CN106874734A - A kind of computer security identifying system based on RFID - Google Patents

A kind of computer security identifying system based on RFID Download PDF

Info

Publication number
CN106874734A
CN106874734A CN201710096193.9A CN201710096193A CN106874734A CN 106874734 A CN106874734 A CN 106874734A CN 201710096193 A CN201710096193 A CN 201710096193A CN 106874734 A CN106874734 A CN 106874734A
Authority
CN
China
Prior art keywords
computer
rfid
user
system based
identifying system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710096193.9A
Other languages
Chinese (zh)
Inventor
任春华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhenjiang Kang Heng Mdt Infotech Ltd
Original Assignee
Zhenjiang Kang Heng Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhenjiang Kang Heng Mdt Infotech Ltd filed Critical Zhenjiang Kang Heng Mdt Infotech Ltd
Priority to CN201710096193.9A priority Critical patent/CN106874734A/en
Publication of CN106874734A publication Critical patent/CN106874734A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0003Automatic card files incorporating selecting, conveying and possibly reading and/or writing operations

Abstract

The invention discloses a kind of computer security identifying system based on RFID, including server and some subscriber computers connected with server network, rfid interrogator is installed on computer, typing has the information of different user in rfid interrogator, user possesses RFID label tag, and typing has the respective information of user in RFID label tag;Rfid interrogator, video monitor and alarm lamp are connected with subscriber computer respectively, and simultaneously and server communication, server memory contains the information of all users to subscriber computer;The present invention uses RFID technique, it is the embedded user profile matched with user in public computer, so that the RFID label tag holder for only possessing corresponding information could use corresponding local computer, avoiding other people can arbitrarily use the dangerous phenomenon of this local calculating, video monitor is used for user of the monitor in real time using computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.

Description

A kind of computer security identifying system based on RFID
Technical field
The invention belongs to technical field of network security, more particularly to a kind of computer security identifying system based on RFID.
Background technology
It is essential that computer and network in the information age of high speed development, the life of people, the safety of network is asked Topic is just particularly important.
Radio frequency identification, RFID(Radio Frequency Identification)Technology, also known as radio frequency identification, be A kind of communication technology, can be recognized by radio signals and specific objective and read and write related data, and without identifying system with it is specific Mechanical or optical contact is set up between target.If radio frequency, usually microwave, 1-100GHz, it is adaptable to short distance identification communication.
Rfid interrogator also divides movable type and fixed, and current RFID technique application is very wide, such as:Library, gate inhibition System, food security is traced to the source.
Computer(computer)Computer is commonly called as, is a kind of modern electronic computer device for supercomputing, Ke Yijin Row numerical computations, can carry out logical calculated, also with store-memory function again.It is that can be run according to program, automatic, high speed Process the modernization intelligent electronic device of mass data.It is made up of hardware system and software systems, is fitted without any software Computer be referred to as bare machine.Supercomputer, industrial control computer, network computer, personal computer, embedded can be divided into The class of computer five, more advanced computer has biocomputer, photonic computer, quantum computer etc..
Network is made up of node and line, is represented many objects and its is connected each other.Mathematically, network is a kind of Figure, it is considered that refer exclusively to weighted graph.In addition to mathematical definition, also specific physical meaning, i.e. network are from certain phase to network The model abstracted in the practical problem of same type.In computer realm, network is information transfer, reception, shared void Intend platform, by it each point, face, body informational linkage to together, so as to realize sharing for these resources.Network is the mankind Development history carrys out most important invention, improves the development of science and technology and human society.
Network security refers to that the data in hardware, software and its system of network system are protected, not because accidental or The reason for person's malice and be subjected to destruction, change, leakage, system is continuous reliable normally to be run, and network service is not interrupted.
The content of the invention
The present invention provides a kind of computer security identifying system based on RFID, to solve the problems of the prior art.
To achieve the above object, the technical solution adopted by the present invention is:
A kind of computer security identifying system based on RFID, including server and some user's meters connected with server network Calculation machine, is provided with rfid interrogator on the computer, typing has the information of different user, the use in the rfid interrogator Family possesses RFID label tag, and typing has the respective information of user in the RFID label tag;Rfid interrogator, video monitor and alarm Warning light is connected with subscriber computer respectively, and simultaneously and server communication, server memory contains all users to subscriber computer Information, video monitor and alarm lamp be respectively mounted on subscriber computer, and video monitor is used for monitor in real time The user of computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
Present invention further optimization scheme, the rfid interrogator, video monitor and alarm lamp difference RJ45 Netting twine or wireless communication technology communicate with subscriber computer.
Present invention further optimization scheme, fire prevention is provided between the network equipment and subscriber computer of the server Wall.
Present invention further optimization scheme, the subscriber computer is unit, campus, hospital, community, airport, bank The public computer used for different crowd in restaurant row number area or Internet bar.
Present invention further optimization scheme, network security device is provided with the subscriber computer.
Present invention further optimization scheme, the network security device be fire wall, network cryptographic machine, security gateway, Any one in gateway, intruding detection system, PAA.
Present invention further optimization scheme, the user profile includes name, code, sex and age.
Present invention further optimization scheme, the code is student number, job number or member's card number.
Compared with prior art, the present invention has advantages below:
The present invention uses RFID technique, is embedded and user in campus, unit or public library, community, the computer in Internet bar The user profile for matching so that the RFID label tag holder for only possessing corresponding information could use corresponding local meter Calculation machine, it is to avoid other people can arbitrarily using the dangerous phenomenon of this local calculating, and video monitor makes for monitor in real time With the user of computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
Specific embodiment
The present invention is further described with reference to embodiment.
Embodiment 1
A kind of computer security identifying system based on RFID, including server and some user's meters connected with server network Calculation machine, is provided with rfid interrogator on the computer, typing has the information of different user, the use in the rfid interrogator Family possesses RFID label tag, and typing has the respective information of user in the RFID label tag;Rfid interrogator, video monitor and alarm Warning light is connected with subscriber computer respectively, and simultaneously and server communication, server memory contains all users to subscriber computer Information, video monitor and alarm lamp be respectively mounted on subscriber computer, and video monitor is used for monitor in real time The user of computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
The rfid interrogator, video monitor and alarm lamp difference RJ45 netting twines or wireless communication technology and user Compunication.
Fire wall is provided between the network equipment and subscriber computer of the server.
The subscriber computer is the public computer that campus uses for different students.
Network security device is installed in the subscriber computer.
The network security device is fire wall, network cryptographic machine, security gateway, gateway, intruding detection system, PAA In any one.
The user profile includes name, school, sex and age.
Student only needs the RFID label tag for holding oneself to be swept on rfid interrogator to sweep, and rfid interrogator is that can recognize that Whether the student possesses the usage right of this computer, if the information of the student is matched with the student information in server, counts Calculation machine can be used directly, unusable computer if mismatching.
Embodiment 2
A kind of computer security identifying system based on RFID, including server and some user's meters connected with server network Calculation machine, is provided with rfid interrogator on the computer, typing has the information of different user, the use in the rfid interrogator Family possesses RFID label tag, and typing has the respective information of user in the RFID label tag;Rfid interrogator, video monitor and alarm Warning light is connected with subscriber computer respectively, and simultaneously and server communication, server memory contains all users to subscriber computer Information, video monitor and alarm lamp be respectively mounted on subscriber computer, and video monitor is used for monitor in real time The user of computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
The rfid interrogator, video monitor and alarm lamp difference RJ45 netting twines or wireless communication technology and user Compunication.
Fire wall is provided between the network equipment and subscriber computer of the server.
The subscriber computer is the public computer that airport uses for VIP guests.
Network security device is installed in the subscriber computer.
The network security device is fire wall, network cryptographic machine, security gateway, gateway, intruding detection system, PAA In any one.
The user profile includes name, VIP guests member card number, sex and age.
VIP guests only need the RFID label tag for holding oneself to be swept on rfid interrogator to sweep, rfid interrogator Recognize whether the VIP guests possess the usage right of this computer, if the VIP guests in the information of the VIP guests and server Information matches, then computer can directly use, if mismatch if the unusable computer.
Embodiment 3
A kind of computer security identifying system based on RFID, including server and some user's meters connected with server network Calculation machine, is provided with rfid interrogator on the computer, typing has the information of different user, the use in the rfid interrogator Family possesses RFID label tag, and typing has the respective information of user in the RFID label tag;Rfid interrogator, video monitor and alarm Warning light is connected with subscriber computer respectively, and simultaneously and server communication, server memory contains all users to subscriber computer Information, video monitor and alarm lamp be respectively mounted on subscriber computer, and video monitor is used for monitor in real time The user of computer, when user profile is mismatched, the flicker of alarm lamp points out user to use the computer.
The rfid interrogator, video monitor and alarm lamp difference RJ45 netting twines or wireless communication technology and user Compunication.
Fire wall is provided between the network equipment and subscriber computer of the server.
The subscriber computer is the public computer that community uses for the different common people in the administration.
Network security device is installed in the subscriber computer.
The network security device is fire wall, network cryptographic machine, security gateway, gateway, intruding detection system, PAA In any one.
The user profile includes the interior common people member's card number of name, administration, sex and age.
The difference common people only need the tangible card for holding oneself or electronic card to sweep one in induction type card reader in administration Sweep, induction type card reader is the usage right that whether the different common people possess this computer in the recognizable administration, in the administration not If with the information of common people common people's information matches different from the administration in server, computer can be used directly, if not With then unusable computer.
The above is only the preferred embodiment of the present invention, it should be pointed out that:For the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (8)

1. a kind of computer security identifying system based on RFID, it is characterised in that including server and some with server net The subscriber computer of network connection, is provided with rfid interrogator on the computer, typing has different use in the rfid interrogator The information at family, the user possesses RFID label tag, and typing has the respective information of user in the RFID label tag;Rfid interrogator, Video monitor and alarm lamp are connected with subscriber computer respectively, subscriber computer simultaneously and server communication, server Memory storage has had the information of user, and video monitor and alarm lamp are respectively mounted on subscriber computer.
2. the computer security identifying system based on RFID according to claim 1, it is characterised in that:The RFID read-write Device, video monitor and alarm lamp difference RJ45 netting twines or wireless communication technology communicate with subscriber computer.
3. the computer security identifying system based on RFID according to claim 1, it is characterised in that:The server Fire wall is provided between the network equipment and subscriber computer.
4. the computer security identifying system based on RFID according to claim 1, it is characterised in that:The user calculates Machine is the public calculating used for different crowd in unit, campus, hospital, community, airport, restaurant row number area of bank or Internet bar Machine.
5. the computer security identifying system based on RFID according to claim 1, it is characterised in that:The user calculates Network security device is installed in machine.
6. the computer security identifying system based on RFID according to claim 5, it is characterised in that:The network security Device is any one in fire wall, network cryptographic machine, security gateway, gateway, intruding detection system, PAA.
7. the computer security identifying system based on RFID according to claim 1, it is characterised in that:The user profile Including name, code, sex and age.
8. the computer security identifying system based on RFID according to claim 7, it is characterised in that:The code is Number, job number or member's card number.
CN201710096193.9A 2017-02-22 2017-02-22 A kind of computer security identifying system based on RFID Pending CN106874734A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710096193.9A CN106874734A (en) 2017-02-22 2017-02-22 A kind of computer security identifying system based on RFID

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710096193.9A CN106874734A (en) 2017-02-22 2017-02-22 A kind of computer security identifying system based on RFID

Publications (1)

Publication Number Publication Date
CN106874734A true CN106874734A (en) 2017-06-20

Family

ID=59167597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710096193.9A Pending CN106874734A (en) 2017-02-22 2017-02-22 A kind of computer security identifying system based on RFID

Country Status (1)

Country Link
CN (1) CN106874734A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101267310A (en) * 2008-05-04 2008-09-17 王琰 Computer network access control system and method
CN102136164A (en) * 2011-04-02 2011-07-27 南京邮电大学 Motor vehicle access control management method based on radio frequency identification under Internet of Things
CN102930441A (en) * 2012-09-20 2013-02-13 华东理工大学 Radio frequency identification (RFID)-based wine anti-counterfeiting system, RFID label and RFID reader authenticating method
CN103297236A (en) * 2013-05-10 2013-09-11 季亚琴科·安德烈 User identity verification and authorization system
CN103942478A (en) * 2013-01-22 2014-07-23 浙江安科网络技术有限公司 Method and device for identity verification and authority management
CN104484591A (en) * 2014-12-15 2015-04-01 天津光电聚能专用通信设备有限公司 Safety mouse control system based on RFID (Radio Frequency Identification)
CN205608780U (en) * 2016-04-27 2016-09-28 南京信息工程大学 Asset management system based on RFID and video monitoring

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101267310A (en) * 2008-05-04 2008-09-17 王琰 Computer network access control system and method
CN102136164A (en) * 2011-04-02 2011-07-27 南京邮电大学 Motor vehicle access control management method based on radio frequency identification under Internet of Things
CN102930441A (en) * 2012-09-20 2013-02-13 华东理工大学 Radio frequency identification (RFID)-based wine anti-counterfeiting system, RFID label and RFID reader authenticating method
CN103942478A (en) * 2013-01-22 2014-07-23 浙江安科网络技术有限公司 Method and device for identity verification and authority management
CN103297236A (en) * 2013-05-10 2013-09-11 季亚琴科·安德烈 User identity verification and authorization system
CN104484591A (en) * 2014-12-15 2015-04-01 天津光电聚能专用通信设备有限公司 Safety mouse control system based on RFID (Radio Frequency Identification)
CN205608780U (en) * 2016-04-27 2016-09-28 南京信息工程大学 Asset management system based on RFID and video monitoring

Similar Documents

Publication Publication Date Title
Ibrahim et al. Review and analyzing RFID technology tags and applications
CN103150798A (en) Door control system
CN103810545A (en) Internet of Things intelligent library method and apparatus
CN202854920U (en) Access control system based on active RFID (radio frequency identification device) technology and face recognition technology
CN104122842A (en) Intelligent monitoring method and system based on prison event
CN110070155B (en) Comprehensive behavior recognition method and system for prisoner based on wearable equipment
AU2007305295A1 (en) Electronic article surveillance enabled radio frequency identification system and method
CN105376321A (en) Multifunctional Internet of things information platform
CN106303438A (en) A kind of indoor video monitoring system for Prison staff
CN102693440A (en) Electronized dormitory antitheft system base on RFID
Younis SLMS: a smart library management system based on an RFID technology
CN105046769A (en) Community person management system based on radio frequency identification technology
CN103065167A (en) Monitoring system and monitoring method of equipment positions in cabinet
US20080136635A1 (en) Low power rfid reader that gives visibility to passive tags as active tags using low power 802.11
CN104732177A (en) Tracking a mobile unit in a housing facility for mobile units
RU2707414C2 (en) Equipment and method for fitting rooms
CN207799767U (en) A kind of Yunmen access control system based on android system
CN105389925B (en) Electronic label burglary system
CN106874734A (en) A kind of computer security identifying system based on RFID
Chen et al. The design and implementation of intelligent campus security tracking system based on RFID and ZigBee
Shadangi et al. Medical internet refrigerator
Chen et al. Campus Intelligent Safety Supervision System Based on RFID.
KR20150003549A (en) Unmanned gate system for access management
CN207115592U (en) A kind of cloud intelligent cabinet
CN203812299U (en) Antitheft alarming system for articles in campus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170620

RJ01 Rejection of invention patent application after publication