Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Duplicating monitoring system

A monitoring system and copier technology, applied in the field of computer technology and information security, can solve problems such as inconvenient copying log query, statistics and security audit, unrecognizable, illegible handwriting, etc., to avoid unauthorized use, enhance non-repudiation, The effect of convenient audit

Active Publication Date: 2012-10-24
BEIJING LANXUM COMP TECH
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although this technical solution solves the problem of authorized use of copiers, it cannot realize auditing of copying operations
The audit of copying still depends on the way of manual registration by users. Manual registration is not only easy to be illegible due to illegible handwriting, but also cannot guarantee the accuracy and completeness of registration information
At the same time, it is not convenient to perform query, statistics and security audit on the copy log

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Duplicating monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The copy monitoring system proposed by the present invention is described in detail as follows in conjunction with the accompanying drawings and embodiments.

[0023] Such as figure 1 As shown, a copy monitoring system according to an embodiment of the present invention includes: a monitoring terminal 100 and a server 200 . in:

[0024] The monitoring terminal 100 is connected with the copier 300, and is used to lock and unlock the copier 300, obtain the identity information, image information of the user of the copier 300, and the copy log and copy content of the legal user, and store the identity information, image information, and legal The user's copy log and copy content are uploaded to the server in real time. The copy log includes copy information such as number of pages, number of copies, paper size, black and white / color, etc.

[0025] The server 200 is used to verify the legitimacy of the user of the copier 300, receive the user's identity information, imag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a duplicating monitoring system and relates to the technical field of computer technology and information safety. The system comprises a monitoring terminal and a server, wherein the monitoring terminal is used for locking and unlocking a duplicator to obtain identity information and image information of a duplicator user and duplicating logs and duplicating contents of a legal user, and the identity information, the image information and the duplicating logs and the duplicating contents of the legal user can be uploaded to the server by the monitoring terminal in real time, and the server is used for checking legality of the user, receiving the user's identity information, image information, duplicating logs and duplicating contents sent by the monitoring terminal, generating an audit report which includes the identity information and the image information of the legal user and the corresponding duplicating logs and contents of the legal user, and supplying inquiry of the audit report. The system has the advantages that the duplicator is controlled to be merely used by authorized users, the duplicating logs can be comprehensively, accurately and automatically recorded, simultaneously the audit report of the duplicating logs is supplied, and the system is convenient for administrative stuffs to inquire and audit the duplicating operation.

Description

technical field [0001] The invention relates to the fields of computer technology and information security technology, in particular to a duplication monitoring system. Background technique [0002] In some particularly sensitive industries, a large amount of confidential information is generated all the time. This information often involves various aspects of the country's national defense, military, economy, and diplomacy. Once leaked, it will cause great harm. The information is displayed on various carriers, and a very common carrier is a paper carrier. The reproduction of paper carriers depends on copying equipment, so the safety supervision of copiers is very important. Strictly controlling the "export" of copiers is not only the result of user demand, but also the only way to deal with internal security threats in the enterprise. [0003] There are two management requirements for the security control of confidential copying: 1. Unauthorized personnel cannot use the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G05B19/048H04L29/08
Inventor 高燕
Owner BEIJING LANXUM COMP TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products