the identity of the target server and the identity of the remote software installed on the target server.

S120:目标服务器接收所述中间服务器发送的所述目标服务器对应的口令,根据所述目标服务器对应的口令生成口令验证请求。S120: The target server receives the password corresponding to the target server sent by the intermediate server, and generates a password verification request according to the password corresponding to the target server.

目标服务器接收到中间服务器转发的口令,即可基于接收到的口令生成口令验证请求,并发送给远程桌面管理平台,请求远程桌面管理平台对目标服务器接收到的口令进行有效性验证,以免不具备远程控制权限的用户设备违规控制目标服务器。When the target server receives the password forwarded by the intermediate server, it can generate a password verification request based on the received password and send it to the remote desktop management platform, requesting the remote desktop management platform to verify the validity of the password received by the target server to avoid incompetence. A user device with remote control permissions violates the control of the target server.

S122:将所述口令验证请求发送给所述远程桌面管理平台。S122: Send the password verification request to the remote desktop management platform.

S124:远程桌面管理平台接收所述目标服务器发送的口令验证请求,并从所述口令验证请求中解析得到目标服务器的口令,调用所述权限管理单元验证所述目标服务器的口令是否有效。S124: The remote desktop management platform receives the password verification request sent by the target server, parses the password verification request to obtain the password of the target server, and calls the authority management unit to verify whether the password of the target server is valid.

远程桌面管理平台中的权限管理单元可对目标服务器的远程控制权限进行分配、管理和收回。因此,远程桌面管理平台可基于待验证的口令,调用权限管理单元验证该口令是否有效。验证的方式可以是,基于待验证的口令,从远程桌面管理平台的缓存中查找是否存在该待验证的口令,若不存在,则该待验证的口令可直接验证为无效,若存在,则还需要确定缓存中存储的与该待验证的口令之间存在对应关系的目标字段是否与发送该待验证的口令的目标服务器匹配,若不匹配,则该待验证的口令依然被验证为无效,只有在匹配时,才可以确定该待验证的口令(从口令验证请求中解析得到目标服务器的口令)是有效的。The permission management unit in the remote desktop management platform can assign, manage and revoke the remote control permissions of the target server. Therefore, the remote desktop management platform can call the authority management unit to verify whether the password is valid based on the password to be verified. The verification method may be to, based on the password to be verified, search from the cache of the remote desktop management platform whether the password to be verified exists. If it does not exist, the password to be verified can be directly verified as invalid. If it exists, then the password to be verified is invalid. It is necessary to determine whether the target field stored in the cache that corresponds to the password to be verified matches the target server that sent the password to be verified. If it does not match, the password to be verified will still be verified as invalid. Only Only when there is a match can it be determined that the password to be verified (the target server's password is parsed from the password verification request) is valid.

S126:在口令有效时生成口令有效消息,并将所述口令有效消息发送给所述目标服务器。S126: Generate a password valid message when the password is valid, and send the password valid message to the target server.

S128:目标服务器当接收到所述远程桌面管理平台返回的口令有效消息时,与所述用户设备建立远程连接。S128: When receiving the password valid message returned by the remote desktop management platform, the target server establishes a remote connection with the user device.

S130:用户设备当与所述目标服务器建立远程连接时,通过所述中间服务器远程控制所述目标服务器。S130: When the user equipment establishes a remote connection with the target server, remotely control the target server through the intermediate server.

本说明提供的远程控制方法中,远程桌面管理平台响应于口令获取请求生成目标服务器对应的口令,当用户设备接收到用户输入的目标服务器对应的口令时,生成口令解析请求并发送给远程桌面管理平台,远程桌面管理平台基于口令解析请求中携带的口令,生成加密标识,用户设备将加密标识和目标服务器的口令通过中间服务器转发到目标服务器,目标服务器基于接收到的口令生成口令验证请求,远程桌面管理平台响应口令验证请求,对目标服务器的口令进行验证,并在口令有效时将口令有效消息发送给目标服务器,使得目标服务器与用户设备之间建立远程连接,从而用户设备能够远程控制目标服务器。In the remote control method provided in this description, the remote desktop management platform generates a password corresponding to the target server in response to the password acquisition request. When the user device receives the password corresponding to the target server input by the user, a password parsing request is generated and sent to the remote desktop management Platform, the remote desktop management platform generates an encrypted identification based on the password carried in the password parsing request. The user device forwards the encrypted identification and the password of the target server to the target server through the intermediate server. The target server generates a password verification request based on the received password. Remote The desktop management platform responds to the password verification request, verifies the password of the target server, and sends a password valid message to the target server when the password is valid, so that a remote connection is established between the target server and the user device, so that the user device can remotely control the target server. .

可见,通过上述方案,用户无需掌握目标服务器的标识或目标服务器安装的远程软件的标识,通过口令的方式在目标服务器与用户设备之间建立远程连接,提高了多人远程控制目标服务器场景下目标服务器的安全性。It can be seen that through the above solution, the user does not need to know the identity of the target server or the identity of the remote software installed on the target server, and establishes a remote connection between the target server and the user device through a password, which improves the accuracy of the target server in the scenario where multiple people remotely control the target server. Server security.

在本说明书一个或多个实施例中,用户设备和目标服务器可预先从远程桌面管理平台处获取中间服务器的配置信息,从而确定远程互联时所采用的是哪个中间服务器。In one or more embodiments of this specification, the user equipment and the target server can obtain the configuration information of the intermediate server from the remote desktop management platform in advance, thereby determining which intermediate server is used for remote interconnection.

如图3所示为用户设备从远程桌面管理平台处获取中间服务器的配置信息,并向中间服务器注册信息的交互流程示意图。Figure 3 shows a schematic diagram of the interaction process in which the user device obtains the configuration information of the intermediate server from the remote desktop management platform and registers the information with the intermediate server.

S200:当所述用户设备安装的远程软件启动时,生成第一配置获取请求,并将所述第一配置获取请求发送给远程桌面管理平台。S200: When the remote software installed on the user equipment is started, generate a first configuration acquisition request, and send the first configuration acquisition request to the remote desktop management platform.

目前的远程软件需要用户自己在软件设置里填写中间服务器的信息,但在本说明书中,远程软件在启动时自动从远程桌面管理平台拉取中间服务器的配置信息,由远程桌面管理平台分配用户的用户设备使用哪个中间服务器与目标服务器进行远程互联,从而不暴露中间服务器的信息,也可以提高远程连接的安全性,避免中间服务器受到攻击。The current remote software requires users to fill in the intermediate server information in the software settings. However, in this manual, the remote software automatically pulls the configuration information of the intermediate server from the remote desktop management platform when it is started, and the remote desktop management platform assigns the user's configuration information. Which intermediary server is used by the user device to remotely interconnect with the target server? This prevents the information of the intermediary server from being exposed. It also improves the security of the remote connection and prevents the intermediary server from being attacked.

为此,在用户设备安装的远程软件启动时,可自动生成第一配置获取请求,该第一配置获取请求用于从远程桌面管理平台获取用户设备所使用的中间服务器的配置信息。To this end, when the remote software installed on the user device is started, a first configuration acquisition request may be automatically generated. The first configuration acquisition request is used to acquire the configuration information of the intermediate server used by the user device from the remote desktop management platform.

S202:远程桌面管理平台响应于所述用户设备发送的第一配置获取请求,从所述配置管理单元中确定中间服务器的目标配置信息。S202: The remote desktop management platform determines the target configuration information of the intermediate server from the configuration management unit in response to the first configuration acquisition request sent by the user equipment.

远程桌面管理平台的配置管理单元用于管理本说明书中远程控制系统中用户设备、中间服务器以及目标服务器的配置信息。配置管理单元可为用户设备分配可用的中间服务器,并将该中间服务器的目标配置信息返回给用户设备,以便用户设备确定在后续远程互联目标服务器时,可采用哪个中间服务器。The configuration management unit of the remote desktop management platform is used to manage the configuration information of user equipment, intermediate servers and target servers in the remote control system in this manual. The configuration management unit can allocate an available intermediate server to the user equipment, and return the target configuration information of the intermediate server to the user equipment, so that the user equipment can determine which intermediate server can be used when subsequently remotely interconnecting the target server.

S204:将所述中间服务器的目标配置信息返回给所述用户设备。S204: Return the target configuration information of the intermediate server to the user equipment.

S206:接收所述远程桌面管理平台发送的中间服务器的目标配置信息;根据所述目标配置信息确定远程控制时所采用的中间服务器,并将所述用户设备的标识、所述用户设备安装的远程软件的标识作为第一注册信息。S206: Receive the target configuration information of the intermediate server sent by the remote desktop management platform; determine the intermediate server used for remote control based on the target configuration information, and use the identifier of the user equipment, the remote server installed on the user equipment The identification of the software is used as the first registration information.

S208:将所述第一注册信息发送给所述中间服务器。S208: Send the first registration information to the intermediate server.

S210:接收所述用户设备发送的第一注册信息,并将所述第一注册信息存储到本地存储中。S210: Receive the first registration information sent by the user equipment, and store the first registration information in local storage.

如图4所示为目标服务器从远程桌面管理平台处获取中间服务器的配置信息,并向中间服务器注册信息的交互流程示意图。Figure 4 shows a schematic diagram of the interaction process in which the target server obtains the configuration information of the intermediate server from the remote desktop management platform and registers the information with the intermediate server.

S300:目标服务器预先生成第二配置获取请求,并将所述第二配置获取请求发送给远程桌面管理平台。S300: The target server generates a second configuration acquisition request in advance, and sends the second configuration acquisition request to the remote desktop management platform.

与前述图3所示用户设备向中间服务器注册类似,目标服务器在与用户设备进行远程互联之前,同样需要向中间服务器进行注册。因此,目标服务器可预先生成第二配置获取请求,第二配置获取请求用于目标服务器向远程桌面管理平台获取目标服务器使用的中间服务器的配置信息。Similar to the user equipment registering with the intermediate server as shown in Figure 3, the target server also needs to register with the intermediate server before remote interconnection with the user equipment. Therefore, the target server can generate a second configuration acquisition request in advance, and the second configuration acquisition request is used by the target server to obtain the configuration information of the intermediate server used by the target server from the remote desktop management platform.

S302:远程桌面管理平台响应于所述目标服务器发送的第二配置获取请求,从所述配置管理单元中确定中间服务器的目标配置信息。S302: The remote desktop management platform determines the target configuration information of the intermediate server from the configuration management unit in response to the second configuration acquisition request sent by the target server.

S304:将所述中间服务器的目标配置信息返回给所述目标服务器。S304: Return the target configuration information of the intermediate server to the target server.

S302和S304与前述S202和S2204类似,此处不再赘述。S302 and S304 are similar to the aforementioned S202 and S2204, and will not be described again here.

S306:接收所述中间服务器的目标配置信息,根据所述目标配置信息确定所述目标服务器被远程控制时所采用的中间服务器,并将所述目标服务器的标识、所述目标服务器安装的远程软件的标识作为第二注册信息。S306: Receive the target configuration information of the intermediate server, determine the intermediate server used when the target server is remotely controlled based on the target configuration information, and obtain the identification of the target server and the remote software installed by the target server. The identification is used as the second registration information.

S308:将所述第二注册信息发送给所述中间服务器。S308: Send the second registration information to the intermediate server.

S310:接收所述目标服务器发送的第二注册信息,并将所述第二注册信息存储到本地存储中。S310: Receive the second registration information sent by the target server, and store the second registration information in local storage.

本说明书并不限制图3所示交互流程和图4所示交互流程的先后顺序,但一般的,在执行图1所示交互流程之前,可执行图3以及图4所示交互流程。This description does not limit the order of the interaction process shown in Figure 3 and the interaction process shown in Figure 4, but generally, before executing the interaction process shown in Figure 1, the interaction processes shown in Figure 3 and Figure 4 can be executed.

在本说明书一个或多个实施例中,上述S124可如下方案实现,如图5所示:In one or more embodiments of this specification, the above S124 can be implemented as follows, as shown in Figure 5:

S400:以所述目标服务器的口令为键读取所述缓存中是否存在所述目标服务器的口令对应的值。若是,执行步骤S402,否则执行步骤S408。S400: Using the password of the target server as a key, read whether there is a value corresponding to the password of the target server in the cache. If yes, execute step S402; otherwise, execute step S408.

S402:解析从缓存中读取到的所述目标服务器的口令对应的值,得到目标字段,解析所述口令验证请求,得到待验证字段。S402: Parse the value corresponding to the password of the target server read from the cache to obtain the target field, and parse the password verification request to obtain the field to be verified.

其中,口令验证请求是由目标服务器基于中间服务器转发的口令生成的,为了向远程桌面管理平台表明该口令验证请求是由哪个目标服务器发送的,可以在口令验证请求中携带目标服务器的标识以及目标服务器安装的远程软件的标识。从而,在此步骤中,解析口令验证请求到的待验证字段可以是由发送该口令验证请求的目标服务器的标识以及该目标服务器安装的远程软件的标识构成。Among them, the password verification request is generated by the target server based on the password forwarded by the intermediate server. In order to indicate to the remote desktop management platform which target server the password verification request is sent by, the password verification request can carry the identity of the target server and the target The identifier of the remote software installed on the server. Therefore, in this step, the field to be verified when parsing the password verification request may be composed of the identity of the target server that sent the password verification request and the identity of the remote software installed by the target server.

S404:判断所述目标字段与所述待验证字段是否匹配。若是,执行步骤S406,否则执行步骤S408。S404: Determine whether the target field matches the field to be verified. If yes, execute step S406; otherwise, execute step S408.

具体的此次步骤为判断目标字段与待验证字段是否匹配,若匹配,说明目标服务器发送的需要进行验证的目标服务器的口令是有效的。若不匹配,说明目标服务器发送的需要案进行验证的目标服务器的口令可能是错误,有可能发生了口令的泄露问题,因此验证该口令无效。The specific step this time is to determine whether the target field matches the field to be verified. If they match, it means that the password of the target server sent by the target server that needs to be verified is valid. If they do not match, it means that the password of the target server sent by the target server that needs to be verified may be wrong, and the password may be leaked, so the verification of the password is invalid.

目标字段与待验证字段匹配可以是目标字段与待验证字段相同,也即,从缓存中查找到的目标服务器的标识以及目标服务器安装的远程软件的标识,与发送该口令的目标服务器的标识以及该目标服务器安装的远程软件的标识均相同。目标字段与待验证字段不匹配,则可能是目标服务器的标识或者目标服务器安装的远程软件的标识中至少一个不相同。The match between the target field and the field to be verified can be that the target field and the field to be verified are the same, that is, the identity of the target server found from the cache and the identity of the remote software installed on the target server, and the identity of the target server that sent the password and The remote software installed on the target server all have the same ID. If the target field does not match the field to be verified, it may be that at least one of the identifier of the target server or the identifier of the remote software installed on the target server is different.

S406:确定所述目标服务器的口令有效。S406: Determine that the password of the target server is valid.

S408:确定所述目标服务器的口令无效。S408: Determine that the password of the target server is invalid.

在本说明书一个或多个实施例中,远程桌面管理平台还可以向用户设备分配目标服务器的远程控制权限,并对已发放的远程控制权限进行管理、收回等。具体方案如下,如图6所示:In one or more embodiments of this specification, the remote desktop management platform can also allocate remote control permissions of the target server to the user device, and manage and withdraw the issued remote control permissions. The specific plan is as follows, as shown in Figure 6:

S500:用户设备预先展示用户界面,所述用户界面上展示所述目标服务器对应的权限申请控件;响应于用户通过所述目标服务器对应的权限申请控件输入的操作,生成所述目标服务器对应的控制权限获取请求。S500: The user device displays a user interface in advance, and the user interface displays the permission application control corresponding to the target server; in response to the operation input by the user through the permission application control corresponding to the target server, generate the control corresponding to the target server Permission acquisition request.

在实际应用中,用户界面上可以显示用户设备可以远程互联的若干个目标服务器,用户可以从中选择至少一个目标服务器,向远程桌面管理平台申请选中的目标服务器的远程控制权限。In practical applications, the user interface can display several target servers that the user device can remotely connect to. The user can select at least one target server and apply to the remote desktop management platform for remote control permissions for the selected target server.

S502:将所述控制权限获取请求发送给所述远程桌面管理平台。S502: Send the control permission acquisition request to the remote desktop management platform.

S504:远程桌面管理平台接收所述控制权限获取请求,调用所述权限管理单元对所述用户进行审核,并在审核通过后生成资源分配消息,由所述权限管理单元将所述资源分配消息发送给资源管理单元。S504: The remote desktop management platform receives the control permission acquisition request, calls the permission management unit to audit the user, and generates a resource allocation message after passing the audit, and the permission management unit sends the resource allocation message. to the resource management unit.

具体的,权限管理单元对所述用户进行审核可以是基于管理员进行人工审核,也可以是基于用户使用用户设备远程控制目标服务器的历史记录进行自动审核,本说明书对此不做限定。Specifically, the authority management unit may conduct manual review based on the administrator's review of the user, or may conduct automatic review based on the user's history of using the user device to remotely control the target server. This specification does not limit this.

S506:当所述资源管理单元接收到所述资源分配消息时,向所述用户设备分配所述目标服务器的控制权限,并将所述用户设备的标识与所述目标服务器的控制权限存入所述远程桌面管理平台的资源分配表中。S506: When the resource management unit receives the resource allocation message, allocate the control authority of the target server to the user equipment, and store the identification of the user equipment and the control authority of the target server in the user equipment. in the resource allocation table of the remote desktop management platform.

当用户设备的标识与目标服务器的控制权限存入资源分配表中时,则说明该用户设备可以基于口令的方式与具备控制权限的目标服务器进行远程互联。When the identification of the user device and the control authority of the target server are stored in the resource allocation table, it means that the user device can remotely interconnect with the target server having control authority based on the password.

另外资源管理单元还可以针对资源分配表中的信息进行增删,以便向用户设备分配一个或多个目标服务器的远程控制权限,以及收回已发放的远程控制权限。In addition, the resource management unit can also add and delete information in the resource allocation table, so as to allocate remote control permissions of one or more target servers to the user device and withdraw the issued remote control permissions.

以上为本说明书的一个或多个实施例提供的远程控制方法,基于同样的思路,本说明书还提供了相应的远程控制装置,如图7和图8所示。The above is the remote control method provided by one or more embodiments of this specification. Based on the same idea, this specification also provides a corresponding remote control device, as shown in Figures 7 and 8.

图7为本说明书提供的一种远程装置示意图,所述装置应用于远程桌面管理平台,具体包括:Figure 7 is a schematic diagram of a remote device provided in this manual. The device is applied to a remote desktop management platform and specifically includes:

口令生成模块600,用于接收用户设备发送的口令获取请求,调用所述远程桌面管理平台的权限管理单元生成所述目标服务器对应的口令;其中,所述口令获取请求是由所述用户设备响应于用户的输入生成并发送的;The password generation module 600 is configured to receive a password acquisition request sent by the user device, and call the permission management unit of the remote desktop management platform to generate a password corresponding to the target server; wherein the password acquisition request is responded to by the user device Generated and sent based on user input;

口令发送模块602,用于将所述目标服务器对应的口令发送给所述用户设备,以使所述用户设备在用户界面中展示所述目标服务器对应的口令,并在接收到所述用户通过所述用户设备安装的远程软件输入所述目标服务器对应的口令时生成口令解析请求,并发送;Password sending module 602 is used to send the password corresponding to the target server to the user equipment, so that the user equipment displays the password corresponding to the target server in the user interface, and after receiving the password passed by the user, When the remote software installed on the user equipment inputs the password corresponding to the target server, a password parsing request is generated and sent;

加密标识确定模块604,用于接收所述用户设备发送的口令解析请求,根据所述口令解析请求中携带的口令,确定目标服务器安装的远程软件的标识,并加密所述目标服务器上安装的远程软件的标识得到加密标识;The encryption identification determination module 604 is configured to receive a password parsing request sent by the user equipment, determine the identification of the remote software installed on the target server according to the password carried in the password parsing request, and encrypt the remote software installed on the target server. The identity of the software is encrypted;

加密标识发送模块606,用于将所述加密标识返回给所述用户设备,以使所述用户设备将所述加密标识和所述目标服务器对应的口令发送给所述中间服务器,以便所述中间服务器根据所述加密标识确定目标服务器,并将所述目标服务器对应的口令转发给所述目标服务器,使得所述目标服务器根据所述目标服务器对应的口令生成口令验证请求并发送;The encrypted identification sending module 606 is configured to return the encrypted identification to the user equipment, so that the user equipment sends the encrypted identification and the password corresponding to the target server to the intermediate server, so that the intermediate server The server determines the target server based on the encryption identification, and forwards the password corresponding to the target server to the target server, so that the target server generates a password verification request based on the password corresponding to the target server and sends it;

口令验证模块608,用于接收所述目标服务器发送的口令验证请求,并从所述口令验证请求中解析得到目标服务器的口令,调用所述权限管理单元验证所述目标服务器的口令是否有效,并在口令有效时生成口令有效消息,并将所述口令有效消息发送给所述目标服务器,以使所述目标服务器通过所述中间服务器与所述用户设备建立远程连接,使得所述用户设备通过所述中间服务器远程控制所述目标服务器。Password verification module 608 is configured to receive a password verification request sent by the target server, parse the password verification request to obtain the password of the target server, call the authority management unit to verify whether the password of the target server is valid, and When the password is valid, a password valid message is generated, and the password valid message is sent to the target server, so that the target server establishes a remote connection with the user equipment through the intermediate server, so that the user equipment passes through the The intermediate server remotely controls the target server.

可选地,所述装置还包括:Optionally, the device also includes:

目标配置信息发送模块610,具体用于响应于用户设备发送的第一配置获取请求,从所述远程桌面管理平台的配置管理单元中确定中间服务器的目标配置信息,并将所述中间服务器的目标配置信息返回给所述用户设备,以使所述用户设备根据所述目标配置信息确定远程控制时所采用的中间服务器,并将所述用户设备的标识、所述用户设备安装的远程软件的标识作为第一注册信息,将所述第一注册信息发送给所述中间服务器,使得所述中间服务器将所述第一注册信息存储到本地存储中;其中,所述第一配置获取请求由所述用户设备在所述用户设备安装的远程软件启动时生成并发送。The target configuration information sending module 610 is specifically configured to respond to the first configuration acquisition request sent by the user device, determine the target configuration information of the intermediate server from the configuration management unit of the remote desktop management platform, and send the target configuration information of the intermediate server to The configuration information is returned to the user equipment, so that the user equipment determines the intermediate server used for remote control based on the target configuration information, and provides the identification of the user equipment and the identification of the remote software installed by the user equipment. As the first registration information, the first registration information is sent to the intermediate server, so that the intermediate server stores the first registration information in local storage; wherein the first configuration acquisition request is made by the The user equipment generates and sends it when the remote software installed by the user equipment starts.

可选地,所述目标配置信息发送模块610具体用于,响应于所述目标服务器发送的第二配置获取请求,从所述远程桌面管理平台的配置管理单元中确定中间服务器的目标配置信息,并将所述中间服务器的目标配置信息返回给所述目标服务器,以使所述目标服务器根据所述目标配置信息确定所述目标服务器被远程控制时所采用的中间服务器,并将所述目标服务器的标识、所述目标服务器安装的远程软件的标识作为第二注册信息,将所述第二注册信息发送给所述中间服务器,使得所述中间服务器将所述第二注册信息存储到本地存储中;其中,所述第二配置信息是由所述目标服务器预先生成并发送的。Optionally, the target configuration information sending module 610 is specifically configured to, in response to the second configuration acquisition request sent by the target server, determine the target configuration information of the intermediate server from the configuration management unit of the remote desktop management platform, and return the target configuration information of the intermediate server to the target server, so that the target server determines the intermediate server used when the target server is remotely controlled based on the target configuration information, and returns the target server to the target server. The identifier and the identifier of the remote software installed by the target server are used as the second registration information, and the second registration information is sent to the intermediate server, so that the intermediate server stores the second registration information in local storage. ; Wherein, the second configuration information is pre-generated and sent by the target server.

可选地,所述口令生成模块600具体用于,从所述口令获取请求中获取所述用户信息,并从所述远程桌面管理平台的缓存中获取所述目标服务器的标识和所述目标服务器安装的远程软件的标识;将所述用户信息、所述目标服务器的标识和所述目标服务器安装的远程软件的标识作为目标字段,并生成所述目标字段对应的字符串作为所述目标服务器的口令;以所述目标字段对应的字符串为键,以所述目标字段为值,以键值对的形式将所述目标字段以及所述目标字段对应的字符串存入所述远程桌面管理平台的缓存中;Optionally, the password generation module 600 is specifically configured to obtain the user information from the password acquisition request, and obtain the identity of the target server and the target server from the cache of the remote desktop management platform. The identifier of the installed remote software; use the user information, the identifier of the target server and the identifier of the remote software installed by the target server as the target field, and generate a string corresponding to the target field as the target server's identifier. Password; use the string corresponding to the target field as the key, use the target field as the value, and store the target field and the string corresponding to the target field in the remote desktop management platform in the form of a key-value pair in the cache;

可选地,所述装置还包括:Optionally, the device also includes:

删除模块612,具体用于确定所述目标服务器的口令对应的失效条件,并将所述目标服务器的口令对应的失效条件存入所述缓存中;当满足所述失效条件时,将所述目标字段以及所述目标字段对应的字符串从所述缓存中删除。The deletion module 612 is specifically used to determine the invalidation condition corresponding to the password of the target server, and store the invalidation condition corresponding to the password of the target server in the cache; when the invalidation condition is met, the target server The string corresponding to the field and the target field is deleted from the cache.

可选地,所述口令验证请求由所述目标服务器根据所述目标服务器对应的口令以及所述目标服务器的信息生成,所述目标服务器的信息包括所述目标服务器的标识以及所述目标服务器安装的远程软件的标识中的至少一个;Optionally, the password verification request is generated by the target server based on the password corresponding to the target server and the information of the target server. The information of the target server includes the identification of the target server and the installation of the target server. at least one of the identifiers of the remote software;

可选地,所述口令验证模块608具体用于,以所述目标服务器的口令为键读取所述缓存中是否存在所述目标服务器的口令对应的值,若否,则确定所述目标服务器的口令无效;若是,解析从缓存中读取到的所述目标服务器的口令对应的值,得到目标字段,解析所述口令验证请求,得到待验证字段,判断所述目标字段与所述待验证字段是否匹配,若是,则确定所述目标服务器的口令有效,若否,则确定所述目标服务器的口令无效。Optionally, the password verification module 608 is specifically configured to use the password of the target server as a key to read whether there is a value corresponding to the password of the target server in the cache, and if not, determine whether the target server The password is invalid; if so, parse the value corresponding to the password of the target server read from the cache to obtain the target field, parse the password verification request, obtain the field to be verified, and determine the difference between the target field and the field to be verified. Whether the fields match, if so, it is determined that the password of the target server is valid, if not, it is determined that the password of the target server is invalid.

可选地,所述装置还包括:Optionally, the device also includes:

权限分配模块614,具体用于接收控制权限获取请求,调用所述权限管理单元对所述用户进行审核,并在审核通过后生成资源分配消息,由所述权限管理单元将所述资源分配消息发送给资源管理单元,当所述资源管理单元接收到所述资源分配消息时,向所述用户设备分配所述目标服务器的控制权限,并将所述用户设备的标识与所述目标服务器的控制权限存入所述远程桌面管理平台的资源分配表中;其中,所述控制权限获取请求是由用户设备预先展示包含所述目标服务器对应的权限申请控件的用户界面,响应于用户通过所述目标服务器对应的权限申请控件输入的操作生成并发送的。The permission allocation module 614 is specifically used to receive the control permission acquisition request, call the permission management unit to audit the user, and generate a resource allocation message after the audit is passed, and the permission management unit sends the resource allocation message. To the resource management unit, when the resource management unit receives the resource allocation message, allocate the control authority of the target server to the user equipment, and combine the identification of the user equipment with the control authority of the target server Stored in the resource allocation table of the remote desktop management platform; wherein the control permission acquisition request is a user interface that includes the permission application control corresponding to the target server displayed in advance by the user device, in response to the user passing the target server The corresponding permission application control input operation is generated and sent.

图8为本说明书提供的一种远程装置示意图,具体包括:Figure 8 is a schematic diagram of a remote device provided in this manual, which specifically includes:

口令获取请求发送模块700,用于响应于用户的输入,生成口令获取请求,并将所述口令获取请求发送给远程桌面管理平台,以使所述远程桌面管理平台调用权限管理单元生成目标服务器对应的口令,并返回;The password acquisition request sending module 700 is used to generate a password acquisition request in response to the user's input, and send the password acquisition request to the remote desktop management platform, so that the remote desktop management platform calls the authority management unit to generate the target server corresponding password and return;

口令接收模块702,用于接收所述远程桌面管理平台发送的所述目标服务器对应的口令,并在用户界面中展示所述目标服务器对应的口令;The password receiving module 702 is used to receive the password corresponding to the target server sent by the remote desktop management platform, and display the password corresponding to the target server in the user interface;

口令解析请求生成模块704,用于当接收到所述用户通过所述用户设备安装的远程软件输入所述目标服务器对应的口令时,生成口令解析请求,并将所述口令解析请求发送给所述远程桌面管理平台,以使所述远程桌面管理平台根据所述口令解析请求中携带的口令,确定目标服务器安装的远程软件的标识,并加密所述目标服务器上安装的远程软件的标识得到加密标识,并返回所述加密标识;Password parsing request generation module 704, configured to generate a password parsing request when receiving that the user inputs a password corresponding to the target server through the remote software installed on the user device, and send the password parsing request to the A remote desktop management platform, so that the remote desktop management platform determines the identity of the remote software installed on the target server based on the password carried in the password parsing request, and encrypts the identity of the remote software installed on the target server to obtain the encrypted identity. , and return the encrypted identification;

加密标识接收模块706,用于接收所述远程桌面管理平台返回的加密标识,将所述加密标识和所述目标服务器对应的口令发送给所述中间服务器,使得所述中间服务器根据所述加密标识确定所述目标服务器,并将所述目标服务器对应的口令转发给所述目标服务器,以便所述目标服务器根据所述目标服务器对应的口令生成口令验证请求,并将所述口令验证请求发送给所述远程桌面管理平台,当所述远程桌面管理平台接收到口令验证请求时,从所述口令验证请求中解析得到目标服务器的口令,调用所述权限管理单元验证所述目标服务器的口令是否有效,并在口令有效时生成口令有效消息,并将所述口令有效消息发送给所述目标服务器,所述目标服务器在接收到所述远程桌面管理平台返回的口令有效消息时,通过所述中间服务器与所述用户设备建立远程连接;The encrypted identification receiving module 706 is used to receive the encrypted identification returned by the remote desktop management platform, and send the encrypted identification and the password corresponding to the target server to the intermediate server, so that the intermediate server can use the encrypted identification according to the encrypted identification. Determine the target server, and forward the password corresponding to the target server to the target server, so that the target server generates a password verification request based on the password corresponding to the target server, and sends the password verification request to the target server. The remote desktop management platform, when the remote desktop management platform receives a password verification request, parses the password of the target server from the password verification request, calls the authority management unit to verify whether the password of the target server is valid, And when the password is valid, a password valid message is generated, and the password valid message is sent to the target server. When the target server receives the password valid message returned by the remote desktop management platform, it communicates with the intermediate server through the intermediate server. The user equipment establishes a remote connection;

远程控制模块708,用于当与所述目标服务器建立远程连接时,通过所述中间服务器远程控制所述目标服务器。The remote control module 708 is configured to remotely control the target server through the intermediate server when establishing a remote connection with the target server.

可选地,所述装置还包括:Optionally, the device also includes:

注册模块710,具体用于当所述用户设备安装的远程软件启动时,生成第一配置获取请求,并将所述第一配置获取请求发送给远程桌面管理平台,以使所述远程桌面管理平台响应于所述用户设备发送的第一配置获取请求,从所述远程桌面管理平台的配置管理单元中确定中间服务器的目标配置信息,并将所述中间服务器的目标配置信息返回给所述用户设备;接收所述远程桌面管理平台发送的中间服务器的目标配置信息;根据所述目标配置信息确定远程控制时所采用的中间服务器,并将所述用户设备的标识、所述用户设备安装的远程软件的标识作为第一注册信息,将所述第一注册信息发送给所述中间服务器,使得所述中间服务器接收所述用户设备发送的第一注册信息,并将所述第一注册信息存储到本地存储中。The registration module 710 is specifically configured to generate a first configuration acquisition request when the remote software installed on the user device is started, and send the first configuration acquisition request to the remote desktop management platform, so that the remote desktop management platform In response to the first configuration acquisition request sent by the user equipment, determine the target configuration information of the intermediate server from the configuration management unit of the remote desktop management platform, and return the target configuration information of the intermediate server to the user equipment ; Receive the target configuration information of the intermediate server sent by the remote desktop management platform; determine the intermediate server used for remote control according to the target configuration information, and obtain the identification of the user equipment and the remote software installed on the user equipment. The identification is used as the first registration information, and the first registration information is sent to the intermediate server, so that the intermediate server receives the first registration information sent by the user equipment and stores the first registration information locally. In storage.

可选地,所述装置还包括:Optionally, the device also includes:

权限申请模块712,具体用于预先展示用户界面,所述用户界面上展示所述目标服务器对应的权限申请控件;响应于用户通过所述目标服务器对应的权限申请控件输入的操作,生成所述目标服务器对应的控制权限获取请求,并将所述控制权限获取请求发送给所述远程桌面管理平台,以使所述远程桌面管理平台接收所述控制权限获取请求,调用所述权限管理单元对所述用户进行审核,并在审核通过后生成资源分配消息,由所述权限管理单元将所述资源分配消息发送给资源管理单元,当所述资源管理单元接收到所述资源分配消息时,向所述用户设备分配所述目标服务器的控制权限,并将所述用户设备的标识与所述目标服务器的控制权限存入所述远程桌面管理平台的资源分配表中。The permission application module 712 is specifically used to display the user interface in advance, and display the permission application control corresponding to the target server on the user interface; in response to the operation input by the user through the permission application control corresponding to the target server, generate the target The control permission acquisition request corresponding to the server is sent to the remote desktop management platform, so that the remote desktop management platform receives the control permission acquisition request and calls the permission management unit to The user conducts an audit, and after passing the audit, a resource allocation message is generated. The authority management unit sends the resource allocation message to the resource management unit. When the resource management unit receives the resource allocation message, it sends the resource allocation message to the resource management unit. The user equipment allocates the control authority of the target server, and stores the identification of the user equipment and the control authority of the target server in the resource allocation table of the remote desktop management platform.

本说明书还提供了一种计算机可读存储介质,该存储介质存储有计算机程序,计算机程序可用于执行上述图2所示的远程控制方法。This specification also provides a computer-readable storage medium that stores a computer program. The computer program can be used to execute the remote control method shown in Figure 2 above.

本说明书还提供了图9所示的电子设备的示意结构图。如图9所述,在硬件层面,该电子设备包括处理器、内部总线、网络接口、内存以及非易失性存储器,当然还可能包括其他业务所需要的硬件。处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,以实现上述图2所示的远程控制方法。当然,除了软件实现方式之外,本说明书并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。This specification also provides a schematic structural diagram of the electronic device shown in Figure 9. As shown in Figure 9, at the hardware level, the electronic device includes a processor, an internal bus, a network interface, a memory and a non-volatile memory, and of course may also include other hardware required by the business. The processor reads the corresponding computer program from the non-volatile memory into the memory and then runs it to implement the remote control method shown in Figure 2 above. Of course, in addition to software implementation, this specification does not exclude other implementation methods, such as logic devices or a combination of software and hardware, etc. That is to say, the execution subject of the following processing flow is not limited to each logical unit, and may also be hardware or logic device.

在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device, PLD)(例如现场可编程门阵列(Field Programmable GateArray,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware DescriptionLanguage)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(RubyHardware Description Language)等,目前最普遍使用的是VHDL(Very-High-SpeedIntegrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, improvements in a technology could be clearly distinguished as hardware improvements (for example, improvements in circuit structures such as diodes, transistors, switches, etc.) or software improvements (improvements in method processes). However, with the development of technology, many improvements in today's method processes can be regarded as direct improvements in hardware circuit structures. Designers almost always obtain the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that an improvement of a method flow cannot be implemented using hardware entity modules. For example, a Programmable Logic Device (PLD) (such as a Field Programmable Gate Array (FPGA)) is such an integrated circuit whose logic functions are determined by the user programming the device. Designers can program themselves to "integrate" a digital system on a PLD, instead of asking chip manufacturers to design and produce dedicated integrated circuit chips. Moreover, nowadays, instead of manually making integrated circuit chips, this kind of programming is mostly implemented using "logic compiler" software, which is similar to the software compiler used in program development and writing. Before compiling, The original code must also be written in a specific programming language, which is called Hardware Description Language (HDL). There is not only one type of HDL, but many types, such as ABEL (Advanced Boolean Expression Language) , AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language), etc. The most commonly used ones currently are VHDL (Very-High-SpeedIntegrated Circuit Hardware Description Language) and Verilog. Those skilled in the art should also know that by simply logically programming the method flow using the above-mentioned hardware description languages and programming it into the integrated circuit, the hardware circuit that implements the logical method flow can be easily obtained.

控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20 以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (eg, software or firmware) executable by the (micro)processor. , logic gates, switches, Application Specific Integrated Circuit (ASIC), programmable logic controllers and embedded microcontrollers. Examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory control logic. Those skilled in the art also know that in addition to implementing the controller in the form of pure computer-readable program code, the controller can be completely programmed with logic gates, switches, application-specific integrated circuits, programmable logic controllers and embedded logic by logically programming the method steps. Microcontroller, etc. to achieve the same function. Therefore, this controller can be considered as a hardware component, and the devices included therein for implementing various functions can also be considered as structures within the hardware component. Or even, the means for implementing various functions can be considered as structures within hardware components as well as software modules implementing the methods.

上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The systems, devices, modules or units described in the above embodiments may be implemented by computer chips or entities, or by products with certain functions. A typical implementation device is a computer. Specifically, the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.

为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above device, the functions are divided into various units and described separately. Of course, when implementing this specification, the functions of each unit can be implemented in the same or multiple software and/or hardware.

本领域内的技术人员应明白,本说明书的实施例可提供为方法、系统、或计算机程序产品。因此,本说明书可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will understand that embodiments of the present specification may be provided as methods, systems, or computer program products. Thus, the present description may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment that combines software and hardware aspects. Furthermore, the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

本说明书是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。This specification is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the specification. It will be understood that each process and/or block in the flowchart illustrations and/or block diagrams, and combinations of processes and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine, such that the instructions executed by the processor of the computer or other programmable data processing device produce a use A device for realizing the functions specified in a process or processes in a flowchart and/or a block or blocks in a block diagram.

这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory that causes a computer or other programmable data processing apparatus to operate in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction means, the instructions The device implements the functions specified in a process or processes in the flowchart and/or in a block or blocks in the block diagram.

这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions may also be loaded onto a computer or other programmable data processing device, causing a series of operating steps to be performed on the computer or other programmable device to produce computer-implemented processing, thereby executing on the computer or other programmable device. Instructions provide steps for implementing the functions specified in a process or processes of a flowchart diagram and/or a block or blocks of a block diagram.

在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.

内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-permanent storage in computer-readable media, random access memory (RAM), and/or non-volatile memory in the form of read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.

计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer-readable media includes both persistent and non-volatile, removable and non-removable media that can be implemented by any method or technology for storage of information. Information may be computer-readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), and read-only memory. (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cassettes, tape magnetic disk storage or other magnetic storage devices or any other non-transmission medium can be used to store information that can be accessed by a computing device. As defined in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.

还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the terms "comprises," "comprises," or any other variation thereof are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that includes a list of elements not only includes those elements, but also includes Other elements are not expressly listed or are inherent to the process, method, article or equipment. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of additional identical elements in a process, method, article, or device that includes the stated element.

本领域技术人员应明白,本说明书的实施例可提供为方法、系统或计算机程序产品。因此,本说明书可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本说明书可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present specification may be provided as methods, systems, or computer program products. Thus, the present description may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment that combines software and hardware aspects. Furthermore, the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

本说明书可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。This specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. The present description may also be practiced in distributed computing environments where tasks are performed by remote processing devices connected through communications networks. In a distributed computing environment, program modules may be located in both local and remote computer storage media including storage devices.

本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner. The same and similar parts between the various embodiments can be referred to each other. Each embodiment focuses on its differences from other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple. For relevant details, please refer to the partial description of the method embodiment.

以上所述仅为本说明书的实施例而已,并不用于限制本说明书。对于本领域技术人员来说,本说明书可以有各种更改和变化。凡在本说明书的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书的权利要求范围之内。The above descriptions are only examples of this specification and are not intended to limit this specification. Various modifications and changes may occur to this description to those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principles of this specification shall be included in the scope of the claims of this specification.

Claims (12)

1. A remote control system, the system comprising: the remote desktop management system comprises a remote desktop management platform, user equipment, a target server and an intermediate server;
the user equipment is used for responding to the input of a user, generating a password acquisition request and sending the password acquisition request to the remote desktop management platform; receiving a password corresponding to the target server sent by the remote desktop management platform, and displaying the password corresponding to the target server in a user interface; when receiving a password corresponding to the target server input by the user through remote software installed by the user equipment, generating a password analysis request, and sending the password analysis request to the remote desktop management platform; receiving an encryption identifier returned by the remote desktop management platform, and sending the encryption identifier and a password corresponding to the target server to the intermediate server; when a remote connection is established with the target server, remotely controlling the target server through the intermediate server;
the remote desktop management platform is used for receiving the password acquisition request sent by the user equipment, and calling a permission management unit of the remote desktop management platform to generate a password corresponding to the target server; transmitting the password corresponding to the target server to the user equipment; receiving a password analysis request sent by the user equipment, determining the identification of remote software installed on a target server according to the password carried in the password analysis request, and encrypting the identification of the remote software installed on the target server to obtain an encrypted identification; returning the encryption identification to the user equipment; receiving a password verification request sent by the target server, analyzing the password verification request to obtain a password of the target server, calling the authority management unit to verify whether the password of the target server is valid, generating a password valid message when the password is valid, and sending the password valid message to the target server;
The intermediate server is used for receiving the encryption identifier sent by the user equipment and the password corresponding to the target server, determining the target server according to the encryption identifier and forwarding the password corresponding to the target server;
the target server is used for receiving the password corresponding to the target server sent by the intermediate server, generating a password verification request according to the password corresponding to the target server, and sending the password verification request to the remote desktop management platform; and when receiving the password valid message returned by the remote desktop management platform, establishing remote connection with the user equipment through the intermediate server.
2. The system of claim 1, wherein the user device is further configured to generate a first configuration acquisition request and send the first configuration acquisition request to a remote desktop management platform when remote software installed by the user device is started; receiving target configuration information of an intermediate server sent by the remote desktop management platform; determining an intermediate server adopted in remote control according to the target configuration information, taking the identification of the user equipment and the identification of remote software installed by the user equipment as first registration information, and sending the first registration information to the intermediate server;
The remote desktop management platform is further used for responding to a first configuration acquisition request sent by the user equipment, determining target configuration information of an intermediate server from a configuration management unit of the remote desktop management platform, and returning the target configuration information of the intermediate server to the user equipment;
the intermediate server is further configured to receive first registration information sent by the user equipment, and store the first registration information in a local storage.
3. The system of claim 1, wherein the target server is further configured to pre-generate a second configuration acquisition request and send the second configuration acquisition request to a remote desktop management platform; receiving target configuration information of an intermediate server sent by the remote desktop management platform; determining an intermediate server adopted when the target server is remotely controlled according to the target configuration information, taking the identification of the target server and the identification of remote software installed by the target server as second registration information, and sending the second registration information to the intermediate server;
the remote desktop management platform is further used for responding to a second configuration acquisition request sent by the target server, determining target configuration information of an intermediate server from a configuration management unit of the remote desktop management platform, and returning the target configuration information of the intermediate server to the target server;
The intermediate server is further configured to receive second registration information sent by the target server, and store the second registration information in a local storage.
4. The system of claim 1, wherein the remote desktop management platform is specifically configured to obtain user information from the password obtaining request, and obtain an identifier of the target server and an identifier of remote software installed by the target server from a cache of the remote desktop management platform; taking the user information, the identification of the target server and the identification of remote software installed by the target server as target fields, and generating a character string corresponding to the target fields as a password of the target server; taking the character string corresponding to the target field as a key, taking the target field as a value, and storing the target field and the character string corresponding to the target field into a cache of the remote desktop management platform in a key value pair mode; determining a failure condition corresponding to the password of the target server, and storing the failure condition corresponding to the password of the target server into the cache; and deleting the target field and the character string corresponding to the target field from the cache when the failure condition is met.
5. The system of claim 4, wherein the password verification request is generated by the target server from a password corresponding to the target server and information of the target server, the information of the target server including at least one of an identification of the target server and an identification of remote software installed by the target server;
the remote desktop management platform is specifically configured to read whether a value corresponding to the password of the target server exists in the cache by using the password of the target server as a key, and if not, determine that the password of the target server is invalid; if yes, analyzing the value corresponding to the password of the target server read from the cache to obtain a target field, analyzing the password verification request to obtain a field to be verified, judging whether the target field is matched with the field to be verified, if yes, determining that the password of the target server is effective, and if not, determining that the password of the target server is ineffective.
6. The system of claim 1, wherein the user device is further configured to pre-present a user interface on which a rights application control corresponding to the target server is presented; responding to the operation input by a user through a permission application control corresponding to the target server, generating a control permission acquisition request corresponding to the target server, and sending the control permission acquisition request to the remote desktop management platform;
The remote desktop management platform is further configured to receive the control permission acquisition request, invoke the permission management unit to audit the user, generate a resource allocation message after the audit passes, send the resource allocation message to the resource management unit by the permission management unit, allocate the control permission of the target server to the user equipment when the resource management unit receives the resource allocation message, and store the identifier of the user equipment and the control permission of the target server in a resource allocation table of the remote desktop management platform.
7. A remote control method, wherein the method is applied to a remote desktop management platform, the method comprising:
receiving a password acquisition request sent by user equipment, and calling a permission management unit of the remote desktop management platform to generate a password corresponding to a target server; wherein the password acquisition request is generated and transmitted by the user device in response to user input;
transmitting the password corresponding to the target server to the user equipment so that the user equipment displays the password corresponding to the target server in a user interface, generating a password analysis request when receiving the password corresponding to the target server input by the user through remote software installed by the user equipment, and transmitting the password analysis request;
Receiving a password analysis request sent by the user equipment, determining the identification of remote software installed on a target server according to the password carried in the password analysis request, and encrypting the identification of the remote software installed on the target server to obtain an encrypted identification;
returning the encryption identification to the user equipment, so that the user equipment sends the encryption identification and the password corresponding to the target server to an intermediate server, so that the intermediate server determines the target server according to the encryption identification, forwards the password corresponding to the target server, and enables the target server to generate a password verification request according to the password corresponding to the target server and send the password verification request;
receiving a password verification request sent by the target server, analyzing the password verification request to obtain a password of the target server, calling the authority management unit to verify whether the password of the target server is valid, generating a password valid message when the password is valid, and sending the password valid message to the target server so that the target server and the user equipment are remotely connected through the intermediate server, and the user equipment remotely controls the target server through the intermediate server.
8. A remote control method, wherein the method is applied to a user equipment, the method comprising:
responding to the input of a user, generating a password acquisition request, and sending the password acquisition request to a remote desktop management platform so that the remote desktop management platform calls a permission management unit to generate a password corresponding to a target server and returns the password;
receiving a password corresponding to a target server sent by the remote desktop management platform, and displaying the password corresponding to the target server in a user interface;
when receiving a password corresponding to the target server input by the user through remote software installed by the user equipment, generating a password analysis request, and sending the password analysis request to the remote desktop management platform, so that the remote desktop management platform determines the identification of the remote software installed by the target server according to the password carried in the password analysis request, encrypts the identification of the remote software installed on the target server to obtain an encrypted identification, and returns the encrypted identification;
receiving an encryption identifier returned by the remote desktop management platform, sending the encryption identifier and a password corresponding to the target server to an intermediate server, enabling the intermediate server to determine the target server according to the encryption identifier, forwarding the password corresponding to the target server, enabling the target server to generate a password verification request according to the password corresponding to the target server, sending the password verification request to the remote desktop management platform, analyzing the password verification request to obtain the password of the target server when the remote desktop management platform receives the password verification request, calling the authority management unit to verify whether the password of the target server is valid, generating a password valid message when the password verification request is valid, sending the password valid message to the target server, and establishing remote connection with the user equipment through the intermediate server when the target server receives the password valid message returned by the remote desktop management platform;
When a remote connection is established with the target server, the target server is remotely controlled through the intermediate server.
9. A remote control device for use with a remote desktop management platform, the device comprising:
the password generation module is used for receiving a password acquisition request sent by the user equipment and calling a permission management unit of the remote desktop management platform to generate a password corresponding to the target server; wherein the password acquisition request is generated and transmitted by the user device in response to user input;
the password sending module is used for sending the password corresponding to the target server to the user equipment so that the user equipment displays the password corresponding to the target server in a user interface, and generates a password analysis request and sends the password analysis request when receiving the password corresponding to the target server which is input by the user through remote software installed by the user equipment;
the encryption identification determining module is used for receiving a password analysis request sent by the user equipment, determining the identification of remote software installed on a target server according to the password carried in the password analysis request, and encrypting the identification of the remote software installed on the target server to obtain an encryption identification;
The encryption identification sending module is used for returning the encryption identification to the user equipment so that the user equipment sends the encryption identification and the password corresponding to the target server to the intermediate server, so that the intermediate server determines the target server according to the encryption identification, forwards the password corresponding to the target server, and enables the target server to generate a password verification request according to the password corresponding to the target server and send the password verification request;
the password verification module is used for receiving a password verification request sent by the target server, analyzing the password verification request to obtain a password of the target server, calling the right management unit to verify whether the password of the target server is valid or not, generating a password valid message when the password is valid, and sending the password valid message to the target server so that the target server can establish remote connection with the user equipment through the intermediate server, and the user equipment can remotely control the target server through the intermediate server.
10. A remote control apparatus, the apparatus being applied to a user equipment, the apparatus comprising:
The password acquisition request sending module is used for responding to the input of a user, generating a password acquisition request and sending the password acquisition request to the remote desktop management platform so that the remote desktop management platform calls the permission management unit to generate a password corresponding to the target server and returns the password;
the password receiving module is used for receiving the password corresponding to the target server sent by the remote desktop management platform and displaying the password corresponding to the target server in a user interface;
the password analysis request generation module is used for generating a password analysis request when receiving a password corresponding to the target server, which is input by the user through the remote software installed by the user equipment, and sending the password analysis request to the remote desktop management platform, so that the remote desktop management platform determines the identification of the remote software installed by the target server according to the password carried in the password analysis request, encrypts the identification of the remote software installed on the target server to obtain an encrypted identification, and returns the encrypted identification;
the system comprises a remote desktop management platform, an encryption identification receiving module, a permission management unit and a user equipment, wherein the remote desktop management platform is used for receiving an encryption identification returned by the remote desktop management platform, sending the encryption identification and a password corresponding to a target server to an intermediate server, enabling the intermediate server to determine the target server according to the encryption identification, and forwarding the password corresponding to the target server, so that the target server generates a password verification request according to the password corresponding to the target server, and sends the password verification request to the remote desktop management platform;
And the remote control module is used for remotely controlling the target server through the intermediate server when the remote connection is established with the target server.
11. A computer-readable storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, implements the method of any of the preceding claims 7 or 8.
12. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of the preceding claims 7 or 8 when executing the program.
CN202410069099.4A 2024-01-17 2024-01-17 A remote control system and method Active CN117579674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410069099.4A CN117579674B (en) 2024-01-17 2024-01-17 A remote control system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410069099.4A CN117579674B (en) 2024-01-17 2024-01-17 A remote control system and method

Publications (2)

Publication Number Publication Date
CN117579674A CN117579674A (en) 2024-02-20
CN117579674B true CN117579674B (en) 2024-03-15

Family

ID=89884905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410069099.4A Active CN117579674B (en) 2024-01-17 2024-01-17 A remote control system and method

Country Status (1)

Country Link
CN (1) CN117579674B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841091A (en) * 2012-11-26 2014-06-04 中国移动通信集团公司 safety login method, device and system
WO2017186005A1 (en) * 2016-04-29 2017-11-02 中兴通讯股份有限公司 Method, server, and terminal for cloud desktop authentication
CN108769041A (en) * 2018-06-06 2018-11-06 深圳壹账通智能科技有限公司 Login method, system, computer equipment and storage medium
CN108781227A (en) * 2016-03-07 2018-11-09 思杰系统有限公司 Encrypted password transmission over an untrusted cloud network
CN114143029A (en) * 2021-10-29 2022-03-04 航天信息股份有限公司 User personal account password generating system and method capable of being repeatedly generated
CN114338115A (en) * 2021-12-21 2022-04-12 北京三快在线科技有限公司 Remote login method and device for unmanned equipment
CN114417318A (en) * 2021-12-22 2022-04-29 中国建设银行股份有限公司 Third-party page jumping method and device and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9866545B2 (en) * 2015-06-02 2018-01-09 ALTR Solutions, Inc. Credential-free user login to remotely executed applications

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841091A (en) * 2012-11-26 2014-06-04 中国移动通信集团公司 safety login method, device and system
CN108781227A (en) * 2016-03-07 2018-11-09 思杰系统有限公司 Encrypted password transmission over an untrusted cloud network
WO2017186005A1 (en) * 2016-04-29 2017-11-02 中兴通讯股份有限公司 Method, server, and terminal for cloud desktop authentication
CN108769041A (en) * 2018-06-06 2018-11-06 深圳壹账通智能科技有限公司 Login method, system, computer equipment and storage medium
CN114143029A (en) * 2021-10-29 2022-03-04 航天信息股份有限公司 User personal account password generating system and method capable of being repeatedly generated
CN114338115A (en) * 2021-12-21 2022-04-12 北京三快在线科技有限公司 Remote login method and device for unmanned equipment
CN114417318A (en) * 2021-12-22 2022-04-29 中国建设银行股份有限公司 Third-party page jumping method and device and electronic equipment

Also Published As

Publication number Publication date
CN117579674A (en) 2024-02-20

Similar Documents

Publication Publication Date Title
US10891383B2 (en) Validating computer resource usage
CN108923908B (en) Authorization processing method, device, equipment and storage medium
US20200220738A1 (en) System and method for interapplication communications
WO2019214211A1 (en) Block chain-based user data authorization method and apparatus, and medium and computing device
JP6033990B2 (en) Multiple resource servers with a single flexible and pluggable OAuth server, OAuth protected REST OAuth permission management service, and OAuth service for mobile application single sign-on
JP4916136B2 (en) System and method for providing security to applications
CN107784221B (en) Authority control method, service providing method, device, system and electronic device
CN109831435B (en) Database operation method, system, proxy server and storage medium
JP2018502368A (en) Methods, storage subsystems, cloud storage systems, data processing programs, and computer program products (automated management of sensitive data in a cloud environment) for storing data in a shared networked environment
JP2016530814A (en) Gateway device to block a large number of VPN connections
US11977620B2 (en) Attestation of application identity for inter-app communications
JP2016519828A (en) Access control method, apparatus, program, and recording medium
JP2023078322A (en) Method and apparatus for ensuring continued device operational reliability in cloud-degraded mode
KR20230027241A (en) shared resource identification
CN113271289A (en) Method, system and computer storage medium for resource authorization and access
WO2019037521A1 (en) Security detection method, device, system, and server
CN108173839A (en) Rights management method and system
Chinnasamy et al. A scalable multilabel‐based access control as a service for the cloud (SMBACaaS)
CN114125027A (en) Communication establishing method and device, electronic equipment and storage medium
CN112115500A (en) Method, device and system for accessing file
CN114640533B (en) Methods, devices, storage media and electronic equipment for transmitting messages
CN114579951A (en) Service access method, electronic device and storage medium
CN108881460B (en) A kind of realization method and realization device of cloud platform unified monitoring
CN117579674B (en) A remote control system and method
CN114329574B (en) Encrypted partition access control method and system based on domain management platform and computing equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant