Academia.eduAcademia.edu

The security warning mail system can be used with any other authentication services that can be added to the security system according to requirement, for example, the security system can be used to monitor presence of a number of people during a certain period of time. Appropriate monitoring service module can be implemented to monitor the USB tokens requested for login access during a certain period of time and thus can identify people who have not requested any login in time and can trigger the mail daemon to send notification messages to the appropriate authority mentioning about the absent ones. The system overview is shown in the block diagram presented in figure 8.

Figure 8 The security warning mail system can be used with any other authentication services that can be added to the security system according to requirement, for example, the security system can be used to monitor presence of a number of people during a certain period of time. Appropriate monitoring service module can be implemented to monitor the USB tokens requested for login access during a certain period of time and thus can identify people who have not requested any login in time and can trigger the mail daemon to send notification messages to the appropriate authority mentioning about the absent ones. The system overview is shown in the block diagram presented in figure 8.