CN106326875A - Security protection fingerprint recognition method and system - Google Patents

Security protection fingerprint recognition method and system Download PDF

Info

Publication number
CN106326875A
CN106326875A CN201610795865.0A CN201610795865A CN106326875A CN 106326875 A CN106326875 A CN 106326875A CN 201610795865 A CN201610795865 A CN 201610795865A CN 106326875 A CN106326875 A CN 106326875A
Authority
CN
China
Prior art keywords
fingerprint
fingerprint recognition
user
identification device
fingerprint identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610795865.0A
Other languages
Chinese (zh)
Inventor
张北江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610795865.0A priority Critical patent/CN106326875A/en
Publication of CN106326875A publication Critical patent/CN106326875A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification

Abstract

The invention provides a security protection fingerprint recognition method and system. The security protection fingerprint recognition method comprises the steps of receiving positioning coordinates of a user; judging whether there is fingerprint recognition equipment around the user or not according to the coordinates; and if the fingerprint recognition equipment exists, prompting the user to input a fingerprint into the fingerprint recognition equipment so as to realize fingerprint recognition. The technical scheme provided by the invention has the advantage of high degree of user experience.

Description

Security protection fingerprint identification method and system
Technical field
The present invention relates to safety-security area, particularly relate to a kind of security protection fingerprint identification method and system.
Background technology
Security protection is the most frequently used data at video data, and for video data, recognition of face is in security protection data Key, present video file cannot realize the accurate identification to fingerprint, and user experience is low.
Summary of the invention
Thering is provided a kind of security protection fingerprint identification method, which solving prior art cannot the low shortcoming of user experience.
On the one hand, it is provided that a kind of security protection fingerprint identification method, described method comprises the steps:
Receive the elements of a fix of user;
Judge whether have fingerprint identification device around user according to coordinate;
As having fingerprint identification device, prompting user inputs fingerprint to realize fingerprint recognition in fingerprint identification device.
Optionally, described method also includes:
The time of record fingerprint recognition and coordinate.
Optionally, described method also includes:
The result of fingerprint recognition is sent to long-distance user.
Second aspect, it is provided that a kind of security protection fingerprint recognition system, described system includes:
Receive unit, for receiving the elements of a fix of user;
Judging unit, for judging whether have fingerprint identification device around user according to coordinate;
Tip element, for such as having fingerprint identification device, prompting user inputs fingerprint with reality in fingerprint identification device Existing fingerprint recognition.
Optionally, described system also includes:
Memory element, for recording time and the coordinate of fingerprint recognition.
Optionally, described system also includes:
Transmitting element, for sending the result of fingerprint recognition to long-distance user.
The technical scheme that the specific embodiment of the invention provides receives the elements of a fix of user, judges user's week according to coordinate Enclosing and whether have fingerprint identification device, as having fingerprint identification device, prompting user inputs fingerprint with reality in fingerprint identification device Existing fingerprint recognition, is managed so it has user application, the advantage that user experience is high.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to Other accompanying drawing is obtained according to these accompanying drawings.
The flow chart of a kind of security protection fingerprint identification method that Fig. 1 provides for the present invention;
The structure chart of a kind of security protection fingerprint recognition system that Fig. 2 provides for the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
Flow process refering to a kind of security protection fingerprint identification method that Fig. 1, Fig. 1 provide for the present invention the first better embodiment Figure, the method is completed by mobile phone, and the method is as it is shown in figure 1, comprise the steps:
Step S101, the elements of a fix of reception user;
Step S102, foundation coordinate judge whether have fingerprint identification device around user;
Step S103, as having fingerprint identification device, prompting user input in fingerprint identification device fingerprint with realization refer to Stricture of vagina identification.
The technical scheme that the specific embodiment of the invention provides receives the elements of a fix of user, judges user's week according to coordinate Enclosing and whether have fingerprint identification device, as having fingerprint identification device, prompting user inputs fingerprint with reality in fingerprint identification device Existing fingerprint recognition, so it has the advantage that online music course realizes about class.
Optionally, said method can also include after step s 103:
The time of record fingerprint recognition and coordinate.
Optionally, said method can also include after step s 103:
The result of fingerprint recognition is sent to long-distance user.
A kind of security protection fingerprint recognition system provided for the present invention the second better embodiment refering to Fig. 2, Fig. 2, this system Including:
Receive unit 201, for receiving the elements of a fix of user;
Judging unit 202, for judging whether have fingerprint identification device around user according to coordinate;
Tip element 203, for such as having fingerprint identification device, prompting user input in fingerprint identification device fingerprint with Realize fingerprint recognition.
The technical scheme that the specific embodiment of the invention provides receives the elements of a fix of user, judges user's week according to coordinate Enclosing and whether have fingerprint identification device, as having fingerprint identification device, prompting user inputs fingerprint with reality in fingerprint identification device Existing fingerprint recognition, so it has the advantage that online music course realizes about class.
Optionally, said system can also include:
Memory element 204, for recording time and the coordinate of fingerprint recognition.
Optionally, said system can also include:
Transmitting element 205, for sending the result of fingerprint recognition to long-distance user.
It should be noted that for aforesaid each method embodiment or embodiment, in order to be briefly described, therefore by its all table Stating as a series of combination of actions, but those skilled in the art should know, the present invention is not by described sequence of movement Restriction, because of according to the present invention, some step can use other orders or carry out simultaneously.Secondly, people in the art Member also should know, embodiment described in the specification or embodiment belong to preferred embodiment, involved action and list Necessary to the unit not necessarily present invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiments.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device can merge according to actual needs, divides and delete.This area The feature of the different embodiments described in this specification and different embodiment can be combined or combine by technical staff.
Through the above description of the embodiments, those skilled in the art it can be understood that to the present invention permissible Realize with hardware, or firmware realizes, or combinations thereof mode realizes.When implemented in software, can be by above-mentioned functions It is stored in computer-readable medium or is transmitted as the one or more instructions on computer-readable medium or code.Meter Calculation machine computer-readable recording medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to from a place to another The individual local any medium transmitting computer program.Storage medium can be any usable medium that computer can access.With As a example by this but be not limited to: computer-readable medium can include random access memory (Random Access Memory, RAM), read only memory (Read-Only Memory, ROM), EEPROM (Electrically Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read- Only Memory, CD-ROM) or other optical disc storage, magnetic disk storage medium or other magnetic storage apparatus or can be used in Carry or store and there is instruction or the desired program code of data structure form can be by any other of computer access Medium.In addition.Any connection can be suitable become computer-readable medium.Such as, if software is to use coaxial cable, light Fine optical cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio and The wireless technology of microwave etc from website, server or other remote source, then coaxial cable, optical fiber cable, double The wireless technology of twisted wire, DSL or such as infrared ray, wireless and microwave etc be included in affiliated medium fixing in.Such as this Bright used, dish (Disk) and dish (disc) include compress laser disc (CD), laser dish, laser disc, Digital Versatile Disc (DVD), Floppy disk and Blu-ray Disc, the duplication data of the usual magnetic of its mid-game, dish then carrys out the duplication data of optics with laser.Group above Close within should also be as being included in the protection domain of computer-readable medium.
In a word, the foregoing is only the preferred embodiment of technical solution of the present invention, be not intended to limit the present invention's Protection domain.All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, should be included in Within protection scope of the present invention.

Claims (6)

1. a security protection fingerprint identification method, it is characterised in that described method comprises the steps:
Receive the elements of a fix of user;
Judge whether have fingerprint identification device around user according to coordinate;
As having fingerprint identification device, prompting user inputs fingerprint to realize fingerprint recognition in fingerprint identification device.
Method the most according to claim 1, it is characterised in that described method also includes:
The time of record fingerprint recognition and coordinate.
Method the most according to claim 1, it is characterised in that described method also includes:
The result of fingerprint recognition is sent to long-distance user.
4. a security protection fingerprint recognition system, it is characterised in that described system includes:
Receive unit, for receiving the elements of a fix of user;
Judging unit, for judging whether have fingerprint identification device around user according to coordinate;
Tip element, for such as having fingerprint identification device, prompting user inputs fingerprint to realize referring in fingerprint identification device Stricture of vagina identification.
System the most according to claim 4, it is characterised in that described system also includes:
Memory element, for recording time and the coordinate of fingerprint recognition.
System the most according to claim 4, it is characterised in that described system also includes:
Transmitting element, for sending the result of fingerprint recognition to long-distance user.
CN201610795865.0A 2016-08-31 2016-08-31 Security protection fingerprint recognition method and system Pending CN106326875A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610795865.0A CN106326875A (en) 2016-08-31 2016-08-31 Security protection fingerprint recognition method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610795865.0A CN106326875A (en) 2016-08-31 2016-08-31 Security protection fingerprint recognition method and system

Publications (1)

Publication Number Publication Date
CN106326875A true CN106326875A (en) 2017-01-11

Family

ID=57786412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610795865.0A Pending CN106326875A (en) 2016-08-31 2016-08-31 Security protection fingerprint recognition method and system

Country Status (1)

Country Link
CN (1) CN106326875A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018040029A1 (en) * 2016-08-31 2018-03-08 张北江 Security fingerprint recognition method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102800140A (en) * 2012-07-19 2012-11-28 杭州九树网络科技有限公司 Intelligent lock system and remote unlocking/locking method
CN105257145A (en) * 2015-09-07 2016-01-20 宁波耀龙软件科技有限公司 Remote safe box
AU2016200250A1 (en) * 2004-10-25 2016-02-11 Security First Corp. Method and apparatus for managing access to data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2016200250A1 (en) * 2004-10-25 2016-02-11 Security First Corp. Method and apparatus for managing access to data
CN102800140A (en) * 2012-07-19 2012-11-28 杭州九树网络科技有限公司 Intelligent lock system and remote unlocking/locking method
CN105257145A (en) * 2015-09-07 2016-01-20 宁波耀龙软件科技有限公司 Remote safe box

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018040029A1 (en) * 2016-08-31 2018-03-08 张北江 Security fingerprint recognition method and system

Similar Documents

Publication Publication Date Title
CN106157196A (en) The evaluation methodology in house and system
CN106293528A (en) Dropbox stores the method and system of big data
CN106294010A (en) The storage method and system of big data in distributed system
CN106294011A (en) The big date storage method of sort-type and system
CN106294637A (en) Realize the method and system of phonetic search
CN106254662A (en) Interior of mobile phone control method and system
CN106253787A (en) The rotating speed method and system of closed loop control horizontal coil winding machine
CN106326875A (en) Security protection fingerprint recognition method and system
CN106161799A (en) The method for closing of application program of mobile phone and system
CN106331323A (en) Method and system for sorting apps according to place
CN106303036A (en) The hidden method of app and system under specific use scene
CN106294818A (en) Personalization realizes app sort method and system
CN106144800A (en) Mobile phone shakes the method and system controlling elevator
CN106296859A (en) The attendance recording method of GPRS and system in security protection
CN106241503A (en) Vertical coil winding machine control method based on pressure and system
CN106294645A (en) Different part of speech realization method and systems in big data search
CN106130420A (en) Vertical coil winding machine method for controlling number of revolution based on motor and system
CN106094911A (en) Closed loop control application process in vertical coil winding machine and system
CN106250535A (en) Application process that key word stores in big data and system
CN106326169A (en) Method and system for replacing mobile phone
CN106292438A (en) The open-loop control method of horizontal coil winding machine and system
CN106331326A (en) Time-based method and system for dynamically adjusting hidden app
CN106325318A (en) Application method of open-loop control in vertical winding machine and application system thereof
CN106303040A (en) Different access times determine the method and system that app hides
CN106276415A (en) The foot rotating method of horizontal coil winding machine and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170111