Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Device and method for controlling computer access

A technology for controlling computers and equipment, applied in computer security devices, computing, user identity/authority verification, etc., can solve the problems that administrators cannot effectively manage computers, hinder the maximum performance of computers, and inconvenience administrators to manage, etc., to reduce resources Occupancy rate, low cost, and easy centralized management

Active Publication Date: 2006-08-23
FEITIAN TECHNOLOGIES
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above method also has certain disadvantages. First, the registration information of the hardware is completed locally, that is, the hardware for logging into each computer needs to be registered on the corresponding computer. Go to the corresponding computer to operate, if there are many computers, the workload of the system administrator will be very heavy, the information of the hardware equipment of each computer is independent of each other, and it is not easy for the administrator to manage; secondly, because the user logs in legally After the computer system, you can also register the hardware to log in to the current computer. The administrator cannot effectively manage each computer, and there are also major security risks; again, the hardware device information registered by each computer needs to occupy the local computer. Certain system resources are not conducive to exerting the maximum performance of the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for controlling computer access
  • Device and method for controlling computer access
  • Device and method for controlling computer access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] User A logs in to computer A with hardware device A: he inserts the hardware device A obtained from the administrator into the interface of computer A, computer A asks user A to enter a password, user A enters the password: "456", the computer prompts the user "password error , cannot log in", user A re-enters the password "123", the login device obtains the information of hardware device A and submits it to the verification device of computer A; The request data is submitted to the network communication device of computer A, and the network communication device encrypts the data and sends it to the network communication device on the server side through the network, and the server-side network communication device decrypts the data and submits it to the centralized management device; Read the information of the hardware device A from the storage device and submit the information to the server-side network communication device; the server-side network communication devic...

Embodiment 2

[0080] User B uses hardware device B to log in to computer A: he inserts hardware device B into the interface of computer A, computer A prompts to enter a password, user B enters the password "123", computer A obtains the information of hardware device B, and sends the server to obtain the hardware device For the registration information request of B, the server reads the information of hardware device B from the database according to the request of computer A and feeds it back to computer A. Computer A judges that hardware device B has been registered according to the feedback information of the server, but hardware device B is not registered as Log in to computer A, and computer A prompts that user B is an illegal user and cannot log in.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Present invention discloses a control computer logging equipment and method. Said equipment includes server side, client-side and hardware unit, wherein server side including data storage device, centralized management device and network communication device, client-side including network communication device, authentication device and logging device. Said method includes first the administrator registering hardware unit in server side, user inserting hardware unit client-side computer interface and inputting password in logging, client-side computer obtaining hardware unit information and requesting to server for obtaining said hardware unit registry information, according to server information judging whether user being legal, allowing authorized subscriber logging and preventing illegally user logging. Present invention raises system safety and reduces administrator workload due to hardware unit registry and management completed by server.

Description

technical field [0001] The invention relates to a device for controlling login to a computer system and a method for controlling computer login by using the device. Background technique [0002] With the development of science and technology, computers are used more and more widely. It has been applied to various fields and played an important role. At the same time, the security of computers is becoming more and more threatened. Once the computer with important information is hacked by others, the loss will be immeasurable. [0003] At present, one of the methods of controlling computers to prevent others from logging in illegally is the password control method, such as the Windows operating system startup password, if the correct password cannot be entered, the operating system cannot be entered, and the computer cannot be used to achieve the purpose of protecting information in the computer. This method is realized by pure software, its password is easy to be cracked, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06F21/00
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products