CN109948316A - A kind of finger prints processing method, apparatus and storage medium - Google Patents

A kind of finger prints processing method, apparatus and storage medium Download PDF

Info

Publication number
CN109948316A
CN109948316A CN201910120503.5A CN201910120503A CN109948316A CN 109948316 A CN109948316 A CN 109948316A CN 201910120503 A CN201910120503 A CN 201910120503A CN 109948316 A CN109948316 A CN 109948316A
Authority
CN
China
Prior art keywords
fingerprint
user fingerprints
determined
children
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910120503.5A
Other languages
Chinese (zh)
Inventor
董明珠
谭建明
李绍斌
宋德超
孟修文
陈道远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910120503.5A priority Critical patent/CN109948316A/en
Publication of CN109948316A publication Critical patent/CN109948316A/en
Pending legal-status Critical Current

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

This application discloses a kind of finger prints processing method, apparatus and storage mediums, are related to finger prints processing field, to solve the problems, such as that Fingerprint Lock at present on the market is more indiscernible for the fingerprint of the still unshaped children (such as 5 one full year of life children below) of fingerprint.This method comprises: obtaining user fingerprints, and extract ridge and the respective width in valley in the user fingerprints;According to the ridge and the respective width in valley, the type of the user fingerprints is determined;If it is determined that the type of user fingerprints is adult fingerprint, then authentication is carried out using the corresponding fingerprint authentication method of adult fingerprint;If it is determined that the type of user fingerprints is children's fingerprint, then authentication is carried out using the corresponding fingerprint authentication method of children's fingerprint.In this way, realizing the classification of adult fingerprint Yu children's fingerprint, and realize the authentication for children's fingerprint by ridge in user fingerprints and the respective width in valley.

Description

A kind of finger prints processing method, apparatus and storage medium
Technical field
This application involves finger prints processing field more particularly to a kind of finger prints processing method, apparatus and storage mediums.
Background technique
Fingerprint Lock is a kind of using the fingerprint at human finger position as the intelligent lock of identification carrier and means, it is computer The perfect crystallization of information technology, electronic technology, mechanical technique and modern five gold process.Fingerprint Lock is generally by electronic recognition and control System, mechanical linkage system two parts composition.The uniqueness and non-reproduction of living body finger print determine that Fingerprint Lock is all at present Lock kind the safest in lockset.
However the fingerprint of children prepattern in developmental process, even if Fingerprint Lock saves the fingerprint of children, but due to Children's fingerprint can change, and will lead to failure when carrying out authentication, so Fingerprint Lock on the market is not appropriate at present Children.
Summary of the invention
The embodiment of the present application provides a kind of finger prints processing method, apparatus and storage medium, to solve at present on the market Fingerprint Lock is directed to the more indiscernible problem of fingerprint of the still unshaped children of fingerprint.
In a first aspect, the embodiment of the present application provides a kind of finger prints processing method, this method comprises:
User fingerprints are obtained, and extract ridge and the respective width in valley in the user fingerprints;
According to the ridge and the respective width in valley, the type of the user fingerprints is determined;
If it is determined that the type of user fingerprints is adult fingerprint, then body is carried out using the corresponding fingerprint authentication method of adult fingerprint Part verifying;
If it is determined that the type of user fingerprints is children's fingerprint, then body is carried out using the corresponding fingerprint authentication method of children's fingerprint Part verifying.
Second aspect, the embodiment of the present application provide a kind of finger prints processing method, this method comprises:
Show fingerprint pattern set interface;
According to the type that user inputs in the fingerprint pattern set interface, fingerprint typing request is generated;Wherein, the type Refer to adult fingerprint or children's fingerprint;
The fingerprint typing request of generation is sent to Fingerprint Lock.
The third aspect, the embodiment of the present application provide a kind of finger prints processing device, which includes:
Module is obtained, for obtaining user fingerprints, and extracts ridge and the respective width in valley in the user fingerprints;
Determining module, for determining the type of the user fingerprints according to the ridge and the respective width in valley;
First authentication module, it is for if it is determined that the type of user fingerprints is adult fingerprint, then corresponding using adult fingerprint Fingerprint authentication method carries out authentication;
Second authentication module, it is for if it is determined that the type of user fingerprints is children's fingerprint, then corresponding using children's fingerprint Fingerprint authentication method carries out authentication.
Fourth aspect, the embodiment of the present application provide a kind of finger prints processing device, which includes:
First display module, for showing fingerprint pattern set interface;
First generation module, the type for being inputted according to user in the fingerprint pattern set interface generate fingerprint record Enter request;Wherein, the type refers to adult fingerprint or children's fingerprint;
First sending module, for the fingerprint typing request of generation to be sent to Fingerprint Lock.
5th aspect, another embodiment of the application additionally provide a kind of computing device, including at least one processor;With And;
The memory being connect at least one described processor communication;Wherein, the memory be stored with can by it is described extremely The instruction that a few processor executes, described instruction are executed by least one described processor, so that at least one described processing Device is able to carry out a kind of finger prints processing method provided by the embodiments of the present application.
6th aspect, another embodiment of the application additionally provide a kind of computer storage medium, wherein the computer is deposited Storage media is stored with computer executable instructions, and the computer executable instructions are for making computer execute the embodiment of the present application One of finger prints processing method.
A kind of finger prints processing method, apparatus provided by the embodiments of the present application and storage medium, the user obtained by judgement Ridge and the width in valley are adult fingerprint or children's fingerprint than the user fingerprints to determine acquisition in fingerprint;And according to determining finger Line type selects corresponding fingerprint authentication method to carry out authentication.In this way, passing through ridge in user fingerprints and the respective width in valley Degree, realizes the classification of adult fingerprint Yu children's fingerprint, and realize the authentication for children's fingerprint.
Other features and advantage will illustrate in the following description, also, partly become from specification It obtains it is clear that being understood and implementing the application.The purpose of the application and other advantages can be by written explanations Specifically noted structure is achieved and obtained in book, claims and attached drawing.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the flow diagram one of fingerprint processing method in the embodiment of the present application;
Fig. 2 is the flow diagram two of fingerprint processing method in the embodiment of the present application;
Fig. 3 is the flow diagram of typing fingerprint in the embodiment of the present application;
Fig. 4 is the flow diagram three of fingerprint processing method in the embodiment of the present application;
Fig. 5 is fingerprint processing structure schematic diagram one in the embodiment of the present application;
Fig. 6 is fingerprint processing structure schematic diagram two in the embodiment of the present application;
Fig. 7 is the structural schematic diagram according to the computing device of the application embodiment.
Specific embodiment
In order to solve the problems, such as that Fingerprint Lock at present on the market is more indiscernible for the fingerprint of the still unshaped children of fingerprint, A kind of finger prints processing method, apparatus and storage medium are provided in the embodiment of the present application.In order to better understand the embodiment of the present application The technical solution of offer does the basic principle of the program once briefly describe here:
1, fingerprint typing
Terminal is attached by close range communication techniques and Fingerprint Lock;Such as: wireless blue tooth technology.After successful connection, if Typing fingerprint is needed, terminal can choose typing adult fingerprint or children's fingerprint, and the request of fingerprint typing is sent to finger Line lock;After Fingerprint Lock receives request, need first to obtain the authorization of administrator, authorization acquires fingerprint after passing through, by the finger of acquisition Line is corresponding with fingerprint pattern to be saved.
2, fingerprint recognition
When carrying out fingerprint recognition, Fingerprint Lock obtain user fingerprints, and according to ridge in the user fingerprints of acquisition with valley respectively Width come the user fingerprints for determining acquisition be adult fingerprint or children's fingerprint;If adult fingerprint, then using adult fingerprint Corresponding fingerprint authentication method carries out authentication;If children's fingerprint, then the corresponding fingerprint authentication method of children's fingerprint is used Carry out authentication.
Finger prints processing is described in detail from Fingerprint Lock side below by specific embodiment.Fig. 1 is finger prints processing side The flow diagram of method, comprising the following steps:
Step 101: receiving the fingerprint typing request that terminal is sent, include fingerprint to be logged in the fingerprint typing request Type.
Wherein, the type of fingerprint to be logged includes adult fingerprint and children's fingerprint.
Step 102: being requested according to the fingerprint typing, acquire fingerprint.
Wherein, the fingerprint sensor used includes but is not limited to optical fingerprint sensor and semiconductor fingerprint sensor;It adopts It is 8 times that the number of collection, which has altogether, that is, the fingerprint characteristic for acquiring same finger different location is 8 times total, every time by the feature to fingerprint Point extracts and picture reinforcement processing.
In one embodiment, when Fingerprint Lock has acquired fingerprint, the information that an acquisition is completed can be sent to terminal, The information can make terminal be named the fingerprint;Such as: fingerprint 1, index finger or the name of children.
Step 103: extracting the characteristic point of the fingerprint of acquisition.
Step 104: by the corresponding storage of the type of the characteristic point of extraction, the fingerprint of acquisition and the fingerprint.
In this way, carrying out the typing of fingerprint by terminal, the safety of Fingerprint Lock can be improved.
In the embodiment of the present application, it before Fingerprint Lock executes step 102, needs to obtain the authorization of administrator, specifically may be used It is embodied as step A1-A2:
Step A1: the request of administrator's typing fingerprint is issued.
Wherein, administrator is the user that the Fingerprint Lock carries out fingerprint typing for the first time, and the user is generally the family of children Long or other children legal guardians.Fingerprint Lock can be issued by voice and be requested, or the number flashed by indicator light Issue request.As long as the application does not limit this when it is implemented, can issue request is applicable to the embodiment of the present application It is fixed.
Step A2: acquiring the fingerprint of typing, and determines that the fingerprint of typing is the fingerprint of the administrator prestored.
In this way, the safety of fingerprint typing can be improved by the authorization of administrator.
In one embodiment, when Fingerprint Lock receives fingerprint typing request, it can be sent to terminal and obtain authorization Information, administrator can confirm authorization at the terminal, and the information of confirmation authorization is sent to Fingerprint Lock, to complete authorization behaviour Make.
In the embodiment of the present application, it after the finger print information management request of the transmission in receive, can be carried out according to request Operation, it is specific implementable are as follows: to receive the finger print information management that terminal is sent and request and execute operation.Wherein, the management request In include user terminal fingerprint management interface select user identifier and corresponding finger print information management operation.Such as: The finger print information of preservation is deleted or is added new fingerprint etc..In this way, by management of the terminal to Fingerprint Lock, so that right It is simpler in the management of fingerprint, improve the experience of user.
Described above by Fingerprint Lock side how typing fingerprint, below by specific embodiment from terminal side to fingerprint Processing is described in detail.Fig. 2 is the flow diagram of finger prints processing method, comprising the following steps:
Step 201: display fingerprint pattern set interface.
Wherein, Fingerprint Lock can be controlled using the application of control Fingerprint Lock in terminal.
Step 202: the type inputted according to user in the fingerprint pattern set interface generates fingerprint typing request.
Wherein, the type includes adult fingerprint and children's fingerprint.
Step 203: the fingerprint typing request of generation is sent to Fingerprint Lock.
In this way, carrying out the typing of fingerprint by terminal, the safety of Fingerprint Lock can be improved.
It should be noted that the equipment that terminal can be attached for mobile phone, tablet computer etc. with Fingerprint Lock.
In the embodiment of the present application, terminal can be attached with Fingerprint Lock by close range communication techniques, in this way, being convenient for Management to Fingerprint Lock realizes the intelligence of Fingerprint Lock.
In the embodiment of the present application, terminal can be managed the finger print information of Fingerprint Lock, specific implementable for step B1-B3:
Step B1: showing fingerprint management interface, includes the finger print information of at least one user in the interface.
Step B2: the operation according to user at the fingerprint management interface generates finger print information management request.
It wherein, include user identifier that user selects at the fingerprint management interface in the management request and corresponding The management of finger print information operates.
Step B3: finger print information management request is sent to Fingerprint Lock and is executed.
In this way, improving the body of user so that the management for fingerprint is simpler by management of the terminal to Fingerprint Lock It tests.
To understand technical solution provided by the embodiments of the present application convenient for systematicness, below by specific example to this progress It further illustrates, the case where this programme is when selecting fingerprint pattern as children's fingerprint.As shown in Figure 3, comprising the following steps:
Step 301: children's fingerprint that terminal is inputted according to user in the fingerprint pattern set interface that terminal is shown, generation refer to Line typing request.
Step 302: the fingerprint typing request of generation is sent to Fingerprint Lock by terminal.
Step 303: the request of Fingerprint Lock sending administrator's typing fingerprint.
Step 304: Fingerprint Lock acquires the fingerprint of typing, and determines that the fingerprint of typing is the fingerprint of the administrator prestored.
Step 305: Fingerprint Lock is requested according to the fingerprint typing, acquires fingerprint.
Step 306: Fingerprint Lock sends the information that an acquisition is completed to terminal.
Step 307: Fingerprint Lock extracts the characteristic point of the fingerprint of acquisition.
Step 308: the type of the characteristic point of extraction, the fingerprint of acquisition and the fingerprint is corresponded to storage by Fingerprint Lock.
Be described above how typing fingerprint, from Fingerprint Lock side finger prints processing is carried out below by specific embodiment detailed Explanation.Fig. 4 is the flow diagram of finger prints processing method, comprising the following steps:
Step 401: obtaining user fingerprints, and extract ridge and the respective width in valley in the user fingerprints.
Wherein, the ridge in fingerprint refers to the lines of finger surface protrusion, and valley is the gully part between ridge and ridge.
Step 402: according to the ridge and the respective width in valley, determining the type of the user fingerprints;
Wherein, the type refers to adult fingerprint or children's fingerprint.
Step 403: if it is determined that the type of user fingerprints is adult fingerprint, then using the corresponding fingerprint authentication side of adult fingerprint Method carries out authentication.
Step 404: if it is determined that the type of user fingerprints is children's fingerprint, then using the corresponding fingerprint authentication side of children's fingerprint Method carries out authentication.
In this way, the classification of adult fingerprint Yu children's fingerprint is realized by ridge in user fingerprints and the respective width in valley, with And realize authentication for children's fingerprint.
In the embodiment of the present application, specific implementable for step C1-C3 when Fingerprint Lock executes step 402:
Step C1: judge whether the width ratio in ridge and valley is greater than predetermined width ratio.
Wherein, ridge can change with valley width ratio with the age, growth period, and the width ratio in ridge and valley is greater than predetermined width ratio; The width ratio in maturity period, ridge and valley is close to predetermined width ratio;The width ratio in declining period, ridge and valley is less than predetermined width ratio.
Step C2: if more than, it is determined that the user fingerprints are children's fingerprints.
Step C3: if being not more than, it is determined that the user fingerprints are adult fingerprints.
In this way, the width ratio by judging ridge and valley, realizes the classification to adult fingerprint and children's fingerprint, thus according to Classification results carry out different verification methods, so that Fingerprint Lock can be adapted for children.
In the embodiment of the present application, specific implementable for step D1-D6 when Fingerprint Lock executes step 403:
Step D1: extracting multiple characteristic points of the user fingerprints, and determines each characteristic point in the user fingerprints Position.
Step D2: for the feature that each characteristic point judges position of this feature point in the user fingerprints and pre-saves Whether distance of the point between the position in its fingerprint be less than the first pre-determined distance.
Step D3: if less than the first pre-determined distance, it is determined that this feature point successful match;If default not less than described first Distance, it is determined that it fails to match for this feature point.
Step D4: judge that the quantity of the characteristic point of successful match is extracted in the user fingerprints in the user fingerprints The ratio of quantity of characteristic point whether be greater than the first default ratio.
Step D5: if more than the first default ratio, it is determined that authentication success.
Step D6: if being not more than the first default ratio, it is determined that authentication failure.
In this way, determining whether authentication succeeds by the positional relationship for detecting each characteristic point with each characteristic point prestored.
And in the embodiment of the present application, when Fingerprint Lock executes step 403, this application provides two schemes to be identified Children's fingerprint.
Scheme one is specific implementable for step E1-E6:
Step E1: extracting the characteristic point of the user fingerprints, and determines position of each characteristic point in the user fingerprints.
Step E2: for the feature that each characteristic point judges position of this feature point in the user fingerprints and pre-saves Whether distance of the point between the position in its fingerprint be less than the second pre-determined distance.
Wherein, the second pre-determined distance is greater than the first pre-determined distance.
Step E3: if less than the second pre-determined distance, it is determined that this feature point successful match.
Step E4: judge that the quantity of the characteristic point of successful match is extracted in the user fingerprints in the user fingerprints The ratio of quantity of characteristic point whether be greater than the second default ratio.
Wherein, the second default ratio is less than the first default ratio.
Step E5: if more than the second default ratio, it is determined that authentication success.
Step E6: if being not more than the second default ratio, it is determined that authentication failure.
In this way, since children's fingerprint can change, limits the second pre-determined distance and be greater than the first pre-determined distance, second Ratio is preset less than the first default ratio.Even if still can be proved to be successful in this way, children's fingerprint changes.
Scheme one is specific implementable for step F1-F3:
Step F1: the scaling extracted between the user fingerprints and the fingerprint to be matched prestored is determined.
Step F2: the user fingerprints are zoomed in and out according to the determining scaling.
Step F3: authentication is carried out with the fingerprint to be matched prestored according to the user fingerprints after scaling.
In this way, since children's fingerprint can change, and fingerprint changes from small to big, thus by determine the ratio of variation come into Row authentication.Even if still can be proved to be successful in this way, children's fingerprint changes.
In one embodiment, Fingerprint Lock chooses at least one characteristic point as reference characteristic from the characteristic point of extraction Point, using residue character point as test feature point;Determine the distance between each test feature point and reference characteristic point;By each test The distance between characteristic point and reference characteristic point are with pre-saving with each test feature point feature corresponding with reference characteristic point The ratio of the distance between point is compared;If ratio is identical, judge position of each characteristic point in the user fingerprints with The characteristic point pre-saved is in its fingerprint by the ratio such as described ratio.
In the embodiment of the present application, when adult fingerprint or children's fingerprint authentication fail, user's checking can be prompted to fail, And record the number of failure.When the number of failure is greater than preset times, then can sound an alarm.In this way, improving Fingerprint Lock Safety.
Based on identical inventive concept, the embodiment of the present application also provides a kind of finger prints processing devices.As shown in figure 5, should Device includes:
Module 501 is obtained, for obtaining user fingerprints, and extracts ridge and the respective width in valley in the user fingerprints;
Determining module 502, for determining the type of the user fingerprints according to the ridge and the respective width in valley;
First authentication module 503, for if it is determined that the type of user fingerprints is adult fingerprint, then the adult fingerprint of use to be corresponding Fingerprint authentication method carry out authentication;
Second authentication module 504, for if it is determined that the type of user fingerprints is children's fingerprint, then using children's fingerprint correspondence Fingerprint authentication method carry out authentication.
Further, determining module 502 includes:
First judging unit, for judging the width of ridge and valley than whether being greater than predetermined width ratio;
First determination unit, for if more than, it is determined that the user fingerprints are children's fingerprints;
Second determination unit, if for being not more than, it is determined that the user fingerprints are adult fingerprints.
Further, the first authentication module 503 includes:
First extraction unit for extracting multiple characteristic points of the user fingerprints, and determines each characteristic point in the use Position in the fingerprint of family;
Second judgment unit judges position of this feature point in the user fingerprints for executing for each characteristic point Whether less than the first pre-determined distance at a distance from the characteristic point that pre-saves is between the position in its fingerprint;If pre- less than first If distance, it is determined that this feature point successful match;If being not less than first pre-determined distance, it is determined that the matching of this feature point is lost It loses;
Third judging unit, for judge in the user fingerprints quantity of the characteristic point of successful match in the user Whether the ratio of the quantity for the characteristic point extracted in fingerprint is greater than the first default ratio;
Third determination unit, for if more than the first default ratio, it is determined that authentication success;
4th determination unit, if for being not more than the first default ratio, it is determined that authentication failure.
Further, the second authentication module 504 includes:
Second extraction unit for extracting the characteristic point of the user fingerprints, and determines that each characteristic point refers in the user Position in line;
4th judging unit, for for each characteristic point judge position of this feature point in the user fingerprints and in advance Whether distance of the characteristic point of preservation between the position in its fingerprint be less than the second pre-determined distance;Wherein, the second pre-determined distance Greater than the first pre-determined distance;
5th determination unit, if for less than the second pre-determined distance, it is determined that this feature point successful match;
5th judging unit, for judge in the user fingerprints quantity of the characteristic point of successful match in the user Whether the ratio of the quantity for the characteristic point extracted in fingerprint is greater than the second default ratio;Wherein, the second default ratio is less than first Default ratio;
6th determination unit, for if more than the second default ratio, it is determined that authentication success;
7th determination unit, if for being not more than the second default ratio, it is determined that authentication failure.
Further, the second authentication module 504 includes:
8th determination unit, for determining the pantograph ratio extracted between the user fingerprints and the fingerprint to be matched prestored Example;
Unit for scaling, for being zoomed in and out according to the determining scaling to the user fingerprints;
Identity authenticating unit is tested for carrying out identity with the fingerprint to be matched prestored according to the user fingerprints after scaling Card.
Further, corresponding device further include:
First receiving module, include for receiving the fingerprint typing request of terminal transmission, in fingerprint typing request to The type of typing fingerprint;Wherein, the type refers to adult fingerprint or children's fingerprint;
First acquisition module acquires fingerprint for requesting according to the fingerprint typing;
Extraction module, the characteristic point of the fingerprint for extracting acquisition;
Memory module, the fingerprint of characteristic point, acquisition for that will extract and the corresponding storage of the type of the fingerprint.
Further, corresponding device further include:
Request module is requested for the first acquisition module according to the fingerprint typing, before acquiring fingerprint, issues administrator The request of typing fingerprint;
Second acquisition module for acquiring the fingerprint of typing, and determines that the fingerprint of typing is the fingerprint of the administrator prestored.
Further, corresponding device further include:
Second receiving module, the finger print information management for receiving terminal transmission request and execute operation;Wherein, the pipe It include the management behaviour of user identifier and corresponding finger print information that user selects at the fingerprint management interface of terminal in reason request Make.
Based on identical inventive concept, the embodiment of the present application also provides a kind of finger prints processing devices.As shown in fig. 6, should Device includes:
First display module 601, for showing fingerprint pattern set interface;
First generation module 602, the type for being inputted according to user in the fingerprint pattern set interface generate fingerprint Typing request;Wherein, the type refers to adult fingerprint or children's fingerprint;
First sending module 603, for the fingerprint typing request of generation to be sent to Fingerprint Lock.
Further, corresponding device further include:
Link block, for being attached by close range communication techniques and Fingerprint Lock.
Further, corresponding device further include:
Second display module includes the finger print information of at least one user for showing fingerprint management interface, in the interface;
Second generation module generates finger print information management and asks for the operation according to user at the fingerprint management interface It asks;Wherein, in the management request include user identifier and corresponding fingerprint that user selects at the fingerprint management interface The management of information operates;
Second sending module is executed for finger print information management request to be sent to Fingerprint Lock.
After describing the finger prints processing method and device of the application illustrative embodiments, next, introducing basis The computing device of the another exemplary embodiment of the application.
Person of ordinary skill in the field it is understood that the various aspects of the application can be implemented as system, method or Program product.Therefore, the various aspects of the application can be with specific implementation is as follows, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
In some possible embodiments, according to an embodiment of the present application, computing device can include at least at least one A processor and at least one processor.Wherein, memory is stored with program code, when program code is executed by processor When, so that processor executes the finger prints processing method according to the various illustrative embodiments of the application of this specification foregoing description In step 401-404.
The computing device 70 of this embodiment according to the application is described referring to Fig. 7.The calculating dress that Fig. 7 is shown Setting 70 is only an example, should not function to the embodiment of the present application and use scope bring any restrictions.The computing device Such as can be mobile phone, tablet computer etc..
As shown in fig. 7, computing device 70 is showed in the form of general-purpose calculating appts.The component of computing device 70 may include But it is not limited to: at least one above-mentioned processor 71, above-mentioned at least one processor 72, (including the storage of the different system components of connection Device 72 and processor 71) bus 73.
Bus 711 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, processor or the local bus using any bus structures in a variety of bus structures.
Memory 72 may include the readable medium of form of volatile memory, such as random access memory (RAM) 721 And/or cache memory 722, it can further include read-only memory (ROM) 723.
Memory 72 can also include program/utility 725 with one group of (at least one) program module 724, this The program module 724 of sample includes but is not limited to: operating system, one or more application program, other program modules and journey It may include the realization of network environment in ordinal number evidence, each of these examples or certain combination.
Computing device 70 can also be communicated with one or more external equipments 74 (such as sensing equipment etc.), can also be with one Or it is multiple enable a user to the equipment interacted with computing device 70 communication, and/or with enable the computing device 70 and one Or any equipment (such as router, modem etc.) communication that a number of other computing devices are communicated.This communication can To be carried out by input/output (I/O) interface 75.Also, computing device 70 can also by network adapter 76 and one or The multiple networks of person (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown, Network adapter 76 is communicated by bus 73 with other modules for computing device 70.It will be appreciated that though be not shown in the figure, Other hardware and/or software module can be used in conjunction with computing device 70, including but not limited to: microcode, device driver, superfluous Remaining processor, external disk drive array, RAID system, tape drive and data backup storage system etc..
In some possible embodiments, the various aspects of finger prints processing method provided by the present application are also implemented as A kind of form of program product comprising program code, when program product is run on a computing device, program code is used for Computer equipment is set to execute the finger prints processing method according to the various illustrative embodiments of the application of this specification foregoing description In step, execute step 401-404 as shown in Figure 4.
Program product can be using any combination of one or more readable mediums.Readable medium can be readable signal Jie Matter or readable storage medium storing program for executing.Readable storage medium storing program for executing for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, infrared The system of line or semiconductor, device or device, or any above combination.The more specific example of readable storage medium storing program for executing is (non- The list of exhaustion) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), Read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, the read-only storage of portable compact disc Device (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The finger prints processing method of the application embodiment can be using portable compact disc read only memory (CD-ROM) simultaneously Including program code, and can run on the computing device.However, the program product of the application is without being limited thereto, in this document, Readable storage medium storing program for executing can be any tangible medium for including or store program, which can be commanded execution system, device Either device use or in connection.
Readable signal medium may include in a base band or as the data-signal that carrier wave a part is propagated, wherein carrying Readable program code.The data-signal of this propagation can take various forms, including --- but being not limited to --- electromagnetism letter Number, optical signal or above-mentioned any appropriate combination.Readable signal medium can also be other than readable storage medium storing program for executing it is any can Read medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Program in connection.
The program code for including on readable medium can transmit with any suitable medium, including --- but being not limited to --- Wirelessly, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the application operation program Code, programming language include object oriented program language-Java, C++ etc., further include conventional process Formula programming language-such as " C " language or similar programming language.Program code can be calculated fully in user It executes on device, partly execute on a user device, executing, as an independent software package partially in user's computing device Upper part executes on remote computing device or executes on remote computing device or server completely.It is being related to remotely counting In the situation for calculating device, remote computing device can pass through the network of any kind --- including local area network (LAN) or wide area network (WAN)-it is connected to user's computing device, or, it may be connected to external computing device (such as provided using Internet service Quotient is connected by internet).
It should be noted that although being referred to several unit or sub-units of device in the above detailed description, this stroke It point is only exemplary not enforceable.In fact, according to presently filed embodiment, it is above-described two or more The feature and function of unit can embody in a unit.Conversely, the feature and function of an above-described unit can It is to be embodied by multiple units with further division.
In addition, although in the accompanying drawings sequentially to describe the operation of the application method, this does not require that or implies These operations must be sequentially executed according to this, or have to carry out operation shown in whole and be just able to achieve desired result.It is attached Add ground or it is alternatively possible to omit certain steps, multiple steps are merged into a step and are executed, and/or by a step point Solution is execution of multiple steps.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with side In the computer-readable memory of formula work, so that it includes instruction dress that instruction stored in the computer readable memory, which generates, The manufacture set, the command device are realized in one box of one or more flows of the flowchart and/or block diagram or multiple The function of being specified in box.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications can be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies Within, then the application is also intended to include these modifications and variations.

Claims (15)

1. a kind of finger prints processing method, which is characterized in that the described method includes:
User fingerprints are obtained, and extract ridge and the respective width in valley in the user fingerprints;
According to the ridge and the respective width in valley, the type of the user fingerprints is determined;
If it is determined that the type of user fingerprints is adult fingerprint, then identity is carried out using the corresponding fingerprint authentication method of adult fingerprint and tested Card;
If it is determined that the type of user fingerprints is children's fingerprint, then identity is carried out using the corresponding fingerprint authentication method of children's fingerprint and tested Card.
2. determining institute the method according to claim 1, wherein described according to the ridge and the respective width in valley The type for stating user fingerprints, specifically includes:
Judge whether the width ratio in ridge and valley is greater than predetermined width ratio;
If more than, it is determined that the user fingerprints are children's fingerprints;
If being not more than, it is determined that the user fingerprints are adult fingerprints.
3. the method according to claim 1, wherein described if it is determined that being adult fingerprint, then using adult fingerprint Corresponding fingerprint authentication method carries out authentication, specifically includes:
Multiple characteristic points of the user fingerprints are extracted, and determine position of each characteristic point in the user fingerprints;
It is executed for each characteristic point, judges position of this feature point in the user fingerprints with the characteristic point that pre-saves at it Whether the distance between position in fingerprint is less than the first pre-determined distance;If less than the first pre-determined distance, it is determined that this feature point Successful match;If being not less than first pre-determined distance, it is determined that it fails to match for this feature point;
Judge the quantity of the characteristic point of successful match in the user fingerprints and the characteristic point extracted in the user fingerprints Whether the ratio of quantity is greater than the first default ratio;
If more than the first default ratio, it is determined that authentication success;
If being not more than the first default ratio, it is determined that authentication failure.
4. according to the method described in claim 3, it is characterized in that, described if it is determined that being children's fingerprint, then using children's fingerprint Corresponding fingerprint authentication method carries out authentication, specifically includes:
The characteristic point of the user fingerprints is extracted, and determines position of each characteristic point in the user fingerprints;
It is executed for each characteristic point:
Judge this feature point in the position in the user fingerprints and the characteristic point pre-saved between the position in its fingerprint Distance whether less than the second pre-determined distance;Wherein, the second pre-determined distance is greater than the first pre-determined distance;
If less than the second pre-determined distance, it is determined that this feature point successful match;
Judge the quantity of the characteristic point of successful match in the user fingerprints and the characteristic point extracted in the user fingerprints Whether the ratio of quantity is greater than the second default ratio;Wherein, the second default ratio is less than the first default ratio;
If more than the second default ratio, it is determined that authentication success;
If being not more than the second default ratio, it is determined that authentication failure.
5. the method according to claim 1, wherein described if it is determined that being children's fingerprint, then using children's fingerprint Corresponding fingerprint authentication method carries out authentication, specifically includes:
Determine the scaling extracted between the user fingerprints and the fingerprint to be matched prestored;
The user fingerprints are zoomed in and out according to the determining scaling;
Authentication is carried out with the fingerprint to be matched prestored according to the user fingerprints after scaling.
6. the method according to claim 1, wherein the method also includes:
The fingerprint typing request that terminal is sent is received, includes the type of fingerprint to be logged in the fingerprint typing request;Wherein, should Type refers to adult fingerprint or children's fingerprint;
It is requested according to the fingerprint typing, acquires fingerprint;
Extract the characteristic point of the fingerprint of acquisition;
By the corresponding storage of the type of the characteristic point of extraction, the fingerprint of acquisition and the fingerprint.
7. according to the method described in claim 6, it is characterized in that, it is described according to the fingerprint typing request, acquisition fingerprint it Before, the method also includes:
Issue the request of administrator's typing fingerprint;
The fingerprint of typing is acquired, and determines that the fingerprint of typing is the fingerprint of the administrator prestored.
8. the method according to claim 1, wherein the method also includes:
The finger print information management that terminal is sent is received to request and execute operation;It wherein, include user at end in the management request The user identifier of the fingerprint management interface selection at end and the management operation of corresponding finger print information.
9. a kind of finger prints processing method, which is characterized in that the described method includes:
Show fingerprint pattern set interface;
According to the type that user inputs in the fingerprint pattern set interface, fingerprint typing request is generated;Wherein, the type refers into People's fingerprint or children's fingerprint;
The fingerprint typing request of generation is sent to Fingerprint Lock.
10. according to the method described in claim 9, it is characterized in that, the method also includes:
It is attached by close range communication techniques and Fingerprint Lock.
11. method according to claim 9 or 10, which is characterized in that the method also includes:
It shows fingerprint management interface, includes the finger print information of at least one user in the interface;
Operation according to user at the fingerprint management interface generates finger print information management request;Wherein, in the management request Management operation including user identifier and corresponding finger print information that user selects at the fingerprint management interface;
Finger print information management request is sent to Fingerprint Lock to execute.
12. a kind of finger prints processing device, which is characterized in that described device includes:
Module is obtained, for obtaining user fingerprints, and extracts ridge and the respective width in valley in the user fingerprints;
Determining module, for determining the type of the user fingerprints according to the ridge and the respective width in valley;
First authentication module, for if it is determined that the type of user fingerprints is adult fingerprint, then using the corresponding fingerprint of adult fingerprint Verification method carries out authentication;
Second authentication module, for if it is determined that the type of user fingerprints is children's fingerprint, then using the corresponding fingerprint of children's fingerprint Verification method carries out authentication.
13. a kind of finger prints processing device, which is characterized in that described device includes:
First display module, for showing fingerprint pattern set interface;
First generation module, the type for being inputted according to user in the fingerprint pattern set interface generate fingerprint typing and ask It asks;Wherein, the type refers to adult fingerprint or children's fingerprint;
First sending module, for the fingerprint typing request of generation to be sent to Fingerprint Lock.
14. a kind of computer-readable medium, is stored with computer executable instructions, which is characterized in that the computer is executable Instruction is for executing the method as described in any claim in claim 1-11.
15. a kind of computing device characterized by comprising
At least one processor;And the memory being connect at least one described processor communication;Wherein, the memory is deposited The instruction that can be executed by least one described processor is contained, described instruction is executed by least one described processor, so that institute It states at least one processor and is able to carry out method as described in any claim in claim 1-11.
CN201910120503.5A 2019-02-18 2019-02-18 A kind of finger prints processing method, apparatus and storage medium Pending CN109948316A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910120503.5A CN109948316A (en) 2019-02-18 2019-02-18 A kind of finger prints processing method, apparatus and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910120503.5A CN109948316A (en) 2019-02-18 2019-02-18 A kind of finger prints processing method, apparatus and storage medium

Publications (1)

Publication Number Publication Date
CN109948316A true CN109948316A (en) 2019-06-28

Family

ID=67006747

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910120503.5A Pending CN109948316A (en) 2019-02-18 2019-02-18 A kind of finger prints processing method, apparatus and storage medium

Country Status (1)

Country Link
CN (1) CN109948316A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851811A (en) * 2019-11-15 2020-02-28 美的集团股份有限公司 Method and device for preventing misoperation of equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660719A (en) * 2015-03-20 2015-05-27 云丁网络技术(北京)有限公司 Electronic lock system and intelligent management achieving implementation method thereof
CN106599666A (en) * 2016-12-21 2017-04-26 北京小米移动软件有限公司 Method and device for starting child mode
CN107016546A (en) * 2017-03-31 2017-08-04 上海族蚂信息科技有限公司 A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism
US20170365147A1 (en) * 2016-06-15 2017-12-21 Amanda Pence Fingerprint reader child tracking system
CN108683947A (en) * 2018-03-22 2018-10-19 江苏大丰和顺电子有限公司 A kind of television set fingerprint power control and control method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660719A (en) * 2015-03-20 2015-05-27 云丁网络技术(北京)有限公司 Electronic lock system and intelligent management achieving implementation method thereof
US20170365147A1 (en) * 2016-06-15 2017-12-21 Amanda Pence Fingerprint reader child tracking system
CN106599666A (en) * 2016-12-21 2017-04-26 北京小米移动软件有限公司 Method and device for starting child mode
CN107016546A (en) * 2017-03-31 2017-08-04 上海族蚂信息科技有限公司 A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism
CN108683947A (en) * 2018-03-22 2018-10-19 江苏大丰和顺电子有限公司 A kind of television set fingerprint power control and control method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851811A (en) * 2019-11-15 2020-02-28 美的集团股份有限公司 Method and device for preventing misoperation of equipment
CN110851811B (en) * 2019-11-15 2022-02-15 美的集团股份有限公司 Method and device for preventing misoperation of equipment

Similar Documents

Publication Publication Date Title
CN104639517B (en) The method and apparatus for carrying out authentication using human body biological characteristics
EP2339496A1 (en) System and method of biometric authentication using multiple kinds of templates
CN109726763A (en) A kind of information assets recognition methods, device, equipment and medium
CN105447454A (en) Fingerprint template improving method, device and terminal device
CN105447927B (en) Control method, access controller and the access control system that gate inhibition's electric lock is opened
CN105141427B (en) A kind of login authentication method, apparatus and system based on Application on Voiceprint Recognition
US8260060B2 (en) Comparison method, comparison system, computer, and program
CN106713370B (en) A kind of identity identifying method, server and mobile terminal
CN106372483A (en) Information verification method and system
US10878071B2 (en) Biometric authentication anomaly detection
CN111506889B (en) User verification method and device based on similar user group
CN109887187A (en) A kind of pickup processing method, device, equipment and storage medium
CN109523266A (en) A kind of payment authentication method, method of payment, system and electronic equipment
CN105809023A (en) Password verification method and device
CN112084476A (en) Biological identification identity verification method, client, server, equipment and system
CN110119746A (en) A kind of characteristic recognition method and device, computer readable storage medium
CN105187412B (en) A kind of login authentication method based on gesture identification, apparatus and system
CN113826135B (en) System, method and computer system for contactless authentication using voice recognition
CN107548059A (en) A kind of authentication method and system
CN109948316A (en) A kind of finger prints processing method, apparatus and storage medium
CN112351047B (en) Double-engine based voiceprint identity authentication method, device, equipment and storage medium
CN106250755A (en) For generating the method and device of identifying code
KR20140078242A (en) System and method for attendance and absence management using biometrics and location sensing in terminal
US20210028938A1 (en) Enrollment device and method of facilitating enrollment of a biometric template
CN112905437B (en) Method, device and storage medium for testing cases

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190628

RJ01 Rejection of invention patent application after publication