CN103428347A - Method of mobile phone user identification system - Google Patents

Method of mobile phone user identification system Download PDF

Info

Publication number
CN103428347A
CN103428347A CN2012101574165A CN201210157416A CN103428347A CN 103428347 A CN103428347 A CN 103428347A CN 2012101574165 A CN2012101574165 A CN 2012101574165A CN 201210157416 A CN201210157416 A CN 201210157416A CN 103428347 A CN103428347 A CN 103428347A
Authority
CN
China
Prior art keywords
mobile phone
database
instruction
information
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101574165A
Other languages
Chinese (zh)
Inventor
刘方璇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wingtech Electronic Technology Co Ltd
Original Assignee
Shanghai Wingtech Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wingtech Electronic Technology Co Ltd filed Critical Shanghai Wingtech Electronic Technology Co Ltd
Priority to CN2012101574165A priority Critical patent/CN103428347A/en
Publication of CN103428347A publication Critical patent/CN103428347A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention relates to a method of a mobile phone user identification system. The method includes the following steps that data entry is performed, an operating instruction serves as an entering instruction, equivalently, a new contact is set up, and data of the new contact are entered; fingerprints of everyone are backed up in the public security bureau, when the new contact is added, fingerprint information of the contact is downloaded through interlinking of a terminal database, and the fingerprint information is stored in a local mobile phone; fingerprints are scanned, and the operating instruction serves as a scanning instruction; when each person sends short messages through keypads or a touch screen, the fingers can touch the mobile phone; the database is interlinked, and the operating instruction serves as an interlinking instruction; a fingerprint search is performed, and the operating instruction serves as a search instruction; the information is received, and the operating instruction serves as a receiving instruction. When receiving the short messages and telephones, a mobile phone user can directly see real identities of the persons sending the short messages and the telephones instead of displaying of names, stored in the mobile phone in advance, of the persons of the telephones.

Description

The method of cellphone subscriber's identification system
Technical field
The present invention relates to the method for cellphone subscriber's identification system, it is mainly to demonstrate the real identity of the other side, and the effects such as anti-swindle are arranged, and belongs to wireless communication technology field.
Background
Modern society's mobile phone has occupied more and more important effect in people's life, people contact interpersonal emotion by it, allow people just can greet mutually and exchange can be aspectant the time, even also can hear thousands of miles away the other side's sound, the mobile phone of saying that can not exaggerate has changed people's life style.
When but people exchange more easily, also bored gap to illegal having divided, the lawless person utilizes note and voice swindle the other side's wealth, makes the common people hard to guard against.1. short message fraud, by sending note to the cellphone subscriber, pretend to claim good friend or household's defraudation.The note that when lawless person sends note, can allow him send by number translated shows on your mobile phone is your good friend or household's number, allows you take for very.2. voice swindle, the lawless person directly phones you, pretends to claim the old friend, and you can not think the other side's sound when another, probably cheated.3. the lawless person pretends to claim group's programs such as " lucky 52 ", says that you get the winning number in a bond to allow you first converge tax, middlely the swindle such as takes.These swindle ways have perplexed the common people's normal interchange, when allowing people's indignation, also allow the people feel at one's wit's end.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of method of cellphone subscriber's identification system, the cellphone subscriber can be when receiving note and phone, directly see the people's who sends note and phone true identity, rather than simply show this number people's that mobile phone is stored name.
The present invention solves above-mentioned technical problem by following technical proposals: a kind of method of cellphone subscriber's identification system, it is characterized in that, and it comprises the following steps:
The S1 logging data, operational order is enter instruction, is equivalent to newly-built contact person, the new contact data of typing;
Everyone fingerprint has backup in public security bureau, and mobile phone will be done, fashionable when there being new contact person to add, and by connecting terminal database, downloads this contact person's finger print information, deposits local handset in;
The S2 finger scan, operational order is scan instruction;
When everyone button or touch-screen are sent short messages, finger all can contact mobile phone, even while making a phone call, also needs to hold phone, and under mobile telephone scanning, just at end user's finger print information, this part needs mobile phone that some hardware facilities are installed;
S3 connects database, and operational order is connection order;
When whenever necessary, this need to have multiple, and mobile phone sends command request and connects terminal database;
The S4 fingerprint search, operational order is search instruction;
When having the other user's finger print information to send over, mobile phone, according to the contact database retrieving information of storing on local handset, when retrieving match information, shows user people's information; When not matching information, connect database by S3, this database is the individual of public security bureau fingerprint database;
S5 receives information, and operational order is for receiving instruction.
Positive progressive effect of the present invention is: the cellphone subscriber can directly see the people's who sends note and phone true identity when receiving note and phone, rather than simply shows this number people's that mobile phone is stored name.
The accompanying drawing explanation
Fig. 1 fingerprint recognition schematic diagram.
Fig. 2 speech recognition schematic diagram.
Embodiment
As depicted in figs. 1 and 2, the method for cellphone subscriber's identification system of the present invention comprises the following steps:
The S1 logging data, operational order is enter instruction, is equivalent to newly-built contact person, the new contact data of typing.
Everyone fingerprint has backup in public security bureau, and mobile phone will be done, fashionable when there being new contact person to add, and by connecting terminal database, downloads this contact person's finger print information, deposits local handset in.
The S2 finger scan, operational order is scan instruction.
When everyone button or touch-screen are sent short messages, finger all can contact mobile phone, even while making a phone call, also needs to hold phone, and under mobile telephone scanning, just at end user's finger print information, this part needs mobile phone that some hardware facilities are installed.
S3 connects database, and operational order is connection order.
When whenever necessary, this need to have multiple, is described in detail later, and mobile phone sends command request and connects terminal database.
The S4 fingerprint search, operational order is search instruction.
When having the other user's finger print information to send over, mobile phone, according to the contact database retrieving information of storing on local handset, when retrieving match information, shows user people's information.When not matching information, connect database by S3, this database is the individual of public security bureau fingerprint database.
S5 receives information, and operational order is for receiving instruction.
This section can be idsplay order, and the user profile of being returned by public security bureau's individual's fingerprint database, be presented on your mobile phone.Certainly you can preserve down this section finger print information and user profile this locality on your mobile phone.
After above instruction has been arranged, concrete operations are as follows:
First set up the local data base of oneself, the data of this database are obtained by public security individual fingerprint database.Mobile phone obtains fingerprint by description, sends to the public security database, obtains personal information (in order to protect individual privacy, personal information may a guy's name and sex) here.After mobile phone receives personal information, by information and finger print information correspondence, be stored in mobile phone this locality.Such people's database has just established.The user can all set up the data of contact person on mobile phone, easy-to-look-up.Formerly issue is according to after establishing, and when we normally use mobile phone to receive note and take on the telephone, the other side's mobile phone can send the other user's finger print information.After mobile phone receives finger print information, retrieve local data base, search the contact person, when matching fingerprint, demonstrate this coupling people's personal information on mobile phone at once.What at this moment on mobile phone, show is the other side's real information, and the user can believe fully.When not matching finger print data, mobile phone connects the public security database, and the other side's finger print data is sent to the public security database, by public security database lookup coupling fingerprint, on our mobile phone, is shown as in the other side's identity validation.Once retrieve the coupling fingerprint, by public security database return information, user mobile phone receives information, directly shows.We can right-only know the people's who is exchanging with you true identity like this.Another kind of situation, the other side does not directly touch mobile phone, or has worn gloves, while not getting the lines of the hand, can carry out retrieval user by voice messaging, and the concrete operations flow process is similar with fingerprint recognition.
Mobile phone production firm is equipped with finger scan device and speech recognition equipment on each mobile phone.Also need to be equipped with finger print information transmitting-receiving application program on mobile phone simultaneously, when scanning fingerprint or voice messaging, if the user thinks building database, this program will send to the public security database to finger print information, if the user is initiatively making a phone call or during photos and sending messages, this program will send to the other user to finger print information.Cellphone subscriber recipient, this program, when receiving mobile fingerprint, is searched for local data base, just searches and shows, and does not search and just sends to the public security database retrieval, after having returned to personal information, is presented on mobile phone at once.
Hardware device: finger scan equipment, speech recognition apparatus.In fact only have finger scan equipment just enough.Be limited to the size of mobile phone and important, after finger scan equipment is installed, this two aspect all can increase to some extent.Public security bureau's database: identification, most important ring or public security bureau's individual database.Be limited to individual privacy, a simple fingerprint database can be set up in the government aspect, and individual finger print data, name, sex are only preserved in the inside.But whether relate to database, it is a problem.
Local fingerprint database, this part can remove fully, and identification by the public security database retrieval, returns to the user fully, considers the access load of speed and public security database, and we set up local fingerprint database on mobile phone.Like this, can be very fast search the All Contacts on mobile phone, do not need to access the public security database simultaneously.The foundation of certain local fingerprint database still must obtain data message from the public security database.
Group's identity, this concept is mainly to some enterprises, and " lucky 52 " such program can be consulted with public security bureau's database, produces a unique ID and agreement., can be retrieved group's identity, thereby show " lucky 52 " correct like this identity on user mobile phone when retrieving in the public security database as this class ID.All enterprises and group can arrive public security bureau and register such identity ID.
Although more than described the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, under the prerequisite that does not deviate from principle of the present invention and essence, can make various changes or modifications to these execution modes.Therefore, protection scope of the present invention is limited by appended claims.

Claims (1)

1. the method for cellphone subscriber's identification system, is characterized in that, it comprises the following steps:
The S1 logging data, operational order is enter instruction, is equivalent to newly-built contact person, the new contact data of typing;
Everyone fingerprint has backup in public security bureau, and mobile phone will be done, fashionable when there being new contact person to add, and by connecting terminal database, downloads this contact person's finger print information, deposits local handset in;
The S2 finger scan, operational order is scan instruction;
When everyone button or touch-screen are sent short messages, finger all can contact mobile phone, even while making a phone call, also needs to hold phone, and under mobile telephone scanning, just at end user's finger print information, this part needs mobile phone that some hardware facilities are installed;
S3 connects database, and operational order is connection order;
When whenever necessary, this need to have multiple, and mobile phone sends command request and connects terminal database;
The S4 fingerprint search, operational order is search instruction;
When having the other user's finger print information to send over, mobile phone, according to the contact database retrieving information of storing on local handset, when retrieving match information, shows user people's information; When not matching information, connect database by S3, this database is the individual of public security bureau fingerprint database;
S5 receives information, and operational order is for receiving instruction.
CN2012101574165A 2012-05-17 2012-05-17 Method of mobile phone user identification system Pending CN103428347A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101574165A CN103428347A (en) 2012-05-17 2012-05-17 Method of mobile phone user identification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101574165A CN103428347A (en) 2012-05-17 2012-05-17 Method of mobile phone user identification system

Publications (1)

Publication Number Publication Date
CN103428347A true CN103428347A (en) 2013-12-04

Family

ID=49652505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101574165A Pending CN103428347A (en) 2012-05-17 2012-05-17 Method of mobile phone user identification system

Country Status (1)

Country Link
CN (1) CN103428347A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072296A (en) * 2015-08-28 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Method, device and system for marking conversation caller
CN105207987A (en) * 2015-08-10 2015-12-30 上海闻泰电子科技有限公司 Fingerprint identification system based on Bluetooth mobile phone terminal
WO2017124542A1 (en) * 2016-01-24 2017-07-27 谢文 Information pushing method for falling-down reason confirmation technology, and confirmation system
CN107622797A (en) * 2017-09-26 2018-01-23 李涵之 A kind of health based on sound determines system and method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105207987A (en) * 2015-08-10 2015-12-30 上海闻泰电子科技有限公司 Fingerprint identification system based on Bluetooth mobile phone terminal
CN105072296A (en) * 2015-08-28 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Method, device and system for marking conversation caller
CN105072296B (en) * 2015-08-28 2018-07-24 宇龙计算机通信科技(深圳)有限公司 A kind of method, apparatus and system that dial-up person is marked
WO2017124542A1 (en) * 2016-01-24 2017-07-27 谢文 Information pushing method for falling-down reason confirmation technology, and confirmation system
CN107622797A (en) * 2017-09-26 2018-01-23 李涵之 A kind of health based on sound determines system and method
CN107622797B (en) * 2017-09-26 2020-07-28 李涵之 Body condition determining system and method based on sound

Similar Documents

Publication Publication Date Title
CN105306657B (en) Personal identification method, device and communicating terminal
CN103685613B (en) A kind of anti-telephone fraud system and method based on speech recognition
CN100488215C (en) Communication device, server possessing telephone antiinterference function and its method
CN102447771B (en) The method of display caller information and the communication terminal of application the method
WO2016134630A1 (en) Method and device for recognizing malicious call
EP1143667A3 (en) Method and system for accessing wirelessly a network phonebook and a journal database
CN106161749B (en) Malicious telephone identification method and device
WO2008079018A3 (en) Efficient authentication of a user for conduct of a transaction initiated via mobile telephone
CN102209137A (en) Private account system of mobile terminal private account system and realization method
CN102082881A (en) Method and system for real-time display of caller location, profile and trust relationships
CN105472093B (en) Mobile terminal call answers method for authenticating and mobile terminal
WO2017035945A1 (en) Method, device and system for marking conversation caller
CN105450827B (en) Call processing method, user terminal and server
CN103167120A (en) System and method for quickly looking up contacts in mobile phone calling process
CN103428347A (en) Method of mobile phone user identification system
CN104602242A (en) Method and device for preventing voice phishing
CN101674557B (en) Method and device for detecting whether missed calls are valid or not
CN104023110A (en) Voiceprint recognition-based caller management method and mobile terminal
JPWO2012114881A1 (en) Gripping feature learning authentication system and gripping feature learning authentication method
CN103379202A (en) Method, device and electronic equipment for searching contact person and vehicle-mounting system
JP5823185B2 (en) Sender information providing apparatus and program
CN105407205A (en) Data output method and data output apparatus
CN104754583A (en) Electronic device having cheat-proof caller identification function and method therefor
CN102238292A (en) Seat login management method
CN106791232A (en) The means of communication of identity-based certification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131204

WD01 Invention patent application deemed withdrawn after publication