KR20100123350A - Control system utilized rfid system for use of computer, method therewith and recording medium thereof - Google Patents
Control system utilized rfid system for use of computer, method therewith and recording medium thereof Download PDFInfo
- Publication number
- KR20100123350A KR20100123350A KR1020090042523A KR20090042523A KR20100123350A KR 20100123350 A KR20100123350 A KR 20100123350A KR 1020090042523 A KR1020090042523 A KR 1020090042523A KR 20090042523 A KR20090042523 A KR 20090042523A KR 20100123350 A KR20100123350 A KR 20100123350A
- Authority
- KR
- South Korea
- Prior art keywords
- computer
- tag
- user
- rfid
- stored
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Automation & Control Theory (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a computer use control system using an RFID system, a method using the same and a recording medium thereof. The configuration of the present invention includes a plurality of tags possessed by a user and a computer usage control system including a computer for determining whether the tag is accessible and usable, wherein the computer communicates with the tag approaching the recognition range and is stored in the tag. An RFID reading means for reading a unique ID of the device, a storage means having stored therein a unique ID of a user authorized to use a computer, an RFID reading means and an ID stored in the storing means Connected to the comparison means, the RFID reading means, the storage means, and the comparison means to determine the availability of the computer according to the comparison result of the comparison means, and when the tag deviates from the recognition range of the RFID system, the user's computer usage information is stored in the storage means. And controlling means for storing and converting the computer into a secure mode to limit its use. According to the present invention, a tag user authorized to use a computer can easily maintain the security of the computer even if there is no input such as an ID and password on the computer, facilitate the user's convenience, and do not cause exposure of the ID and password. It has the effect of enhancing computer security.
Description
The present invention relates to a computer usage control system using an RFID system, a control method thereof, and a recording medium thereof, and more particularly, a tag user authorized to use a computer by using an RFID system to maintain computer security. The present invention relates to a computer usage control system using an RFID system in which a security mode for limiting computer use is automatically set after using the computer.
RFID (Radio Frequency Identification) is a next-generation recognition technology that can manage unique information of various objects such as food, animals, and objects through IC chip wireless communication. RFID system consists of RFID tag, reader and middleware. The RFID tag receives radio signals from the reader and sends the stored data to the reader, and the reader reads the data and transmits the data back to the middleware. The middleware collects and manages the data transmitted from the reader and forms a separate network to connect with existing computer systems. Such RFID technology is widely used in logistics, access control system or electronic bill payment system, and active research is in progress.
On the other hand, the conventional computer security method was made by a method of authorizing or restricting the use of a computer by simply entering a login ID and password set by a user through an input means such as a keyboard or a mouse. In this method, there is a risk that the login ID and password may be exposed, and thus there is a problem in the reliability of security. In addition, the user has a problem in using the user himself or herself to enter the login ID and password through the input means in order to use the computer or limit the use of the computer.
Therefore, the present invention was created to solve the above problems, by approaching the tag within the recognition range of the RFID system provided in the computer to release the security mode of the computer in a non-contact manner, the tag user after using the computer RFID It is an object of the present invention to provide a computer usage control system using an RFID system that can secure the computer and the user's convenience by limiting the use of the computer by automatically setting the security mode of the computer when the system is out of the recognition range.
Other objects, specific advantages and novel features of the invention will become apparent from the following detailed description and the preferred embodiments described in conjunction with the accompanying drawings.
Means for achieving the object of the present invention is a computer usage control system comprising a plurality of tags (10) possessed by a plurality of users and a computer (1) for determining the access and availability of the tags (10) The
In addition, the RFID reading means 20 is characterized in that for reading the
In addition, in a computer usage control system including a plurality of tags (10) possessed by a plurality of users, a computer (1) and a server (60) for determining whether to access and use the tags (10), the computer (1) Server (60) having a storage means (30) storing a unique ID of a user authorized to use; RFID reading means 20 and RFID reading means (20) connected to the server (60) and the network (62), respectively, to communicate with the
In addition, the RFID reading means (20) is a computer usage control system using an RFID system, characterized in that for reading the tag (10) at a predetermined time interval.
In addition, as another category for achieving the object of the present invention, in the control method for controlling the availability of the computer (1) performing a security mode that restricts the use of the computer (1), the computer (1) or server A first step (S10) of storing the unique ID of the user of the
In addition, as another category for achieving the object of the present invention, a control method for controlling the availability of the computer (1) that can be read and executed in the computer, and performing a security mode that restricts the use of the computer (1). A function of storing a unique ID of a user of a
According to the present invention, a tag user authorized to use a computer may use the computer by releasing the security mode of the computer in a non-contact manner by approaching the tag within the recognition range of the RFID system provided in the computer. When the tag user authorized to use the computer leaves the recognition range of the RFID system after using the computer, the security mode of the computer may be automatically set to limit the use of the computer. Therefore, even if the computer user is authorized to use the tag, the user can easily maintain the security of the computer even if there is no input such as an ID and password. It has the effect of strengthening.
In addition, by implementing a system in which a plurality of computers and servers are connected through a network according to the present invention, computer usage information of a tag user may be stored in a database. As a result, the administrator can utilize the accumulated tag user's computer usage information as personnel management information and business management information.
Hereinafter, with reference to the accompanying drawings will be described in detail a preferred embodiment of the present invention.
<Configuration of Control System>
(Configuration of First Embodiment)
1 is a block diagram showing a computer usage control system using an RFID system according to a first embodiment of the present invention. As shown in FIG. 1, the computer usage control system using the RFID system according to the first embodiment of the present invention includes a plurality of
The RFID reading means 20 serves to read the unique ID of the user stored in the
The storage means 30 stores a unique ID of a user authorized to use the
The comparison means 40 performs a function of comparing the ID read by the RFID reading means 20 with the ID stored in the storage means 30, and is connected to the RFID reading means 20 and the storage means 30. . The
The control means 50 determines whether or not the
The storage means 30, the comparison means 40 and the control means 50 described above are implemented based on a computer composed of a storage device such as a hard disk drive or a flash memory, a CPU, a RAM, a main board, and the like. An application program for achieving the object according to the present invention is installed under an operating system program for operating such a computer. At this time, in the first embodiment according to the present invention, an application program is implemented using Visual Basic.
The computer usage control system using the RFID system includes a
(Configuration of Second Embodiment)
2 is a block diagram illustrating a computer usage control system using an RFID system according to a second embodiment of the present invention. As shown in FIG. 2, the computer usage control system using the RFID system according to the second embodiment of the present invention includes a plurality of
In the second embodiment of the present invention, a plurality of
In the second embodiment of the present invention, the RFID reading means 20, the comparing
<Control Method>
The computer usage control method using the RFID system according to the present invention will be described based on the
In the security mode of the present invention, the power of the display means such as the
3 is a flowchart illustrating a computer usage control method using an RFID system according to the present invention.
As shown in FIG. 3, first, the first step S10 is a
The storage means 30 here may be provided in each
At this time, the ID information of the user of the
Hereinafter, a description will be given with reference to the administrator screen of the application program associated with the first step S10. 4A is a diagram illustrating a screen of an application program for setting a password, according to a first embodiment of a computer usage control system. 4B is a diagram illustrating a screen of an application program for user setting according to the first embodiment of the computer usage control system.
The screen shown in FIG. 4A is a screen for selecting a
The screen shown in FIG. 4B is a screen in which the
5 is a diagram illustrating a screen of an application program for user setting according to the second embodiment of the computer usage control system. The screen shown in FIG. 5 is a screen in which the
Next, the second step S20 is a step of reading the unique ID of the user stored in the
Hereinafter, a description will be given with reference to the administrator screen of the application program associated with the second step (S20). 6A is a diagram illustrating a screen of an application program for other settings according to the first embodiment of the computer usage control system. 6B is a diagram showing a screen of an application program for other settings according to the second embodiment of the computer usage control system.
The screen shown in FIG. 6A is a screen in which the
The screen shown in FIG. 6B is a screen in which a server
Next, the third step S30 is a step in which the ID read by the RFID reading means 20 and the ID stored in the storage means 30 are compared through the comparing means 40 provided in the
(If the IDs match)
Next, the fourth step (S42) is a step in which the use of the
Next, the fourth step (S42) is that the user's
Through the above-described 4-1 step S44, the security mode is released and the
(If ID mismatch)
Finally, the fifth step S50 is a step in which a security mode for limiting the use of the
<Recording medium>
The recording medium according to the present invention is loaded with an application program executable on a computer. Here, the application can be read and executed by a computer, and the unique ID of the user of the
Visual Basic is used to produce the application programs recorded on the recording medium according to the present invention. Here, the recording medium includes all kinds of recording devices capable of storing data that can be read by a computer system. Examples include ROM, RAM, CD-ROM, magnetic tape, floppy disk, USB memory or optical data device.
As described above, those skilled in the art will understand that the present invention can be implemented in other specific forms without changing the technical spirit or essential features. It is therefore to be understood that the above-described embodiments are to be considered in all respects as illustrative and not restrictive. The scope of the present invention is defined by the appended claims rather than the detailed description, and all changes or modifications derived from the meanings and equivalent concepts of the claims should be construed as being included in the scope of the present invention.
The following drawings, which are attached in this specification, illustrate the preferred embodiments of the present invention, and together with the detailed description thereof, serve to further understand the technical spirit of the present invention, and therefore, the present invention is limited only to the matters described in the drawings. It should not be interpreted.
1 is a block diagram showing a computer usage control system using an RFID system according to a first embodiment of the present invention.
2 is a block diagram illustrating a computer usage control system using an RFID system according to a second embodiment of the present invention.
3 is a flowchart illustrating a computer usage control method using an RFID system according to the present invention.
4A is a diagram illustrating a screen of an application program for setting a password, according to a first embodiment of a computer usage control system.
4B is a diagram illustrating a screen of an application program for user setting according to the first embodiment of the computer usage control system.
5 is a diagram illustrating a screen of an application program for user setting according to the second embodiment of the computer usage control system.
6A is a diagram illustrating a screen of an application program for other settings according to the first embodiment of the computer usage control system.
6B is a diagram showing a screen of an application program for other settings according to the second embodiment of the computer usage control system.
<Explanation of symbols for the main parts of the drawings>
1: computer 10: tags
20: RFID reading means 30: Storage means
40: comparison means 50: control means
60: server 62: network
100: Password Settings Tab 102: User Settings Tab
104: Other Settings Tab 106: Password Field
108: Apply Button 110: Computer Use Settings
111: computer selection unit 112: add / delete user button
114: Settings Field 116: Server Address Settings Field
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020090042523A KR20100123350A (en) | 2009-05-15 | 2009-05-15 | Control system utilized rfid system for use of computer, method therewith and recording medium thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020090042523A KR20100123350A (en) | 2009-05-15 | 2009-05-15 | Control system utilized rfid system for use of computer, method therewith and recording medium thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20100123350A true KR20100123350A (en) | 2010-11-24 |
Family
ID=43408043
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020090042523A KR20100123350A (en) | 2009-05-15 | 2009-05-15 | Control system utilized rfid system for use of computer, method therewith and recording medium thereof |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20100123350A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110084027A (en) * | 2019-05-07 | 2019-08-02 | 李俊霖 | A kind of electronic information security storage system with identity recognition function |
-
2009
- 2009-05-15 KR KR1020090042523A patent/KR20100123350A/en not_active Application Discontinuation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110084027A (en) * | 2019-05-07 | 2019-08-02 | 李俊霖 | A kind of electronic information security storage system with identity recognition function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3276556B1 (en) | Method and electronic device for payment using biometric authentication | |
CN101438330B (en) | Method and system for setup of, and communication with, an RFID middleware server from an enterprise resource planning system server | |
US20140373111A1 (en) | Virtual key ring | |
CN111970138B (en) | Network resource management and control system and resource management method | |
US8646069B2 (en) | Security apparatus for computer system and method thereof | |
KR20220159925A (en) | Sub reader and sub reader control method | |
CN104504314B (en) | Access control system | |
CN105761343A (en) | Information processing method and information processing device for hotel access card | |
CN104102610A (en) | Method for using electronic device with two systems | |
JP2010165144A (en) | Access control system and access control terminal | |
US11402814B2 (en) | Interactive home system including wireless devices | |
KR20100123350A (en) | Control system utilized rfid system for use of computer, method therewith and recording medium thereof | |
KR102211272B1 (en) | Access control system and access control method using the same | |
US20090096585A1 (en) | Methods, Systems and Apparatus for Radio Frequency Identification (RFID) System Configuration Management | |
JP6184932B2 (en) | ELECTRIC LOCK DEVICE, ELECTRIC LOCK SYSTEM, AND CONTROL METHOD | |
KR100847787B1 (en) | System and Method for Authenticating RFID Readeror Terminal, Secure RFID Tag for Authenticating RFID Readeror Terminal and Recording Medium | |
US11321686B2 (en) | Electronic device and control method of electronic device | |
KR100874390B1 (en) | Multi-boot system using RFID | |
JP2010128753A (en) | Entrance/exit management system, and entrance/exit management terminal | |
KR100974816B1 (en) | System and Method for Building RFID Tag into Electronic Parts and Recording Medium | |
KR102469412B1 (en) | Sub reader and sub reader control method | |
CN108630309A (en) | A kind of information matches device, method, terminal and storage medium | |
US11695762B2 (en) | Heterogeneous device authentication system and heterogeneous device authentication method thereof | |
KR20140128168A (en) | A method for issueing a card and an appratus using it | |
Huang et al. | Gen2v2-security-and-privacy-features-leveraged application designs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |