KR20100123350A - Control system utilized rfid system for use of computer, method therewith and recording medium thereof - Google Patents

Control system utilized rfid system for use of computer, method therewith and recording medium thereof Download PDF

Info

Publication number
KR20100123350A
KR20100123350A KR1020090042523A KR20090042523A KR20100123350A KR 20100123350 A KR20100123350 A KR 20100123350A KR 1020090042523 A KR1020090042523 A KR 1020090042523A KR 20090042523 A KR20090042523 A KR 20090042523A KR 20100123350 A KR20100123350 A KR 20100123350A
Authority
KR
South Korea
Prior art keywords
computer
tag
user
rfid
stored
Prior art date
Application number
KR1020090042523A
Other languages
Korean (ko)
Inventor
오정훈
Original Assignee
대덕대학산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 대덕대학산학협력단 filed Critical 대덕대학산학협력단
Priority to KR1020090042523A priority Critical patent/KR20100123350A/en
Publication of KR20100123350A publication Critical patent/KR20100123350A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a computer use control system using an RFID system, a method using the same and a recording medium thereof. The configuration of the present invention includes a plurality of tags possessed by a user and a computer usage control system including a computer for determining whether the tag is accessible and usable, wherein the computer communicates with the tag approaching the recognition range and is stored in the tag. An RFID reading means for reading a unique ID of the device, a storage means having stored therein a unique ID of a user authorized to use a computer, an RFID reading means and an ID stored in the storing means Connected to the comparison means, the RFID reading means, the storage means, and the comparison means to determine the availability of the computer according to the comparison result of the comparison means, and when the tag deviates from the recognition range of the RFID system, the user's computer usage information is stored in the storage means. And controlling means for storing and converting the computer into a secure mode to limit its use. According to the present invention, a tag user authorized to use a computer can easily maintain the security of the computer even if there is no input such as an ID and password on the computer, facilitate the user's convenience, and do not cause exposure of the ID and password. It has the effect of enhancing computer security.

Description

Control System Utilized RFID System for Use of Computer, Method Therewith and Recording Medium

The present invention relates to a computer usage control system using an RFID system, a control method thereof, and a recording medium thereof, and more particularly, a tag user authorized to use a computer by using an RFID system to maintain computer security. The present invention relates to a computer usage control system using an RFID system in which a security mode for limiting computer use is automatically set after using the computer.

RFID (Radio Frequency Identification) is a next-generation recognition technology that can manage unique information of various objects such as food, animals, and objects through IC chip wireless communication. RFID system consists of RFID tag, reader and middleware. The RFID tag receives radio signals from the reader and sends the stored data to the reader, and the reader reads the data and transmits the data back to the middleware. The middleware collects and manages the data transmitted from the reader and forms a separate network to connect with existing computer systems. Such RFID technology is widely used in logistics, access control system or electronic bill payment system, and active research is in progress.

On the other hand, the conventional computer security method was made by a method of authorizing or restricting the use of a computer by simply entering a login ID and password set by a user through an input means such as a keyboard or a mouse. In this method, there is a risk that the login ID and password may be exposed, and thus there is a problem in the reliability of security. In addition, the user has a problem in using the user himself or herself to enter the login ID and password through the input means in order to use the computer or limit the use of the computer.

Therefore, the present invention was created to solve the above problems, by approaching the tag within the recognition range of the RFID system provided in the computer to release the security mode of the computer in a non-contact manner, the tag user after using the computer RFID It is an object of the present invention to provide a computer usage control system using an RFID system that can secure the computer and the user's convenience by limiting the use of the computer by automatically setting the security mode of the computer when the system is out of the recognition range.

Other objects, specific advantages and novel features of the invention will become apparent from the following detailed description and the preferred embodiments described in conjunction with the accompanying drawings.

Means for achieving the object of the present invention is a computer usage control system comprising a plurality of tags (10) possessed by a plurality of users and a computer (1) for determining the access and availability of the tags (10) The computer 1 includes: RFID reading means 20 for communicating with a tag 10 approaching a recognition range and reading a unique ID of a user stored in the tag 10; Storage means 30 storing a unique ID of a user authorized to use the computer 1; A comparison means (40) connected to the RFID reading means (20) and the storage means (30), for comparing the ID read by the RFID reading means (20) with the ID stored in the storage means (30); It is connected to the RFID reading means 20, the storage means 30 and the comparison means 40 determines the availability of the computer 1 according to the comparison result of the comparison means 40, the tag 10 is the RFID system Departing from the recognition range of the control unit 50 for storing the user's computer (1) use information in the storage means 30 and converting the computer (1) to a secure mode to limit the use; characterized in that it comprises a .

In addition, the RFID reading means 20 is characterized in that for reading the tag 10 at a predetermined time interval.

In addition, in a computer usage control system including a plurality of tags (10) possessed by a plurality of users, a computer (1) and a server (60) for determining whether to access and use the tags (10), the computer (1) Server (60) having a storage means (30) storing a unique ID of a user authorized to use; RFID reading means 20 and RFID reading means (20) connected to the server (60) and the network (62), respectively, to communicate with the tag 10 approaching the recognition range and to read the unique ID of the user stored in the tag 10. According to the comparison result of the comparison means 40 and the comparison means 40 for comparing the ID read by 20 and the ID stored in the storage means 30, it is determined whether the computer 1 can be used and the tag 10 A plurality of control means (50) having control means (50) for storing the user's computer (1) use information in the storage means 30 and converting the computer (1) to a secure mode when the deviation from the recognition range of the RFID system to limit the use Computer (1).

In addition, the RFID reading means (20) is a computer usage control system using an RFID system, characterized in that for reading the tag (10) at a predetermined time interval.

In addition, as another category for achieving the object of the present invention, in the control method for controlling the availability of the computer (1) performing a security mode that restricts the use of the computer (1), the computer (1) or server A first step (S10) of storing the unique ID of the user of the tag 10 authorized to use the computer 1 in the storage means 30 provided in at least one of the 60; A second step (S20) of reading the unique ID of the user stored in the tag (10) approaching the recognition range in the RFID reading means (20) provided in the computer (1); A third step (S30) of comparing the ID read by the RFID reading means 20 with the ID stored in the storing means 30 in the comparing means 40 provided in the computer 1; Step 4-1 (S42) of applying the use of the computer 1 when the control means 50 included in the computer 1 matches the IDs compared in the comparing means 40; When the tag 10 possessed by the user in the control means 50 deviates from the recognition range of the RFID system, the user's computer 1 usage information is stored in the storage means 30, and the computer 1 is converted into the security mode. Step 4-2 of limiting use (S44); And a fifth step (S50) in which the control means 50 maintains a security mode limiting the use of the computer 1 when the IDs compared in the comparing means 40 are inconsistent. It is characterized by that.

In addition, as another category for achieving the object of the present invention, a control method for controlling the availability of the computer (1) that can be read and executed in the computer, and performing a security mode that restricts the use of the computer (1). A function of storing a unique ID of a user of a tag 10 authorized to use the computer 1 in a storage means 30 provided in at least one of the computer 1 and the server 60; A function of reading the unique ID of the user stored in the tag 10 approaching the recognition range in the RFID reading means 20 included in the computer 1; A function of comparing the ID read by the RFID reading means 20 with the ID stored in the storage means 30 in the comparing means 40 provided in the computer 1; A function of allowing the control means 50 provided in the computer 1 to authorize use of the computer 1 if the IDs compared in the comparison means 40 match; When the tag 10 possessed by the user in the control means 50 deviates from the recognition range of the RFID system, the user's computer 1 usage information is stored in the storage means 30, and the computer 1 is converted into the security mode. To limit usage; And a function for the control means 50 to maintain a security mode limiting the use of the computer 1 if the IDs compared in the comparison means 40 are inconsistent. Characterized in that the recording medium.

According to the present invention, a tag user authorized to use a computer may use the computer by releasing the security mode of the computer in a non-contact manner by approaching the tag within the recognition range of the RFID system provided in the computer. When the tag user authorized to use the computer leaves the recognition range of the RFID system after using the computer, the security mode of the computer may be automatically set to limit the use of the computer. Therefore, even if the computer user is authorized to use the tag, the user can easily maintain the security of the computer even if there is no input such as an ID and password. It has the effect of strengthening.

In addition, by implementing a system in which a plurality of computers and servers are connected through a network according to the present invention, computer usage information of a tag user may be stored in a database. As a result, the administrator can utilize the accumulated tag user's computer usage information as personnel management information and business management information.

Hereinafter, with reference to the accompanying drawings will be described in detail a preferred embodiment of the present invention.

<Configuration of Control System>

(Configuration of First Embodiment)

1 is a block diagram showing a computer usage control system using an RFID system according to a first embodiment of the present invention. As shown in FIG. 1, the computer usage control system using the RFID system according to the first embodiment of the present invention includes a plurality of tags 10 and a computer 1 possessed by a plurality of users. The computer 1 here comprises an RFID reading means 20, a storage means 30, a comparison means 40 and a control means 40.

Tag 10 used in the present invention serves to transmit the stored data received from the RFID reading means 20 to the RFID reading means 20, the shape, size and type of such a tag 10 May be changed in various ways. However, the tag 10 according to the embodiment of the present invention is formed of a read-only type tag 10 having a miniaturized form, which is composed of an antenna coil and an IC chip and receives power from radio waves from the outside. The tag 10 stores a unique ID and is issued to a plurality of users.

The RFID reading means 20 serves to read the unique ID of the user stored in the tag 10 by communicating with the tag 10 approaching the recognition range, and may be provided in the computer 1 internally or externally. have. The RFID reading means 20 may use various frequencies. However, the frequency of the RFID reading means 20 according to the embodiment of the present invention communicates with the tag 10 using a band of 13.56Mhz and follows the standard set forth in ISO 14443A [8]. Meanwhile, the RFID reading means 20 is implemented as an IC chip for communication with the tag 10 and a micro controller unit (MCU) that is connected to and controls the tag 10. In this case, the IC chip may be implemented as any IC chip as long as it is for communication with the tag 10. However, it is preferable to use the RC 500/632 [7-9] chip of Philips. In addition, the MCU may be implemented as any MCU as long as it is for controlling the RFID reading means 20. However, it is preferable to use ATEL 128 of ATMEL.

The storage means 30 stores a unique ID of a user authorized to use the computer 1, and stores information on the use of the computer 1 of the user who is out of the recognition range of the RFID system by the control means 50. By performing, it is connected to the comparison means 40 and the control means 50. In the storage means 30, information divided into a name field, affiliation field, computer number field, tag ID field, and computer use time field is stored in a database. On the other hand, the storage means 30 is controlled by the application program to exchange information with the comparison means 40 and the control means 50.

The comparison means 40 performs a function of comparing the ID read by the RFID reading means 20 with the ID stored in the storage means 30, and is connected to the RFID reading means 20 and the storage means 30. . The comparing means 40 is connected to the RFID reading means 20 and compares the transmitted ID information with a plurality of ID information authorized for use stored in the storage means 30 to determine whether or not to match. Is controlled by

The control means 50 determines whether or not the computer 1 can be used according to the comparison result of the comparison means 40, and if the tag 10 is out of the recognition range of the RFID system, the control means 50 may use the user's computer 1 usage information. While storing in the storage means 30 performs the function of limiting the use by converting the computer 1 into a secure mode. At this time, the control means 50 is controlled by an application program so as to be connected to the RFID reading means 20, the comparison means 40 and the storage means 30, respectively, to perform such a function.

The storage means 30, the comparison means 40 and the control means 50 described above are implemented based on a computer composed of a storage device such as a hard disk drive or a flash memory, a CPU, a RAM, a main board, and the like. An application program for achieving the object according to the present invention is installed under an operating system program for operating such a computer. At this time, in the first embodiment according to the present invention, an application program is implemented using Visual Basic.

The computer usage control system using the RFID system includes a computer 1 and a plurality of tags 10 including the RFID reading means 20, the storage means 30, the comparison means 40, and the control means 50. Is completed.

(Configuration of Second Embodiment)

2 is a block diagram illustrating a computer usage control system using an RFID system according to a second embodiment of the present invention. As shown in FIG. 2, the computer usage control system using the RFID system according to the second embodiment of the present invention includes a plurality of tags 10, a plurality of computers 1, and a server 60 carried by a plurality of users. It consists of The computer 1 comprises an RFID reading means 20, a comparing means 40 and a control means 40. And the server 60 is configured with a storage means (30).

In the second embodiment of the present invention, a plurality of computers 1 rather than one computer 1 is connected to the server 60 provided with the storage means 30 in a network 62 manner. As a result, the administrator can control the use of the plurality of computers 1 by storing the unique ID of the user authorized for use in each computer 1 in the storage means 30 provided in the server 60. In this case, the network 62 between the plurality of computers 1 and the server 60 may be variously constructed using wired or wireless methods. However, it is preferable that the network 62 between the plurality of computers 1 and the server 60 be constructed by a wired cable LAN method.

In the second embodiment of the present invention, the RFID reading means 20, the comparing means 40 and the control means 40 provided in the computer 1 are the same as those described in the above-described first embodiment. The storage means 30 provided in the server 60 is also the same as described in the above-described first embodiment.

<Control Method>

The computer usage control method using the RFID system according to the present invention will be described based on the computer 1 in a state in which a security mode for restricting the use of the computer 1 is being performed.

In the security mode of the present invention, the power of the display means such as the computer 1 monitor is turned off, the operation of the input means such as the keyboard and the mouse is stopped, and the power of the storage means such as the hard disk drive is turned off, resulting in a low power consumption state. In this security mode, each step of the computer usage control method using the RFID system described below proceeds.

3 is a flowchart illustrating a computer usage control method using an RFID system according to the present invention.

As shown in FIG. 3, first, the first step S10 is a tag 10 to which the use of the computer 1 is authorized to the storage means 30 provided in at least one of the computer 1 or the server 60. ) The user's unique ID is stored.

The storage means 30 here may be provided in each computer 1 as in the first embodiment of the system described above or in the server 60 as in the second embodiment of the system described above. In addition, if necessary, the storage device 30 is provided in both the server 30 and each computer 1 so that the mutually stored information can be utilized for backup.

At this time, the ID information of the user of the tag 10 authorized to use the computer 1 stored in the storage means 30 is a database format divided into a name field, affiliation field, a computer number field, a tag ID field, and a computer use time field. Are stored accordingly. This first step (S10) is achieved by the administrator inputs the information to be stored through the input means in accordance with the above-described database format using an application program installed in the computer 1 to achieve the object of the present invention.

Hereinafter, a description will be given with reference to the administrator screen of the application program associated with the first step S10. 4A is a diagram illustrating a screen of an application program for setting a password, according to a first embodiment of a computer usage control system. 4B is a diagram illustrating a screen of an application program for user setting according to the first embodiment of the computer usage control system.

The screen shown in FIG. 4A is a screen for selecting a password setting tab 100, and a password setting tab 100, a user setting tab 102, and other setting tabs 104 are located at the top of the screen. The password input field 106 to be set is located. And at the bottom of the screen is an application button 108 that can apply or cancel the password change. Through the password setting tab 100, the administrator can change the password. The screen shown in FIG. 4A is the same as the screen of an application program for setting a password according to the second embodiment of the computer usage control system.

The screen shown in FIG. 4B is a screen in which the user setting tab 102 is selected. The tab located at the top of the screen is the same as described above with reference to FIG. 4A, and the computer usage setting column 110 is located at the screen stop. At the bottom of the screen, a user add / delete button 112 is located to add or delete a user authorized to use the computer 1. Herein, the computer usage setting field 110 is configured to display information of a user authorized to use the computer 1 at the top and to input a newly authorized user at the bottom. The user setting tab 102 allows the administrator to set whether the computer 1 can be used for each user.

5 is a diagram illustrating a screen of an application program for user setting according to the second embodiment of the computer usage control system. The screen shown in FIG. 5 is a screen in which the computer selection unit 111 is added to the screen shown in FIG. 4B. This is to allow the administrator to set a computer that can be used for each user by providing a plurality of computers 1 according to the second embodiment of the computer usage control system described above. The other buttons, tabs, and the like are the same as those described in FIG. 4B.

Next, the second step S20 is a step of reading the unique ID of the user stored in the tag 10 approaching the recognition range through the RFID reading means 20 included in the computer 1. Here, the RFID reading means 20 repeatedly transmits radio waves to detect and read the tag 10 within the recognition range. The time interval for transmitting radio waves at this time can be arbitrarily set by the administrator within the range of 1 second to 3600 seconds through an application program installed in the computer 1 to achieve the object of the present invention. The ID information read through the RFID reading means 20 is transmitted to the comparing means 40 and the control means 50, respectively.

Hereinafter, a description will be given with reference to the administrator screen of the application program associated with the second step (S20). 6A is a diagram illustrating a screen of an application program for other settings according to the first embodiment of the computer usage control system. 6B is a diagram showing a screen of an application program for other settings according to the second embodiment of the computer usage control system.

The screen shown in FIG. 6A is a screen in which the other setting tab 104 is selected. The tab located at the top of the screen is the same as described above with reference to FIG. 4A, and the environment setting field 114 is located at the screen stop. The environment setting field 114 is composed of three selection items. At this time, the automatic execution item at the start of the window is an item for selecting whether to start the computer 1 operating system and to run the application program according to the present invention. The reader reading time manual setting item and the number control button at the bottom thereof are provided to allow the administrator to manually set the radio wave transmission time interval of the RFID reading means 20. After completing these settings, it is possible to apply or cancel the set items by selecting the apply button (108).

The screen shown in FIG. 6B is a screen in which a server address setting field 116 is added to the screen shown in FIG. 6A. This server address setting field 116 is a setting item added to form a network 62 between the plurality of computers 1 and the server 60 according to the second embodiment of the computer usage control system described above. By setting this, the administrator can connect the plurality of computers 1 and the server 60. The other buttons, tabs, and the like are the same as those described in FIG. 6A.

Next, the third step S30 is a step in which the ID read by the RFID reading means 20 and the ID stored in the storage means 30 are compared through the comparing means 40 provided in the computer 1. The comparison means 40 determines whether the ID information read and transmitted from the RFID reading means 20 is identical or inconsistent with a plurality of ID information stored in the storage means 30, and controls the corresponding determination result information. To transmit. The identification, mismatch of the ID information and the transmission to the control means 50 are implemented through the application program according to the present invention.

(If the IDs match)

Next, the fourth step (S42) is a step in which the use of the computer 1 is authorized if the IDs compared in the comparing means 40 are matched through the control means 50 provided in the computer 1. In this way, when the control means 50 receives the result of determining that the ID information matches from the comparison means 40, the control means 50 releases the security mode state so that the owner of the tag 10 in which the ID information is stored can use the computer 1. do.

Next, the fourth step (S42) is that the user's computer 1 usage information is stored in the storage means 30 when the tag 10 possessed by the user via the control means 50 is out of the recognition range of the RFID system. Is stored in the computer 1, and the computer 1 is converted into a secure mode, thereby limiting its use.

Through the above-described 4-1 step S44, the security mode is released and the tag 10 of the user who is using the computer 1 is repeatedly read by the RFID reader 20 to see if it is within the recognition range of the RFID system. . At this time, if the same tag 10 ID information is repeatedly read and transmitted to the control means 50, the control means 50 maintains the security mode release state. On the other hand, the time interval for the RFID reading means 20 to transmit the radio wave to detect the tag 10 is set by the administrator through the application program as described in the second step (S20) described above. When the security mode is released in such a way that the user of the computer 1 with the tag 10 carried away from the recognition range of the RFID reading means 20, the RFID reading means 20 is no longer the same tag 10. Since the ID information is not transmitted to the control means 50, the control means 50 assumes that the user has left the computer 1 and converts the computer 1 into the secure mode. In addition, the control means 50 converts to the security mode and at the same time calculates the first reading time and the last reading time of the tag 10 ID information corresponding to the user's computer 1 usage information, and builds it in the storage means 30. The calculated time is stored in the computer usage time field among the generated database fields. Therefore, the administrator can accumulate the computer 1 usage information of the user authorized to use the computer 1 and utilize the information as human resource management information and business management information.

(If ID mismatch)

Finally, the fifth step S50 is a step in which a security mode for limiting the use of the computer 1 is maintained when the IDs compared in the comparing means 40 through the control means 50 do not match. When the control means 50 receives the result of determining that the ID information is inconsistent from the comparison means 40, the control means 50 maintains the security mode state so that the owner of the tag 10 in which the ID information is stored cannot use the computer 1. .

<Recording medium>

The recording medium according to the present invention is loaded with an application program executable on a computer. Here, the application can be read and executed by a computer, and the unique ID of the user of the tag 10 authorized to use the computer 1 in the storage means 30 provided in at least one of the computer 1 or the server 60. Function of storing the unique ID of the user stored in the tag 10 approaching the recognition range in the RFID reading means 20 included in the computer 1, and comparing means provided in the computer 1 A function of comparing the ID read by the reading means 20 with the ID stored in the storage means 30 at 40, the control means 50 provided in the computer 1 is compared at the comparing means 40. A function of authorizing the use of the computer 1 if the IDs match, and storing means of the user's use of the computer 1 when the tag 10 possessed by the user in the control means 50 deviates from the recognition range of the RFID system. (30) and convert the computer (1) into a secure mode to limit its use. If the ID comparison in function, and control means 50, the comparison means 40 comprises a function of a mismatch to maintain a secure mode of limiting the use of a computer (1).

Visual Basic is used to produce the application programs recorded on the recording medium according to the present invention. Here, the recording medium includes all kinds of recording devices capable of storing data that can be read by a computer system. Examples include ROM, RAM, CD-ROM, magnetic tape, floppy disk, USB memory or optical data device.

As described above, those skilled in the art will understand that the present invention can be implemented in other specific forms without changing the technical spirit or essential features. It is therefore to be understood that the above-described embodiments are to be considered in all respects as illustrative and not restrictive. The scope of the present invention is defined by the appended claims rather than the detailed description, and all changes or modifications derived from the meanings and equivalent concepts of the claims should be construed as being included in the scope of the present invention.

The following drawings, which are attached in this specification, illustrate the preferred embodiments of the present invention, and together with the detailed description thereof, serve to further understand the technical spirit of the present invention, and therefore, the present invention is limited only to the matters described in the drawings. It should not be interpreted.

1 is a block diagram showing a computer usage control system using an RFID system according to a first embodiment of the present invention.

2 is a block diagram illustrating a computer usage control system using an RFID system according to a second embodiment of the present invention.

3 is a flowchart illustrating a computer usage control method using an RFID system according to the present invention.

4A is a diagram illustrating a screen of an application program for setting a password, according to a first embodiment of a computer usage control system.

4B is a diagram illustrating a screen of an application program for user setting according to the first embodiment of the computer usage control system.

5 is a diagram illustrating a screen of an application program for user setting according to the second embodiment of the computer usage control system.

6A is a diagram illustrating a screen of an application program for other settings according to the first embodiment of the computer usage control system.

6B is a diagram showing a screen of an application program for other settings according to the second embodiment of the computer usage control system.

<Explanation of symbols for the main parts of the drawings>

1: computer 10: tags

20: RFID reading means 30: Storage means

40: comparison means 50: control means

60: server 62: network

100: Password Settings Tab 102: User Settings Tab

104: Other Settings Tab 106: Password Field

108: Apply Button 110: Computer Use Settings

111: computer selection unit 112: add / delete user button

114: Settings Field 116: Server Address Settings Field

Claims (6)

In the computer usage control system comprising a plurality of tags (10) possessed by a plurality of users and a computer (1) for determining whether the tag 10 is accessible and usable, The computer 1, RFID reading means (20) for communicating with the tag (10) approaching a recognition range and reading a unique ID of a user stored in the tag (10); Storage means (30) storing a unique ID of a user authorized to use the computer (1); Comparison means (40) connected to the RFID reading means (20) and the storage means (30) and comparing the ID read by the RFID reading means (20) with the ID stored in the storage means (30); It is connected to the RFID reading means 20, the storage means 30 and the comparison means 40 determines the availability of the computer 1 according to the comparison result of the comparison means 40, the tag If the 10 is out of the recognition range of the RFID system control means for storing the user's use information of the computer (1) in the storage means 30 and converting the computer (1) to a secure mode to limit the use (50) Computer use control system using an RFID system, characterized in that it comprises a. The method of claim 1, And the RFID reading means (20) reads the tag (10) at predetermined time intervals. In a computer usage control system including a plurality of tags (10) possessed by a plurality of users, a computer (1) and a server (60) for determining whether the tag 10 is accessible and usable, A server (60) having a storage means (30) storing a unique ID of a user authorized to use the computer (1); RFID reading means 20 connected to the server 60 and the network 62, respectively, for communicating with the tag 10 approaching the recognition range and reading a unique ID of the user stored in the tag 10; Whether the computer 1 can be used in accordance with a comparison result 40 comparing the ID read by the RFID reading means 20 with the ID stored in the storage means 30 and the comparison means 40. If the tag 10 is out of the recognition range of the RFID system, the user's computer 1 usage information is stored in the storage means 30 and the computer 1 is converted into a secure mode to limit the use. Computer use control system using an RFID system, characterized in that it comprises a plurality of computers (1) having a control means (50). The method of claim 3, wherein The RFID reading means (20) is a computer usage control system using an RFID system, characterized in that for reading the tag at a predetermined time interval. In the control method for controlling the availability of the computer (1) in the security mode to restrict the use of the computer (1), A first step (S10) of storing the unique ID of the user of the tag 10 authorized to use the computer 1 in the storage means 30 provided in at least one of the computer 1 or the server 60; A second step (S20) of reading the unique ID of the user stored in the tag (10) approaching the recognition range by the RFID reading means (20) provided in the computer (1); A third step (S30) of comparing the ID read by the RFID reading means (20) with the ID stored in the storage means (30) in the comparing means (40) provided in the computer (1); Step 4-1 (S42) of applying the use of the computer (1) if the control means (50) provided in the computer (1) match the IDs compared in the comparison means (40); When the tag 10 possessed by the user in the control means 50 deviates from the recognition range of the RFID system, the user's computer 1 usage information is stored in the storage means 30, and the computer 1 is stored. Step 4-2 (S44) to limit the use by converting to a secure mode; And And a fifth step (S50) in which the control means 50 maintains a security mode limiting the use of the computer 1 when the IDs compared in the comparison means 40 are inconsistent. Computer usage control method using. Can be read and executed by a computer, In the control method for controlling the availability of the computer (1) in the security mode to restrict the use of the computer (1), A function of storing the unique ID of the user of the tag 10 authorized to use the computer 1 in the storage means 30 provided in at least one of the computer 1 or the server 60; A function of reading a unique ID of a user stored in the tag (10) approaching the recognition range by the RFID reading means (20) provided in the computer (1); A function of comparing the ID read by the RFID reading means (20) with the ID stored in the storage means (30) in the comparing means (40) provided in the computer (1); A function of allowing the control means (50) provided in the computer (1) to permit the use of the computer (1) if the IDs compared in the comparison means (40) match; When the tag 10 possessed by the user in the control means 50 deviates from the recognition range of the RFID system, the user's computer 1 usage information is stored in the storage means 30, and the computer 1 is stored. Converting to a secure mode to limit usage; And The control means 50 is a function to maintain a security mode for limiting the use of the computer (1) if the ID compared in the comparison means 40, the computer usage control method program using an RFID system consisting of Recorded media.
KR1020090042523A 2009-05-15 2009-05-15 Control system utilized rfid system for use of computer, method therewith and recording medium thereof KR20100123350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020090042523A KR20100123350A (en) 2009-05-15 2009-05-15 Control system utilized rfid system for use of computer, method therewith and recording medium thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020090042523A KR20100123350A (en) 2009-05-15 2009-05-15 Control system utilized rfid system for use of computer, method therewith and recording medium thereof

Publications (1)

Publication Number Publication Date
KR20100123350A true KR20100123350A (en) 2010-11-24

Family

ID=43408043

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020090042523A KR20100123350A (en) 2009-05-15 2009-05-15 Control system utilized rfid system for use of computer, method therewith and recording medium thereof

Country Status (1)

Country Link
KR (1) KR20100123350A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084027A (en) * 2019-05-07 2019-08-02 李俊霖 A kind of electronic information security storage system with identity recognition function

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084027A (en) * 2019-05-07 2019-08-02 李俊霖 A kind of electronic information security storage system with identity recognition function

Similar Documents

Publication Publication Date Title
EP3276556B1 (en) Method and electronic device for payment using biometric authentication
CN101438330B (en) Method and system for setup of, and communication with, an RFID middleware server from an enterprise resource planning system server
US20140373111A1 (en) Virtual key ring
CN111970138B (en) Network resource management and control system and resource management method
US8646069B2 (en) Security apparatus for computer system and method thereof
KR20220159925A (en) Sub reader and sub reader control method
CN104504314B (en) Access control system
CN105761343A (en) Information processing method and information processing device for hotel access card
CN104102610A (en) Method for using electronic device with two systems
JP2010165144A (en) Access control system and access control terminal
US11402814B2 (en) Interactive home system including wireless devices
KR20100123350A (en) Control system utilized rfid system for use of computer, method therewith and recording medium thereof
KR102211272B1 (en) Access control system and access control method using the same
US20090096585A1 (en) Methods, Systems and Apparatus for Radio Frequency Identification (RFID) System Configuration Management
JP6184932B2 (en) ELECTRIC LOCK DEVICE, ELECTRIC LOCK SYSTEM, AND CONTROL METHOD
KR100847787B1 (en) System and Method for Authenticating RFID Readeror Terminal, Secure RFID Tag for Authenticating RFID Readeror Terminal and Recording Medium
US11321686B2 (en) Electronic device and control method of electronic device
KR100874390B1 (en) Multi-boot system using RFID
JP2010128753A (en) Entrance/exit management system, and entrance/exit management terminal
KR100974816B1 (en) System and Method for Building RFID Tag into Electronic Parts and Recording Medium
KR102469412B1 (en) Sub reader and sub reader control method
CN108630309A (en) A kind of information matches device, method, terminal and storage medium
US11695762B2 (en) Heterogeneous device authentication system and heterogeneous device authentication method thereof
KR20140128168A (en) A method for issueing a card and an appratus using it
Huang et al. Gen2v2-security-and-privacy-features-leveraged application designs

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application