Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security management method and system for networked computer users

A network computer and security management technology, applied in the field of network computer user security management and systems, can solve problems such as inconvenient use and error-prone

Inactive Publication Date: 2005-06-15
LENOVO (BEIJING) CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In order to solve the problem of inconvenient use and error-prone problems caused by manually setting the network configuration of network computer users in the prior art, the present invention proposes a network computer user security management method and system, which can automatically complete the network configuration of network computer users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management method and system for networked computer users
  • Security management method and system for networked computer users
  • Security management method and system for networked computer users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to realize the security management of network computer users through smart cards, the server of this embodiment and the client network computer it carries are all provided with a smart card read-write device, and the smart card read-write device includes a smart card read-write chip and a smart card slot.

[0046] In addition, smart cards, software written for smart cards and circuits developed are also required. For example, the management software that resides in memory is set on the server and its configured network computer terminal. After the server or network computer terminal is started, the program resides in the memory. , activate the smart card driver, initialize the smart card driver module to start the smart card reading and writing device, and for the network computer, if the user does not insert the smart card after starting, the management software will also remind the user to insert it. Since these are basic technologies for smart card applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes following steps: (1) security management information of each networked computer user is saved on relevant server and intelligent card; (2) reading out network configuration information in intelligent card corresponding to computer user in order to configure networked computer and build network connection between networked computer and server; (3) reading out logging on information of safety verification; if verification is passed, then the networked computer user logging on server is allowed. The system includes user management devices, configuration devices and verification devices. The invention raises security and practicability.

Description

technical field [0001] The invention relates to a computer security management method and system. Background technique [0002] Smart card is also known as IC card, and its English name is "smart card" or "Integrated Circuit Card". With logic processing function, it is used to identify and respond to the information provided by the outside and the logic function of the chip itself to determine the route and execute the instruction. s method. [0003] A network computer is a client computer dedicated to the network environment. Its application programs and data are stored on the server. It does not require external storage such as hard disks, floppy disks, and CD-ROMs. It uses local resources or server resources for calculations, which is safe and reliable. , Easy management features. Due to these characteristics, network computers are favored by government departments and large enterprises, and have a wide range of applications. [0004] Existing network computer user ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F3/06H04L9/32
Inventor 索胜军毕洪江柴杰于洋
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products