Duplicating monitoring system
A monitoring system and copier technology, applied in the field of computer technology and information security, can solve problems such as inconvenient copying log query, statistics and security audit, unrecognizable, illegible handwriting, etc., to avoid unauthorized use, enhance non-repudiation, The effect of convenient audit
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] The copy monitoring system proposed by the present invention is described in detail as follows in conjunction with the accompanying drawings and embodiments.
[0023] Such as figure 1 As shown, a copy monitoring system according to an embodiment of the present invention includes: a monitoring terminal 100 and a server 200 . in:
[0024] The monitoring terminal 100 is connected with the copier 300, and is used to lock and unlock the copier 300, obtain the identity information, image information of the user of the copier 300, and the copy log and copy content of the legal user, and store the identity information, image information, and legal The user's copy log and copy content are uploaded to the server in real time. The copy log includes copy information such as number of pages, number of copies, paper size, black and white / color, etc.
[0025] The server 200 is used to verify the legitimacy of the user of the copier 300, receive the user's identity information, imag...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com