CN112272372A - Zero terminal login method and system - Google Patents

Zero terminal login method and system Download PDF

Info

Publication number
CN112272372A
CN112272372A CN202011047146.3A CN202011047146A CN112272372A CN 112272372 A CN112272372 A CN 112272372A CN 202011047146 A CN202011047146 A CN 202011047146A CN 112272372 A CN112272372 A CN 112272372A
Authority
CN
China
Prior art keywords
mobile terminal
terminal
identification information
zero
virtual machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011047146.3A
Other languages
Chinese (zh)
Inventor
江润生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202011047146.3A priority Critical patent/CN112272372A/en
Publication of CN112272372A publication Critical patent/CN112272372A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure provides a zero terminal login method and a zero terminal login system, relates to the technical field of communication, and can solve the problems of complicated login and low safety of the conventional zero terminal login method. The specific technical scheme is as follows: receiving a Bluetooth connection request sent by a mobile terminal, wherein the Bluetooth connection request comprises identification information of a zero terminal and identification information of the mobile terminal; carrying out authorization verification on the mobile terminal according to the identification information of the mobile terminal and the identification information of the zero terminal; if the mobile terminal is an authorized device, a Bluetooth connection link with the mobile terminal is established, and the mobile terminal is switched from a locking state to an available state. The invention is used for logging in the zero terminal.

Description

Zero terminal login method and system
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a zero terminal login method and system.
Background
The existing login mode of the zero-terminal ZC is complicated, and a user name and a password are required to be manually input by a user. In consideration of information security, the password of the user is often set to be more complex; in addition, due to the requirement of security and confidentiality, the special industry can require the staff to update the password once a week, and the user needs to remember the complex password, so that the process is very complicated and painful, and the flexibility and the usability of the zero terminal are reduced. If the user forgets to lock the screen or disconnect when leaving the company, huge potential safety hazards are brought.
Disclosure of Invention
The embodiment of the disclosure provides a zero terminal login method and a zero terminal login system, which can solve the problems of complicated login and low security of the current zero terminal login method. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, a login method for a zero terminal is provided, where the method includes: receiving a Bluetooth connection request sent by a mobile terminal, wherein the Bluetooth connection request comprises identification information of a zero terminal and identification information of the mobile terminal; performing authorization verification on the mobile terminal according to the identification information of the mobile terminal and the identification information of the zero terminal; and if the mobile terminal is an authorized device, establishing a Bluetooth connection link with the mobile terminal, and switching from a locking state to an available state.
According to the zero terminal login method provided by the disclosure, a user sends a Bluetooth connection request to a zero terminal through a mobile terminal, the zero terminal receives the Bluetooth connection request and then carries out authorization verification on the mobile terminal, if the mobile terminal is verified to be authorized equipment, a Bluetooth connection link with the mobile terminal is established, and the zero terminal is also switched from a locked state to an available state, namely, the zero terminal login success is explained.
In an embodiment, the performing authorization verification on the mobile terminal according to the identification information of the mobile terminal and the identification information of the zero terminal includes: sending the identification information of the mobile terminal and the identification information of the zero terminal to an authorization server so that the authorization server can search and compare the identification information of the zero terminal and the identification information of the zero terminal in a preset authorization list, wherein the preset authorization list comprises the identification information of a plurality of zero terminals and the identification information of a plurality of mobile terminals corresponding to the zero terminals;
if the mobile terminal is an authorized device, establishing a bluetooth connection link with the mobile terminal, including: and if the preset authorization list comprises the identification information of the mobile terminal and the identification information of the mobile terminal corresponding to the zero terminal, establishing a Bluetooth connection link with the mobile terminal.
In one embodiment, the receiving a bluetooth connection request sent by a mobile terminal includes: and when the distance between the current position of the mobile terminal and the current position of the mobile terminal is less than a preset threshold value, receiving a Bluetooth connection request automatically sent by the mobile terminal.
In one embodiment, after the switching from the locked state to the available state, the method further comprises: and when the disconnection of the Bluetooth connection link with the mobile terminal is detected, switching from the available state to the locked state.
In one embodiment, after the switching from the locked state to the available state, the method further comprises: acquiring the position distance between the mobile terminal and the mobile terminal in a preset time period; and if the position distance is greater than a preset threshold value, disconnecting the Bluetooth connection link with the mobile terminal, and switching from the available state to the locked state.
In one embodiment, after the switching from the locked state to the available state, the method further comprises: obtaining a login instruction and establishing a communication link with a virtual machine, wherein the login instruction is used for logging in the virtual machine.
In one embodiment, after the establishing the communication link with the virtual machine, the method further comprises: and when the available state is switched to the locking state, acquiring a logout instruction, and disconnecting a communication link with the virtual machine.
In one embodiment, after the establishing the communication link with the virtual machine, the method further comprises: acquiring the position distance between the mobile terminal and the mobile terminal in a preset time period, and judging whether a program running on the virtual machine is safe or not under the position distance;
and if the program running on the virtual machine is unsafe under the position distance, closing the program running on the virtual machine.
In one embodiment, the determining whether the program running on the virtual machine is safe at the current distance includes: determining a security level corresponding to the current distance according to the position distance;
sending the security level to the virtual machine so that the virtual machine can judge whether the security level of the currently running program is lower than the security level;
if the program running on the virtual machine under the current distance is not safe, closing the program, including: and if the confidentiality level of the currently running program on the virtual machine is lower than the security level, closing the program.
According to a second aspect of the embodiments of the present disclosure, there is provided a login system of a zero terminal, the system including: a mobile terminal, a zero terminal and a virtual machine;
the zero terminal receives a Bluetooth connection request sent by a mobile terminal, wherein the Bluetooth connection request comprises identification information of the zero terminal and identification information of the mobile terminal;
the zero terminal carries out authorization verification on the mobile terminal according to the identification information of the mobile terminal and the identification information of the zero terminal; if the mobile terminal is an authorized device, establishing a Bluetooth connection link with the mobile terminal, and switching from a locking state to an available state;
and the zero terminal acquires a login instruction and establishes a communication link with the virtual machine.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flowchart of a zero terminal login method provided in an embodiment of the present disclosure;
fig. 2 is a structural diagram of a zero terminal login system according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of systems and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The embodiment of the present disclosure provides a login method for a zero terminal, as shown in fig. 1, the method includes the following steps:
101. and receiving a Bluetooth connection request sent by the mobile terminal.
The bluetooth connection request includes identification information of the terminal and identification information of the mobile terminal, and the mobile terminal may be a mobile phone, a smart phone, a tablet computer, or the like, which is not limited in the present invention.
For example, the receiving of the bluetooth connection request sent by the mobile terminal includes: and when the distance between the zero terminal and the current position of the mobile terminal is smaller than a preset threshold value, receiving a Bluetooth connection request automatically sent by the mobile terminal.
102. And carrying out authorization verification on the mobile terminal according to the identification information of the mobile terminal and the identification information of the zero terminal.
Specifically, the authorization verification of the mobile terminal according to the identification information of the mobile terminal and the identification information of the zero terminal includes: sending the identification information of the mobile terminal and the identification information of the zero terminal to an authorization server so that the authorization server can search and compare the identification information of the zero terminal and the identification information of the mobile terminals corresponding to the zero terminals in a preset authorization list, wherein the preset authorization list comprises the identification information of the zero terminals and the identification information of the mobile terminals corresponding to the zero terminals;
if the mobile terminal is an authorized device, establishing a bluetooth connection link with the mobile terminal, including: and if the preset authorization list comprises the identification information of the mobile terminal and the identification information of the mobile terminal corresponding to the zero terminal, establishing a Bluetooth connection link with the mobile terminal.
Further, the user can execute the application by means of mails and the like, the identification code number of the mobile terminal is sent to an administrator, after the administrator passes the audit, the identification code is maintained in an authorization list of the authorization server and is bound with the corresponding zero terminal, and meanwhile, the virtual machine resources which can be accessed by the user are allocated. The method is suitable for functional machines and intelligent machines. In addition, the user downloads the application program, the user executes the application of fast login and logout in the application, after the administrator passes the audit, the identification code number of the mobile terminal is maintained in the authorization list of the authorization server and is bound with the corresponding zero terminal, and meanwhile, the virtual machine resources which can be accessed by the user are distributed. The method is suitable for the smart phone.
103. If the mobile terminal is an authorized device, a Bluetooth connection link with the mobile terminal is established, and the mobile terminal is switched from a locking state to an available state.
Specifically, if the mobile terminal is an authorized device, the zero terminal receives a bluetooth connection agreeing to the mobile terminal, and simultaneously, the zero terminal switches from a locked state to an available state.
Furthermore, when the zero terminal is in a locked state, a frame of static picture is displayed on the display, and the user is prompted to carry out Bluetooth connection. At this time, the keyboard and mouse device with zero terminal connection is not controllable. The keyboard and mouse device is not operable and has the following specific implementation modes: enabling an image transmission decoding module in the zero terminal to enter a dormant state and be incapable of receiving keyboard and mouse coordinate information sent by keyboard and mouse equipment; or, the USB port of the keyboard and mouse device connected with the zero terminal is enabled, so that the keyboard and mouse coordinate information sent by the keyboard and mouse device cannot reach the zero terminal. When the zero terminal is in an available state, the display switches the static picture to a dynamic connection picture or a virtual machine picture. At this time, the keyboard and mouse device connected with the zero terminal is in a normal use state. Correspondingly, the key mouse equipment recovery state is specifically realized in the following modes: and enabling an image transmission decoding module in the zero terminal to enter a working state and normally receiving the keyboard and mouse coordinate information sent by the keyboard and mouse equipment. And restoring the USB port of the keyboard and mouse device connected with the zero terminal, so that the keyboard and mouse coordinate information sent by the keyboard and mouse device can normally reach the zero terminal.
In practical application, the user logs in the zero terminal through the bluetooth function and may include the following scenes:
scene one: the user mobile phone is not authenticated or authorized to be in the audit
A user starts a Bluetooth function on the mobile phone, searches for a target zero terminal, and clicks connection after locking;
the Bluetooth module in the zero terminal then executes authentication, and sends the identification code of the local machine and the identification code of the mobile phone to an authorization server through a compressed image transmission protocol;
the authorization server receives the information, decodes the information, and compares the information with an authorization list, wherein the record is not hit because the authorization is not applied or the record is not checked in the audit. The authorization server returns the miss result to the Bluetooth module in the zero terminal;
the zero terminal refuses the Bluetooth connection of the user, the process is finished, and the zero terminal is always in a locking state.
Scene two: the user mobile phone is authorized but is connected with the zero terminal for the first time
A user starts a Bluetooth function on the mobile phone, searches for a target zero terminal, and clicks connection after locking;
the Bluetooth module in the zero terminal then executes authentication, and sends the identification code of the local machine and the identification code of the mobile phone to an authorization server through a compressed image transmission protocol;
and the authorization server decodes the information after receiving the information, compares the information in an authorization list, authorizes the target equipment and records the hit. The authorization server returns the hit result to the Bluetooth module in the zero terminal;
and the Bluetooth module in the zero terminal agrees to the Bluetooth connection of the user, the locking state of the zero terminal is released, the zero terminal is switched to an available state, and the process is ended.
Scene three: the user mobile phone is authorized and is not connected with the zero terminal for the first time
When the user mobile phone is within an effective distance (namely within 10 meters) of Bluetooth communication with the target zero terminal, the mobile phone automatically initiates a Bluetooth connection request;
the Bluetooth module in the zero terminal then executes authentication, and sends the identification code of the local machine and the identification code of the mobile phone to an authorization server through a compressed image transmission protocol;
and the authorization server decodes the information after receiving the information, compares the information in an authorization list, authorizes the target equipment and records the hit. The authorization server returns the hit result to the Bluetooth module in the zero terminal;
and the Bluetooth module in the zero terminal agrees to the Bluetooth connection of the user, the locking state of the zero terminal is released, the zero terminal is switched to an available state, and the process is ended.
When the zero terminal and the mobile terminal establish Bluetooth connection, the state of a Bluetooth module in the zero terminal is marked as a connection state, the connection state is sent to the zero terminal, and the zero terminal converts the self state from a locking state into an available state after receiving the connection state.
In one embodiment, after switching from the locked state to the available state, the method further comprises: and when the disconnection of the Bluetooth connection link with the mobile terminal is detected, switching from the available state to the locked state.
In practical application, when a user leaves an office, the Bluetooth connection with a zero terminal can be actively disconnected through a mobile phone (for example, a Bluetooth module on the mobile phone is closed), and after the Bluetooth module in the zero terminal recognizes that the connection is disconnected, the state of the zero terminal is marked as unconnected, and the unconnected state is sent to the zero terminal; and after receiving the unconnected state, the zero terminal converts the self state from the available state into the locked state, simultaneously, a Bluetooth module in the zero terminal issues a logout instruction to the zero terminal, and after receiving the logout instruction, the zero terminal automatically disconnects the connected virtual machine.
Specifically, the image transmission decoding module in the zero terminal enters a sleep state, so that the connection between the zero terminal and the virtual machine is automatically interrupted.
In one embodiment, after switching from the locked state to the available state, the method further comprises: acquiring the position distance between the mobile terminal and the mobile terminal in a preset time period; if the position distance is larger than the preset threshold value, the Bluetooth connection link with the mobile terminal is disconnected, and the available state is switched to the locking state.
In practical application, the Bluetooth module in the zero terminal can periodically detect the distance between the user mobile phone and the zero terminal and send the current distance to the zero terminal, when the distance between the mobile phone and the zero terminal is greater than a preset threshold value, a Bluetooth connection link with a mobile terminal is disconnected, the available state is switched to a locking state, and the situation that data leakage is caused due to the fact that the user forgets to disconnect the Bluetooth connection before leaving a computer is prevented.
The periodic detection time may be 1s, and the maximum preset distance between the mobile phone and the zero terminal may be 10 meters.
In one embodiment, after switching from the locked state to the available state, the method further comprises: and acquiring a login instruction, and establishing a communication link with the virtual machine, wherein the login instruction is used for logging in the virtual machine.
In practical application, after the state of the zero terminal is switched from a locking state to an available state, a Bluetooth module in the zero terminal sends a login instruction to the zero terminal; and after receiving the login instruction, the zero terminal automatically connects the virtual machine resources accessible by the user and establishes communication.
Specifically, after receiving the login instruction, the zero terminal initiates a connection request to the corresponding virtual machine. Specifically, the connection request includes a preset user name and a preset password, and identification information of the virtual machine corresponding to the zero terminal. And after receiving the connection request, the cloud server where the virtual machine is located forwards the connection request to the virtual machine corresponding to the identification information, and after the virtual machine passes the verification of the user name and the password, the cloud server establishes communication with the zero terminal.
In one embodiment, after establishing the communication link with the virtual machine, the method further comprises: and when the available state is switched to the locking state, acquiring a logout instruction, and disconnecting a communication link with the virtual machine.
Specifically, after the zero terminal is switched from the available state to the locked state, the bluetooth module in the zero terminal issues a logout instruction to the zero terminal, and after receiving the logout instruction, the zero terminal automatically disconnects the connected virtual machine.
In one embodiment, after establishing the communication link with the virtual machine, the method further comprises: acquiring the position distance between the mobile terminal and the mobile terminal in a preset time period, and judging whether a program running on the virtual machine is safe or not at the position distance; and if the program running on the virtual machine is unsafe at the position distance, closing the program running on the virtual machine.
Specifically, the determining whether the program running on the virtual machine is safe at the current distance includes: determining a security level corresponding to the current distance according to the position distance; sending the security level to the virtual machine so that the virtual machine can judge whether the security level of the currently running program is lower than the security level; if the program running on the virtual machine under the current distance is unsafe, closing the program, including: and if the confidentiality level of the currently running program on the virtual machine is lower than the security level, closing the program. The correspondence between the distance level table and the program security level is shown in table 1.
TABLE 1
Distance range (rice) Level of security
[0,1) First stage
[1,5) Second stage
[5,∞) Three-stage
As shown in table 1, the highest security level is one level, which indicates that the mobile terminal is very close to the zero terminal, and the problem of information leakage hardly occurs. And the secondary level indicates that the zero terminal is still in the visual range of the user, and the information leakage probability is low. And the third level indicates that the zero terminal is already out of the sight of the user and the information leakage is more likely to occur. And the zero terminal sends the security level corresponding to the current distance to the connected virtual machine. The virtual machine judges whether the confidentiality level of the currently running program is matched with the security level or not according to the received security level; if not, the program is closed.
It should be noted that all programs in the virtual machine have preset corresponding security levels. For example, the security level corresponding to the program a is one level, the security level corresponding to the program B is two levels, and the security level corresponding to the program C is three levels. One level is the highest security level, and the corresponding program includes a large amount of key information. The larger the number of levels, the lower the security level, the less the key information included in the corresponding program, and the program corresponding to the lowest security level does not include the key information.
Wherein, the confidentiality level of the program is matched with the security level, namely, the confidentiality level of the program is not lower than the security level. That is, if the security level is level 1, all programs are matched. If the security level is level 2, it is matched with a program whose security level is not higher than level 2. If the security level is level 3, it is matched with a program whose security level is not higher than level 3. The higher the security level, the safer the current use environment, and the programs containing the key information can be used normally. The lower the security level, the more dangerous the current use environment is, and in order to avoid the leakage of the critical information, the use of a part of the program containing the critical information is not allowed.
It can be understood that the present processing steps are applicable to scenes in which the distance between the mobile terminal and the zero terminal is longer and longer. And for some key running programs, the running programs can be closed in time, so that information leakage is avoided, and the safety is improved. Wherein, for part of programs, such as document editing or drawing software, the programs can be saved and then quitted, thereby reducing the loss of users as much as possible.
According to the zero terminal login method provided by the disclosure, a user sends a Bluetooth connection request to a zero terminal through a mobile terminal, the zero terminal receives the Bluetooth connection request and then carries out authorization verification on the mobile terminal, if the mobile terminal is verified to be authorized equipment, a Bluetooth connection link with the mobile terminal is established, and the zero terminal is also switched from a locked state to an available state, namely, the zero terminal login success is explained.
The embodiment of the present disclosure provides a login system of a zero terminal, as shown in fig. 2, the system includes: a mobile terminal 201, a zero terminal 202 and a virtual machine 203; the zero terminal 202 receives a bluetooth connection request sent by the mobile terminal 201, where the bluetooth connection request includes identification information of the zero terminal 202 and identification information of the mobile terminal 201; the zero terminal 202 performs authorization verification on the mobile terminal 201 according to the identification information of the mobile terminal 201 and the identification information of the zero terminal 202; if the mobile terminal 201 is an authorized device, establishing a bluetooth connection link with the mobile terminal 201, and switching from a locked state to an available state; the zero terminal 202 acquires the login instruction and establishes a communication link with the virtual machine 203.
In one embodiment, the null terminal 202 is further configured to: the identification information of the mobile terminal 201 and the identification information of the zero terminal 202 are sent to an authorization server, the authorization server searches and compares the identification information of the mobile terminal 201 and the identification information of the zero terminal 202 in a preset authorization list, and if the preset authorization list includes the identification information of the mobile terminal 201 and the identification information of the mobile terminal 201 corresponding to the zero terminal 202, the zero terminal 202 establishes a bluetooth connection link with the mobile terminal 201.
In one embodiment, the zero terminal 202 is further configured to obtain a login instruction for logging in the virtual machine 203, and establish a communication link with the virtual machine 203.
According to the login system of the zero terminal 202 provided by the disclosure, a user sends a Bluetooth connection request to the zero terminal 202 through the mobile terminal 201, the zero terminal 202 carries out authorization verification on the mobile terminal 201 after receiving the Bluetooth connection request, if the mobile terminal 201 is verified to be an authorized device, a Bluetooth connection link with the mobile terminal 201 is established, and the zero terminal 202 is also switched from a locked state to an available state, namely, the login success of the zero terminal 202 is explained.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A login method of a zero terminal is characterized by comprising the following steps:
receiving a Bluetooth connection request sent by a mobile terminal, wherein the Bluetooth connection request comprises identification information of a zero terminal and identification information of the mobile terminal;
performing authorization verification on the mobile terminal according to the identification information of the mobile terminal and the identification information of the zero terminal;
and if the mobile terminal is an authorized device, establishing a Bluetooth connection link with the mobile terminal, and switching from a locking state to an available state.
2. The method according to claim 1, wherein the performing authorization verification on the mobile terminal according to the identification information of the mobile terminal and the identification information of the zero terminal comprises:
sending the identification information of the mobile terminal and the identification information of the zero terminal to an authorization server so that the authorization server can search and compare the identification information of the zero terminal and the identification information of the zero terminal in a preset authorization list, wherein the preset authorization list comprises the identification information of a plurality of zero terminals and the identification information of a plurality of mobile terminals corresponding to the zero terminals;
if the mobile terminal is an authorized device, establishing a bluetooth connection link with the mobile terminal, including: and if the preset authorization list comprises the identification information of the mobile terminal and the identification information of the mobile terminal corresponding to the zero terminal, establishing a Bluetooth connection link with the mobile terminal.
3. The method according to claim 1, wherein the receiving the bluetooth connection request sent by the mobile terminal comprises:
and when the distance between the current position of the mobile terminal and the current position of the mobile terminal is less than a preset threshold value, receiving a Bluetooth connection request automatically sent by the mobile terminal.
4. The method of claim 1, wherein after the switching from the locked state to the available state, the method further comprises:
and when the disconnection of the Bluetooth connection link with the mobile terminal is detected, switching from the available state to the locked state.
5. The method of claim 1, wherein after the switching from the locked state to the available state, the method further comprises:
acquiring the position distance between the mobile terminal and the mobile terminal in a preset time period;
and if the position distance is greater than a preset threshold value, disconnecting the Bluetooth connection link with the mobile terminal, and switching from the available state to the locked state.
6. The method of claim 1, wherein after the switching from the locked state to the available state, the method further comprises:
obtaining a login instruction and establishing a communication link with a virtual machine, wherein the login instruction is used for logging in the virtual machine.
7. The method of claim 6, wherein after the establishing the communication link with the virtual machine, the method further comprises:
and when the available state is switched to the locking state, acquiring a logout instruction, and disconnecting a communication link with the virtual machine.
8. The method of claim 6, wherein after establishing the communication link with the virtual machine, the method further comprises:
acquiring the position distance between the mobile terminal and the mobile terminal in a preset time period, and judging whether a program running on the virtual machine is safe or not under the position distance;
and if the program running on the virtual machine is unsafe under the position distance, closing the program running on the virtual machine.
9. The method of claim 8, wherein determining whether a program running on the virtual machine at the location distance is safe comprises:
determining a security level corresponding to the current distance according to the position distance;
sending the security level to the virtual machine so that the virtual machine can judge whether the security level of the currently running program is lower than the security level;
if the program running on the virtual machine is unsafe under the position distance, closing the program, including:
and if the confidentiality level of the currently running program on the virtual machine is lower than the security level, closing the program.
10. A zero-terminal login system, the system comprising: a mobile terminal, a zero terminal and a virtual machine;
the zero terminal receives a Bluetooth connection request sent by a mobile terminal, wherein the Bluetooth connection request comprises identification information of the zero terminal and identification information of the mobile terminal;
the zero terminal carries out authorization verification on the mobile terminal according to the identification information of the mobile terminal and the identification information of the zero terminal;
if the mobile terminal is an authorized device, establishing a Bluetooth connection link with the mobile terminal, and switching from a locking state to an available state;
and the zero terminal acquires a login instruction and establishes a communication link with the virtual machine.
CN202011047146.3A 2020-09-28 2020-09-28 Zero terminal login method and system Pending CN112272372A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011047146.3A CN112272372A (en) 2020-09-28 2020-09-28 Zero terminal login method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011047146.3A CN112272372A (en) 2020-09-28 2020-09-28 Zero terminal login method and system

Publications (1)

Publication Number Publication Date
CN112272372A true CN112272372A (en) 2021-01-26

Family

ID=74348638

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011047146.3A Pending CN112272372A (en) 2020-09-28 2020-09-28 Zero terminal login method and system

Country Status (1)

Country Link
CN (1) CN112272372A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102868724A (en) * 2012-08-22 2013-01-09 上海金图信息科技有限公司 Control system for managing zero clients and desktop virtual machines
CN102868723A (en) * 2012-08-22 2013-01-09 上海金图信息科技有限公司 Control console and management method of management zero terminal machine and desktop virtual machine
CN104318170A (en) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 Multi-mobile terminal-based data security protection method and device
CN105897661A (en) * 2015-01-13 2016-08-24 王运姣 Security and secrecy method based on position information
CN106126265A (en) * 2016-07-04 2016-11-16 南京金佰达电子科技有限公司 A kind of production method of zero-configuration client system graphic interface
CN106534105A (en) * 2016-11-03 2017-03-22 百度在线网络技术(北京)有限公司 Logging-in method and apparatus
CN108255578A (en) * 2017-12-27 2018-07-06 中标易云信息技术有限公司 The method that virtual machine remote booting is realized based on zero terminal
CN108616640A (en) * 2018-03-30 2018-10-02 广东欧珀移动通信有限公司 Terminal unlock method and device, readable storage medium storing program for executing, terminal
CN109074443A (en) * 2017-06-02 2018-12-21 华为技术有限公司 A kind of unlocking method and device
CN111092731A (en) * 2019-11-04 2020-05-01 西安万像电子科技有限公司 Authentication method and server
CN111695104A (en) * 2020-06-05 2020-09-22 北京百瑞互联技术有限公司 System and method for automatically locking and unlocking computer screen

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102868724A (en) * 2012-08-22 2013-01-09 上海金图信息科技有限公司 Control system for managing zero clients and desktop virtual machines
CN102868723A (en) * 2012-08-22 2013-01-09 上海金图信息科技有限公司 Control console and management method of management zero terminal machine and desktop virtual machine
CN104318170A (en) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 Multi-mobile terminal-based data security protection method and device
CN105897661A (en) * 2015-01-13 2016-08-24 王运姣 Security and secrecy method based on position information
CN106126265A (en) * 2016-07-04 2016-11-16 南京金佰达电子科技有限公司 A kind of production method of zero-configuration client system graphic interface
CN106534105A (en) * 2016-11-03 2017-03-22 百度在线网络技术(北京)有限公司 Logging-in method and apparatus
CN109074443A (en) * 2017-06-02 2018-12-21 华为技术有限公司 A kind of unlocking method and device
CN108255578A (en) * 2017-12-27 2018-07-06 中标易云信息技术有限公司 The method that virtual machine remote booting is realized based on zero terminal
CN108616640A (en) * 2018-03-30 2018-10-02 广东欧珀移动通信有限公司 Terminal unlock method and device, readable storage medium storing program for executing, terminal
CN111092731A (en) * 2019-11-04 2020-05-01 西安万像电子科技有限公司 Authentication method and server
CN111695104A (en) * 2020-06-05 2020-09-22 北京百瑞互联技术有限公司 System and method for automatically locking and unlocking computer screen

Similar Documents

Publication Publication Date Title
US8079064B2 (en) Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method
US20180041893A1 (en) Method and system of multi-terminal mapping to a virtual sim card
EP2814276A1 (en) Access authentication method and device for wireless local area network hotspot
US20070066280A1 (en) Connection management system, method and program
JP2016541082A (en) Connection management method, apparatus, electronic equipment, program, and recording medium
CN104767713B (en) Account binding method, server and system
US8931065B2 (en) OTA bootstrap method and system
CN104349423A (en) Method, system and device for automatically connecting with wireless LAN (local area network)
CN108243471B (en) Network environment switching method and device
CN103874065A (en) Method and device for judging user position abnormity
CN111797418B (en) Online service control method and device, service terminal, server and storage medium
CN103427999A (en) User authentication method and system
CN106686754A (en) Data interaction method and data interaction system
CN104580170A (en) Data reading method and device
CN101594615B (en) Method, system and equipment for network management of terminal triple information security
CN112995227B (en) One-stop information service platform based on three-party credit management
CN105025548B (en) A kind of the connection control method and device of SIM card
CN108809937B (en) Management and control system and method
CN110933018B (en) Network authentication method, device and computer storage medium
CN112272372A (en) Zero terminal login method and system
CN108271230B (en) Method and device for acquiring mobile management information and computer readable storage medium
CN114338132B (en) Secret-free login method, client application, operator server and electronic equipment
CN114726664A (en) Household equipment binding method and equipment
CN111050323B (en) Terminal switching method, device and system
CN110337087B (en) Air WiFi access method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination