CN115830734B - Method for preventing card from being punched instead of card and related equipment - Google Patents

Method for preventing card from being punched instead of card and related equipment Download PDF

Info

Publication number
CN115830734B
CN115830734B CN202211736156.7A CN202211736156A CN115830734B CN 115830734 B CN115830734 B CN 115830734B CN 202211736156 A CN202211736156 A CN 202211736156A CN 115830734 B CN115830734 B CN 115830734B
Authority
CN
China
Prior art keywords
identification code
target
employee account
condition
target employee
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211736156.7A
Other languages
Chinese (zh)
Other versions
CN115830734A (en
Inventor
冯雁
叶楚珠
肖兴华
杜辉
王小龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Bjc Technology Co ltd
Original Assignee
Wuhan Bjc Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Bjc Technology Co ltd filed Critical Wuhan Bjc Technology Co ltd
Priority to CN202211736156.7A priority Critical patent/CN115830734B/en
Publication of CN115830734A publication Critical patent/CN115830734A/en
Application granted granted Critical
Publication of CN115830734B publication Critical patent/CN115830734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for preventing card punching and related equipment, relates to the field of card punching, and mainly aims to solve the problem that equipment can be used for replacing card punching among colleagues under the circumstance of enterprise attendance management. The method comprises the following steps: correlating the unique identification code of the local machine with the cloud identification code; under the condition that a target terminal device detects a login request of a target employee account, acquiring a cloud identification code of the target employee account; and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment. The invention is used for preventing the card punching process.

Description

Method for preventing card from being punched instead of card and related equipment
Technical Field
The invention relates to the field of card punching, in particular to a method for preventing card punching instead of card punching and related equipment.
Background
In order to better understand the working condition of staff and the operation state of the enterprise, the enterprise manager needs to timely and effectively master the attendance status of the staff and related attendance data.
However, in the actual application scene, if a certain employee cannot appear at the designated place of attendance checking, the employee logs in the account through the terminal equipment of other colleagues, so that the employee can finish checking the card if the employee is in the loophole of the designated place of attendance checking, and the attendance checking data is tampered.
Disclosure of Invention
In view of the above problems, the present invention provides a method and related device for preventing card punching, and is mainly aimed at solving the problem that, under the circumstance of enterprise attendance management, it is possible to use devices to replace card punching between colleagues.
To solve at least one of the above technical problems, in a first aspect, the present invention provides a method for preventing a card from being punched, which includes:
correlating the unique identification code of the local machine with the cloud identification code;
under the condition that a target terminal device detects a login request of a target employee account, acquiring a cloud identification code of the target employee account;
and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment.
Optionally, the unique local identification code is determined based on the target terminal device, and the cloud identification code is generated based on the employee account.
Optionally, determining the card punching result based on the matching condition of the cloud identifier of the target employee account and the unique identifier of the target terminal device includes:
under the condition that the cloud identification code of the first target employee account is matched with the local unique identification code of the target terminal equipment, determining that the first target employee account can log in the target terminal equipment;
And under the condition that the first target employee account logs in the target terminal equipment and triggers the card punching authority, determining that a card punching result is effective.
Optionally, determining the card punching result based on the matching condition of the cloud identifier of the target employee account and the unique identifier of the target terminal device includes:
And under the condition that the cloud identification code of the second target employee account is not matched with the cloud identification code associated with the unique identification code of the target terminal equipment, recording the second target employee account and the target terminal equipment, and refusing the second target employee account to log in the target terminal equipment.
Optionally, the method further comprises:
under the condition that the second target employee account number is refused to log in the target terminal equipment, monitoring the account number logging-in condition of the target terminal equipment;
Acquiring real-time face information under the condition that the cloud identification code of the target employee account is detected to be matched with the local unique identification code of the target terminal equipment;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
Optionally, the method further comprises:
Recording basic login information of the target employee account, wherein the basic login information comprises local unique identification codes associated with cloud identification codes of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
And determining a card punching result based on the basic login information of the target employee account.
Optionally, determining the card punching result based on the basic login information of the target employee account includes:
Under the condition that the cloud identification code of the target employee account is associated with at least two local unique identification codes, monitoring the switching condition of the at least two local unique identification codes;
Acquiring real-time face information under the condition that the switching frequency of the two local unique identification codes is lower than a preset frequency;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
In a second aspect, an embodiment of the present invention further provides a device for preventing card punching, including:
The association unit is used for associating the unique identification code of the local machine with the cloud identification code;
The acquisition unit is used for acquiring the cloud identification code of the target employee account under the condition that the target terminal equipment detects the login request of the target employee account;
And the determining unit is used for determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the unique identification code of the target terminal equipment.
In order to achieve the above object, according to a third aspect of the present invention, there is provided a computer-readable storage medium including a stored program, wherein the steps of the above-described method of preventing a card pickup by substitution are implemented when the program is executed by a processor.
In order to achieve the above object, according to a fourth aspect of the present invention, there is provided an electronic device including at least one processor, and at least one memory connected to the processor; the processor is used for calling the program instructions in the memory and executing the steps of the method for preventing card punching.
By means of the technical scheme, the method for preventing the card from being punched and the related equipment are used for solving the problem that the card punching is possibly replaced by equipment among colleagues under the condition of enterprise attendance management, and the unique identification code of the device is correlated with the cloud identification code; under the condition that a target terminal device detects a login request of a target employee account, acquiring a cloud identification code of the target employee account; and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment. In the scheme, the card punching equipment (namely the target terminal equipment) is associated with one staff account, so that one equipment can only log in one staff account, whether the associated account logs in the target terminal equipment or not is judged based on the cloud identification code of the logged-in staff account, and the card punching can be carried out only under the condition of matching, thereby ensuring that the condition that one colleague does not use the other terminal equipment of the colleague at the card punching site to replace card punching and tamper the attendance record is prevented.
Accordingly, the device and the computer readable storage medium for preventing the card from being punched in the alternative embodiment of the invention have the technical effects as above.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present invention more readily apparent.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
fig. 1 shows a schematic flow chart of a method for preventing card punching in a substituted manner according to an embodiment of the present invention;
FIG. 2 is a schematic block diagram showing the composition of a device for preventing card punching according to an embodiment of the present invention;
fig. 3 shows a schematic block diagram of a device for preventing card punching.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present invention are shown in the drawings, it should be understood that the present invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
In order to solve the problem that devices may be used to replace card punching among colleagues in the situation of enterprise attendance management, an embodiment of the present invention provides a method for preventing card punching instead, as shown in fig. 1, the method includes:
S101, associating the unique identification code of the local machine with the cloud identification code;
by associating the unique identification code of the mobile phone with the cloud identification code, an account is associated with one mobile phone, so that the subsequent detection is facilitated.
S102, under the condition that a target terminal device detects a login request of a target employee account, acquiring a cloud identification code of the target employee account;
If the target terminal device detects that the account needs to be logged in, the cloud identification code corresponding to the account is obtained, so that whether the account is associated with the target terminal device is verified.
S103, determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment.
By means of the method, whether the unique account associated with the equipment is required to be subjected to login and card punching is determined through the fact that the cloud identification code of the account and the local unique identification code of the terminal equipment are matched, if the unique account associated with the equipment is determined to be subjected to login, card punching can be performed, and therefore the fact that other people are prevented from using equipment of a user at a card punching site to perform card punching instead through login is ensured.
By means of the technical scheme, the method for preventing the card punching by the proxy comprises the steps that under the circumstance of enterprise attendance management, the problem that equipment is likely to be used for replacing card punching among colleagues exists, and the unique identification code of the proxy is related to the cloud identification code; under the condition that a target terminal device detects a login request of a target employee account, acquiring a cloud identification code of the target employee account; and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment. In the scheme, the card punching equipment (namely the target terminal equipment) is associated with one staff account, so that one equipment can only log in one staff account, whether the associated account logs in the target terminal equipment or not is judged based on the cloud identification code of the logged-in staff account, and the card punching can be carried out only under the condition of matching, thereby ensuring that the condition that one colleague does not use the other terminal equipment of the colleague at the card punching site to replace card punching and tamper the attendance record is prevented.
In one embodiment, the local unique identifier is determined based on the target terminal device, and the cloud identifier is generated based on an employee account.
Illustratively, with terminal devices, the common basic attributes are: the mobile phone model, the system version, the manufacturer brand and the equipment name are combined with uuidV algorithm, the 32-bit character string codes are generated after MD5 mixing, the generated corresponding codes are subjected to RSA encryption algorithm, and the codes are stored in a mobile phone system storage space and an application storage space.
Illustratively, the cloud generates a 32-bit identification code according to employee, name, job number information and a uuid algorithm by using an MD5 algorithm.
In an embodiment, determining the card punching result based on the matching condition of the cloud identifier of the target employee account and the unique identifier of the target terminal device includes:
under the condition that the cloud identification code of the first target employee account is matched with the local unique identification code of the target terminal equipment, determining that the first target employee account can log in the target terminal equipment;
And under the condition that the first target employee account logs in the target terminal equipment and triggers the card punching authority, determining that a card punching result is effective.
For example, if the unique account number is determined to be associated, the card can be punched, so that the action of preventing others from using equipment of a user at a card punching site to carry out card punching instead of the login is ensured.
In an embodiment, determining the card punching result based on the matching condition of the cloud identifier of the target employee account and the unique identifier of the target terminal device includes:
And under the condition that the cloud identification code of the second target employee account is not matched with the cloud identification code associated with the unique identification code of the target terminal equipment, recording the second target employee account and the target terminal equipment, and refusing the second target employee account to log in the target terminal equipment.
For example, if the second target employee account logged in the target terminal device is not matched with the first target employee account by verifying the unique local identification code and the cloud identification code, it is proved that other personnel log in the non-local terminal device
The situation of the device associated with the account may possibly show a modern card-punching behavior, so that the second objective 5 is refused to log in the target terminal device by the employee account, thereby ensuring that the situation that the account associated with the non-target terminal device logs in the target terminal device is prevented.
In one embodiment, the method further comprises:
under the condition that the second target employee account is refused to log in the target terminal equipment, monitoring the target terminal equipment
Account login condition of target terminal equipment;
0 Acquiring real-time face information under the condition that the cloud identification code of the target employee account is detected to be matched with the local unique identification code of the target terminal equipment;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
For example, after the account associated with the non-target terminal device logs in the target terminal device, 5 needs to reject the account associated with the non-target terminal device from logging in the target terminal device, at this time, the account associated with the target terminal device is also squeezed out, and needs to log in again, if it is detected that the cloud identification code matches with the local unique identification code of the target terminal device, it proves that the target employee account associated with the cloud identification code is correctly logged in the target terminal device, at this time, even if the cloud identification code matches with the local unique identification code, a face test is required to be performed
The employee account owner who is indeed the target terminal device needs to log in to the target terminal device, thereby ensuring the reliability of the logged-in employee from 0.
In one embodiment, the method further comprises:
Recording basic login information of the target employee account, wherein the basic login information comprises local unique identification codes associated with cloud identification codes of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
5 And determining a card punching result based on the basic login information of the target employee account.
The method is mainly used for logging in and punching cards aiming at the equipment of the user B, if the equipment of the user B is associated with one own account, but if the user A has a plurality of equipment, one employee account can be associated with a plurality of mobile terminals, and one mobile terminal can only be associated with one employee account.
In one embodiment, the determining the card punching result based on the basic login information of the target employee account includes:
Under the condition that the cloud identification code of the target employee account is associated with at least two local unique identification codes, monitoring the switching condition of the at least two local unique identification codes;
Acquiring real-time face information under the condition that the switching frequency of the two local unique identification codes is lower than a preset frequency;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
For example, in order to avoid a user logging in by using multiple terminals, the system may perform comprehensive analysis according to the behavior of the attendance card punching device, for example: the method can be considered to use 3 mobile phone devices as a common mode, and more than 3 devices perform daily card punching operation, and can be recorded as a behavior to be observed, when the card punching mode of the devices is alternate, for example, the device 1 is used in the morning, the device 2 in the afternoon or the device 1 of the today, and the device 2 in the tomorrow; the alternative replacement is performed for more than 3 days, so that the abnormal card punching behavior of the user can be considered, the high risk violation is detected, the early warning is performed, when the user continuously performs card punching for a period of time (for example, more than 7 days), the new terminal is used for card punching, the behavior is considered to be normal, and the user normally replaces the common terminal equipment. Thus preventing the user from leaving a device at the attendance location as much as possible for the act of punching a card when it is not.
Further, as an implementation of the method shown in fig. 1, the embodiment of the invention further provides a device for preventing card punching, which is used for implementing the method shown in fig. 1. The embodiment of the device corresponds to the embodiment of the method, and for convenience of reading, details of the embodiment of the method are not repeated one by one, but it should be clear that the device in the embodiment can correspondingly realize all the details of the embodiment of the method. As shown in fig. 2, the apparatus includes: an association unit 21, an acquisition unit 22, and a determination unit 23, wherein
An associating unit 21, configured to associate the unique local identification code and the cloud identification code with each other;
The obtaining unit 22 is configured to obtain a cloud identifier of a target employee account when the target terminal device detects a login request of the target employee account;
and the determining unit 23 is configured to determine a card punching result based on a matching condition of the cloud identifier of the target employee account and the unique identifier of the target terminal device.
The local unique identification code is determined based on the target terminal device, and the cloud identification code is generated based on the employee account.
The determining the card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal device includes:
under the condition that the cloud identification code of the first target employee account is matched with the local unique identification code of the target terminal equipment, determining that the first target employee account can log in the target terminal equipment;
And under the condition that the first target employee account logs in the target terminal equipment and triggers the card punching authority, determining that a card punching result is effective.
The determining the card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal device includes:
And under the condition that the cloud identification code of the second target employee account is not matched with the cloud identification code associated with the unique identification code of the target terminal equipment, recording the second target employee account and the target terminal equipment, and refusing the second target employee account to log in the target terminal equipment.
Illustratively, the above unit is further configured to:
under the condition that the second target employee account number is refused to log in the target terminal equipment, monitoring the account number logging-in condition of the target terminal equipment;
Acquiring real-time face information under the condition that the cloud identification code of the target employee account is detected to be matched with the local unique identification code of the target terminal equipment;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
Illustratively, the above unit is further configured to:
Recording basic login information of the target employee account, wherein the basic login information comprises local unique identification codes associated with cloud identification codes of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
And determining a card punching result based on the basic login information of the target employee account.
The determining the card punching result based on the basic login information of the target employee account includes:
Under the condition that the cloud identification code of the target employee account is associated with at least two local unique identification codes, monitoring the switching condition of the at least two local unique identification codes;
Acquiring real-time face information under the condition that the switching frequency of the two local unique identification codes is lower than a preset frequency;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
By means of the technical scheme, the device for preventing the card punching is capable of solving the problem that equipment is likely to be used for replacing card punching among colleagues under the circumstance of enterprise attendance management, and the unique identification code of the device is related to the cloud identification code; under the condition that a target terminal device detects a login request of a target employee account, acquiring a cloud identification code of the target employee account; and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment. In the scheme, the card punching equipment (namely the target terminal equipment) is associated with one staff account, so that one equipment can only log in one staff account, whether the associated account logs in the target terminal equipment or not is judged based on the cloud identification code of the logged-in staff account, and the card punching can be carried out only under the condition of matching, thereby ensuring that the condition that one colleague does not use the other terminal equipment of the colleague at the card punching site to replace card punching and tamper the attendance record is prevented.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one, and the method for preventing the card punching by the generation is realized by adjusting kernel parameters, so that the problem that equipment can be used for replacing card punching among colleagues under the circumstance of enterprise attendance management can be solved.
An embodiment of the present invention provides a computer-readable storage medium including a stored program that, when executed by a processor, implements the method of preventing a card punch as described above.
The embodiment of the invention provides a processor, which is used for running a program, wherein the method for preventing card punching is executed when the program runs.
The embodiment of the invention provides electronic equipment, which comprises at least one processor and at least one memory connected with the processor; wherein the processor is configured to call the program instructions in the memory and execute the method for preventing card punching
An embodiment of the present invention provides an electronic device 30, as shown in fig. 3, where the electronic device includes at least one processor 301, and at least one memory 302 and a bus 303 connected to the processor; wherein, the processor 301 and the memory 302 complete communication with each other through the bus 303; the processor 301 is configured to call the program instructions in the memory to perform the method of preventing the card punch.
The intelligent electronic device herein may be a PC, PAD, cell phone, etc.
The application also provides a computer program product adapted to perform, when executed on a flow management electronic device, a program initialized with the method steps of:
correlating the unique identification code of the local machine with the cloud identification code;
under the condition that a target terminal device detects a login request of a target employee account, acquiring a cloud identification code of the target employee account;
and determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment.
Further, the unique local identification code is determined based on the target terminal device, and the cloud identification code is generated based on the employee account.
Further, determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal device includes:
under the condition that the cloud identification code of the first target employee account is matched with the local unique identification code of the target terminal equipment, determining that the first target employee account can log in the target terminal equipment;
And under the condition that the first target employee account logs in the target terminal equipment and triggers the card punching authority, determining that a card punching result is effective.
Further, determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal device includes:
And under the condition that the cloud identification code of the second target employee account is not matched with the cloud identification code associated with the unique identification code of the target terminal equipment, recording the second target employee account and the target terminal equipment, and refusing the second target employee account to log in the target terminal equipment.
Further, the method further comprises the following steps:
under the condition that the second target employee account number is refused to log in the target terminal equipment, monitoring the account number logging-in condition of the target terminal equipment;
Acquiring real-time face information under the condition that the cloud identification code of the target employee account is detected to be matched with the local unique identification code of the target terminal equipment;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
Further, the method further comprises the following steps:
Recording basic login information of the target employee account, wherein the basic login information comprises local unique identification codes associated with cloud identification codes of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
And determining a card punching result based on the basic login information of the target employee account.
Further, the determining the card punching result based on the basic login information of the target employee account includes:
Under the condition that the cloud identification code of the target employee account is associated with at least two local unique identification codes, monitoring the switching condition of the at least two local unique identification codes;
Acquiring real-time face information under the condition that the switching frequency of the two local unique identification codes is lower than a preset frequency;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
In the foregoing embodiments, the descriptions of the embodiments are focused on, and for those portions of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Embodiments of the present application also provide a computer program product comprising computer software instructions which, when run on a processing device, cause the processing device to perform a flow of control of a memory as in the corresponding embodiment of fig. 1.
The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). Computer readable storage media can be any available media that can be stored by a computer or data storage devices such as servers, data centers, etc. that contain an integration of one or more available media. Usable media may be magnetic media (e.g., floppy disks, hard disks, magnetic tape), optical media (e.g., DVD), or semiconductor media (e.g., solid State Disk (SSD)) or the like.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (8)

1. A method for preventing card punching, comprising:
correlating the unique identification code of the local machine with the cloud identification code;
Under the condition that a target terminal device detects a login request of a target employee account, acquiring a cloud identification code of the target employee account;
determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment;
Recording basic login information of the target employee account, wherein the basic login information comprises local unique identification codes associated with cloud identification codes of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
determining a card punching result based on the basic login information of the target employee account;
the determining the card punching result based on the basic login information of the target employee account comprises the following steps:
Under the condition that the cloud identification code of the target employee account is associated with at least two local unique identification codes, monitoring the switching condition of the at least two local unique identification codes;
acquiring real-time face information under the condition that the switching frequency of the two local unique identification codes is lower than a preset frequency;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
2. The method of claim 1, wherein the locally unique identification code is determined based on a target terminal device and the cloud identification code is generated based on an employee account.
3. The method according to claim 1, wherein the determining the card punching result based on the matching condition of the cloud identifier of the target employee account and the local unique identifier of the target terminal device includes:
under the condition that a cloud identification code of a first target employee account is matched with a local unique identification code of the target terminal equipment, determining that the first target employee account can log in the target terminal equipment;
And under the condition that the first target employee account logs in the target terminal equipment and triggers the card punching authority, determining that a card punching result is effective.
4. The method according to claim 1, wherein the determining the card punching result based on the matching condition of the cloud identifier of the target employee account and the local unique identifier of the target terminal device includes:
and under the condition that the cloud identification code of the second target employee account is not matched with the cloud identification code associated with the unique identification code of the target terminal equipment, recording the second target employee account and the target terminal equipment, and refusing the second target employee account to log in the target terminal equipment.
5. The method as recited in claim 4, further comprising:
under the condition that the second target employee account number is refused to log in the target terminal equipment, monitoring the account number logging-in condition of the target terminal equipment;
acquiring real-time face information under the condition that the cloud identification code of the target employee account is detected to be matched with the local unique identification code of the target terminal equipment;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
6. A card-punching prevention device, comprising:
The association unit is used for associating the unique identification code of the local machine with the cloud identification code;
The acquisition unit is used for acquiring the cloud identification code of the target employee account under the condition that the target terminal equipment detects the login request of the target employee account;
The determining unit is used for determining a card punching result based on the matching condition of the cloud identification code of the target employee account and the local unique identification code of the target terminal equipment;
Recording basic login information of the target employee account, wherein the basic login information comprises local unique identification codes associated with cloud identification codes of the target employee account, and one cloud identification code can be associated with at least one local unique identification code;
determining a card punching result based on the basic login information of the target employee account;
the determining the card punching result based on the basic login information of the target employee account comprises the following steps:
Under the condition that the cloud identification code of the target employee account is associated with at least two local unique identification codes, monitoring the switching condition of the at least two local unique identification codes;
acquiring real-time face information under the condition that the switching frequency of the two local unique identification codes is lower than a preset frequency;
And under the condition that the real-time face information is matched with the preset face information associated with the target employee account, determining that the target employee account can log in the target terminal equipment.
7. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a stored program, wherein the method of preventing a card-punching as claimed in any one of claims 1 to 5 is implemented when the program is executed by a processor.
8. An electronic device comprising at least one processor and at least one memory coupled to the processor; wherein the processor is configured to invoke program instructions in the memory to perform the method of preventing a card punch as claimed in any one of claims 1 to 5.
CN202211736156.7A 2022-12-30 2022-12-30 Method for preventing card from being punched instead of card and related equipment Active CN115830734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211736156.7A CN115830734B (en) 2022-12-30 2022-12-30 Method for preventing card from being punched instead of card and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211736156.7A CN115830734B (en) 2022-12-30 2022-12-30 Method for preventing card from being punched instead of card and related equipment

Publications (2)

Publication Number Publication Date
CN115830734A CN115830734A (en) 2023-03-21
CN115830734B true CN115830734B (en) 2024-05-17

Family

ID=85519828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211736156.7A Active CN115830734B (en) 2022-12-30 2022-12-30 Method for preventing card from being punched instead of card and related equipment

Country Status (1)

Country Link
CN (1) CN115830734B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016105261A (en) * 2014-12-01 2016-06-09 株式会社DSi Attendance monitor device, attendance management method, attendance management system and program
CN106600734A (en) * 2016-12-13 2017-04-26 北京恒华伟业科技股份有限公司 Processing method and system for card swiping for attendance, as well as mobile end and server
CN109636937A (en) * 2018-12-18 2019-04-16 深圳市沃特沃德股份有限公司 Voice Work attendance method, device and terminal device
CN112330833A (en) * 2020-10-30 2021-02-05 中国平安人寿保险股份有限公司 Face recognition attendance data verification method and device and computer equipment
JP2021146053A (en) * 2020-03-23 2021-09-27 シャープ株式会社 Biological information management device, biological information management method, biological information management program and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6764013B2 (en) * 2002-04-17 2004-07-20 American Eps, Inc. Multi-purpose terminal, payroll and work management system and related methods
TWM490697U (en) * 2014-08-22 2014-11-21 Mian-Zhi Liu Roll call device
WO2020125773A1 (en) * 2018-12-20 2020-06-25 云丁网络技术(北京)有限公司 Identity confirmation method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016105261A (en) * 2014-12-01 2016-06-09 株式会社DSi Attendance monitor device, attendance management method, attendance management system and program
CN106600734A (en) * 2016-12-13 2017-04-26 北京恒华伟业科技股份有限公司 Processing method and system for card swiping for attendance, as well as mobile end and server
CN109636937A (en) * 2018-12-18 2019-04-16 深圳市沃特沃德股份有限公司 Voice Work attendance method, device and terminal device
JP2021146053A (en) * 2020-03-23 2021-09-27 シャープ株式会社 Biological information management device, biological information management method, biological information management program and storage medium
CN112330833A (en) * 2020-10-30 2021-02-05 中国平安人寿保险股份有限公司 Face recognition attendance data verification method and device and computer equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
AI+生物识别技术对可信身份认证的挑战;高一骄;;《信息安全研究》;20200705(07);645-651 *
JN5139在无线煤矿安全监测系统中的设计;曹卫锋;王俊杰;江泳;谢泽会;;《煤矿安全》;20101010(第10期);76-79 *

Also Published As

Publication number Publication date
CN115830734A (en) 2023-03-21

Similar Documents

Publication Publication Date Title
CN108268354A (en) Data safety monitoring method, background server, terminal and system
CN111490981B (en) Access management method and device, bastion machine and readable storage medium
JP5363305B2 (en) Method for determining the ID of an electronic device
US10652255B2 (en) Forensic analysis
CN110049028B (en) Method and device for monitoring domain control administrator, computer equipment and storage medium
CN110457223B (en) Gray test drainage method, device, proxy server and readable storage medium
CN110688653A (en) Client security protection method and device and terminal equipment
CN112417391A (en) Information data security processing method, device, equipment and storage medium
CN113987508A (en) Vulnerability processing method, device, equipment and medium
CN111897768B (en) Configuration method and device of object access policy
CN111818025B (en) User terminal detection method and device
CN115801305B (en) Network attack detection and identification method and related equipment
CN115830734B (en) Method for preventing card from being punched instead of card and related equipment
CN110958236A (en) Dynamic authorization method of operation and maintenance auditing system based on risk factor insight
CN115714660A (en) Authority configuration method and device
CN106485104B (en) Automatic restoration method, device and system for terminal security policy
CN113794679A (en) Method and system for preventing automatic script number robbing
CN110677483A (en) Information processing system and trusted security management system
CN112090087A (en) Game plug-in detection method and device, storage medium and computer equipment
CN110909352A (en) Malicious process detection method under Linux server
CN112989349B (en) Virus detection method, device, equipment and storage medium
CN115134143B (en) Global Internet of things equipment authentication method, device and storage medium
CN114553563B (en) Verification method and device without back display loopholes, electronic equipment and readable storage medium
US11403395B1 (en) Method of using a dynamic rule engine with an application
CN117371987A (en) Operation and maintenance audit management method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant