CN103353953A - Method for carrying out computer information management by using resident identification cards - Google Patents

Method for carrying out computer information management by using resident identification cards Download PDF

Info

Publication number
CN103353953A
CN103353953A CN2013101543710A CN201310154371A CN103353953A CN 103353953 A CN103353953 A CN 103353953A CN 2013101543710 A CN2013101543710 A CN 2013101543710A CN 201310154371 A CN201310154371 A CN 201310154371A CN 103353953 A CN103353953 A CN 103353953A
Authority
CN
China
Prior art keywords
user
identification card
login
china
identity card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101543710A
Other languages
Chinese (zh)
Inventor
辛晖
朱爱东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU PRIDE GAOTONG COMMUNICATION TECHNOLOGY Co Ltd
Original Assignee
JIANGSU PRIDE GAOTONG COMMUNICATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU PRIDE GAOTONG COMMUNICATION TECHNOLOGY Co Ltd filed Critical JIANGSU PRIDE GAOTONG COMMUNICATION TECHNOLOGY Co Ltd
Priority to CN2013101543710A priority Critical patent/CN103353953A/en
Publication of CN103353953A publication Critical patent/CN103353953A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a method for carrying out computer information management by using resident identification cards. Authenticity of an identification card is identified by using a method that information of a 2-nd generation identification card is read by resident 2-nd identification card equipment; if the identification card is authentic and belongs to a user which is registered into a use system by an administrator, the user can log in normally and use the system after the 2-nd identification card reading equipment reads corresponding information, and the whole use process of the user can be recorded by a computer system so as to be used for data retrieving in future; and if the identification card is counterfeited or not registered by the administer, the user can not log in or use the system. The method disclosed by the invention can effectively solve the problem that a current computer system can not carry out real-name management, and can carry out data retrieving, thereby ensuring the safety of the system.

Description

A kind of method of utilizing resident identification card to carry out computer information management
Technical field
The present invention relates to stand-alone System and Network field of system management, particularly a kind of method of utilizing resident identification card to carry out computer information management.
Background technology
At present, enterprises and institutions mainly comprise following several in order to the system that carries out information management: fingerprint, USB KEY or IC-card computer information management system.Its concrete grammar can be referring to " strengthening Windows_NT login safety based on Gina and fingerprint recognition " and " using USB KEY control Windows 2000 NT start login ".But all there is the real name information that can not read in these methods, is not the situations of real-name management simultaneously.
From 2005, China started the work of changing second-generation resident identification card comprehensively.Added intelligent chip in the second-generation resident identification card, the machine sensible information in order to storage can be carried out identification can read relevant information by card reader and carry out the identity verification.The China second-generation identity card fetch equipment that public security department authenticates can be connected to computing machine by USB or serial ports, just at present in order to verify the common equipment of management China second-generation identity card.
Summary of the invention
The object of the present invention is to provide a kind of method of utilizing resident identification card to carry out computer information management.
The technical solution that realizes the object of the invention is: a kind of method of utilizing resident identification card to carry out computer information management, and step is as follows:
(1) the China second-generation identity card fetch equipment is connected on the computing machine that needs management;
(2) whether China second-generation identity card fetch equipment autoscan has China second-generation identity card to be placed on the fetch equipment, if scan China second-generation identity card and this I.D. is effective, then execution in step (3) starts the process of reading identity card, if do not have, then continues scanning;
(3) the China second-generation identity card fetch equipment carries out first the authentication of I.D., and after authentication, the inner personally identifiable information of preserving of reading identity card is saved in the computer background database with these information as log-on message, continues execution in step (4); If by authentication, then this China second-generation identity card is not false evidence or has damaged I.D.;
(4) personally identifiable information that reads out and the user data in the background data base are compared, if this user data was registered, then correctly login system and use of this user, continue execution in step (5), if this user data was not registered, then this user is invalid login user;
(5) after the correct login system of user, background data base is recorded user's login time, and starts a management window, this user's of Real Time Monitoring operation, when the user carried out an operation, background data base recorded corresponding state and time, reviews use as data.
The present invention compared with prior art, its remarkable advantage: the present invention program is for the login of present use system of real name and use computer system and propose, the requirement login user uses the mode login system of real name and also will use in the mode of real name after login, if in using computer procedures, realize if there is not I.D. to exist, will automatic locking system, all operations (comprising start, login, locking, cancellation, shutdown etc.) of user all will be recorded as later reviewing.Therefore in conjunction with the I.D. fetch equipment of one of the present Ministry of Public Security, the user can only use the China second-generation identity card login system of present national standard, effectively solves the problem that computer system instantly can not real-name management, and can carry out data and review.In the computed process of user, the user must not take away I.D., accomplish the people card must, card does not automatically lock in system then, has greatly strengthened the security that system uses.
Description of drawings
Fig. 1 is method flow diagram of the present invention.
Fig. 2 is the inventive method monitoring and reviews process flow diagram.
Embodiment
The present invention utilizes resident identification card to carry out the method for computer information management, the use information management that it relates to computer system and user, the true and false that the method for utilizing resident's China second-generation identity card equipment to read second-generation identification card information removes to discriminate one's identification card.If real I.D. and be that the keeper is to the user who uses system registry to cross, normally login and the use system after can reading corresponding information by the China second-generation identity card fetch equipment, the process of the whole use of user will be recorded as later data by computer system and review.If the I.D. of faking or the I.D. of registering through the keeper then can not login and the use system, thereby guaranteed Security of the system.
The China second-generation identity card fetch equipment that first Ministry of Public Security was authenticated is received the computing machine that needs management by USB mouth or serial ports.After the keeper enters system by password, the login, monitoring software and the corresponding database management language (standalone version originally is installed in this locality, and network version is installed in background server) that match are installed, are carried out relevant setting.More than work finish after, the keeper opens management software the computed user of authority registration.After finishing, log off, restart computing machine, the work that the user who had registered just can use this computing machine to be correlated with.
Below in conjunction with accompanying drawing the present invention is described in further detail.
The China second-generation identity card fetch equipment that this method utilizes public security department to authenticate is connected to computing machine by USB or serial ports, and the external unit that must want as log into thr computer uses.
The computer user is placed on my China second-generation identity card on the I.D. fetch equipment, whether the China second-generation identity card fetch equipment can have China second-generation identity card to be placed on the fetch equipment by autoscan, if scan China second-generation identity card and effective, then start the process of reading identity card, if no, then continue scanning.
When scanning China second-generation identity card and exist, the ID (identity number) card information fetch equipment can carry out first the authentication of I.D., only have by the inner personally identifiable information (comprising name, sex, nationality, date of birth, address, identification card number, issuing authority, valid period and individual head part's photo) of preserving of authentication ability reading identity card, these information will be saved in Computer Database as log-on message, as follow-up data management with review use.If by authentication, then this China second-generation identity card might not be false evidence or damage I.D., please arrive local public security organ's application and change.
After the China second-generation identity card of login also correctly reads out the information of preserving in the identity by authentication, system will compare with the user data in this information and the back-end data, if this user data person of being managed was registered, then correctly login system and use of user, if this user was not registered, then be invalid login user, system prompt please look for the keeper to register.In login process, the user takes I.D. away, system's meeting automatic locking system, and the user need to re-start login process.
After the correct login system of user, background data base can be recorded user's login time, and system can start a management window, Real Time Monitoring user's operation (as locking computing machine, nullify computing machine, shutting down computer), when the user has a wherein operation, background data base can record corresponding state and time, reviews use as data.If system manager's discovery system goes wrong or when information leakage is arranged, then can and check relevant record with the administrator right login system, to determine the responsible person concerned, maintain secrecy and the purpose of reviewing thereby reach.
In using computer procedures, the user takes China second-generation identity card away, and then system can process as nullifying computer mode, and records the corresponding time.
The system that uses the inventive method can with the installing DB that is used for management at local computer, also can be installed in the server of network.Installing DB then can carry out the single computer management in this locality, and installing DB then can manage many computing machines in the network in the webserver.

Claims (7)

1. method of utilizing resident identification card to carry out computer information management is characterized in that step is as follows:
(1) the China second-generation identity card fetch equipment is connected on the computing machine that needs management;
(2) whether China second-generation identity card fetch equipment autoscan has China second-generation identity card to be placed on the fetch equipment, if scan China second-generation identity card and this I.D. is effective, then execution in step (3) starts the process of reading identity card, if do not have, then continues scanning;
(3) the China second-generation identity card fetch equipment carries out first the authentication of I.D., and after authentication, the inner personally identifiable information of preserving of reading identity card is saved in the computer background database with these information as log-on message, continues execution in step (4); If by authentication, then this China second-generation identity card is not false evidence or has damaged I.D.;
(4) personally identifiable information that reads out and the user data in the background data base are compared, if this user data was registered, then correctly login system and use of this user, continue execution in step (5), if this user data was not registered, then this user is invalid login user;
(5) after the correct login system of user, background data base is recorded user's login time, and starts a management window, this user's of Real Time Monitoring operation, when the user carried out an operation, background data base recorded corresponding state and time, reviews use as data.
2. the method for utilizing resident identification card to carry out computer information management according to claim 1, it is characterized in that: the personally identifiable information in the described step (3) comprises name, sex, nationality, date of birth, address, identification card number, issuing authority, valid period and individual head part's photo.
3. the method for utilizing resident identification card to carry out computer information management according to claim 1 is characterized in that: when the user was for invalid login user in the described step (4), system prompt please look for the keeper to register.
4. the method for utilizing resident identification card to carry out computer information management according to claim 1, it is characterized in that: in the login process of described step (4), if the user takes I.D. away, system then automatically locks, and the user need to re-start login.
5. the method for utilizing resident identification card to carry out computer information management according to claim 1 is characterized in that: comprised the locking computing machine, nullify computing machine or shut down computer by the user's of Real Time Monitoring operation in the described step (5).
6. the method for utilizing resident identification card to carry out computer information management according to claim 1 is characterized in that: in the described step (5) state of background data base record and time for start, shutdown, login in user's operating process, nullify, publish, lock and the time of these operations when occuring.
7. the method for utilizing resident identification card to carry out computer information management according to claim 1, it is characterized in that: described step (5) is in using computer procedures, if the user takes China second-generation identity card away, then system can process as nullifying computer mode, and records the corresponding time.
CN2013101543710A 2013-04-27 2013-04-27 Method for carrying out computer information management by using resident identification cards Pending CN103353953A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101543710A CN103353953A (en) 2013-04-27 2013-04-27 Method for carrying out computer information management by using resident identification cards

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013101543710A CN103353953A (en) 2013-04-27 2013-04-27 Method for carrying out computer information management by using resident identification cards

Publications (1)

Publication Number Publication Date
CN103353953A true CN103353953A (en) 2013-10-16

Family

ID=49310319

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101543710A Pending CN103353953A (en) 2013-04-27 2013-04-27 Method for carrying out computer information management by using resident identification cards

Country Status (1)

Country Link
CN (1) CN103353953A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104820814A (en) * 2015-05-07 2015-08-05 熊小军 Second-generation ID card anti-counterfeiting verification system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1707530A (en) * 2004-06-08 2005-12-14 田广 Booking system using IC card identification card combined with internet and booking method thereof
CN101599832A (en) * 2008-06-05 2009-12-09 北京思创银联科技有限公司 A kind of personal identification method and system that realize the network system login
CN202075781U (en) * 2011-05-20 2011-12-14 山东中创软件工程股份有限公司 Citizen card with key
CN102299920A (en) * 2011-08-01 2011-12-28 句容市盛世软件有限公司 Electronic document safety management system
JP2012079209A (en) * 2010-10-05 2012-04-19 Japan Steel Works Ltd:The Log-in method for injection molding machine, and injection molding machine

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1707530A (en) * 2004-06-08 2005-12-14 田广 Booking system using IC card identification card combined with internet and booking method thereof
CN101599832A (en) * 2008-06-05 2009-12-09 北京思创银联科技有限公司 A kind of personal identification method and system that realize the network system login
JP2012079209A (en) * 2010-10-05 2012-04-19 Japan Steel Works Ltd:The Log-in method for injection molding machine, and injection molding machine
CN202075781U (en) * 2011-05-20 2011-12-14 山东中创软件工程股份有限公司 Citizen card with key
CN102299920A (en) * 2011-08-01 2011-12-28 句容市盛世软件有限公司 Electronic document safety management system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104820814A (en) * 2015-05-07 2015-08-05 熊小军 Second-generation ID card anti-counterfeiting verification system

Similar Documents

Publication Publication Date Title
CN101436247B (en) Biological personal identification method and system based on UEFI
EP1571525A1 (en) A method, a hardware token, and a computer program for authentication
CN105243314B (en) A kind of security system and its application method based on USB key
CN1897046B (en) Biological authentication system
CN101887600A (en) Identity authentication method and device
CN103942478A (en) Method and device for identity verification and authority management
KR101944581B1 (en) System, method, and apparatus for authentication
CN201126581Y (en) Biological personal identification apparatus based on UEFI
CN111862424A (en) Attendance management system, method, equipment and storage medium
CN102456102A (en) Method for carrying out identity recertification on particular operation of information system by using Usb key technology
CN103699879A (en) Identity authentication device based on biometric information
US20200334430A1 (en) Self-sovereign identity systems and methods for identification documents
CN103996035A (en) Passenger security check identity certification product
CN105138887B (en) A kind of input method of log-on message, device and terminal device
CN106156590A (en) A kind of computer startup processing method and processing system
CN103353953A (en) Method for carrying out computer information management by using resident identification cards
CN110955877A (en) Fingerprint login implementation method based on Shenwei processor
CN113032755B (en) Nuclear power equipment operator verification method, device, equipment and storage medium
RU2573235C2 (en) System and method for checking authenticity of identity of person accessing data over computer network
CN103049686A (en) Method for verifying information of database and user through universal serial bus (Usb) key
CN102457484A (en) Method for checking user information by combining user name/password authentication and check code
JP2008040944A (en) Authentication system and authenticating method
JPWO2019098205A1 (en) Authentication device, authentication method, and program
KR102601100B1 (en) User authentication apparatus and user authentication method
CN116541814B (en) Unified login authentication method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131016