CN103353953A - Method for carrying out computer information management by using resident identification cards - Google Patents
Method for carrying out computer information management by using resident identification cards Download PDFInfo
- Publication number
- CN103353953A CN103353953A CN2013101543710A CN201310154371A CN103353953A CN 103353953 A CN103353953 A CN 103353953A CN 2013101543710 A CN2013101543710 A CN 2013101543710A CN 201310154371 A CN201310154371 A CN 201310154371A CN 103353953 A CN103353953 A CN 103353953A
- Authority
- CN
- China
- Prior art keywords
- user
- identification card
- login
- china
- identity card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a method for carrying out computer information management by using resident identification cards. Authenticity of an identification card is identified by using a method that information of a 2-nd generation identification card is read by resident 2-nd identification card equipment; if the identification card is authentic and belongs to a user which is registered into a use system by an administrator, the user can log in normally and use the system after the 2-nd identification card reading equipment reads corresponding information, and the whole use process of the user can be recorded by a computer system so as to be used for data retrieving in future; and if the identification card is counterfeited or not registered by the administer, the user can not log in or use the system. The method disclosed by the invention can effectively solve the problem that a current computer system can not carry out real-name management, and can carry out data retrieving, thereby ensuring the safety of the system.
Description
Technical field
The present invention relates to stand-alone System and Network field of system management, particularly a kind of method of utilizing resident identification card to carry out computer information management.
Background technology
At present, enterprises and institutions mainly comprise following several in order to the system that carries out information management: fingerprint, USB KEY or IC-card computer information management system.Its concrete grammar can be referring to " strengthening Windows_NT login safety based on Gina and fingerprint recognition " and " using USB KEY control Windows 2000 NT start login ".But all there is the real name information that can not read in these methods, is not the situations of real-name management simultaneously.
From 2005, China started the work of changing second-generation resident identification card comprehensively.Added intelligent chip in the second-generation resident identification card, the machine sensible information in order to storage can be carried out identification can read relevant information by card reader and carry out the identity verification.The China second-generation identity card fetch equipment that public security department authenticates can be connected to computing machine by USB or serial ports, just at present in order to verify the common equipment of management China second-generation identity card.
Summary of the invention
The object of the present invention is to provide a kind of method of utilizing resident identification card to carry out computer information management.
The technical solution that realizes the object of the invention is: a kind of method of utilizing resident identification card to carry out computer information management, and step is as follows:
(1) the China second-generation identity card fetch equipment is connected on the computing machine that needs management;
(2) whether China second-generation identity card fetch equipment autoscan has China second-generation identity card to be placed on the fetch equipment, if scan China second-generation identity card and this I.D. is effective, then execution in step (3) starts the process of reading identity card, if do not have, then continues scanning;
(3) the China second-generation identity card fetch equipment carries out first the authentication of I.D., and after authentication, the inner personally identifiable information of preserving of reading identity card is saved in the computer background database with these information as log-on message, continues execution in step (4); If by authentication, then this China second-generation identity card is not false evidence or has damaged I.D.;
(4) personally identifiable information that reads out and the user data in the background data base are compared, if this user data was registered, then correctly login system and use of this user, continue execution in step (5), if this user data was not registered, then this user is invalid login user;
(5) after the correct login system of user, background data base is recorded user's login time, and starts a management window, this user's of Real Time Monitoring operation, when the user carried out an operation, background data base recorded corresponding state and time, reviews use as data.
The present invention compared with prior art, its remarkable advantage: the present invention program is for the login of present use system of real name and use computer system and propose, the requirement login user uses the mode login system of real name and also will use in the mode of real name after login, if in using computer procedures, realize if there is not I.D. to exist, will automatic locking system, all operations (comprising start, login, locking, cancellation, shutdown etc.) of user all will be recorded as later reviewing.Therefore in conjunction with the I.D. fetch equipment of one of the present Ministry of Public Security, the user can only use the China second-generation identity card login system of present national standard, effectively solves the problem that computer system instantly can not real-name management, and can carry out data and review.In the computed process of user, the user must not take away I.D., accomplish the people card must, card does not automatically lock in system then, has greatly strengthened the security that system uses.
Description of drawings
Fig. 1 is method flow diagram of the present invention.
Fig. 2 is the inventive method monitoring and reviews process flow diagram.
Embodiment
The present invention utilizes resident identification card to carry out the method for computer information management, the use information management that it relates to computer system and user, the true and false that the method for utilizing resident's China second-generation identity card equipment to read second-generation identification card information removes to discriminate one's identification card.If real I.D. and be that the keeper is to the user who uses system registry to cross, normally login and the use system after can reading corresponding information by the China second-generation identity card fetch equipment, the process of the whole use of user will be recorded as later data by computer system and review.If the I.D. of faking or the I.D. of registering through the keeper then can not login and the use system, thereby guaranteed Security of the system.
The China second-generation identity card fetch equipment that first Ministry of Public Security was authenticated is received the computing machine that needs management by USB mouth or serial ports.After the keeper enters system by password, the login, monitoring software and the corresponding database management language (standalone version originally is installed in this locality, and network version is installed in background server) that match are installed, are carried out relevant setting.More than work finish after, the keeper opens management software the computed user of authority registration.After finishing, log off, restart computing machine, the work that the user who had registered just can use this computing machine to be correlated with.
Below in conjunction with accompanying drawing the present invention is described in further detail.
The China second-generation identity card fetch equipment that this method utilizes public security department to authenticate is connected to computing machine by USB or serial ports, and the external unit that must want as log into thr computer uses.
The computer user is placed on my China second-generation identity card on the I.D. fetch equipment, whether the China second-generation identity card fetch equipment can have China second-generation identity card to be placed on the fetch equipment by autoscan, if scan China second-generation identity card and effective, then start the process of reading identity card, if no, then continue scanning.
When scanning China second-generation identity card and exist, the ID (identity number) card information fetch equipment can carry out first the authentication of I.D., only have by the inner personally identifiable information (comprising name, sex, nationality, date of birth, address, identification card number, issuing authority, valid period and individual head part's photo) of preserving of authentication ability reading identity card, these information will be saved in Computer Database as log-on message, as follow-up data management with review use.If by authentication, then this China second-generation identity card might not be false evidence or damage I.D., please arrive local public security organ's application and change.
After the China second-generation identity card of login also correctly reads out the information of preserving in the identity by authentication, system will compare with the user data in this information and the back-end data, if this user data person of being managed was registered, then correctly login system and use of user, if this user was not registered, then be invalid login user, system prompt please look for the keeper to register.In login process, the user takes I.D. away, system's meeting automatic locking system, and the user need to re-start login process.
After the correct login system of user, background data base can be recorded user's login time, and system can start a management window, Real Time Monitoring user's operation (as locking computing machine, nullify computing machine, shutting down computer), when the user has a wherein operation, background data base can record corresponding state and time, reviews use as data.If system manager's discovery system goes wrong or when information leakage is arranged, then can and check relevant record with the administrator right login system, to determine the responsible person concerned, maintain secrecy and the purpose of reviewing thereby reach.
In using computer procedures, the user takes China second-generation identity card away, and then system can process as nullifying computer mode, and records the corresponding time.
The system that uses the inventive method can with the installing DB that is used for management at local computer, also can be installed in the server of network.Installing DB then can carry out the single computer management in this locality, and installing DB then can manage many computing machines in the network in the webserver.
Claims (7)
1. method of utilizing resident identification card to carry out computer information management is characterized in that step is as follows:
(1) the China second-generation identity card fetch equipment is connected on the computing machine that needs management;
(2) whether China second-generation identity card fetch equipment autoscan has China second-generation identity card to be placed on the fetch equipment, if scan China second-generation identity card and this I.D. is effective, then execution in step (3) starts the process of reading identity card, if do not have, then continues scanning;
(3) the China second-generation identity card fetch equipment carries out first the authentication of I.D., and after authentication, the inner personally identifiable information of preserving of reading identity card is saved in the computer background database with these information as log-on message, continues execution in step (4); If by authentication, then this China second-generation identity card is not false evidence or has damaged I.D.;
(4) personally identifiable information that reads out and the user data in the background data base are compared, if this user data was registered, then correctly login system and use of this user, continue execution in step (5), if this user data was not registered, then this user is invalid login user;
(5) after the correct login system of user, background data base is recorded user's login time, and starts a management window, this user's of Real Time Monitoring operation, when the user carried out an operation, background data base recorded corresponding state and time, reviews use as data.
2. the method for utilizing resident identification card to carry out computer information management according to claim 1, it is characterized in that: the personally identifiable information in the described step (3) comprises name, sex, nationality, date of birth, address, identification card number, issuing authority, valid period and individual head part's photo.
3. the method for utilizing resident identification card to carry out computer information management according to claim 1 is characterized in that: when the user was for invalid login user in the described step (4), system prompt please look for the keeper to register.
4. the method for utilizing resident identification card to carry out computer information management according to claim 1, it is characterized in that: in the login process of described step (4), if the user takes I.D. away, system then automatically locks, and the user need to re-start login.
5. the method for utilizing resident identification card to carry out computer information management according to claim 1 is characterized in that: comprised the locking computing machine, nullify computing machine or shut down computer by the user's of Real Time Monitoring operation in the described step (5).
6. the method for utilizing resident identification card to carry out computer information management according to claim 1 is characterized in that: in the described step (5) state of background data base record and time for start, shutdown, login in user's operating process, nullify, publish, lock and the time of these operations when occuring.
7. the method for utilizing resident identification card to carry out computer information management according to claim 1, it is characterized in that: described step (5) is in using computer procedures, if the user takes China second-generation identity card away, then system can process as nullifying computer mode, and records the corresponding time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013101543710A CN103353953A (en) | 2013-04-27 | 2013-04-27 | Method for carrying out computer information management by using resident identification cards |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013101543710A CN103353953A (en) | 2013-04-27 | 2013-04-27 | Method for carrying out computer information management by using resident identification cards |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103353953A true CN103353953A (en) | 2013-10-16 |
Family
ID=49310319
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013101543710A Pending CN103353953A (en) | 2013-04-27 | 2013-04-27 | Method for carrying out computer information management by using resident identification cards |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103353953A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104820814A (en) * | 2015-05-07 | 2015-08-05 | 熊小军 | Second-generation ID card anti-counterfeiting verification system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1707530A (en) * | 2004-06-08 | 2005-12-14 | 田广 | Booking system using IC card identification card combined with internet and booking method thereof |
CN101599832A (en) * | 2008-06-05 | 2009-12-09 | 北京思创银联科技有限公司 | A kind of personal identification method and system that realize the network system login |
CN202075781U (en) * | 2011-05-20 | 2011-12-14 | 山东中创软件工程股份有限公司 | Citizen card with key |
CN102299920A (en) * | 2011-08-01 | 2011-12-28 | 句容市盛世软件有限公司 | Electronic document safety management system |
JP2012079209A (en) * | 2010-10-05 | 2012-04-19 | Japan Steel Works Ltd:The | Log-in method for injection molding machine, and injection molding machine |
-
2013
- 2013-04-27 CN CN2013101543710A patent/CN103353953A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1707530A (en) * | 2004-06-08 | 2005-12-14 | 田广 | Booking system using IC card identification card combined with internet and booking method thereof |
CN101599832A (en) * | 2008-06-05 | 2009-12-09 | 北京思创银联科技有限公司 | A kind of personal identification method and system that realize the network system login |
JP2012079209A (en) * | 2010-10-05 | 2012-04-19 | Japan Steel Works Ltd:The | Log-in method for injection molding machine, and injection molding machine |
CN202075781U (en) * | 2011-05-20 | 2011-12-14 | 山东中创软件工程股份有限公司 | Citizen card with key |
CN102299920A (en) * | 2011-08-01 | 2011-12-28 | 句容市盛世软件有限公司 | Electronic document safety management system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104820814A (en) * | 2015-05-07 | 2015-08-05 | 熊小军 | Second-generation ID card anti-counterfeiting verification system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101436247B (en) | Biological personal identification method and system based on UEFI | |
EP1571525A1 (en) | A method, a hardware token, and a computer program for authentication | |
CN105243314B (en) | A kind of security system and its application method based on USB key | |
CN1897046B (en) | Biological authentication system | |
CN101887600A (en) | Identity authentication method and device | |
CN103942478A (en) | Method and device for identity verification and authority management | |
KR101944581B1 (en) | System, method, and apparatus for authentication | |
CN201126581Y (en) | Biological personal identification apparatus based on UEFI | |
CN111862424A (en) | Attendance management system, method, equipment and storage medium | |
CN102456102A (en) | Method for carrying out identity recertification on particular operation of information system by using Usb key technology | |
CN103699879A (en) | Identity authentication device based on biometric information | |
US20200334430A1 (en) | Self-sovereign identity systems and methods for identification documents | |
CN103996035A (en) | Passenger security check identity certification product | |
CN105138887B (en) | A kind of input method of log-on message, device and terminal device | |
CN106156590A (en) | A kind of computer startup processing method and processing system | |
CN103353953A (en) | Method for carrying out computer information management by using resident identification cards | |
CN110955877A (en) | Fingerprint login implementation method based on Shenwei processor | |
CN113032755B (en) | Nuclear power equipment operator verification method, device, equipment and storage medium | |
RU2573235C2 (en) | System and method for checking authenticity of identity of person accessing data over computer network | |
CN103049686A (en) | Method for verifying information of database and user through universal serial bus (Usb) key | |
CN102457484A (en) | Method for checking user information by combining user name/password authentication and check code | |
JP2008040944A (en) | Authentication system and authenticating method | |
JPWO2019098205A1 (en) | Authentication device, authentication method, and program | |
KR102601100B1 (en) | User authentication apparatus and user authentication method | |
CN116541814B (en) | Unified login authentication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20131016 |