Computer authorizing monitoring system with image identification function and its method

An image recognition and computer technology, applied in computing, instruments, electrical and digital data processing, etc., can solve the problems of high security risks, control of the operation authority of objects that cannot be protected, and the operation control right falling into the hands of others, so as to improve the safety effect

Inactive Publication Date: 2007-04-04
LENOVO (BEIJING) CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The so-called real-time monitoring is only to shoot videos, issue some warning messages, etc., and cannot really control the operation rights of the objects that need to be protected.
For computers, if the user leaves the computer and forgets to take protective measures, the operation control right may fall into the hands of others. Even if the screen saver function is turned on, the minimum startup time of the screen saver is one minute, that is to say, in this case , the computer is completely open for at least one minute, which poses a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer authorizing monitoring system with image identification function and its method
  • Computer authorizing monitoring system with image identification function and its method
  • Computer authorizing monitoring system with image identification function and its method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The invention provides an application scheme for real-time control of computer system operation authority by using face recognition. The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0013] As shown in FIG. 1 , the monitoring system according to the present invention includes a camera 11 and a monitoring module 12 located in a computer. Camera 11 is used for taking the face image of the user who uses the computer. The monitoring module 12 judges whether the user has the authority to operate the computer according to the face image captured by the camera 11 . The camera 11 can also be built into a computer.

[0014] As shown in FIG. 2 , the monitoring module 12 includes three parts: a processor 121 , a comparator 122 and a memory 123 . The face image templates of one or more users are stored in the memory 123, and the users are users who have the authority to use the computer. The rights to use a computer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer right monitoring system with image identifying function comprises a video shooting unit for making video-shooting on user to use said computer, a monitoring unit for judging whether user has the right to use said computer or not according to image shot by video-shooting unit.

Description

technical field [0001] The invention relates to a computer authority monitoring system and method with image recognition function. Background technique [0002] At present, the method of using cameras for real-time monitoring is mostly used in special occasions such as buildings and security departments. The so-called real-time monitoring is only to shoot videos, issue some warning messages, etc., and cannot really control the operation authority of the objects that need to be protected. For a computer, if the user leaves the computer and forgets to take protective measures, the operation control right may fall into the hands of others. Even if the screen saver function is turned on, the minimum startup time of the screen saver is one minute, that is to say, in this case , the computer is completely open for at least one minute, which poses a great security risk. Contents of the invention [0003] The purpose of the present invention is to provide a system and method cap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00
Inventor 张春燕
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products