Monitoring method and device, and electronic equipment

An electronic device and a legal technology, applied in the field of electronic device security monitoring, can solve problems such as user information leakage, user property damage, etc., and achieve the effect of improving use safety, reducing possibility, and improving accuracy

Inactive Publication Date: 2017-05-24
CLOUDMINDS (SHENZHEN) ROBOTICS SYST CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, it is easy to cause problems such as leakage of user information and damage to user property.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring method and device, and electronic equipment
  • Monitoring method and device, and electronic equipment
  • Monitoring method and device, and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0023] Figure 1A It is a schematic diagram of an implementation environment shown according to an exemplary embodiment. like Figure 1A As shown, the implementation environment may include an electronic device 100 . In the present disclosure, the electronic device 100 may be, for example, an intelligent robot, a smart phone, a tablet computer, a personal digital assistant (PDA), a PC, a notebook computer, an access control unlocking device, and the like. Figure 1A In the illustration, the electronic device 100 is a smart phone as an example.

[0024] Figure 1B It is a schematic diagram of an implementation environment shown according to another exemplary...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a monitoring method and device, and electronic equipment. The monitoring method comprises obtaining the user feature information under the non-sensing condition of the user; determining whether the current user is a legal user according to the user feature information when the user is determined to be legal according to the identity authentication information input by the user, wherein the identity authentication information is used for determining whether target authentication operation is permitted or not; and executing specified safe operation when the current user is determined to be an illegal user according to the user feature information. Thus, even if an illegal user cracks or forges identity authentication information of a legal user, and logs in the electronic equipment successfully, the electronic equipment can carry out secondary verification to the identity of the user by acquiring the user feature information of the current user. When the secondary verification result shows that the user is an illegal user, the specified safe operation is executed, and therefore the service safety of the electronic equipment is improved, and problems that user information is leaked, user property is damaged and the like are avoided.

Description

technical field [0001] The present disclosure relates to the field of electronic equipment security monitoring, and in particular, to a monitoring method, device and electronic equipment. Background technique [0002] With the continuous development of technology, electronic devices are becoming more and more intelligent. For example, people can not only perform basic operations such as calling and sending text messages through smartphones, but also install various types of applications (for example, video applications, social applications, shopping applications, financial applications, etc.) applications, etc.), so as to meet their different usage needs. However, with the improvement of intelligence level, higher requirements are put forward for the safety performance of electronic equipment. [0003] In related technologies, when an electronic device performs some sensitive operations, user identity needs to be authenticated. The electronic device only performs the oper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCH04L9/40
Inventor 江秀
Owner CLOUDMINDS (SHENZHEN) ROBOTICS SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products