CN106874734A - A kind of computer security identifying system based on RFID - Google Patents
A kind of computer security identifying system based on RFID Download PDFInfo
- Publication number
- CN106874734A CN106874734A CN201710096193.9A CN201710096193A CN106874734A CN 106874734 A CN106874734 A CN 106874734A CN 201710096193 A CN201710096193 A CN 201710096193A CN 106874734 A CN106874734 A CN 106874734A
- Authority
- CN
- China
- Prior art keywords
- computer
- rfid
- user
- system based
- identifying system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0003—Automatic card files incorporating selecting, conveying and possibly reading and/or writing operations
Abstract
The invention discloses a kind of computer security identifying system based on RFID, including server and some subscriber computers connected with server network, rfid interrogator is installed on computer, typing has the information of different user in rfid interrogator, user possesses RFID label tag, and typing has the respective information of user in RFID label tag;Rfid interrogator, video monitor and alarm lamp are connected with subscriber computer respectively, and simultaneously and server communication, server memory contains the information of all users to subscriber computer;The present invention uses RFID technique, it is the embedded user profile matched with user in public computer, so that the RFID label tag holder for only possessing corresponding information could use corresponding local computer, avoiding other people can arbitrarily use the dangerous phenomenon of this local calculating, video monitor is used for user of the monitor in real time using computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
Description
Technical field
The invention belongs to technical field of network security, more particularly to a kind of computer security identifying system based on RFID.
Background technology
It is essential that computer and network in the information age of high speed development, the life of people, the safety of network is asked
Topic is just particularly important.
Radio frequency identification, RFID(Radio Frequency Identification)Technology, also known as radio frequency identification, be
A kind of communication technology, can be recognized by radio signals and specific objective and read and write related data, and without identifying system with it is specific
Mechanical or optical contact is set up between target.If radio frequency, usually microwave, 1-100GHz, it is adaptable to short distance identification communication.
Rfid interrogator also divides movable type and fixed, and current RFID technique application is very wide, such as:Library, gate inhibition
System, food security is traced to the source.
Computer(computer)Computer is commonly called as, is a kind of modern electronic computer device for supercomputing, Ke Yijin
Row numerical computations, can carry out logical calculated, also with store-memory function again.It is that can be run according to program, automatic, high speed
Process the modernization intelligent electronic device of mass data.It is made up of hardware system and software systems, is fitted without any software
Computer be referred to as bare machine.Supercomputer, industrial control computer, network computer, personal computer, embedded can be divided into
The class of computer five, more advanced computer has biocomputer, photonic computer, quantum computer etc..
Network is made up of node and line, is represented many objects and its is connected each other.Mathematically, network is a kind of
Figure, it is considered that refer exclusively to weighted graph.In addition to mathematical definition, also specific physical meaning, i.e. network are from certain phase to network
The model abstracted in the practical problem of same type.In computer realm, network is information transfer, reception, shared void
Intend platform, by it each point, face, body informational linkage to together, so as to realize sharing for these resources.Network is the mankind
Development history carrys out most important invention, improves the development of science and technology and human society.
Network security refers to that the data in hardware, software and its system of network system are protected, not because accidental or
The reason for person's malice and be subjected to destruction, change, leakage, system is continuous reliable normally to be run, and network service is not interrupted.
The content of the invention
The present invention provides a kind of computer security identifying system based on RFID, to solve the problems of the prior art.
To achieve the above object, the technical solution adopted by the present invention is:
A kind of computer security identifying system based on RFID, including server and some user's meters connected with server network
Calculation machine, is provided with rfid interrogator on the computer, typing has the information of different user, the use in the rfid interrogator
Family possesses RFID label tag, and typing has the respective information of user in the RFID label tag;Rfid interrogator, video monitor and alarm
Warning light is connected with subscriber computer respectively, and simultaneously and server communication, server memory contains all users to subscriber computer
Information, video monitor and alarm lamp be respectively mounted on subscriber computer, and video monitor is used for monitor in real time
The user of computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
Present invention further optimization scheme, the rfid interrogator, video monitor and alarm lamp difference RJ45
Netting twine or wireless communication technology communicate with subscriber computer.
Present invention further optimization scheme, fire prevention is provided between the network equipment and subscriber computer of the server
Wall.
Present invention further optimization scheme, the subscriber computer is unit, campus, hospital, community, airport, bank
The public computer used for different crowd in restaurant row number area or Internet bar.
Present invention further optimization scheme, network security device is provided with the subscriber computer.
Present invention further optimization scheme, the network security device be fire wall, network cryptographic machine, security gateway,
Any one in gateway, intruding detection system, PAA.
Present invention further optimization scheme, the user profile includes name, code, sex and age.
Present invention further optimization scheme, the code is student number, job number or member's card number.
Compared with prior art, the present invention has advantages below:
The present invention uses RFID technique, is embedded and user in campus, unit or public library, community, the computer in Internet bar
The user profile for matching so that the RFID label tag holder for only possessing corresponding information could use corresponding local meter
Calculation machine, it is to avoid other people can arbitrarily using the dangerous phenomenon of this local calculating, and video monitor makes for monitor in real time
With the user of computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
Specific embodiment
The present invention is further described with reference to embodiment.
Embodiment 1
A kind of computer security identifying system based on RFID, including server and some user's meters connected with server network
Calculation machine, is provided with rfid interrogator on the computer, typing has the information of different user, the use in the rfid interrogator
Family possesses RFID label tag, and typing has the respective information of user in the RFID label tag;Rfid interrogator, video monitor and alarm
Warning light is connected with subscriber computer respectively, and simultaneously and server communication, server memory contains all users to subscriber computer
Information, video monitor and alarm lamp be respectively mounted on subscriber computer, and video monitor is used for monitor in real time
The user of computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
The rfid interrogator, video monitor and alarm lamp difference RJ45 netting twines or wireless communication technology and user
Compunication.
Fire wall is provided between the network equipment and subscriber computer of the server.
The subscriber computer is the public computer that campus uses for different students.
Network security device is installed in the subscriber computer.
The network security device is fire wall, network cryptographic machine, security gateway, gateway, intruding detection system, PAA
In any one.
The user profile includes name, school, sex and age.
Student only needs the RFID label tag for holding oneself to be swept on rfid interrogator to sweep, and rfid interrogator is that can recognize that
Whether the student possesses the usage right of this computer, if the information of the student is matched with the student information in server, counts
Calculation machine can be used directly, unusable computer if mismatching.
Embodiment 2
A kind of computer security identifying system based on RFID, including server and some user's meters connected with server network
Calculation machine, is provided with rfid interrogator on the computer, typing has the information of different user, the use in the rfid interrogator
Family possesses RFID label tag, and typing has the respective information of user in the RFID label tag;Rfid interrogator, video monitor and alarm
Warning light is connected with subscriber computer respectively, and simultaneously and server communication, server memory contains all users to subscriber computer
Information, video monitor and alarm lamp be respectively mounted on subscriber computer, and video monitor is used for monitor in real time
The user of computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
The rfid interrogator, video monitor and alarm lamp difference RJ45 netting twines or wireless communication technology and user
Compunication.
Fire wall is provided between the network equipment and subscriber computer of the server.
The subscriber computer is the public computer that airport uses for VIP guests.
Network security device is installed in the subscriber computer.
The network security device is fire wall, network cryptographic machine, security gateway, gateway, intruding detection system, PAA
In any one.
The user profile includes name, VIP guests member card number, sex and age.
VIP guests only need the RFID label tag for holding oneself to be swept on rfid interrogator to sweep, rfid interrogator
Recognize whether the VIP guests possess the usage right of this computer, if the VIP guests in the information of the VIP guests and server
Information matches, then computer can directly use, if mismatch if the unusable computer.
Embodiment 3
A kind of computer security identifying system based on RFID, including server and some user's meters connected with server network
Calculation machine, is provided with rfid interrogator on the computer, typing has the information of different user, the use in the rfid interrogator
Family possesses RFID label tag, and typing has the respective information of user in the RFID label tag;Rfid interrogator, video monitor and alarm
Warning light is connected with subscriber computer respectively, and simultaneously and server communication, server memory contains all users to subscriber computer
Information, video monitor and alarm lamp be respectively mounted on subscriber computer, and video monitor is used for monitor in real time
The user of computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
The rfid interrogator, video monitor and alarm lamp difference RJ45 netting twines or wireless communication technology and user
Compunication.
Fire wall is provided between the network equipment and subscriber computer of the server.
The subscriber computer is the public computer that community uses for the different common people in the administration.
Network security device is installed in the subscriber computer.
The network security device is fire wall, network cryptographic machine, security gateway, gateway, intruding detection system, PAA
In any one.
The user profile includes the interior common people member's card number of name, administration, sex and age.
The difference common people only need the tangible card for holding oneself or electronic card to sweep one in induction type card reader in administration
Sweep, induction type card reader is the usage right that whether the different common people possess this computer in the recognizable administration, in the administration not
If with the information of common people common people's information matches different from the administration in server, computer can be used directly, if not
With then unusable computer.
The above is only the preferred embodiment of the present invention, it should be pointed out that:For the ordinary skill people of the art
For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (8)
1. a kind of computer security identifying system based on RFID, it is characterised in that including server and some with server net
The subscriber computer of network connection, is provided with rfid interrogator on the computer, typing has different use in the rfid interrogator
The information at family, the user possesses RFID label tag, and typing has the respective information of user in the RFID label tag;Rfid interrogator,
Video monitor and alarm lamp are connected with subscriber computer respectively, subscriber computer simultaneously and server communication, server
Memory storage has had the information of user, and video monitor and alarm lamp are respectively mounted on subscriber computer.
2. the computer security identifying system based on RFID according to claim 1, it is characterised in that:The RFID read-write
Device, video monitor and alarm lamp difference RJ45 netting twines or wireless communication technology communicate with subscriber computer.
3. the computer security identifying system based on RFID according to claim 1, it is characterised in that:The server
Fire wall is provided between the network equipment and subscriber computer.
4. the computer security identifying system based on RFID according to claim 1, it is characterised in that:The user calculates
Machine is the public calculating used for different crowd in unit, campus, hospital, community, airport, restaurant row number area of bank or Internet bar
Machine.
5. the computer security identifying system based on RFID according to claim 1, it is characterised in that:The user calculates
Network security device is installed in machine.
6. the computer security identifying system based on RFID according to claim 5, it is characterised in that:The network security
Device is any one in fire wall, network cryptographic machine, security gateway, gateway, intruding detection system, PAA.
7. the computer security identifying system based on RFID according to claim 1, it is characterised in that:The user profile
Including name, code, sex and age.
8. the computer security identifying system based on RFID according to claim 7, it is characterised in that:The code is
Number, job number or member's card number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710096193.9A CN106874734A (en) | 2017-02-22 | 2017-02-22 | A kind of computer security identifying system based on RFID |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710096193.9A CN106874734A (en) | 2017-02-22 | 2017-02-22 | A kind of computer security identifying system based on RFID |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106874734A true CN106874734A (en) | 2017-06-20 |
Family
ID=59167597
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710096193.9A Pending CN106874734A (en) | 2017-02-22 | 2017-02-22 | A kind of computer security identifying system based on RFID |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106874734A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101267310A (en) * | 2008-05-04 | 2008-09-17 | 王琰 | Computer network access control system and method |
CN102136164A (en) * | 2011-04-02 | 2011-07-27 | 南京邮电大学 | Motor vehicle access control management method based on radio frequency identification under Internet of Things |
CN102930441A (en) * | 2012-09-20 | 2013-02-13 | 华东理工大学 | Radio frequency identification (RFID)-based wine anti-counterfeiting system, RFID label and RFID reader authenticating method |
CN103297236A (en) * | 2013-05-10 | 2013-09-11 | 季亚琴科·安德烈 | User identity verification and authorization system |
CN103942478A (en) * | 2013-01-22 | 2014-07-23 | 浙江安科网络技术有限公司 | Method and device for identity verification and authority management |
CN104484591A (en) * | 2014-12-15 | 2015-04-01 | 天津光电聚能专用通信设备有限公司 | Safety mouse control system based on RFID (Radio Frequency Identification) |
CN205608780U (en) * | 2016-04-27 | 2016-09-28 | 南京信息工程大学 | Asset management system based on RFID and video monitoring |
-
2017
- 2017-02-22 CN CN201710096193.9A patent/CN106874734A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101267310A (en) * | 2008-05-04 | 2008-09-17 | 王琰 | Computer network access control system and method |
CN102136164A (en) * | 2011-04-02 | 2011-07-27 | 南京邮电大学 | Motor vehicle access control management method based on radio frequency identification under Internet of Things |
CN102930441A (en) * | 2012-09-20 | 2013-02-13 | 华东理工大学 | Radio frequency identification (RFID)-based wine anti-counterfeiting system, RFID label and RFID reader authenticating method |
CN103942478A (en) * | 2013-01-22 | 2014-07-23 | 浙江安科网络技术有限公司 | Method and device for identity verification and authority management |
CN103297236A (en) * | 2013-05-10 | 2013-09-11 | 季亚琴科·安德烈 | User identity verification and authorization system |
CN104484591A (en) * | 2014-12-15 | 2015-04-01 | 天津光电聚能专用通信设备有限公司 | Safety mouse control system based on RFID (Radio Frequency Identification) |
CN205608780U (en) * | 2016-04-27 | 2016-09-28 | 南京信息工程大学 | Asset management system based on RFID and video monitoring |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ibrahim et al. | Review and analyzing RFID technology tags and applications | |
CN103150798A (en) | Door control system | |
CN103810545A (en) | Internet of Things intelligent library method and apparatus | |
CN202854920U (en) | Access control system based on active RFID (radio frequency identification device) technology and face recognition technology | |
CN104122842A (en) | Intelligent monitoring method and system based on prison event | |
CN110070155B (en) | Comprehensive behavior recognition method and system for prisoner based on wearable equipment | |
AU2007305295A1 (en) | Electronic article surveillance enabled radio frequency identification system and method | |
CN105376321A (en) | Multifunctional Internet of things information platform | |
CN106303438A (en) | A kind of indoor video monitoring system for Prison staff | |
CN102693440A (en) | Electronized dormitory antitheft system base on RFID | |
Younis | SLMS: a smart library management system based on an RFID technology | |
CN105046769A (en) | Community person management system based on radio frequency identification technology | |
CN103065167A (en) | Monitoring system and monitoring method of equipment positions in cabinet | |
US20080136635A1 (en) | Low power rfid reader that gives visibility to passive tags as active tags using low power 802.11 | |
CN104732177A (en) | Tracking a mobile unit in a housing facility for mobile units | |
RU2707414C2 (en) | Equipment and method for fitting rooms | |
CN207799767U (en) | A kind of Yunmen access control system based on android system | |
CN105389925B (en) | Electronic label burglary system | |
CN106874734A (en) | A kind of computer security identifying system based on RFID | |
Chen et al. | The design and implementation of intelligent campus security tracking system based on RFID and ZigBee | |
Shadangi et al. | Medical internet refrigerator | |
Chen et al. | Campus Intelligent Safety Supervision System Based on RFID. | |
KR20150003549A (en) | Unmanned gate system for access management | |
CN207115592U (en) | A kind of cloud intelligent cabinet | |
CN203812299U (en) | Antitheft alarming system for articles in campus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170620 |
|
RJ01 | Rejection of invention patent application after publication |