CN103428347A - Method of mobile phone user identification system - Google Patents
Method of mobile phone user identification system Download PDFInfo
- Publication number
- CN103428347A CN103428347A CN2012101574165A CN201210157416A CN103428347A CN 103428347 A CN103428347 A CN 103428347A CN 2012101574165 A CN2012101574165 A CN 2012101574165A CN 201210157416 A CN201210157416 A CN 201210157416A CN 103428347 A CN103428347 A CN 103428347A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- database
- instruction
- information
- fingerprint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention relates to a method of a mobile phone user identification system. The method includes the following steps that data entry is performed, an operating instruction serves as an entering instruction, equivalently, a new contact is set up, and data of the new contact are entered; fingerprints of everyone are backed up in the public security bureau, when the new contact is added, fingerprint information of the contact is downloaded through interlinking of a terminal database, and the fingerprint information is stored in a local mobile phone; fingerprints are scanned, and the operating instruction serves as a scanning instruction; when each person sends short messages through keypads or a touch screen, the fingers can touch the mobile phone; the database is interlinked, and the operating instruction serves as an interlinking instruction; a fingerprint search is performed, and the operating instruction serves as a search instruction; the information is received, and the operating instruction serves as a receiving instruction. When receiving the short messages and telephones, a mobile phone user can directly see real identities of the persons sending the short messages and the telephones instead of displaying of names, stored in the mobile phone in advance, of the persons of the telephones.
Description
Technical field
The present invention relates to the method for cellphone subscriber's identification system, it is mainly to demonstrate the real identity of the other side, and the effects such as anti-swindle are arranged, and belongs to wireless communication technology field.
Background
Modern society's mobile phone has occupied more and more important effect in people's life, people contact interpersonal emotion by it, allow people just can greet mutually and exchange can be aspectant the time, even also can hear thousands of miles away the other side's sound, the mobile phone of saying that can not exaggerate has changed people's life style.
When but people exchange more easily, also bored gap to illegal having divided, the lawless person utilizes note and voice swindle the other side's wealth, makes the common people hard to guard against.1. short message fraud, by sending note to the cellphone subscriber, pretend to claim good friend or household's defraudation.The note that when lawless person sends note, can allow him send by number translated shows on your mobile phone is your good friend or household's number, allows you take for very.2. voice swindle, the lawless person directly phones you, pretends to claim the old friend, and you can not think the other side's sound when another, probably cheated.3. the lawless person pretends to claim group's programs such as " lucky 52 ", says that you get the winning number in a bond to allow you first converge tax, middlely the swindle such as takes.These swindle ways have perplexed the common people's normal interchange, when allowing people's indignation, also allow the people feel at one's wit's end.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of method of cellphone subscriber's identification system, the cellphone subscriber can be when receiving note and phone, directly see the people's who sends note and phone true identity, rather than simply show this number people's that mobile phone is stored name.
The present invention solves above-mentioned technical problem by following technical proposals: a kind of method of cellphone subscriber's identification system, it is characterized in that, and it comprises the following steps:
The S1 logging data, operational order is enter instruction, is equivalent to newly-built contact person, the new contact data of typing;
Everyone fingerprint has backup in public security bureau, and mobile phone will be done, fashionable when there being new contact person to add, and by connecting terminal database, downloads this contact person's finger print information, deposits local handset in;
The S2 finger scan, operational order is scan instruction;
When everyone button or touch-screen are sent short messages, finger all can contact mobile phone, even while making a phone call, also needs to hold phone, and under mobile telephone scanning, just at end user's finger print information, this part needs mobile phone that some hardware facilities are installed;
S3 connects database, and operational order is connection order;
When whenever necessary, this need to have multiple, and mobile phone sends command request and connects terminal database;
The S4 fingerprint search, operational order is search instruction;
When having the other user's finger print information to send over, mobile phone, according to the contact database retrieving information of storing on local handset, when retrieving match information, shows user people's information; When not matching information, connect database by S3, this database is the individual of public security bureau fingerprint database;
S5 receives information, and operational order is for receiving instruction.
Positive progressive effect of the present invention is: the cellphone subscriber can directly see the people's who sends note and phone true identity when receiving note and phone, rather than simply shows this number people's that mobile phone is stored name.
The accompanying drawing explanation
Fig. 1 fingerprint recognition schematic diagram.
Fig. 2 speech recognition schematic diagram.
Embodiment
As depicted in figs. 1 and 2, the method for cellphone subscriber's identification system of the present invention comprises the following steps:
The S1 logging data, operational order is enter instruction, is equivalent to newly-built contact person, the new contact data of typing.
Everyone fingerprint has backup in public security bureau, and mobile phone will be done, fashionable when there being new contact person to add, and by connecting terminal database, downloads this contact person's finger print information, deposits local handset in.
The S2 finger scan, operational order is scan instruction.
When everyone button or touch-screen are sent short messages, finger all can contact mobile phone, even while making a phone call, also needs to hold phone, and under mobile telephone scanning, just at end user's finger print information, this part needs mobile phone that some hardware facilities are installed.
S3 connects database, and operational order is connection order.
When whenever necessary, this need to have multiple, is described in detail later, and mobile phone sends command request and connects terminal database.
The S4 fingerprint search, operational order is search instruction.
When having the other user's finger print information to send over, mobile phone, according to the contact database retrieving information of storing on local handset, when retrieving match information, shows user people's information.When not matching information, connect database by S3, this database is the individual of public security bureau fingerprint database.
S5 receives information, and operational order is for receiving instruction.
This section can be idsplay order, and the user profile of being returned by public security bureau's individual's fingerprint database, be presented on your mobile phone.Certainly you can preserve down this section finger print information and user profile this locality on your mobile phone.
After above instruction has been arranged, concrete operations are as follows:
First set up the local data base of oneself, the data of this database are obtained by public security individual fingerprint database.Mobile phone obtains fingerprint by description, sends to the public security database, obtains personal information (in order to protect individual privacy, personal information may a guy's name and sex) here.After mobile phone receives personal information, by information and finger print information correspondence, be stored in mobile phone this locality.Such people's database has just established.The user can all set up the data of contact person on mobile phone, easy-to-look-up.Formerly issue is according to after establishing, and when we normally use mobile phone to receive note and take on the telephone, the other side's mobile phone can send the other user's finger print information.After mobile phone receives finger print information, retrieve local data base, search the contact person, when matching fingerprint, demonstrate this coupling people's personal information on mobile phone at once.What at this moment on mobile phone, show is the other side's real information, and the user can believe fully.When not matching finger print data, mobile phone connects the public security database, and the other side's finger print data is sent to the public security database, by public security database lookup coupling fingerprint, on our mobile phone, is shown as in the other side's identity validation.Once retrieve the coupling fingerprint, by public security database return information, user mobile phone receives information, directly shows.We can right-only know the people's who is exchanging with you true identity like this.Another kind of situation, the other side does not directly touch mobile phone, or has worn gloves, while not getting the lines of the hand, can carry out retrieval user by voice messaging, and the concrete operations flow process is similar with fingerprint recognition.
Mobile phone production firm is equipped with finger scan device and speech recognition equipment on each mobile phone.Also need to be equipped with finger print information transmitting-receiving application program on mobile phone simultaneously, when scanning fingerprint or voice messaging, if the user thinks building database, this program will send to the public security database to finger print information, if the user is initiatively making a phone call or during photos and sending messages, this program will send to the other user to finger print information.Cellphone subscriber recipient, this program, when receiving mobile fingerprint, is searched for local data base, just searches and shows, and does not search and just sends to the public security database retrieval, after having returned to personal information, is presented on mobile phone at once.
Hardware device: finger scan equipment, speech recognition apparatus.In fact only have finger scan equipment just enough.Be limited to the size of mobile phone and important, after finger scan equipment is installed, this two aspect all can increase to some extent.Public security bureau's database: identification, most important ring or public security bureau's individual database.Be limited to individual privacy, a simple fingerprint database can be set up in the government aspect, and individual finger print data, name, sex are only preserved in the inside.But whether relate to database, it is a problem.
Local fingerprint database, this part can remove fully, and identification by the public security database retrieval, returns to the user fully, considers the access load of speed and public security database, and we set up local fingerprint database on mobile phone.Like this, can be very fast search the All Contacts on mobile phone, do not need to access the public security database simultaneously.The foundation of certain local fingerprint database still must obtain data message from the public security database.
Group's identity, this concept is mainly to some enterprises, and " lucky 52 " such program can be consulted with public security bureau's database, produces a unique ID and agreement., can be retrieved group's identity, thereby show " lucky 52 " correct like this identity on user mobile phone when retrieving in the public security database as this class ID.All enterprises and group can arrive public security bureau and register such identity ID.
Although more than described the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, under the prerequisite that does not deviate from principle of the present invention and essence, can make various changes or modifications to these execution modes.Therefore, protection scope of the present invention is limited by appended claims.
Claims (1)
1. the method for cellphone subscriber's identification system, is characterized in that, it comprises the following steps:
The S1 logging data, operational order is enter instruction, is equivalent to newly-built contact person, the new contact data of typing;
Everyone fingerprint has backup in public security bureau, and mobile phone will be done, fashionable when there being new contact person to add, and by connecting terminal database, downloads this contact person's finger print information, deposits local handset in;
The S2 finger scan, operational order is scan instruction;
When everyone button or touch-screen are sent short messages, finger all can contact mobile phone, even while making a phone call, also needs to hold phone, and under mobile telephone scanning, just at end user's finger print information, this part needs mobile phone that some hardware facilities are installed;
S3 connects database, and operational order is connection order;
When whenever necessary, this need to have multiple, and mobile phone sends command request and connects terminal database;
The S4 fingerprint search, operational order is search instruction;
When having the other user's finger print information to send over, mobile phone, according to the contact database retrieving information of storing on local handset, when retrieving match information, shows user people's information; When not matching information, connect database by S3, this database is the individual of public security bureau fingerprint database;
S5 receives information, and operational order is for receiving instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101574165A CN103428347A (en) | 2012-05-17 | 2012-05-17 | Method of mobile phone user identification system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101574165A CN103428347A (en) | 2012-05-17 | 2012-05-17 | Method of mobile phone user identification system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103428347A true CN103428347A (en) | 2013-12-04 |
Family
ID=49652505
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012101574165A Pending CN103428347A (en) | 2012-05-17 | 2012-05-17 | Method of mobile phone user identification system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103428347A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105072296A (en) * | 2015-08-28 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Method, device and system for marking conversation caller |
CN105207987A (en) * | 2015-08-10 | 2015-12-30 | 上海闻泰电子科技有限公司 | Fingerprint identification system based on Bluetooth mobile phone terminal |
WO2017124542A1 (en) * | 2016-01-24 | 2017-07-27 | 谢文 | Information pushing method for falling-down reason confirmation technology, and confirmation system |
CN107622797A (en) * | 2017-09-26 | 2018-01-23 | 李涵之 | A kind of health based on sound determines system and method |
-
2012
- 2012-05-17 CN CN2012101574165A patent/CN103428347A/en active Pending
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105207987A (en) * | 2015-08-10 | 2015-12-30 | 上海闻泰电子科技有限公司 | Fingerprint identification system based on Bluetooth mobile phone terminal |
CN105072296A (en) * | 2015-08-28 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Method, device and system for marking conversation caller |
CN105072296B (en) * | 2015-08-28 | 2018-07-24 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method, apparatus and system that dial-up person is marked |
WO2017124542A1 (en) * | 2016-01-24 | 2017-07-27 | 谢文 | Information pushing method for falling-down reason confirmation technology, and confirmation system |
CN107622797A (en) * | 2017-09-26 | 2018-01-23 | 李涵之 | A kind of health based on sound determines system and method |
CN107622797B (en) * | 2017-09-26 | 2020-07-28 | 李涵之 | Body condition determining system and method based on sound |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105306657B (en) | Personal identification method, device and communicating terminal | |
CN103685613B (en) | A kind of anti-telephone fraud system and method based on speech recognition | |
CN100488215C (en) | Communication device, server possessing telephone antiinterference function and its method | |
CN102447771B (en) | The method of display caller information and the communication terminal of application the method | |
WO2016134630A1 (en) | Method and device for recognizing malicious call | |
EP1143667A3 (en) | Method and system for accessing wirelessly a network phonebook and a journal database | |
CN106161749B (en) | Malicious telephone identification method and device | |
WO2008079018A3 (en) | Efficient authentication of a user for conduct of a transaction initiated via mobile telephone | |
CN102209137A (en) | Private account system of mobile terminal private account system and realization method | |
CN102082881A (en) | Method and system for real-time display of caller location, profile and trust relationships | |
CN105472093B (en) | Mobile terminal call answers method for authenticating and mobile terminal | |
WO2017035945A1 (en) | Method, device and system for marking conversation caller | |
CN105450827B (en) | Call processing method, user terminal and server | |
CN103167120A (en) | System and method for quickly looking up contacts in mobile phone calling process | |
CN103428347A (en) | Method of mobile phone user identification system | |
CN104602242A (en) | Method and device for preventing voice phishing | |
CN101674557B (en) | Method and device for detecting whether missed calls are valid or not | |
CN104023110A (en) | Voiceprint recognition-based caller management method and mobile terminal | |
JPWO2012114881A1 (en) | Gripping feature learning authentication system and gripping feature learning authentication method | |
CN103379202A (en) | Method, device and electronic equipment for searching contact person and vehicle-mounting system | |
JP5823185B2 (en) | Sender information providing apparatus and program | |
CN105407205A (en) | Data output method and data output apparatus | |
CN104754583A (en) | Electronic device having cheat-proof caller identification function and method therefor | |
CN102238292A (en) | Seat login management method | |
CN106791232A (en) | The means of communication of identity-based certification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20131204 |
|
WD01 | Invention patent application deemed withdrawn after publication |