CN106326875A - Security protection fingerprint recognition method and system - Google Patents
Security protection fingerprint recognition method and system Download PDFInfo
- Publication number
- CN106326875A CN106326875A CN201610795865.0A CN201610795865A CN106326875A CN 106326875 A CN106326875 A CN 106326875A CN 201610795865 A CN201610795865 A CN 201610795865A CN 106326875 A CN106326875 A CN 106326875A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- fingerprint recognition
- user
- identification device
- fingerprint identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides a security protection fingerprint recognition method and system. The security protection fingerprint recognition method comprises the steps of receiving positioning coordinates of a user; judging whether there is fingerprint recognition equipment around the user or not according to the coordinates; and if the fingerprint recognition equipment exists, prompting the user to input a fingerprint into the fingerprint recognition equipment so as to realize fingerprint recognition. The technical scheme provided by the invention has the advantage of high degree of user experience.
Description
Technical field
The present invention relates to safety-security area, particularly relate to a kind of security protection fingerprint identification method and system.
Background technology
Security protection is the most frequently used data at video data, and for video data, recognition of face is in security protection data
Key, present video file cannot realize the accurate identification to fingerprint, and user experience is low.
Summary of the invention
Thering is provided a kind of security protection fingerprint identification method, which solving prior art cannot the low shortcoming of user experience.
On the one hand, it is provided that a kind of security protection fingerprint identification method, described method comprises the steps:
Receive the elements of a fix of user;
Judge whether have fingerprint identification device around user according to coordinate;
As having fingerprint identification device, prompting user inputs fingerprint to realize fingerprint recognition in fingerprint identification device.
Optionally, described method also includes:
The time of record fingerprint recognition and coordinate.
Optionally, described method also includes:
The result of fingerprint recognition is sent to long-distance user.
Second aspect, it is provided that a kind of security protection fingerprint recognition system, described system includes:
Receive unit, for receiving the elements of a fix of user;
Judging unit, for judging whether have fingerprint identification device around user according to coordinate;
Tip element, for such as having fingerprint identification device, prompting user inputs fingerprint with reality in fingerprint identification device
Existing fingerprint recognition.
Optionally, described system also includes:
Memory element, for recording time and the coordinate of fingerprint recognition.
Optionally, described system also includes:
Transmitting element, for sending the result of fingerprint recognition to long-distance user.
The technical scheme that the specific embodiment of the invention provides receives the elements of a fix of user, judges user's week according to coordinate
Enclosing and whether have fingerprint identification device, as having fingerprint identification device, prompting user inputs fingerprint with reality in fingerprint identification device
Existing fingerprint recognition, is managed so it has user application, the advantage that user experience is high.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to
Other accompanying drawing is obtained according to these accompanying drawings.
The flow chart of a kind of security protection fingerprint identification method that Fig. 1 provides for the present invention;
The structure chart of a kind of security protection fingerprint recognition system that Fig. 2 provides for the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
Flow process refering to a kind of security protection fingerprint identification method that Fig. 1, Fig. 1 provide for the present invention the first better embodiment
Figure, the method is completed by mobile phone, and the method is as it is shown in figure 1, comprise the steps:
Step S101, the elements of a fix of reception user;
Step S102, foundation coordinate judge whether have fingerprint identification device around user;
Step S103, as having fingerprint identification device, prompting user input in fingerprint identification device fingerprint with realization refer to
Stricture of vagina identification.
The technical scheme that the specific embodiment of the invention provides receives the elements of a fix of user, judges user's week according to coordinate
Enclosing and whether have fingerprint identification device, as having fingerprint identification device, prompting user inputs fingerprint with reality in fingerprint identification device
Existing fingerprint recognition, so it has the advantage that online music course realizes about class.
Optionally, said method can also include after step s 103:
The time of record fingerprint recognition and coordinate.
Optionally, said method can also include after step s 103:
The result of fingerprint recognition is sent to long-distance user.
A kind of security protection fingerprint recognition system provided for the present invention the second better embodiment refering to Fig. 2, Fig. 2, this system
Including:
Receive unit 201, for receiving the elements of a fix of user;
Judging unit 202, for judging whether have fingerprint identification device around user according to coordinate;
Tip element 203, for such as having fingerprint identification device, prompting user input in fingerprint identification device fingerprint with
Realize fingerprint recognition.
The technical scheme that the specific embodiment of the invention provides receives the elements of a fix of user, judges user's week according to coordinate
Enclosing and whether have fingerprint identification device, as having fingerprint identification device, prompting user inputs fingerprint with reality in fingerprint identification device
Existing fingerprint recognition, so it has the advantage that online music course realizes about class.
Optionally, said system can also include:
Memory element 204, for recording time and the coordinate of fingerprint recognition.
Optionally, said system can also include:
Transmitting element 205, for sending the result of fingerprint recognition to long-distance user.
It should be noted that for aforesaid each method embodiment or embodiment, in order to be briefly described, therefore by its all table
Stating as a series of combination of actions, but those skilled in the art should know, the present invention is not by described sequence of movement
Restriction, because of according to the present invention, some step can use other orders or carry out simultaneously.Secondly, people in the art
Member also should know, embodiment described in the specification or embodiment belong to preferred embodiment, involved action and list
Necessary to the unit not necessarily present invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment
Point, may refer to the associated description of other embodiments.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device can merge according to actual needs, divides and delete.This area
The feature of the different embodiments described in this specification and different embodiment can be combined or combine by technical staff.
Through the above description of the embodiments, those skilled in the art it can be understood that to the present invention permissible
Realize with hardware, or firmware realizes, or combinations thereof mode realizes.When implemented in software, can be by above-mentioned functions
It is stored in computer-readable medium or is transmitted as the one or more instructions on computer-readable medium or code.Meter
Calculation machine computer-readable recording medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to from a place to another
The individual local any medium transmitting computer program.Storage medium can be any usable medium that computer can access.With
As a example by this but be not limited to: computer-readable medium can include random access memory (Random Access Memory,
RAM), read only memory (Read-Only Memory, ROM), EEPROM (Electrically
Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read-
Only Memory, CD-ROM) or other optical disc storage, magnetic disk storage medium or other magnetic storage apparatus or can be used in
Carry or store and there is instruction or the desired program code of data structure form can be by any other of computer access
Medium.In addition.Any connection can be suitable become computer-readable medium.Such as, if software is to use coaxial cable, light
Fine optical cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio and
The wireless technology of microwave etc from website, server or other remote source, then coaxial cable, optical fiber cable, double
The wireless technology of twisted wire, DSL or such as infrared ray, wireless and microwave etc be included in affiliated medium fixing in.Such as this
Bright used, dish (Disk) and dish (disc) include compress laser disc (CD), laser dish, laser disc, Digital Versatile Disc (DVD),
Floppy disk and Blu-ray Disc, the duplication data of the usual magnetic of its mid-game, dish then carrys out the duplication data of optics with laser.Group above
Close within should also be as being included in the protection domain of computer-readable medium.
In a word, the foregoing is only the preferred embodiment of technical solution of the present invention, be not intended to limit the present invention's
Protection domain.All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, should be included in
Within protection scope of the present invention.
Claims (6)
1. a security protection fingerprint identification method, it is characterised in that described method comprises the steps:
Receive the elements of a fix of user;
Judge whether have fingerprint identification device around user according to coordinate;
As having fingerprint identification device, prompting user inputs fingerprint to realize fingerprint recognition in fingerprint identification device.
Method the most according to claim 1, it is characterised in that described method also includes:
The time of record fingerprint recognition and coordinate.
Method the most according to claim 1, it is characterised in that described method also includes:
The result of fingerprint recognition is sent to long-distance user.
4. a security protection fingerprint recognition system, it is characterised in that described system includes:
Receive unit, for receiving the elements of a fix of user;
Judging unit, for judging whether have fingerprint identification device around user according to coordinate;
Tip element, for such as having fingerprint identification device, prompting user inputs fingerprint to realize referring in fingerprint identification device
Stricture of vagina identification.
System the most according to claim 4, it is characterised in that described system also includes:
Memory element, for recording time and the coordinate of fingerprint recognition.
System the most according to claim 4, it is characterised in that described system also includes:
Transmitting element, for sending the result of fingerprint recognition to long-distance user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610795865.0A CN106326875A (en) | 2016-08-31 | 2016-08-31 | Security protection fingerprint recognition method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610795865.0A CN106326875A (en) | 2016-08-31 | 2016-08-31 | Security protection fingerprint recognition method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106326875A true CN106326875A (en) | 2017-01-11 |
Family
ID=57786412
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610795865.0A Pending CN106326875A (en) | 2016-08-31 | 2016-08-31 | Security protection fingerprint recognition method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106326875A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018040029A1 (en) * | 2016-08-31 | 2018-03-08 | 张北江 | Security fingerprint recognition method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102800140A (en) * | 2012-07-19 | 2012-11-28 | 杭州九树网络科技有限公司 | Intelligent lock system and remote unlocking/locking method |
CN105257145A (en) * | 2015-09-07 | 2016-01-20 | 宁波耀龙软件科技有限公司 | Remote safe box |
AU2016200250A1 (en) * | 2004-10-25 | 2016-02-11 | Security First Corp. | Method and apparatus for managing access to data |
-
2016
- 2016-08-31 CN CN201610795865.0A patent/CN106326875A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2016200250A1 (en) * | 2004-10-25 | 2016-02-11 | Security First Corp. | Method and apparatus for managing access to data |
CN102800140A (en) * | 2012-07-19 | 2012-11-28 | 杭州九树网络科技有限公司 | Intelligent lock system and remote unlocking/locking method |
CN105257145A (en) * | 2015-09-07 | 2016-01-20 | 宁波耀龙软件科技有限公司 | Remote safe box |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018040029A1 (en) * | 2016-08-31 | 2018-03-08 | 张北江 | Security fingerprint recognition method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106157196A (en) | The evaluation methodology in house and system | |
CN106293528A (en) | Dropbox stores the method and system of big data | |
CN106294010A (en) | The storage method and system of big data in distributed system | |
CN106294011A (en) | The big date storage method of sort-type and system | |
CN106294637A (en) | Realize the method and system of phonetic search | |
CN106241504A (en) | The method and system of foot Bit andits control vertical coil winding machine | |
CN106254662A (en) | Interior of mobile phone control method and system | |
CN106326875A (en) | Security protection fingerprint recognition method and system | |
CN106253787A (en) | The rotating speed method and system of closed loop control horizontal coil winding machine | |
CN106161799A (en) | The method for closing of application program of mobile phone and system | |
CN106331323A (en) | Method and system for sorting apps according to place | |
CN106303036A (en) | The hidden method of app and system under specific use scene | |
CN106294818A (en) | Personalization realizes app sort method and system | |
CN106144800A (en) | Mobile phone shakes the method and system controlling elevator | |
CN106296859A (en) | The attendance recording method of GPRS and system in security protection | |
CN106241503A (en) | Vertical coil winding machine control method based on pressure and system | |
CN106294645A (en) | Different part of speech realization method and systems in big data search | |
CN106130420A (en) | Vertical coil winding machine method for controlling number of revolution based on motor and system | |
CN106094911A (en) | Closed loop control application process in vertical coil winding machine and system | |
CN106250535A (en) | Application process that key word stores in big data and system | |
CN106326169A (en) | Method and system for replacing mobile phone | |
CN106292438A (en) | The open-loop control method of horizontal coil winding machine and system | |
CN106331326A (en) | Time-based method and system for dynamically adjusting hidden app | |
CN106325318A (en) | Application method of open-loop control in vertical winding machine and application system thereof | |
CN106303040A (en) | Different access times determine the method and system that app hides |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170111 |