CN103618737A - VNC console optimization scheme of virtual machines in cloud computing environment - Google Patents
VNC console optimization scheme of virtual machines in cloud computing environment Download PDFInfo
- Publication number
- CN103618737A CN103618737A CN201310661368.8A CN201310661368A CN103618737A CN 103618737 A CN103618737 A CN 103618737A CN 201310661368 A CN201310661368 A CN 201310661368A CN 103618737 A CN103618737 A CN 103618737A
- Authority
- CN
- China
- Prior art keywords
- vnc
- virtual machine
- control desk
- cloud computing
- desktop
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a VNC console optimization scheme of virtual machines in a cloud computing environment. VNC console proxy and an SSH encryption tunnel are established, encryption, forwarding and shunting are carried out on VNC data packets, a virtual machine console is used in a multi-network environment, double-mouse phenomena are eliminated by writing an Applet program, the function of virtual machine console monitoring is added, wide-to-height proportions of desktops of the virtual machines are zoomed by means of a graphic algorithm, the desktops of the multiple virtual machines are monitored in the same view, and a administer of a cloud data center is helped to monitor use situations of the virtual machines. Existing VNC source codes are optimized and can be well applied to the cloud computing environment, the console optimization scheme is suitable for the multi-network environment, VNC safety is improved, using characteristics of the VNC console desktops are further optimized, and the function for monitoring the desktops of the virtual machines is enriched.
Description
Technical field
The present invention relates to cloud data-center applications system field, be specifically related to the virtual machine VNC control desk prioritization scheme of a kind of across a network, low bandwidth, high security.
Technical background
Development along with Information technology, cloud computing progressively becomes the Hot spots for development of industry, and the cloud computing service platform of domestic and international all big enterprises also starts to put into one after another a plurality of fields such as science, education, culture, health, government, high-performance calculation, ecommerce, Internet of Things to be used.
Virtual machine under cloud computing environment in server, cannot directly connect desktop with display, mostly uses VNC to carry out long-range connection.VNC(Virtual Network Computing), for a kind of screen-picture of the RFB of use agreement is shared and remote operation software.VNC software is connected with the specific VNC port of server by network, transmits keyboard and the action of mouse and real-time screen-picture.
On the one hand, VNC non-security agreement, just can accept external connection although VNC servo programe need arrange password, and the password transmission between VNC client and VNC servo programe is through encryption, but still can be intercepted easily and the search method that uses force cracks.On the other hand, in view of the complexity of cloud data center network deployed environment and the fail safe of supervising the network, most of cloud keepers carry out physical isolation by managerial grid server and service network.
In order to be applicable to multi-network environment, improve the fail safe of VNC, further optimize the operating characteristic of VNC control desk desktop, enrich virtual machine Desktop Monitoring function, this programme is optimized existing VNC Open Source Code, and it is applied under cloud computing environment better.
Summary of the invention
The technical problem to be solved in the present invention is: the present invention is directed to the drawbacks such as VNC open source software poor stability, strong, the two mouse problem of mesh dependence be serious, propose a kind ofly by utilizing the technological means such as VNC control desk agency, SSH tunnel, data ciphering and deciphering, be applicable to the VNC control desk prioritization scheme under cloud computing environment.
Traditional VNC program of increasing income, by direct connection server VNC port, obtains virtual machine desktop, has following shortcoming:
1) cannot pass through multi-network environment;
2) cannot realize VNC data distribution, cause network bandwidth occupancy very large;
3) for virtual bottoms such as VMware, Xen, there are two mouse phenomenons in various degree to occur, cannot accomplish the basic elimination of two mouses.
The technical solution adopted in the present invention is:
A virtual machine VNC control desk prioritization scheme under cloud computing environment, comprising: VNC control desk agency, and SSH tunnel is encrypted, and eliminates two mouses, virtual machine Desktop Monitoring, wherein,
VNC control desk agency, is the realization basis of this programme, disposes the middle-agent who is responsible for virtual machine VNC control desk package forward specially, connects service network and data network, realizes control desk data retransmission and shunting under many nets environment;
SSH tunnel is encrypted, it is the data security protecting measure of this programme, by setting up safe SSH tunnel encrypting user name password, protection virtual machine VNC data, background server are not subject to illegal connection, reduce the risk that virtual machine VNC control desk data are illegally accessed, many nets environment is connected, and the VNC reaching under many networks is interconnected;
Note: Secure Shell(is abbreviated as SSH, containment agreement), be a security protocol being created on application layer and transport layer basis, be the Shell(shell on computer) safe transmission and environment for use be provided;
Two mouses are eliminated, and are the optimization of this programme to the VNC client of increasing income, and by writing Applet program, eliminate two mouse phenomenons, improve the ease for use of virtual machine desktop;
Virtual machine Desktop Monitoring, utilizes graphics algorithm, by VNC desktop transverse and longitudinal convergent-divergent, in the unified management of monitoring view.In same view, monitor the desktop of many virtual machines simultaneously, help cloud data center administrator supervision user's virtual machine service condition.
Described VNC control desk agency, one end connection management net, one end connects service network.(note: managerial grid is the network environment at machine room server place, service network is the network environment at virtual machine tenant place, service network and managerial grid can be according to customer demands, select intercommunication or two kinds of modes of physical isolation) on the one hand, control desk agency is solely responsible for VNC data packet flow and forwards, and alleviates taking of the network bandwidth; On the other hand, by data retransmission, realize the support to single net, many nets environment.
Described
encryption concrete steps in SSH tunnel are as follows:
1) select cryptographic algorithm.The higher cryptographic algorithm of fail safe of industry main flow comprises DES, AES, RSA, MD5 etc. at present.As the encrypting and decrypting schematic flow sheet of Fig. 2, Fig. 3, this programme is selected aes algorithm.
2) set up and encrypt SSH tunnel.SSH(Secure Shell, Secure Shell) object is to be encrypted by the network remote visit data between main frame, realizes the protection to communication.It is by providing the functions such as better authentication instrument and Secure Copy (SCP), Secure File Transfer Protocol (SFTP), X session forwarding and port repeat to carry out refined net exchange, thereby increases the fail safe of other non-security agreements.For preventing that the stolen hacker of causing of user name password in SSH tunnel from utilizing this tunnel as SSH springboard, be connected to managerial grid server, the user name of SSH is used different secret key encryptions from password.
3) for the fail safe of the network server of strengthening management, open the fire compartment wall of server, only open indivedual secure ports (as 443,8080, VNC port etc.) externally provide service.
Described pair of mouse elimination concrete steps are as follows:
1) write VNC client, choice for use Java Applet writes VNC client, has higher platform compatible, and direct loading needn't be installed, and can support the browser of all installation JRE;
2) shield local mouse, by being positioned at the local mouse shielding on Applet window top, only show the mouse in VME operating system, therefore, in the window ranges of Applet, the phenomenon of two mouses is eliminated.
Described virtual machine Desktop Monitoring concrete steps are as follows:
1), according to VNC agreement, virtual machine desktop is arranged to length and width scaling adjustable.The picture of virtual machine is presented in monitoring view according to fixing length and width;
2) VNC is configured to read-only control mode, only shows desktop, do not transmit the control flow of keyboard, mouse, to reduce the taking the network bandwidth of VNC;
3) parameter such as coded system (Raw, RRE, CoRRE, Hextile, Zlib, Tight, ZRLE), hierarchy compression, picture quality of control desk image, compressed virtual machine desktop picture are set voluntarily by user.For the user of heterogeneous networks bandwidth environment, provide optimal graphics display parameters.
Beneficial effect of the present invention is:
This programme is optimized existing VNC Open Source Code, and it is applied under cloud computing environment better, is applicable to multi-network environment, improves the fail safe of VNC, further optimizes the operating characteristic of VNC control desk desktop, enriches virtual machine Desktop Monitoring function.
Accompanying drawing explanation
Fig. 1 is the topological diagram of realizing of this scheme;
Fig. 2 is the encryption flow schematic diagram of aes algorithm;
Fig. 3 is the deciphering schematic flow sheet of aes algorithm.
Embodiment
With reference to the accompanying drawings, by embodiment, the present invention is further described:
The solution of the present invention mainly comprises: VNC control desk agency, and SSH tunnel is encrypted, and two mouses are eliminated, virtual desktop monitoring.
Wherein, VNC control desk agency is the realization basis of this programme.So-called VNC control desk is acted on behalf of, and is responsible for the middle-agent of virtual machine VNC control desk package forward specially.As Fig. 1, this acts on behalf of one end connection management net, and one end connects service network and (notes: managerial grid is the network environment at machine room server place, and service network is the network environment at virtual machine tenant place, service network and managerial grid can, according to customer demand, be selected intercommunication or two kinds of modes of physical isolation).
Such design, on the one hand, control desk agency is solely responsible for VNC data packet flow and forwards, and alleviates taking of the network bandwidth; On the other hand, by data retransmission, realize the support to single net, many nets environment.
It is the data security protecting measure of this programme that SSH tunnel is encrypted.By setting up safe SSH tunnel encrypting user name password, protection virtual machine VNC data, background server are not subject to illegal connection.Concrete steps are as follows:
1) select cryptographic algorithm.The higher cryptographic algorithm of fail safe of industry main flow comprises DES, AES, RSA, MD5 etc. at present.Encrypting and decrypting schematic flow sheet as shown in Figure 2 and Figure 3, this programme is selected aes algorithm.
2) set up and encrypt SSH tunnel.SSH(Secure Shell, Secure Shell) object is to be encrypted by the network remote visit data between main frame, realizes the protection to communication.It is by providing the functions such as better authentication instrument and Secure Copy (SCP), Secure File Transfer Protocol (SFTP), X session forwarding and port repeat to carry out refined net exchange, thereby increases the fail safe of other non-security agreements.For preventing that the stolen hacker of causing of user name password in SSH tunnel from utilizing this tunnel as SSH springboard, be connected to managerial grid server, the user name of SSH is used different secret key encryptions from password.
3) for the fail safe of the network server of strengthening management, open the fire compartment wall of server, only open indivedual secure ports (as 443,8080, VNC port etc.) externally provide service.
It is the optimization that this programme carries out the VNC client of increasing income that two mouses are eliminated, and concrete steps are as follows:
1) write VNC client.Choice for use Java Applet writes VNC client, has higher platform compatible, and direct loading needn't be installed, and can support the browser of all installation JRE.
2) shield local mouse.By being positioned at the local mouse shielding on Applet window top, only show the mouse in VME operating system, therefore, in the window ranges of Applet, the phenomenon of two mouses is eliminated.
Virtual machine Desktop Monitoring, concrete steps are as follows:
1) according to VNC agreement, virtual machine desktop is arranged to length and width scaling adjustable, the picture of virtual machine is presented in monitoring view according to fixing length and width;
2) VNC is configured to read-only control mode, only shows desktop, do not transmit the control flow of keyboard, mouse, to reduce the taking the network bandwidth of VNC;
3) parameter such as coded system (Raw, RRE, CoRRE, Hextile, Zlib, Tight, ZRLE), hierarchy compression, picture quality of control desk image, compressed virtual machine desktop picture are set voluntarily by user.For the user of heterogeneous networks bandwidth environment, provide optimal graphics display parameters.
Claims (5)
1. the virtual machine VNC control desk prioritization scheme under cloud computing environment, is characterized in that, comprising: VNC control desk agency, and SSH tunnel is encrypted, and eliminates two mouses, virtual machine Desktop Monitoring, wherein,
VNC control desk agency, is the realization basis of this programme, disposes the middle-agent who is responsible for virtual machine VNC control desk package forward specially, connects service network and data network, realizes control desk data retransmission and shunting under many nets environment;
SSH tunnel is encrypted, it is the data security protecting measure of this programme, by setting up safe SSH tunnel encrypting user name password, protection virtual machine VNC data, background server are not subject to illegal connection, reduce the risk that virtual machine VNC control desk data are illegally accessed, many nets environment is connected, and the VNC reaching under many networks is interconnected;
Two mouses are eliminated, and are the optimization of this programme to the VNC client of increasing income, and by writing Applet program, eliminate two mouse phenomenons, improve the ease for use of virtual machine desktop;
Virtual machine Desktop Monitoring, utilizes graphics algorithm, by VNC desktop transverse and longitudinal convergent-divergent, and in the unified management of monitoring view,
In same view, monitor the desktop of many virtual machines simultaneously, help cloud data center administrator supervision user's virtual machine service condition.
2. the virtual machine VNC control desk prioritization scheme under a kind of cloud computing environment according to claim 1, it is characterized in that: described VNC control desk agency, one end connection management net, one end connects service network, on the one hand, control desk agency is solely responsible for VNC data packet flow and forwards, and alleviates taking of the network bandwidth; On the other hand, by data retransmission, realize the support to single net, many nets environment.
3. the virtual machine VNC control desk prioritization scheme under a kind of cloud computing environment according to claim 1 and 2, is characterized in that, encryption concrete steps in described SSH tunnel are as follows:
1) select cryptographic algorithm;
2) set up to encrypt SSH tunnel, the user name password that prevents SSH tunnel is stolen and cause hacker to utilize this tunnel as SSH springboard, is connected to managerial grid server, and the user name of SSH is used different secret key encryptions from password;
3) for the fail safe of the network server of strengthening management, open the fire compartment wall of server, only open indivedual secure ports externally provide service.
4. the virtual machine VNC control desk prioritization scheme under a kind of cloud computing environment according to claim 3, is characterized in that, described pair of mouse elimination concrete steps are as follows:
1) write VNC client, choice for use Java Applet writes VNC client, has higher platform compatible, and direct loading needn't be installed, and can support the browser of all installation JRE;
2) shield local mouse, by being positioned at the local mouse shielding on Applet window top, only show the mouse in VME operating system.
5. the virtual machine VNC control desk prioritization scheme under a kind of cloud computing environment according to claim 4, is characterized in that, described virtual machine Desktop Monitoring concrete steps are as follows:
1), according to VNC agreement, virtual machine desktop is arranged to length and width scaling adjustable;
2) VNC is configured to read-only control mode, only shows desktop, do not transmit the control flow of keyboard, mouse, to reduce the taking the network bandwidth of VNC;
3) coded system, hierarchy compression, the picture quality parameter of control desk image are set voluntarily by user, compressed virtual machine desktop picture, for the user of heterogeneous networks bandwidth environment, provides optimal graphics display parameters.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310661368.8A CN103618737A (en) | 2013-12-10 | 2013-12-10 | VNC console optimization scheme of virtual machines in cloud computing environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310661368.8A CN103618737A (en) | 2013-12-10 | 2013-12-10 | VNC console optimization scheme of virtual machines in cloud computing environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103618737A true CN103618737A (en) | 2014-03-05 |
Family
ID=50169441
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310661368.8A Pending CN103618737A (en) | 2013-12-10 | 2013-12-10 | VNC console optimization scheme of virtual machines in cloud computing environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103618737A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015180293A1 (en) * | 2014-05-28 | 2015-12-03 | 中兴通讯股份有限公司 | Cloud desktop monitoring method and apparatus |
CN107124459A (en) * | 2017-04-28 | 2017-09-01 | 南京大学 | It is controllable in sequence of threads evaluation and test middleware based on cloud platform |
CN107391350A (en) * | 2017-07-28 | 2017-11-24 | 郑州云海信息技术有限公司 | A kind of display methods for monitoring view, apparatus and system |
CN107634892A (en) * | 2017-09-08 | 2018-01-26 | 郑州云海信息技术有限公司 | A kind of Xenserver realizes the method and device of console based on novnc |
CN107959701A (en) * | 2016-10-17 | 2018-04-24 | 中兴通讯股份有限公司 | Data sharing method, cloud terminal, cloud desktop virtual machine and pass-through proxy server |
CN108243157A (en) * | 2016-12-26 | 2018-07-03 | 华为技术服务有限公司 | The method for implanting and device of sensitive information in virtual machine |
CN110995705A (en) * | 2019-12-03 | 2020-04-10 | 广州西麦科技股份有限公司 | Method for remotely and safely accessing virtual machine |
CN112416522A (en) * | 2020-11-24 | 2021-02-26 | 北京华胜天成科技股份有限公司 | Virtual machine control method and device |
CN113472878A (en) * | 2021-06-29 | 2021-10-01 | 烽火通信科技股份有限公司 | Method and device for realizing file dragging transmission in VNC by using browser plug-in |
WO2023241351A1 (en) * | 2022-06-14 | 2023-12-21 | 中兴通讯股份有限公司 | Virtual machine monitoring method and apparatus, and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050273849A1 (en) * | 2004-03-11 | 2005-12-08 | Aep Networks | Network access using secure tunnel |
CN102307153A (en) * | 2011-10-14 | 2012-01-04 | 王宁 | Virtual desktop transmission device and method |
US20120023570A1 (en) * | 2010-07-23 | 2012-01-26 | Anchorfree, Inc. | Web vpn |
CN102523207A (en) * | 2011-12-06 | 2012-06-27 | 北京航空航天大学 | VNC (Virtual Network Computer)-based remote resource access method and proxy device |
CN102571773A (en) * | 2011-12-27 | 2012-07-11 | 浙江省电力公司 | Information security comprehensive audit system and method |
CN103200215A (en) * | 2012-01-08 | 2013-07-10 | 佳都新太科技股份有限公司 | Method achieving XenServer virtual machine remote control on https |
US20130191631A1 (en) * | 2012-01-24 | 2013-07-25 | Ssh Communications Security Corp | Auditing and policy control at SSH endpoints |
CN103368956A (en) * | 2013-07-03 | 2013-10-23 | 北京华胜天成科技股份有限公司 | RFB (remote frame buffer) protocol secure communication method for VNC (virtual network computer) used for server side and RFB proxy server |
CN103368955A (en) * | 2013-07-03 | 2013-10-23 | 浪潮电子信息产业股份有限公司 | Method for carrying out encryption on VNC (Virtual Network Computer) of virtual machine in cloud data center operation system |
-
2013
- 2013-12-10 CN CN201310661368.8A patent/CN103618737A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050273849A1 (en) * | 2004-03-11 | 2005-12-08 | Aep Networks | Network access using secure tunnel |
US20120023570A1 (en) * | 2010-07-23 | 2012-01-26 | Anchorfree, Inc. | Web vpn |
CN102307153A (en) * | 2011-10-14 | 2012-01-04 | 王宁 | Virtual desktop transmission device and method |
CN102523207A (en) * | 2011-12-06 | 2012-06-27 | 北京航空航天大学 | VNC (Virtual Network Computer)-based remote resource access method and proxy device |
CN102571773A (en) * | 2011-12-27 | 2012-07-11 | 浙江省电力公司 | Information security comprehensive audit system and method |
CN103200215A (en) * | 2012-01-08 | 2013-07-10 | 佳都新太科技股份有限公司 | Method achieving XenServer virtual machine remote control on https |
US20130191631A1 (en) * | 2012-01-24 | 2013-07-25 | Ssh Communications Security Corp | Auditing and policy control at SSH endpoints |
CN103368956A (en) * | 2013-07-03 | 2013-10-23 | 北京华胜天成科技股份有限公司 | RFB (remote frame buffer) protocol secure communication method for VNC (virtual network computer) used for server side and RFB proxy server |
CN103368955A (en) * | 2013-07-03 | 2013-10-23 | 浪潮电子信息产业股份有限公司 | Method for carrying out encryption on VNC (Virtual Network Computer) of virtual machine in cloud data center operation system |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105162641A (en) * | 2014-05-28 | 2015-12-16 | 中兴通讯股份有限公司 | Monitoring method and device for cloud desktop |
WO2015180293A1 (en) * | 2014-05-28 | 2015-12-03 | 中兴通讯股份有限公司 | Cloud desktop monitoring method and apparatus |
CN107959701A (en) * | 2016-10-17 | 2018-04-24 | 中兴通讯股份有限公司 | Data sharing method, cloud terminal, cloud desktop virtual machine and pass-through proxy server |
CN108243157A (en) * | 2016-12-26 | 2018-07-03 | 华为技术服务有限公司 | The method for implanting and device of sensitive information in virtual machine |
CN107124459A (en) * | 2017-04-28 | 2017-09-01 | 南京大学 | It is controllable in sequence of threads evaluation and test middleware based on cloud platform |
CN107391350A (en) * | 2017-07-28 | 2017-11-24 | 郑州云海信息技术有限公司 | A kind of display methods for monitoring view, apparatus and system |
CN107634892A (en) * | 2017-09-08 | 2018-01-26 | 郑州云海信息技术有限公司 | A kind of Xenserver realizes the method and device of console based on novnc |
CN110995705A (en) * | 2019-12-03 | 2020-04-10 | 广州西麦科技股份有限公司 | Method for remotely and safely accessing virtual machine |
CN110995705B (en) * | 2019-12-03 | 2022-07-05 | 广州西麦科技股份有限公司 | Method for remotely and safely accessing virtual machine |
CN112416522A (en) * | 2020-11-24 | 2021-02-26 | 北京华胜天成科技股份有限公司 | Virtual machine control method and device |
CN113472878A (en) * | 2021-06-29 | 2021-10-01 | 烽火通信科技股份有限公司 | Method and device for realizing file dragging transmission in VNC by using browser plug-in |
CN113472878B (en) * | 2021-06-29 | 2022-04-26 | 烽火通信科技股份有限公司 | Method and device for realizing file dragging transmission in VNC by using browser plug-in |
WO2023241351A1 (en) * | 2022-06-14 | 2023-12-21 | 中兴通讯股份有限公司 | Virtual machine monitoring method and apparatus, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103618737A (en) | VNC console optimization scheme of virtual machines in cloud computing environment | |
Ganapathy | A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications | |
US9231976B2 (en) | Creating and managing a network security tag | |
JP2020502896A (en) | Secure distribution of sensitive data over content distribution networks | |
US20120254622A1 (en) | Secure Access to Electronic Devices | |
Chen et al. | An infrastructure framework for privacy protection of community medical internet of things: Transmission protection, storage protection and access control | |
JP2016512374A5 (en) | ||
JP6055023B2 (en) | Information processing apparatus, terminal apparatus, and storage method for storing data in cloud environment | |
WO2013006296A1 (en) | Methods and apparatus for secure data sharing | |
Yan et al. | Context-aware verifiable cloud computing | |
CN103716166A (en) | Self-adaptation hybrid encryption method and device and encryption communication system | |
US20170302454A1 (en) | Encryption for transactions in a memory fabric | |
WO2023155696A1 (en) | Database operation method and system, and storage medium and computer terminal | |
CN105100248A (en) | Cloud storage security realization method based on data encryption and access control | |
CN204180095U (en) | A kind of ciphering and deciphering device for network data encryption transmission | |
Rekhate et al. | Secure and efficient message passing in distributed systems using one-time pad | |
Kumaresan et al. | Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile | |
Goswami et al. | Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability | |
CN114546527A (en) | Longitudinal multi-party data aggregation calculation solution system | |
Sengupta et al. | Contriving hybrid DESCAST algorithm for cloud security | |
Wang et al. | Enabling privacy and leakage resistance for dynamic blockchain-based access control systems | |
Somaiya et al. | Implementation and evaluation of EMAES–A hybrid encryption algorithm for sharing multimedia files with more security and speed | |
CN111209544B (en) | Web application security protection method and device, electronic equipment and storage medium | |
KR101173583B1 (en) | Method for Security Application Data in Mobile Terminal | |
CN103701589A (en) | Information transmission method and device based on virtual desktop system and relevant equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140305 |