Monitoring method and monitoring system

A technology for monitoring systems and verifying passwords, which is applied to instruments, electrical digital data processing, and platform integrity maintenance. status, the effect of preventing malicious theft

Inactive Publication Date: 2012-05-30
INVENTEC CORP
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, if a malicious person steals the password of the owner of the computer or mobile phone, and then takes the opportunity to log in to the computer or mobile phone, the data or confidential files in it may be leaked
In this case, users have no way of knowing or mastering whether their computers or mobile phones have been maliciously hacked by others

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring method and monitoring system
  • Monitoring method and monitoring system
  • Monitoring method and monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following exemplified embodiments are described in detail in conjunction with the accompanying drawings, but the provided embodiments are not used to limit the scope of the present invention, and the description of the structure and operation is not used to limit the order of its execution, and any recombination of components The structure of the resulting device with equal efficacy is within the scope of the present invention. The drawings are for illustration purposes only and are not drawn to original scale.

[0031] figure 1 A schematic diagram of a monitoring system is shown according to an embodiment of the present invention. The monitoring system 100 includes an electronic device 102 and a remote server 105 , wherein the electronic device 102 communicates with the remote server 105 through a network. Here, the electronic device 102 can be integrated and applied to notebook computers, tablet computers, desktop computers or other types of computers or mobile ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a monitoring method and a monitoring system. The monitoring system comprises an electronic device and a remote server. In the electronic device, a processor starts a photographing component after receiving a request verification command output by a command transmitting module, so as to control the photographing component to capture a face image of a user. The processor judges a verification password, and transmits the verification password and the face image of the user when the verification password is incorrect. The remote server is in communication connection with the electronic device via a network, and confirms at least one of the verification password and the image face of the user. When at least one of the verification password and the face image of the user is confirmed to be wrong, the remote server sends the face image of the user and the warning information.

Description

technical field [0001] The present invention relates to a monitoring system, and in particular to a monitoring system and a monitoring method for monitoring through communication with a server. Background technique [0002] Today's technology is developing more and more rapidly, and electronic products are becoming more and more diversified. Electronic products such as personal computers, notebook computers, mobile phones, etc. are closely related to personal daily life or work. Many personal data or even It is a confidential work document, and it is usually stored in a computer or mobile phone for easy access at any time. [0003] However, if a malicious person steals the password of the owner of the computer or mobile phone, and then takes the opportunity to log into the computer or mobile phone, the data or confidential documents therein may be leaked. In this case, the user has no way of knowing or mastering whether his computer or mobile phone has been maliciously inva...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/50
Inventor 黄敬轩李柏苍蔡孟辰黄清福陈瀞仪蔡元琪
Owner INVENTEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products