CN115830734A - Method for preventing substitute card punching and related equipment - Google Patents

Method for preventing substitute card punching and related equipment Download PDF

Info

Publication number
CN115830734A
CN115830734A CN202211736156.7A CN202211736156A CN115830734A CN 115830734 A CN115830734 A CN 115830734A CN 202211736156 A CN202211736156 A CN 202211736156A CN 115830734 A CN115830734 A CN 115830734A
Authority
CN
China
Prior art keywords
identification code
target
employee account
condition
target terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211736156.7A
Other languages
Chinese (zh)
Other versions
CN115830734B (en
Inventor
冯雁
叶楚珠
肖兴华
杜辉
王小龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Bjc Technology Co ltd
Original Assignee
Wuhan Bjc Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Bjc Technology Co ltd filed Critical Wuhan Bjc Technology Co ltd
Priority to CN202211736156.7A priority Critical patent/CN115830734B/en
Priority claimed from CN202211736156.7A external-priority patent/CN115830734B/en
Publication of CN115830734A publication Critical patent/CN115830734A/en
Application granted granted Critical
Publication of CN115830734B publication Critical patent/CN115830734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for preventing substitute card punching and related equipment, relates to the field of card punching, and mainly aims to solve the problem that equipment can be borrowed among colleagues to replace card punching under the condition of enterprise attendance management. The method comprises the following steps: correlating the unique identification code of the local machine with the cloud identification code; under the condition that target terminal equipment detects a login request of a target employee account, acquiring a cloud identification code of the target employee account; and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment. The invention is used for preventing the substitute card punching process.

Description

Method for preventing substitute card punching and related equipment
Technical Field
The invention relates to the field of card punching, in particular to a method for preventing substitute card punching and related equipment.
Background
In order to better understand the working conditions of the employees and the operation states of the enterprises, the enterprise managers need to timely and effectively master the attendance conditions of the employees and relevant attendance data.
However, in an actual application scenario, if a certain employee cannot appear at an attendance card punching specified place, the employee logs in his own account through terminal equipment of other colleagues, so that the employee can complete the card punching even if the employee is not at the attendance card punching specified place by supposing that a bug is in the attendance card punching specified place, and logs in his own account to complete the card punching, thereby tampering attendance data.
Disclosure of Invention
In view of the above problems, the present invention provides a method and related device for preventing substitute card punching, and mainly aims to solve the problem that in the context of enterprise attendance management, devices may be borrowed between coworkers to replace card punching.
To solve at least one of the above technical problems, in a first aspect, the present invention provides a method for preventing substitute card punching, the method comprising:
correlating the unique identification code of the local machine with the cloud identification code;
under the condition that target terminal equipment detects a login request of a target employee account, acquiring a cloud identification code of the target employee account;
and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the unique identification code of the local machine of the target terminal equipment.
Optionally, the unique identification code of the local computer is determined based on the target terminal device, and the cloud identification code is generated based on the employee account.
Optionally, the determining a card punching result according to the matching condition between the cloud identification code based on the target employee account and the unique local identification code of the target terminal device includes:
under the condition that the cloud identification code of a first target employee account number is matched with the local unique identification code of the target terminal device, determining that the first target employee account number can log in the target terminal device;
and determining that the card punching result is valid under the condition that the first target employee account logs in the target terminal equipment and triggers the card punching authority.
Optionally, the determining a card punching result according to the matching condition between the cloud identification code based on the target employee account and the unique local identification code of the target terminal device includes:
and under the condition that the cloud identification code of the second target employee account is not matched with the cloud identification code associated with the local unique identification code of the target terminal equipment, recording the second target employee account and the target terminal equipment, and refusing the second target employee account to log in the target terminal equipment.
Optionally, the method further includes:
monitoring the account login condition of the target terminal equipment under the condition that the account of the second target employee is refused to login the target terminal equipment;
acquiring real-time face information under the condition that the cloud identification code of the target employee account is matched with the unique identification code of the target terminal device;
and under the condition that the real-time face information is matched with preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
Optionally, the method further includes:
recording basic login information of the target employee account, wherein the basic login information comprises a local unique identification code associated with a cloud identification code of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
and determining a card punching result based on the basic login information of the target employee account.
Optionally, the determining a card punching result based on the basic login information of the target employee account includes:
monitoring the switching condition of the at least two unique local identification codes under the condition that the cloud identification code of the target employee account number is associated with the at least two unique local identification codes;
under the condition that the switching frequency of the two unique identification codes of the two computers is lower than the preset frequency, acquiring real-time face information;
and under the condition that the real-time face information is matched with preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
In a second aspect, an embodiment of the present invention further provides an apparatus for preventing a substitute card punch, including:
the association unit is used for associating the unique identification code of the local computer with the cloud identification code;
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a cloud identification code of a target employee account under the condition that target terminal equipment detects a login request of the target employee account;
and the determining unit is used for determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment.
To achieve the above object, according to a third aspect of the present invention, there is provided a computer-readable storage medium including a stored program, wherein the steps of the above-described agent card punching prevention method are implemented when the program is executed by a processor.
In order to achieve the above object, according to a fourth aspect of the present invention, there is provided an electronic device comprising at least one processor, and at least one memory connected to the processor; the processor is used for calling the program instructions in the memory and executing the steps of the substitute card punching prevention method.
By means of the technical scheme, the method for preventing substitute card punching and the related equipment provided by the invention have the advantages that in the situation of enterprise attendance management, the problem that equipment is possibly borrowed among colleagues to replace the card punching is solved, and the unique identification code and the cloud identification code of the local machine are mutually associated; under the condition that target terminal equipment detects a login request of a target employee account, acquiring a cloud identification code of the target employee account; and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the unique identification code of the local machine of the target terminal equipment. In the above scheme, since the card punching device (i.e., the target terminal device) is associated with one employee account, one device can only log in one employee account, so that whether the associated account logs in the target terminal device is judged based on the cloud identification code of the logged-in employee account, and the device can log in and punch the card only under the matching condition, thereby ensuring that the situation that one colleague is not in the card punching field, another terminal device of the colleague in the card punching field is used for replacing the card punching, and the attendance record is tampered.
Accordingly, the device, the equipment and the computer readable storage medium for preventing generation card punching provided by the embodiment of the invention also have the technical effects.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various additional advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart illustrating a method for preventing substitute card punching according to an embodiment of the present invention;
FIG. 2 is a block diagram illustrating a schematic configuration of an apparatus for preventing substitute card punching according to an embodiment of the present invention;
fig. 3 is a block diagram illustrating a schematic composition of an electronic device for preventing card punching according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
In order to solve the problem that equipment may be borrowed between colleagues to replace punching cards in the situation of enterprise attendance management, an embodiment of the present invention provides a method for preventing punching cards instead, as shown in fig. 1, the method includes:
s101, correlating the unique identification code of the computer with the cloud identification code;
illustratively, the unique identification code of the mobile phone and the cloud identification code are correlated, so that one mobile phone is correlated with one account, and subsequent detection is facilitated.
S102, under the condition that target terminal equipment detects a login request of a target employee account, acquiring a cloud identification code of the target employee account;
illustratively, if the target terminal device detects that an account needs to be logged in, the cloud identification code corresponding to the account is acquired, so that whether the account is logged in related to the target terminal device is verified.
S103, determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal device.
In an exemplary embodiment, whether the unique account associated with the device needs to be logged in and punched if the matching condition between the cloud identification code of the account and the unique identification code of the local terminal device is verified, and the unique account associated with the device can be logged in and punched if the matching condition is determined, so that the behavior that others use the device of the user at the punching site to log in for punching the card instead is ensured.
By means of the technical scheme, the method for preventing substitute card punching has the advantages that in the situation of enterprise attendance management, the problem that equipment is possibly borrowed among colleagues to replace card punching exists, and the unique identification code and the cloud identification code of the self-machine are correlated; under the condition that target terminal equipment detects a login request of a target employee account, acquiring a cloud identification code of the target employee account; and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the unique identification code of the local machine of the target terminal equipment. In the above scheme, since the card punching device (i.e., the target terminal device) is associated with one employee account, one device can only log in one employee account, so that whether the associated account logs in the target terminal device is judged based on the cloud identification code of the logged-in employee account, and the device can log in and punch the card only under the matching condition, thereby ensuring that the situation that one colleague is not in the card punching field, another terminal device of the colleague in the card punching field is used for replacing the card punching, and the attendance record is tampered.
In one embodiment, the unique identification code of the local computer is determined based on a target terminal device, and the cloud identification code is generated based on an employee account.
Illustratively, with terminal devices, the common basic attributes are: the method comprises the steps of combining a mobile phone model, a system version, a manufacturer brand and a device name with a uuidV4 algorithm, generating 32-bit string codes after MD5 mixing, generating corresponding codes, carrying out an RSA encryption algorithm, and storing the corresponding codes in a mobile phone system storage space and an application storage space.
Illustratively, the cloud generates 32-digit identification codes according to the information of the staff, the name and the work number, and an MD5 algorithm is used in combination with the uuid algorithm.
In an embodiment, the determining a card punching result based on a matching condition between the cloud identification code of the target employee account and the local unique identification code of the target terminal device includes:
under the condition that the cloud identification code of a first target employee account number is matched with the local unique identification code of the target terminal device, determining that the first target employee account number can log in the target terminal device;
and determining that the card punching result is valid under the condition that the first target employee account logs in the target terminal equipment and triggers the card punching authority.
For example, the card punching can be performed only if the associated unique account is determined to be logged in, so that the behavior of preventing others from performing substitute card punching through logging in by using equipment of a user at the card punching site is ensured.
In an embodiment, the determining a card punching result based on a matching condition between the cloud identification code of the target employee account and the local unique identification code of the target terminal device includes:
and under the condition that the cloud identification code of the second target employee account is not matched with the cloud identification code associated with the local unique identification code of the target terminal equipment, recording the second target employee account and the target terminal equipment, and refusing the second target employee account to log in the target terminal equipment.
Illustratively, if a second target employee account of the target terminal device is logged in and the unique identification code of the local computer and the cloud identification code are verified to determine that the two are not matched, it is proved that other people log in the non-local computer
The condition of the device associated with the account number may cause modern card punching, so that the second purpose is rejected 5 And the account of the target terminal equipment is logged in by the staff member, so that the condition that the account related to the non-target terminal equipment is prevented from logging in the target terminal equipment is ensured.
In one embodiment, the method further comprises:
monitoring the second target employee account number under the condition of refusing to log in the target terminal equipment
The account number login condition of the target terminal equipment;
0 acquiring real-time face information under the condition that the cloud identification code of the target employee account is matched with the local unique identification code of the target terminal equipment;
and under the condition that the real-time face information is matched with preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
For example, after the account number associated with the non-target terminal device logs in the target terminal device, the account number is not only associated with the target terminal device 5 The account number associated with the non-target terminal equipment is required to be refused to log in the target terminal equipment, the account number associated with the target terminal equipment is squeezed at the moment, the target terminal equipment is required to log in again, if the cloud identification code is detected to be matched with the unique identification code of the local machine of the target terminal equipment, the fact that the account number of the target employee correctly associated is proved to log in the target terminal equipment is proved, and at the moment, even if the cloud identification code is matched with the unique identification code of the local machine, face verification is required to be carried out
To ensure that the employee account owner, who is indeed the target terminal device, needs to log in to the target terminal device, from there 0 Thereby ensuring the reliability of the login personnel.
In one embodiment, the method further comprises:
recording basic login information of the target employee account, wherein the basic login information comprises a local unique identification code associated with a cloud identification code of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
5 and determining a card punching result based on the basic login information of the target employee account.
For example, the method is mainly used for logging in and punching a card by using equipment of a user B aiming at a user A by monitoring the switching habit of the login equipment of the user, and the premise is that the equipment of the user B is associated with one account, but if the user A has a plurality of pieces of equipment, one employee account can be associated with a plurality of mobile terminals, and one mobile terminal can only be associated with one employee account.
In an embodiment, the determining a card-punching result based on the basic login information of the target employee account includes:
monitoring the switching condition of the at least two unique local identification codes under the condition that the cloud identification code of the target employee account number is associated with the at least two unique local identification codes;
under the condition that the switching frequency of the two unique identification codes of the two computers is lower than the preset frequency, acquiring real-time face information;
and under the condition that the real-time face information is matched with preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
For example, in order to avoid the user from logging in with multiple terminals and manually using the terminals to punch cards instead of violating the regulations, the system may perform comprehensive analysis according to the behavior of the attendance card punching device, for example: it can be considered that 3 mobile phone devices are used as a common mode, more than 3 devices are used for daily card punching operation, the operation can be recorded as the behavior to be observed, and when the card punching mode of the devices is replaced by turns, for example, the device 1 is used in the morning, the device 2 in the afternoon or the device 1 today and the device 2 tomorrow; and (3) alternately replacing for more than 3 days, considering that the card punching behavior of the user is abnormal, giving an early warning for high-risk violation, and when the user continuously punches the card for a period of time (for example, more than 7 days), considering that the behavior is normal, and normally replacing the common terminal equipment by the user. Therefore, the user is prevented from leaving a device at the attendance checking place as far as possible, and the device is used for the action of punching the card when the user is not at the attendance checking place.
Further, as an implementation of the method shown in fig. 1, an embodiment of the present invention further provides an anti-substitute-card-punching device, which is used for implementing the method shown in fig. 1. The embodiment of the apparatus corresponds to the embodiment of the method, and for convenience of reading, details in the embodiment of the apparatus are not repeated one by one, but it should be clear that the apparatus in the embodiment can correspondingly implement all the contents in the embodiment of the method. As shown in fig. 2, the apparatus includes: an association unit 21, an acquisition unit 22 and a determination unit 23, wherein
The association unit 21 is configured to associate the local unique identification code with the cloud identification code;
the acquiring unit 22 is configured to acquire a cloud identification code of a target employee account when the target terminal device detects a login request of the target employee account;
the determining unit 23 is configured to determine a card punching result based on a matching condition between the cloud identification code of the target employee account and the local unique identification code of the target terminal device.
For example, the local unique identification code is determined based on a target terminal device, and the cloud identification code is generated based on an employee account.
For example, the determining a card punching result based on a matching condition between the cloud identification code of the target employee account and the local unique identification code of the target terminal device includes:
under the condition that the cloud identification code of a first target employee account number is matched with the local unique identification code of the target terminal device, determining that the first target employee account number can log in the target terminal device;
and determining that the card punching result is valid under the condition that the first target employee account logs in the target terminal equipment and triggers the card punching authority.
For example, the determining a card punching result based on a matching condition between the cloud identification code of the target employee account and the local unique identification code of the target terminal device includes:
and under the condition that the cloud identification code of the second target employee account is not matched with the cloud identification code associated with the local unique identification code of the target terminal equipment, recording the second target employee account and the target terminal equipment, and refusing the second target employee account to log in the target terminal equipment.
Exemplarily, the above unit is further configured to:
monitoring the account login condition of the target terminal equipment under the condition that the account of the second target employee is refused to log in the target terminal equipment;
acquiring real-time face information under the condition that the cloud identification code of the target employee account is matched with the unique identification code of the target terminal device;
and under the condition that the real-time face information is matched with preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
Exemplarily, the above unit is further configured to:
recording basic login information of the target employee account, wherein the basic login information comprises a local unique identification code associated with a cloud identification code of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
and determining a card punching result based on the basic login information of the target employee account.
For example, the determining the card punching result based on the basic login information of the target employee account includes:
monitoring the switching condition of the at least two unique local identification codes under the condition that the cloud identification code of the target employee account number is associated with the at least two unique local identification codes;
under the condition that the switching frequency of the unique identification codes of the two local computers is lower than a preset frequency, acquiring real-time face information;
and under the condition that the real-time face information is matched with preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
By means of the technical scheme, the device for preventing substitute card punching has the advantages that in the situation of enterprise attendance management, the problem that equipment is possibly borrowed among colleagues to replace card punching exists, and the unique identification code and the cloud identification code of the device are correlated; under the condition that target terminal equipment detects a login request of a target employee account, acquiring a cloud identification code of the target employee account; and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the unique identification code of the local machine of the target terminal equipment. In the above scheme, since the card punching device (i.e., the target terminal device) is associated with one employee account, one device can only log in one employee account, so that whether the associated account logs in the target terminal device is judged based on the cloud identification code of the logged-in employee account, and the device can log in and punch the card only under the matching condition, thereby ensuring that the situation that one colleague is not in the card punching field, another terminal device of the colleague in the card punching field is used for replacing the card punching, and the attendance record is tampered.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. One or more kernels can be set, the method for preventing substitute card punching is realized by adjusting kernel parameters, and the problem that equipment can be borrowed to replace card punching between colleagues in the situation of enterprise attendance management can be solved.
An embodiment of the present invention provides a computer-readable storage medium, which includes a stored program, and when the program is executed by a processor, the computer-readable storage medium implements the above-mentioned method for preventing substitute card punching.
The embodiment of the invention provides a processor, which is used for running a program, wherein the program executes the substitute card punching prevention method during running.
The embodiment of the invention provides electronic equipment, which comprises at least one processor and at least one memory connected with the processor; the processor is used for calling the program instruction in the memory and executing the method for preventing the substitute card punching
An embodiment of the present invention provides an electronic device 30, as shown in fig. 3, the electronic device includes at least one processor 301, at least one memory 302 connected to the processor, and a bus 303; wherein, the processor 301 and the memory 302 complete the communication with each other through the bus 303; the processor 301 is configured to call program instructions in the memory to perform the above-described anti-punch method.
The intelligent electronic device herein may be a PC, PAD, mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a flow management electronic device:
correlating the unique identification code of the local machine with the cloud identification code;
under the condition that target terminal equipment detects a login request of a target employee account, acquiring a cloud identification code of the target employee account;
and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the unique identification code of the local machine of the target terminal equipment.
Furthermore, the unique identification code of the computer is determined based on the target terminal device, and the cloud identification code is generated based on the employee account.
Further, the determining of the card punching result based on the matching condition of the cloud identification code of the target employee account and the unique identification code of the local computer of the target terminal device includes:
under the condition that the cloud identification code of a first target employee account number is matched with the local unique identification code of the target terminal device, determining that the first target employee account number can log in the target terminal device;
and determining that the card punching result is valid under the condition that the first target employee account logs in the target terminal equipment and triggers the card punching authority.
Further, the determining of the card punching result based on the matching condition of the cloud identification code of the target employee account and the unique identification code of the local computer of the target terminal device includes:
and under the condition that the cloud identification code of the second target employee account is not matched with the cloud identification code associated with the local unique identification code of the target terminal equipment, recording the second target employee account and the target terminal equipment, and refusing the second target employee account to log in the target terminal equipment.
Further, the method further comprises:
monitoring the account login condition of the target terminal equipment under the condition that the account of the second target employee is refused to login the target terminal equipment;
acquiring real-time face information under the condition that the cloud identification code of the target employee account is matched with the unique identification code of the target terminal device;
and under the condition that the real-time face information is matched with preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
Further, the method further comprises:
recording basic login information of the target employee account, wherein the basic login information comprises a local unique identification code associated with a cloud identification code of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
and determining a card punching result based on the basic login information of the target employee account.
Further, the determining a card punching result based on the basic login information of the target employee account includes:
monitoring the switching condition of the at least two unique local identification codes under the condition that the cloud identification code of the target employee account number is associated with the at least two unique local identification codes;
under the condition that the switching frequency of the two unique identification codes of the two computers is lower than the preset frequency, acquiring real-time face information;
and under the condition that the real-time face information is matched with preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Embodiments of the present application further provide a computer program product, which includes computer software instructions, when the computer software instructions are executed on a processing device, cause the processing device to execute the flow of control of a memory as in the corresponding embodiment of fig. 1.
The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). A computer-readable storage medium may be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
It can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit is only a logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A method for preventing substitute card punching, comprising:
correlating the unique identification code of the local machine with the cloud identification code;
under the condition that target terminal equipment detects a login request of a target employee account, acquiring a cloud identification code of the target employee account;
and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment.
2. The method of claim 1, wherein the local unique identification code is determined based on a target terminal device, and wherein the cloud identification code is generated based on an employee account.
3. The method of claim 1, wherein determining a card punching result based on a matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal device comprises:
under the condition that the cloud identification code of a first target employee account number is matched with the unique identification code of the target terminal device, determining that the first target employee account number can log in the target terminal device;
and determining that the card punching result is valid under the condition that the first target employee account logs in the target terminal equipment and triggers the card punching authority.
4. The method of claim 1, wherein determining a card punching result based on a matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal device comprises:
and under the condition that the cloud identification code of the second target employee account is not matched with the cloud identification code associated with the local unique identification code of the target terminal equipment, recording the second target employee account and the target terminal equipment, and refusing the second target employee account to log in the target terminal equipment.
5. The method of claim 4, further comprising:
monitoring the account login condition of the target terminal equipment under the condition that the account of the second target employee is refused to login the target terminal equipment;
acquiring real-time face information under the condition that the cloud identification code of the target employee account is matched with the unique identification code of the target terminal device;
and under the condition that the real-time face information is matched with preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
6. The method of claim 1, further comprising:
recording basic login information of the target employee account, wherein the basic login information comprises local unique identification codes associated with cloud identification codes of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
and determining a card punching result based on the basic login information of the target employee account.
7. The method of claim 6, wherein determining the card punching result based on the basic login information of the target employee account comprises:
monitoring the switching condition of at least two unique identification codes of a local machine under the condition that the cloud identification code of the target employee account number is associated with the at least two unique identification codes of the local machine;
under the condition that the switching frequency of the two unique identification codes of the two computers is lower than a preset frequency, acquiring real-time face information;
and under the condition that the real-time face information is matched with preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
8. An anti-substitute-punch device, comprising:
the association unit is used for associating the unique identification code of the local computer with the cloud identification code;
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a cloud identification code of a target employee account under the condition that target terminal equipment detects a login request of the target employee account;
and the determining unit is used for determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium includes a stored program, wherein the program, when executed by a processor, implements the method for preventing substitute printing according to any one of claims 1 to 7.
10. An electronic device, comprising at least one processor, and at least one memory coupled to the processor; wherein the processor is configured to call program instructions in the memory to perform the anti-generation-card-punching method according to any one of claims 1 to 7.
CN202211736156.7A 2022-12-30 Method for preventing card from being punched instead of card and related equipment Active CN115830734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211736156.7A CN115830734B (en) 2022-12-30 Method for preventing card from being punched instead of card and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211736156.7A CN115830734B (en) 2022-12-30 Method for preventing card from being punched instead of card and related equipment

Publications (2)

Publication Number Publication Date
CN115830734A true CN115830734A (en) 2023-03-21
CN115830734B CN115830734B (en) 2024-05-17

Family

ID=

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030197055A1 (en) * 2002-04-17 2003-10-23 Nebil Ben-Aissa Multi-purpose terminal, payroll and work management system and related methods
US20160055683A1 (en) * 2014-08-22 2016-02-25 Man-Chee LIU Attendance checking device
JP2016105261A (en) * 2014-12-01 2016-06-09 株式会社DSi Attendance monitor device, attendance management method, attendance management system and program
CN106600734A (en) * 2016-12-13 2017-04-26 北京恒华伟业科技股份有限公司 Processing method and system for card swiping for attendance, as well as mobile end and server
CN109636937A (en) * 2018-12-18 2019-04-16 深圳市沃特沃德股份有限公司 Voice Work attendance method, device and terminal device
CN112330833A (en) * 2020-10-30 2021-02-05 中国平安人寿保险股份有限公司 Face recognition attendance data verification method and device and computer equipment
JP2021146053A (en) * 2020-03-23 2021-09-27 シャープ株式会社 Biological information management device, biological information management method, biological information management program and storage medium
US20210312027A1 (en) * 2018-12-20 2021-10-07 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for identity confirmation

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030197055A1 (en) * 2002-04-17 2003-10-23 Nebil Ben-Aissa Multi-purpose terminal, payroll and work management system and related methods
US20160055683A1 (en) * 2014-08-22 2016-02-25 Man-Chee LIU Attendance checking device
JP2016105261A (en) * 2014-12-01 2016-06-09 株式会社DSi Attendance monitor device, attendance management method, attendance management system and program
CN106600734A (en) * 2016-12-13 2017-04-26 北京恒华伟业科技股份有限公司 Processing method and system for card swiping for attendance, as well as mobile end and server
CN109636937A (en) * 2018-12-18 2019-04-16 深圳市沃特沃德股份有限公司 Voice Work attendance method, device and terminal device
US20210312027A1 (en) * 2018-12-20 2021-10-07 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for identity confirmation
JP2021146053A (en) * 2020-03-23 2021-09-27 シャープ株式会社 Biological information management device, biological information management method, biological information management program and storage medium
CN112330833A (en) * 2020-10-30 2021-02-05 中国平安人寿保险股份有限公司 Face recognition attendance data verification method and device and computer equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
曹卫锋;王俊杰;江泳;谢泽会;: "JN5139在无线煤矿安全监测系统中的设计", 《煤矿安全》, no. 10, 10 October 2010 (2010-10-10), pages 76 - 79 *
高一骄;: "AI+生物识别技术对可信身份认证的挑战", 《信息安全研究》, no. 07, 5 July 2020 (2020-07-05), pages 645 - 651 *

Similar Documents

Publication Publication Date Title
CN108268354A (en) Data safety monitoring method, background server, terminal and system
WO2007005437A2 (en) Out-of-band change detection
CN111400714B (en) Virus detection method, device, equipment and storage medium
CN112417391B (en) Information data security processing method, device, equipment and storage medium
CN110381166A (en) A kind of message informing management method, device and computer readable storage medium
CN110049028A (en) Monitor method, apparatus, computer equipment and the storage medium of domain control administrator
CN111259382A (en) Malicious behavior identification method, device and system and storage medium
CN111984601A (en) Log file deleting method and device, electronic equipment and storage medium
CN107231245B (en) Method and device for reporting monitoring log, and method and device for processing monitoring log
CN113626882A (en) Method, device and medium for generating equipment identifier
CN101330383A (en) Credible system for monitoring network resource based on user identification and action
CN112650180A (en) Safety warning method, device, terminal equipment and storage medium
CN116723212A (en) Data processing method, device, electronic equipment and computer readable storage medium
CN115830734A (en) Method for preventing substitute card punching and related equipment
CN115830734B (en) Method for preventing card from being punched instead of card and related equipment
CN115567218A (en) Data processing method and device of security certificate based on block chain and server
CN114925033A (en) Information uplink method, device, system and storage medium
CN113190200B (en) Exhibition data security protection method and device
CN108270735A (en) A kind of data leakage prevention method and equipment
CN111901299A (en) Application authentication method and device, electronic equipment and storage medium
CN112989349B (en) Virus detection method, device, equipment and storage medium
CN116308394B (en) Label association method, apparatus, electronic device and computer readable storage medium
CN114553563B (en) Verification method and device without back display loopholes, electronic equipment and readable storage medium
CN115292272B (en) Enterprise-level authority management method, system, electronic equipment and storage medium
CN113709140B (en) Cloud big data intelligent safety management and control system based on comprehensive audit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant