CN102667809A - Fingerprint identification method and fingerprint identification system - Google Patents

Fingerprint identification method and fingerprint identification system Download PDF

Info

Publication number
CN102667809A
CN102667809A CN2009801599385A CN200980159938A CN102667809A CN 102667809 A CN102667809 A CN 102667809A CN 2009801599385 A CN2009801599385 A CN 2009801599385A CN 200980159938 A CN200980159938 A CN 200980159938A CN 102667809 A CN102667809 A CN 102667809A
Authority
CN
China
Prior art keywords
special
spy
identity
sudden
chu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009801599385A
Other languages
Chinese (zh)
Inventor
盛永祥
邢益涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN WINSING TECHNOLOGY CO Ltd
Original Assignee
SHENZHEN WINSING TECHNOLOGY CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN WINSING TECHNOLOGY CO Ltd filed Critical SHENZHEN WINSING TECHNOLOGY CO Ltd
Publication of CN102667809A publication Critical patent/CN102667809A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints

Abstract

A fingerprint identification method and a fingerprint identification system are disclosed. The fingerprint identification method includes the following steps: fingerprint register step, comprising the first fingerprint acquisition step which involves acquiring the fingerprint information to be registered and extracting the fingerprint features from it; speech acquisition step, comprising acquiring the speech information and extracting the speech feature from it; storage step, comprising searching the identification corresponding to the extracted speech feature, and storing the extracted fingerprint feature to the fingerprint feature set corresponding to the identification. A fingerprint identification system is also disclosed. The fingerprint identification method and the fingerprint identification system greatly simplify the authorization setup and the modification flow.

Description

Fingerprint identification method and fingerprint identification system
Condition Fang Fa are He Condition Do Xi System
Mu Collar domains
Originally it is related to the water more fallow land Tax sides of being related to method and Do systems.
Background wood
The lower each every aspects of by Getting walking out people Men daily life of the in Shui He cities.
3] each use Households with Households identity.Stop in Households firstly the need of on each oneself i.e. respectively deposit Chu templates with Households middle extraction spy first.This is in use
If the special template so with the presence or absence of special matching in all templates for itself deposit Chu of each extraction with Households finds the Mo Ban The of matching with Households power is legal and with Households Fou The illegally uses Households with Households.The template of one step may be certain with Households phases with by each control.
4] surface Qing Condition have in daily life.And
Do's.Therefore with Households oneself generally require it is many so as to wherein one be situated between or can completion.
5] however Will with Households template it is certain same there are Mo Ban The modifications to obtain very numb Trouble with Households Will with Households with Households is similar.Even if often an amalgamation method fails not each template with Households template in knowing that still being changed one by one Yong Households The for each template use Households with Households each Jie's template with Households for the Duo Number Do systems that Shou Xian Now have.It is very inconvenient that Yin Ci Now You Do tie up to modification Households uses.
6] such one the effective Ke Fu Now of water scheme are accomplished by there is present in water upper defect. Inner holds
7] this water river Yu Now have each repairing to use the awkward defect provider Fa of Households instead He Do systems.
8] the water scheme in this its skill water river is
9] method includes Bu Sudden Bu Sudden and stopped to include 10] spy is extracted in the information that includes of mono- Bu Sudden
11 Bu Sudden include extracting special in message breath
12] spy that special identity Will is extracted that depositing Chu Bu Sudden includes extracting deposits Chu among the special set of identity.
13] in the method for this offer
14] deposit Chu Bu Sudden be included in find spy identity in
The spy that the identity of spy's generation and the special set Will of identity are extracted deposits Chu among the special set of identity.
15] in the method for this offer
16] among the Ginseng Number set for depositing the identity that Chu is arrived including receiving the Ginseng Number Will that Lose enters including Bu Sudden.
17] in the method for this offer
18] including Bu Sudden includes
19] extract special in bis- Bu Sudden Bao Kuo Do information
20] matching step Sudden includes the Ginseng Number set that the identity Lose comprising the special special set of special set goes out identity.
21] in the method for this offer
22] matching Bu Sudden are included in find goes out prompt message comprising special spy set Lose.
23] this Ti Gong Do systems include
24]
25]
26] in 27] extract special in the information of control
28] extract special in control message breath
29] spy that the special identity Will extracted is extracted deposits Chu among the special set of identity.
30] in this Ti Gong Do systems
31] in find the identity of spy in the identity of spy's generation and the special set Will of the identity spy extracted deposit Chu identity it is special gather among.
32] in this Ti Gong Do systems
33] it is included in and receives among the Ginseng Number set that the Ginseng Number Will that enter of Lose deposit the identity that Chu is arrived.
34] in this Ti Gong Do systems
35] it is included in
36] extract special in control Suo Do information
37] identity of the special special set of special set is included
Lose goes out the Ginseng Number set of identity.
38] in this Ti Gong Do systems in
39] prompt message is gone out comprising special spy set Lose finding.
40] this water scheme has following beneficial effect to be deposited in the water scheme of middle offer by the spy set Will of water foundations Households identity and identity with all of Households among Chu gather to the spy for using Households.And it is such identity or modification identity each special once can or change being set up with the water scheme Will of this offer in Households with Households with Households identity rather than with Households each spy
Change and modification process is conveniently used with Households.In 41] Will He Mission and originally a step
42 1 be the flow according to method Zhong Bu Sudden good this Yi More 43] 2 be the flow 44 according to method Zhong Bu Sudden good this Yi More] 3 it is signal according to this Yi More Jia Do systems.
Not mode
45] this purpose, water scheme and be more clearly understood following He Mission and
This step.Understand that this her stops originally is not used in restriction originally to solve Buddhism.
46] this provider Fa He Do systems can in by the spy set Will of water foundation Households identity and identity with Households all Chu that deposit among the special set with Households.And it is such once identity or modification identity each special change or can be changed being set up with the water scheme Will of this offer in Households with Households with Households identity rather than with Households each spy
Conveniently used with modification process with Households.The water scheme that Mission and Xiu Ben is provided just is closed below.
47] this offer method include step Sudden, step Sudden and
Bu Sudden.Fen Do close Bu Sudden in the villages of 1 He Mission 2 below.
48] 1 is the flow according to method Zhong Bu Sudden 100 good this Yi More.
Yu Bu Sudden 102 of Bu Sudden 100 as indicated with 1
49] special (mono- Bu Sudden) is extracted in Yi Bu Sudden 104 information Xia.Have and laugh at the special Shui Now of information extraction and have in water clearly therefore herein no longer.
50] spy (Bu Sudden are extracted in the messages of Yi Bu Sudden 106 breath Xia).Have and laugh at the special water of sound information extraction in Now has water clearly therefore herein no longer.
51] Yi Bu Sudden 108 sentence Broken with the presence or absence of special Fou The Time Dao the Bu Sudden 112 of identity Ruo Shi The Time Dao Bu Sudden 110 extracted Xia.In the presence of extraction special identity it is legal with Households with Households this purposes be probably that Books coughs hand with Households not yet.In the absence of the special identity Households of extraction It is not yet any thus this with Households.
52] if as judged that deposit Chu in the presence of the special body part The Time extracted to the step Will of Sudden 110 spies extracted (deposits Chu and walk Sudden) among spy's set of identity in step Sudden 108 above.Stop middle spy that can be many with Households.
53] if as judged that special body part The Time to step Sudden 112 that extraction is not present deposit Chu in the spy of the spy's set Will extractions for the identity and identity that spy generates and (deposit Chu among the special set of identity and walk Sudden) in step Sudden 108 above.Word Will words that can be special in stopping make power identity.There are the Shui Now for laughing at the text information that Lose goes out message breath institute to have in water clearly therefore herein no longer.
The Yu Bu Sudden 114 of 54] Bu Sudden 100
55] note 1 shown in Bu Sudden 100 in this it is non-in limit this.In stopping can the modification of step Sudden 100 shown in 1 such as, but not limited to add other step Sudden with some of step Sudden 100 shown in increased function or 1 step Sudden Cis sequences such as the first step Sudden and step Sudden Cis sequences etc..
Bu Sudden in the method for 2 offers 56] are provided.
57] 2 be the flow according to method Zhong Bu Sudden 200 good this Yi More.
Yu Bu Sudden 202 of Bu Sudden 200 as indicated with 2
58] special (bis- Bu Sudden) is extracted in the Do of Yi Bu Sudden 204 information Xia.Have and laugh at the special Shui Now of information extraction and have in water clearly therefore herein no longer.
59] Yi Bu Sudden 206 sentence Broken with the presence or absence of special special set (Fou The Time Dao the Bu Sudden 210 of matching Bu Sudden) Ruo Shi The Time Dao Bu Sudden 208 comprising extraction Xia
60] if closing the Ginseng Number set (matching step Sudden) that the special right Lose of identity gathered of The Time to step Sudden 208 go out identity as judged to exist special spy's collection comprising extraction in step Sudden 206 above.Ginseng Number gather the control in can be used for such as, but not limited to each control n but being not limited to) etc.. 61] if being such as, but not limited to point out illegally to use Households as judged to be not present the special special collection comprising extraction in step Sudden 206 above and closing The Time to the step Lose of Sudden 210 and go out prompt message (matching step Sudden).
The Yu Bu Sudden 212 of 62] Bu Sudden 200
63] each identity Ginseng Number set phase in stopping.Ginseng Number can be such as but not limited to, effectively etc..As above the method that text is provided is included among the Ginseng Number set that Bu Sudden deposit the identity that Chu is arrived including receiving the Ginseng Number Will that Lose enters.
64] this offer methodology above Xiang Do systems just close 3 below.
65] 3 be the signal according to this Yi More Jia Do systems 300.As indicated at 3 this Ti Gong Do systems 300 include 302,304,
306 and 308
66] 302 extract special in information.
67] 304 extract special in message breath.
68] 306 in
69] extract special in the information of control 302
70] extract special in 304 messages of control breath
71] spy that the special identity Will extracted is extracted deposits Chu among the special set of identity.
72] in addition 306 in finding spy identity
Chu is deposited among the special set of identity in the identity of spy's generation and the special set Will of the identity spy extracted.
73] 308 in
74] control institute 302 Do information in extract spy
75] identity of the special special set of special set is included
Lose goes out the Ginseng Number set of identity.
76] outside 308 in finding comprising special special set Lose goes out prompt message.
77] stop in this Ti Gong Do systems 300 include (
) among the reception Lose Ginseng Number Will entered deposit the Ginseng Number set for the identity that Chu is arrived.
78] More of above power sheet it is good and not to limit this it is all this spirit and original The Inner made any modification, etc. with for Change and wait included in originally guarantor Inner.

Claims (1)

  1. It is required that
    Method include Bu Sudden its spy be Bu Sudden stop including
    Extracted in the information that mono- Bu Sudden include special
    Bu Sudden include the special spy for depositing special identity Will extractions of the Chu Bu Sudden including extracting of extraction in message breath and deposit Chu among the spy of identity gathers.
    Its spy of the method for N requirements 1 is
    Deposit Chu Bu Sudden be included in find the identity of spy in the identity of spy's generation and the special set Will of the identity spy extracted deposit Chu identity it is special gather among.
    Include receiving the Ginseng Number Will that Lose enters it is required that its spy of 1 or 2 method is to include Bu Sudden and deposit among the Ginseng Number set for the identity that Chu is arrived.
    4 require that its spy of 3 method is that including Bu Sudden includes
    2nd step Sudden bags, which are included, extracts Ginseng Number set of the special matching step Sudden including going out identity comprising the special special identity Lose gathered of special set in Do information.
    5 require that its spy of 4 method is
    Matching Bu Sudden are included in find goes out prompt message comprising special spy set Lose.
    6 its spy of Do systems are to include
    Arrange Min in
    Extracted in the information of control in special control message breath and extract special The spy that the special identity Will of extraction is extracted deposits Chu among the special set of identity.
    7] require that 6 its spy of Do systems are
    In find the identity of spy in the identity of spy's generation and the special set Will of the identity spy extracted deposit Chu identity it is special gather among.
    8] require that 6 or 7 its spy of Do systems are to include
    Among the reception Lose Ginseng Number Will entered deposit the Ginseng Number set for the identity that Chu is arrived.
    9] require that 8 its spy of Do systems are to include
    In
    Control to extract special in Suo Do information
    Identity Lose comprising the special special set of special set goes out the Ginseng Number set of identity.
    10] require that 9 its spy of Do systems are
    In
    Go out prompt message comprising special spy set Lose finding.
CN2009801599385A 2009-06-16 2009-06-16 Fingerprint identification method and fingerprint identification system Pending CN102667809A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/072287 WO2010145072A1 (en) 2009-06-16 2009-06-16 Fingerprint identification method and fingerprint identification system

Publications (1)

Publication Number Publication Date
CN102667809A true CN102667809A (en) 2012-09-12

Family

ID=43355677

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009801599385A Pending CN102667809A (en) 2009-06-16 2009-06-16 Fingerprint identification method and fingerprint identification system

Country Status (2)

Country Link
CN (1) CN102667809A (en)
WO (1) WO2010145072A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103258270A (en) * 2013-04-12 2013-08-21 李霆 Bank paying method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6167517A (en) * 1998-04-09 2000-12-26 Oracle Corporation Trusted biometric client authentication
CN1439592A (en) * 2003-03-17 2003-09-03 深圳市旺龙智能科技有限公司 Intelligent control elevator connected with multifunctional device and elevator control method thereof
CN1455367A (en) * 2003-04-16 2003-11-12 邹建军 Method and system of identifying teller identity using fingerprint
CN1675650A (en) * 2002-08-13 2005-09-28 Bsh博施及西门子家用器具有限公司 Household appliance comprising a biometric person-identifying device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6167517A (en) * 1998-04-09 2000-12-26 Oracle Corporation Trusted biometric client authentication
CN1675650A (en) * 2002-08-13 2005-09-28 Bsh博施及西门子家用器具有限公司 Household appliance comprising a biometric person-identifying device
CN1439592A (en) * 2003-03-17 2003-09-03 深圳市旺龙智能科技有限公司 Intelligent control elevator connected with multifunctional device and elevator control method thereof
CN1455367A (en) * 2003-04-16 2003-11-12 邹建军 Method and system of identifying teller identity using fingerprint

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王君: "电子商务网络支付安全体系研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103258270A (en) * 2013-04-12 2013-08-21 李霆 Bank paying method and device
CN103258270B (en) * 2013-04-12 2015-11-18 李霆 Bank paying method and device thereof

Also Published As

Publication number Publication date
WO2010145072A1 (en) 2010-12-23

Similar Documents

Publication Publication Date Title
CN101727391B (en) Method for extracting operation sequence of software vulnerability characteristics
CN101783731B (en) Display method of dynamic password and dynamic token
CN102253972A (en) Web crawler-based geographical name database maintenance method
CN103077341A (en) Application program unlocking method and device
CN108111526A (en) A kind of illegal website method for digging based on abnormal WHOIS information
CN105956192A (en) Method and system for acquiring shortened form of organization name based on website homepage information
CN102667809A (en) Fingerprint identification method and fingerprint identification system
CN103530419A (en) Ontological learning method applicable to Web service description
Le Thu US–Vietnam relations under President Trump
Burégio et al. Towards government as a social machine
Zhang et al. Application of Bayesian method to spam SMS filtering
CN105302881A (en) Literature search system-oriented search prompt word generation method
CN103646113A (en) Keyword restoration method and device
Ceccoli et al. Subnational policy windows: Shanghai's grid screening policy
Jain et al. MATDAAN: a secure voting system using blockchain
CN108416411A (en) One kind being based on the encrypted customer information guard method of graphic code and system
Susser Commentary: Uneven development, the politics of scale, or global austerity?
Xu et al. Algorithm research for user trajectory matching across social media networks based on paragraph2vec
CN102542280B (en) The recognition methods of the different lip reading shape of the mouth as one speaks and system for same content
Voita The Renovation wave. A Make or Break for the European Green Deal
Santoso et al. Semantic enhancement framework for e-government using ontology versioning approach
Hawker et al. Bank Height Estimates and Flood Models-Challenges, current practices and recent developments
Panda et al. Future Domestic Water Demand, Surface Water Availability and Vulnerability Across Rapidly Growing Asian Megacities
Moretti et al. Efficient use of high-resolution topographic data for the extraction of large river networks
Gomez Martin et al. Participatory modelling for Nature Based Solutions implementation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120912