Computer network access control system and method

A technology of control system and control method, which is applied to computer components, computing, transmission systems, etc., can solve problems such as system loopholes, being impersonated or replaced, and unsatisfactory effects, and achieve high security effects

Inactive Publication Date: 2008-09-17
王琰 +2
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after so many years of implementation, the effect is not satisfactory, and the problem cannot be fundamentally solved.
[0003] For example, there have been proposals to identify minors by swiping cards or pressing fingerprints when entering Internet cafes. However, there are many loopholes in this formalistic authentication method that hopes to keep minors out of the door. For example, Users can pass verification by finding someone instead of swiping their card or pressing their fingerprints, and Internet cafes, as profit-making organizations, will intentionally or unintentionally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network access control system and method
  • Computer network access control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention starts with the mouse and keyboard that must be used by surfers, adopts the fingerprint mouse and the fingerprint keyboard, uses the current high-tech fingerprint identification technology, and identifies whether the system user or the surfer is an illegal user through the identification of the pre-established fingerprint database. And monitor and identify in real time during the user's use to prevent other people from replacing the operation, and perform real-time monitoring and management on the operation of each client on the server side to ensure that each client device can operate normally and prevent malicious blocking and Uninstall to ensure the normal operation of the entire system.

[0037] Such as figure 1 As shown in , the present invention discloses a computer access control system, which includes a fingerprint collection terminal for collecting the user's fingerprint. This fingerprint collection terminal can be any known and public fin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a computer internet control system and a method thereof. The system comprise the following components: a fingerprint collecting terminal, a data base server; a client terminal identification and judgment unit; a fingerprint checking server; a client terminal control unit; and a client terminal control and protection unit. The method comprises the following procedures: 1) collecting the fingerprint of the user; 2) transmitting the collected fingerprint to a fingerprint checking server; 3) comparing the fingerprint with the fingerprint stored in the data base server; and 4) when the client terminal computer is unlocked, collecting the fingerprint of the user spacing a certain time, and comparing these fingerprints with the stored fingerprint. The invention can effectively control the logging-on of the computer, especially the invention can effectively settle the social problem that the minor goes on line in the internet bar.

Description

technical field [0001] The invention relates to a computer login control system, in particular to a system and method for controlling computer access to the Internet through fingerprint management identification. Background technique [0002] Computer login control has received more and more attention due to reasons of security and monitoring. In particular, due to the lack of supervision of minors in China to surf the Internet in Internet cafes, minors are addicted to the Internet, wasting money and time, affecting their study and physical health, and unhealthy website content also corrupts their thinking. It is not uncommon for minors to be affected by the Internet or lack of money to access the Internet. Various criminal cases are also common, causing huge harm to society. In recent years, the state has also been very concerned about the problems of minors caused by this, and has introduced many policies to restrict minors from going online in Internet cafes. Some compan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06K9/00H04L12/24
Inventor 王琰黄勇徐奇
Owner 王琰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products