CN108399710A - A kind of fingerprint recognition alarm method, system and terminal device - Google Patents

A kind of fingerprint recognition alarm method, system and terminal device Download PDF

Info

Publication number
CN108399710A
CN108399710A CN201810159542.1A CN201810159542A CN108399710A CN 108399710 A CN108399710 A CN 108399710A CN 201810159542 A CN201810159542 A CN 201810159542A CN 108399710 A CN108399710 A CN 108399710A
Authority
CN
China
Prior art keywords
user
alarm
warning message
terminal device
finger print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810159542.1A
Other languages
Chinese (zh)
Other versions
CN108399710B (en
Inventor
范鑫
胡胜发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Ankai Microelectronics Co.,Ltd.
Original Assignee
Anyka Guangzhou Microelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anyka Guangzhou Microelectronics Technology Co Ltd filed Critical Anyka Guangzhou Microelectronics Technology Co Ltd
Priority to CN201810159542.1A priority Critical patent/CN108399710B/en
Publication of CN108399710A publication Critical patent/CN108399710A/en
Application granted granted Critical
Publication of CN108399710B publication Critical patent/CN108399710B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72424User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with manual activation of emergency-service functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72451User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Environmental & Geological Engineering (AREA)
  • Public Health (AREA)
  • Computer Hardware Design (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention is suitable for safe unlocking technology field, provides a kind of fingerprint recognition alarm method, system and terminal device, including:Obtain the finger print information of user;Judge whether finger print information is consistent with preset alarm finger print information;If consistent, terminal device is unlocked, after unlocking terminal device, detects the operation of user, and executes corresponding alarm operation depending on the user's operation.The embodiment of the present invention is by being arranged alarm fingerprint, and it is alarmed accordingly according to corresponding operation, to solve user when personal property is on the hazard, can not be by mobile phone convenient and safe alarm the problem of, hidden completion actuation of an alarm is allowed users to, to effectively ensure the safety of the personal property of user.

Description

A kind of fingerprint recognition alarm method, system and terminal device
Technical field
The invention belongs to a kind of safe unlocking technology field more particularly to fingerprint recognition alarm method, system and terminals to set It is standby.
Background technology
With the development of social economy and scientific and technological level, mobile phone user's quantity also increases rapidly, mobile phone with its ease for use and Portability is that daily life brings revolutionary variation, nowadays has become essential communication work in people's life Tool, while under the trend of present cash-freeization, people are usually only by mobile-phone payment come into consuming under line, it is seen then that mobile phone exists It is played an increasingly important role in people's life.
Currently, when the personal property of user is on the hazard, generally require to use mobile phone alarm, but existing mobile phone is usual It needs first to be unlocked and dial the police emergency number again, this series of action is likely to cause criminal's note that especially existing In the case that user is kidnapped by criminal, this cumbersome mobile phone alarm operation, can not often succeed alert help.
Invention content
In view of this, an embodiment of the present invention provides a kind of fingerprint recognition alarm method, system and terminal device, to solve In the prior art due to mobile phone alarm is cumbersome caused by can not succeed alert help the problem of.
The first aspect of the embodiment of the present invention provides a kind of fingerprint recognition alarm method, including:
Obtain the finger print information of user;
Judge whether finger print information is consistent with preset alarm finger print information;
If consistent, terminal device is unlocked, after unlocking terminal device, detects the operation of user, and according to user's Operation executes corresponding alarm operation.
The second aspect of the embodiment of the present invention provides a kind of fingerprint recognition alarm system, including:
Finger print information acquisition module, the finger print information for obtaining user;
Finger print information judgment module, for judging whether finger print information is consistent with preset alarm finger print information;
If operation module of alarming unlocks terminal device, after unlocking terminal device, detects user's for consistent Operation, and corresponding alarm operation is executed depending on the user's operation.
The third aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored in In the memory and the computer program that can run on the processor, when the processor executes the computer program The step of realizing fingerprint recognition alarm method as described above.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, the computer program to realize fingerprint recognition alarm method as described above when being executed by processor The step of.
Existing advantageous effect is the embodiment of the present invention compared with prior art:By the finger print information for obtaining user;Sentence Whether disconnected finger print information and preset alarm finger print information are consistent;If consistent, unlock terminal device, unlock terminal device it Afterwards, the operation of user is detected, and executes corresponding alarm operation depending on the user's operation.The embodiment of the present invention is alarmed by being arranged Fingerprint, and alarmed accordingly according to corresponding operation, to solve user when personal property is on the hazard, Wu Fatong The problem of crossing mobile phone convenient and safe alarm, allows users to hidden completion actuation of an alarm, to effectively ensure user Personal property safety.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description be only the present invention some Embodiment for those of ordinary skill in the art without having to pay creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the implementation process schematic diagram of fingerprint recognition alarm method provided by one embodiment of the present invention;
Fig. 2 is the specific implementation flow schematic diagram of step S103 in Fig. 1 provided by one embodiment of the present invention;
Fig. 3 is the specific implementation flow schematic diagram of step S203 in Fig. 2 provided by one embodiment of the present invention;
Fig. 4 is the structural schematic diagram of fingerprint recognition alarm system provided by one embodiment of the present invention;
Fig. 5 is the structural schematic diagram of alarm operation module in Fig. 4 provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of warning message transmission unit in Fig. 5 provided in an embodiment of the present invention;
Fig. 7 is the schematic diagram of terminal device provided in an embodiment of the present invention.
Specific implementation mode
In being described below, for illustration and not for limitation, it is proposed that such as tool of particular system structure, technology etc Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention can also be realized in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
Term " comprising " in description and claims of this specification and above-mentioned attached drawing and their any deformations, meaning Figure, which is to cover, non-exclusive includes.Such as process, method or system comprising series of steps or unit, product or equipment do not have It is defined in the step of having listed or unit, but further includes the steps that optionally not listing or unit, or optionally also wrap It includes for the intrinsic other steps of these processes, method, product or equipment or unit.In addition, term " first ", " second " and " third " etc. is for distinguishing different objects, not for description particular order.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
Embodiment 1:
Fig. 1 shows a kind of implementation process for fingerprint recognition alarm method that one embodiment of the present of invention provides, this reality The flow executive agent for applying example can be terminal device, and details are as follows for process:
In step S101, the finger print information of user is obtained.
In the present embodiment, the finger print information of user is obtained, the finger print information of user includes default common unlock fingerprint letter Breath and preset alarm finger print information.
In one embodiment of the invention, before the finger print information for obtaining user, it is necessary first to typing finger print information, The default common unlock finger print information of typing is identical as the method for preset alarm finger print information, by typing preset alarm finger print information Finger is set as the finger different and rarely needed from default common unlock finger print information, for reducing accidentally tactile risk.
In step s 102, judge whether finger print information is consistent with preset alarm finger print information.
In the present embodiment, after getting finger print information, first determine whether that the finger print information refers to default common unlock Whether line information is consistent, if unanimously, unlocking terminal device;If inconsistent, continue to judge that the finger print information refers to preset alarm Whether line information is consistent.
In step s 103, if unanimously, unlocking terminal device, after unlocking terminal device, the operation of user is detected, And corresponding alarm operation is executed depending on the user's operation.
In the present embodiment, if finger print information is consistent with preset alarm finger print information, terminal device is unlocked, is unlocked herein Operation with it is above-mentioned when finger print information with it is default commonly unlock finger print information it is consistent when unlock operation it is identical, make user by people Body will not act rashly and alert the enemy when threatening because of apparent alarm operation, come to harm.
In the present embodiment, after unlocking terminal equipment, the operation of user can be detected in real time, and hold depending on the user's operation The corresponding alert operation of row.
From above-described embodiment it is found that the embodiment of the present invention obtains the finger print information of user;Judge finger print information and default report Whether alert finger print information is consistent;If consistent, terminal device is unlocked, after unlocking terminal device, detects the operation of user, and Corresponding alarm operation is executed depending on the user's operation.The embodiment of the present invention is by being arranged alarm fingerprint, and according to corresponding behaviour Make to carry out corresponding alarm operation, it, can not be convenient and safe by mobile phone to solve user when personal property is on the hazard Alarm the problem of, allow users to hidden completion alarm operation, to effectively ensured user personal property peace Entirely.
As shown in Fig. 2, in one embodiment of the invention, Fig. 2 shows the implementation processes of step S103 in Fig. 1, in detail It states as follows:
In step s 201, the current operation record of user in real.
In the present embodiment, after unlocking terminal device in above-mentioned steps S103, the current operation of user is monitored in real time Record.
In step S202, judge whether current operation record includes default sensitive operation.
In the present embodiment, default sensitive operation is the operation for being executed in emergency situation pre-set.According to Default sensitive operation is associated, to different by the correspondence that user preset is set with corresponding alarm operation Dangerous situation triggers different alarm operations.
In step S203, if current operation record includes default sensitive operation, warning message is sent to alarm system.
In the present embodiment, when the current operation of user record includes default sensitive operation, it was demonstrated that user's person at this time Property is on the hazard, so alert, to alarm system, alarm system shows the warning message, makes related police service people Member can see in time, make corresponding processing.
In the present embodiment, sensitive operation is preset by setting, user is made to trigger default sensitive operation when facing a danger And alert, ensure the security of the lives and property of itself.
As shown in figure 3, in one embodiment of the invention, Fig. 3 shows the specific sight stream of step S203 in Fig. 2 Journey, details are as follows:
In step S301, current geographic coordinate is obtained.
In the present embodiment, when default sensitive operation is emergent emergency operation, illustrate the life security of user at this time by It to threat, needs timely to alarm, and send out the location information of oneself, so needing to obtain current geographic position, in this implementation In example, current geographic position can be obtained by the GPS positioning function of terminal device.
In the present embodiment, the emergent emergency operation includes the screen that the terminal device is slided according to desired guiding trajectory, The desired guiding trajectory includes being slided to some direction, such as left cunning and sliding, upper cunning or downslide;The desired guiding trajectory further includes simple Symbol track, such as letter, the simple figure at picture of geometric figure.
In the present embodiment, user oneself can add, change desired guiding trajectory, facilitate user that emergent emergency behaviour is rapidly completed Make.
In step s 302, the warning message for including current geographic coordinate is generated.
In the present embodiment, warning message includes current geographic coordinate, and the police is made to get alert spot at the first time To make corresponding police strength policy, warning message further includes the phone number of terminal device, to real-time by phone number Monitor the variation in user geographical location.
In step S303, warning message is sent to alarm system.
From above-described embodiment it is found that after by finger print information alarm unlock, when getting emergent emergency operation, hair The warning message including current geographic coordinate is sent to alarm, so as to be completed under the premise of not causing criminal to pay attention to Alarm operation, has ensured the safety of user itself.
In one embodiment of the invention, alarm system is set to police end, alarm system include Alarm Server and Alarm terminal, Alarm Server receive warning message, and according to the current geographic position coordinate carried in warning message, judging should The nearest public security organ in alert spot, the alarm terminal of transmission warning message to the public security organ, so that public security organ can Police strength quickly is sent, is further ensured that the safety of user.
In one embodiment of the invention, default sensitive operation includes transfer operation, and step S103 further includes in Fig. 2:
Step S401:Obtain transfer operation transfer information, transfer information include user account information and arrive account account Account information.
In the present embodiment, default sensitive operation further includes transfer operation, and the transfer operation includes by Alipay, micro- The platforms such as letter are transferred accounts;It is transferred accounts by the bank card of bank client;And supplement the presence such as transfer of payment with money by supplement platform with money The operation that the amount of money changes.
In the present embodiment, when getting current operation and being recorded as transfer operation, transfer information is obtained first, letter of transferring accounts Breath includes the account information of user and the account information to account account, and account information includes account account, the account account packet Include the login account account and bank card account number of payment platform.The transfer information further includes account holder information, when transferring accounts Between etc. information.
Step S402:Warning message is sent to alarm system, warning message includes current geographic coordinate and transfer information, report Alert information is used to indicate alarm system to being monitored to account account.
In the present embodiment, warning message includes current geographic coordinate and transfer information, and alarm system receives alarm signal After breath, according to the transfer information in warning message to being monitored to account account, user's property loss is avoided, and catch all in one draft not Method molecule.
In one embodiment of the invention, warning message further includes the preset mobile phone number of user, when monitoring to transfer accounts When operation, alarm system can search all bank accounts of the preset mobile phone number binding, and to the bank account into Row monitoring obtains the specified place for operation of withdrawing the money when the bank account, which exists, withdraws the money operation, and the police can be specific according to this Place proposes that corresponding police strength policy avoids the property loss of user so as to more quickly arrest criminal.
In one embodiment of the invention, above-mentioned withdrawal operation further includes withdrawing the money to operate without card, is made when user is seized on both sides by the arms When being withdrawn the money without card with terminal device, terminal device is detected to be unlocked by preset alarm finger print information, and is got and withdrawn the money without card Identifying code when, it was demonstrated that detect without card withdraw the money operate, then send warning message to alarm system, warning message includes current position Manage position coordinates and this without card withdraw the money account information, alarm system by account information search occur without card withdraw the money operate certainly The particular geographic location coordinate for helping cash terminals, it is more accurate by current geographic position coordinate and particular geographic location coordinate Confirm that alert scene arrests criminal so as to quickly arrange nearest police strength, to ensure the personal wealth of user Production safety.
In one embodiment of the invention, step S103 further includes in Fig. 1:
Step S501:Judge whether the operation of user is predetermined registration operation, and the predetermined registration operation includes being held in preset time The manual screen locking operation of row.
Step S502:If the operation of user is not predetermined registration operation, corresponding alarm operation is executed depending on the user's operation.
In the present embodiment, user's police's puzzlement caused by false alarm because of maloperation in order to prevent, adds mistake Operation judges process, by be arranged predetermined registration operation, judge whether the operation of user is predetermined registration operation, to judge user whether be Maloperation.
In this example, it is assumed that preset time is 30 seconds, if user executes manual screen locking in 30 seconds preset times Operation, then judge user for maloperation, does not execute alarm operation.
In the present embodiment, predetermined registration operation can also include not executing any sensitive operation in preset time, then judge User is maloperation, does not execute alarm operation.
If it is determined that operation of the user in preset time is not predetermined registration operation, then execute depending on the user's operation corresponding Alarm operation.
From above-described embodiment it is found that by the way that maloperation deterministic process is arranged, the accuracy of alarm operation is improved, effectively Prevent user to perplex caused by maloperation is to the police, enable the police accurately and timely be connected to real alert, further The personal safety as well as the property safety of user is ensured.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Embodiment 2:
As shown in figure 4, the fingerprint recognition alarm system 1000 that one embodiment of the present of invention provides, for executing Fig. 1 institutes Method and step in corresponding embodiment comprising:
Finger print information acquisition module 1100, the finger print information for obtaining user;
Finger print information judgment module 1200, for judging whether the finger print information is consistent with preset alarm finger print information;
Operation module 1300 of alarming unlocks the terminal device if for consistent, unlock the terminal device it Afterwards, the operation of user is detected, and corresponding alarm operation is executed according to the operation of the user.
From above-described embodiment it is found that the finger print information that the embodiment of the present invention passes through acquisition user;Judge finger print information with it is pre- If whether alarm fingerprint information is consistent;If consistent, terminal device is unlocked, after unlocking terminal device, detects the behaviour of user Make, and executes corresponding alarm operation depending on the user's operation.The embodiment of the present invention is by being arranged alarm fingerprint, and according to correspondence Operation alarmed accordingly, can not be convenient and safe by mobile phone to solve user when personal property is on the hazard Alarm the problem of, allow users to hidden completion actuation of an alarm, to effectively ensured user personal property peace Entirely.
As shown in figure 5, in one embodiment of the invention, the alarm operation module in the embodiment corresponding to Fig. 4 1300 further include the structure for executing the method and step in the embodiment corresponding to Fig. 2 comprising:
Current operation records acquiring unit 1310, and the current operation for user in real records;
Current operation records judging unit 1320, for judging whether current operation record includes default sensitive operation;
Warning message transmission unit 1330 sends alarm signal if including default sensitive operation for current operation record Cease alarm system.
From above-described embodiment it is found that presetting sensitive operation by setting, user is made to trigger default sensitivity when facing a danger It operates and alert, ensures the security of the lives and property of itself.
As shown in fig. 6, in one embodiment of the invention, the warning message in the embodiment corresponding to Fig. 5 sends single Member 1330 further includes the structure for executing the method and step in the embodiment corresponding to Fig. 3 comprising:
Current geographic coordinate obtains subelement 1331, for obtaining current geographic coordinate;
Warning message generates subelement 1332, for generating the warning message for including the current geographic coordinate;
Warning message transmission sub-unit 1333, for the warning message to be sent to the alarm system.
From above-described embodiment it is found that after by finger print information alarm unlock, when getting emergent emergency operation, hair The warning message including current geographic coordinate is sent to alarm, so as to be completed under the premise of not causing criminal to pay attention to Alarm operation, has ensured the safety of user itself.
In one embodiment, warning message transmission unit 1330 further includes:
Transfer information obtains subelement, and the transfer information for obtaining the transfer operation, the transfer information includes institute State the account information of user and the account information to account account;
Second warning message transmission sub-unit, for sending warning message to alarm system, the warning message includes working as Preceding geographical coordinate and the transfer information, the warning message are used to indicate the alarm system and are supervised to account account to described Depending on.
In the present embodiment, it by obtaining current operation record, when current operation record is consistent with transfer operation, sends Warning message is to alarm system, according to the transfer information in warning message to being monitored to account account, to avoid property from damaging It loses, and catches all in one draft criminal, ensure the personal safety as well as the property safety of user.
In one embodiment, alarm operation module 1300 further includes:
Predetermined registration operation judging unit, for judging whether the operation of the user is predetermined registration operation, the predetermined registration operation packet It includes and executes manual screen locking operation in preset time;
Alarm operation execution unit, if the operation for the user is not the predetermined registration operation, according to the user Operation execute corresponding alarm operation.
From above-described embodiment it is found that by the way that maloperation deterministic process is arranged, the accuracy of alarm operation is improved, effectively Prevent user to perplex caused by maloperation is to the police, enable the police accurately and timely be connected to real alert, further The personal safety as well as the property safety of user is ensured.
Embodiment 3:
The embodiment of the present invention additionally provides a kind of terminal device 7, including memory 71, processor 70 and is stored in storage In device 71 and the computer program 72 that can be run on processor 70, the processor 70 execute real when the computer program 72 Step in each embodiment now as described in example 1 above, such as step S101 shown in FIG. 1 to step S103.Alternatively, described Processor 70 realizes the work(of each module in each device embodiment as described in example 2 above when executing the computer program 72 Can, for example, module 1100 to 1300 shown in Fig. 4 function.
The terminal device 7 can be that the calculating such as desktop PC, notebook, palm PC and cloud server are set It is standby.The terminal device 7 may include, but be not limited only to, processor 70, memory.Such as the terminal device 7 can also include Input-output equipment, network access equipment, bus etc..
Alleged processor 70 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng.
The memory 71 can be the internal storage unit of the terminal device 7, such as the hard disk of terminal device 7 or interior It deposits.The memory 71 can also be to be equipped on the External memory equipment of the terminal device 7, such as the terminal device 7 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Further, the memory 71 can also both include terminal device 7 internal storage unit or Including External memory equipment.The memory 71 is for storing needed for the computer program 72 and the terminal device 7 Other programs and data.The memory 71 can be also used for temporarily storing the data that has exported or will export.
Embodiment 4:
The embodiment of the present invention additionally provides a kind of computer readable storage medium, and computer-readable recording medium storage has meter Calculation machine program 72 realizes the step in each embodiment as described in example 1 above when computer program 72 is executed by processor 70, Such as step S101 shown in FIG. 1 to step S103.Alternatively, being realized when the computer program 72 is executed by processor 70 strictly according to the facts Apply the function of each module in each device embodiment described in example 2, such as the function of module 1100 to 1300 shown in Fig. 4.
The computer program 72 can be stored in a computer readable storage medium, which is being located It manages when device 70 executes, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, the computer program 72 includes computer journey Sequence code, the computer program code can be source code form, object identification code form, executable file or certain intermediate shapes Formula etc..The computer-readable medium may include:Any entity or device, note of the computer program code can be carried Recording medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage 71, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software Distribution medium etc..It should be noted that the content that the computer-readable medium includes can be according to making laws in jurisdiction Requirement with patent practice carries out increase and decrease appropriate, such as in certain jurisdictions, according to legislation and patent practice, computer Readable medium is including being not electric carrier signal and telecommunication signal.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.
Module or unit in system of the embodiment of the present invention can be combined, divided and deleted according to actual needs.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.

Claims (10)

1. a kind of fingerprint recognition alarm method, the method is applied to terminal device, which is characterized in that including:
Obtain the finger print information of user;
Judge whether the finger print information is consistent with preset alarm finger print information;
If consistent, the terminal device is unlocked, after unlocking the terminal device, detects the operation of user, and according to institute The operation for stating user executes corresponding alarm operation.
2. fingerprint recognition alarm method as described in claim 1, which is characterized in that described to be executed according to the operation of the user Corresponding alarm operation, including:
The current operation of user in real records;
Judge whether the current operation record includes default sensitive operation;
If the current operation record includes default sensitive operation, warning message is sent to alarm system.
3. fingerprint recognition alarm method as claimed in claim 2, which is characterized in that the default sensitive operation includes emergent asks Operation is rescued, the emergent emergency operation includes the screen that the terminal device is slided according to desired guiding trajectory;
If the current operation record includes default sensitive operation, warning message is sent to alarm system, including:
Obtain current geographic coordinate;
Generate the warning message for including the current geographic coordinate;
The warning message is sent to the alarm system.
4. fingerprint recognition alarm method as claimed in claim 2, which is characterized in that the default sensitive operation includes the behaviour that transfers accounts Make;
If the current operation record includes default sensitive operation, warning message is sent to alarm system, including:
Obtain the transfer information of the transfer operation, the transfer information includes the account information of the user and to account account Account information;
Warning message is sent to alarm system, the warning message includes current geographic coordinate and the transfer information, the report Alert information is used to indicate the alarm system and is monitored to account account to described.
5. fingerprint recognition alarm method as described in claim 1, which is characterized in that after the operation of the detection user, also Including:
Judge whether the operation of the user is predetermined registration operation, and the predetermined registration operation includes that manual screen locking is executed in preset time Operation;
If the operation of the user is not the predetermined registration operation, corresponding alarm operation is executed according to the operation of the user.
6. a kind of fingerprint recognition alarm system is applied to terminal device, which is characterized in that including:
Finger print information acquisition module, the finger print information for obtaining user;
Finger print information judgment module, for judging whether the finger print information is consistent with preset alarm finger print information;
If operation module of alarming unlocks the terminal device for consistent, and after unlocking the terminal device, detection is used The operation at family, and corresponding alarm operation is executed according to the operation of the user.
7. fingerprint recognition alarm system as claimed in claim 6, which is characterized in that the alarm operation module, including:
Current operation records acquiring unit, and the current operation for user in real records;
Current operation records judging unit, for judging whether the current operation record includes default sensitive operation;
Warning message transmission unit, if including default sensitive operation for current operation record, send warning message to Alarm system.
8. fingerprint recognition alarm system as claimed in claim 7, which is characterized in that the default sensitive operation includes emergent asks Operation is rescued, the emergent emergency operation includes the screen that the terminal device is slided according to desired guiding trajectory;
The warning message transmission unit, including:
Current geographic coordinate obtains subelement, for obtaining current geographic coordinate;
Warning message generates subelement, for generating the warning message for including the current geographic coordinate;
Warning message transmission sub-unit, for the warning message to be sent to the alarm system.
9. a kind of terminal device, including memory, processor and it is stored in the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 5 when executing the computer program The step of any one of them fingerprint recognition alarm method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist In realization such as fingerprint recognition alarm method described in any one of claim 1 to 5 when the computer program is executed by processor The step of.
CN201810159542.1A 2018-02-26 2018-02-26 Fingerprint identification alarm method, system and terminal equipment Active CN108399710B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810159542.1A CN108399710B (en) 2018-02-26 2018-02-26 Fingerprint identification alarm method, system and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810159542.1A CN108399710B (en) 2018-02-26 2018-02-26 Fingerprint identification alarm method, system and terminal equipment

Publications (2)

Publication Number Publication Date
CN108399710A true CN108399710A (en) 2018-08-14
CN108399710B CN108399710B (en) 2020-02-28

Family

ID=63096791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810159542.1A Active CN108399710B (en) 2018-02-26 2018-02-26 Fingerprint identification alarm method, system and terminal equipment

Country Status (1)

Country Link
CN (1) CN108399710B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109872501A (en) * 2019-04-12 2019-06-11 维沃移动通信有限公司 A kind of alarm method and terminal device
CN110096863A (en) * 2019-04-23 2019-08-06 维沃移动通信有限公司 A kind of alarm method and mobile terminal
WO2020118491A1 (en) * 2018-12-10 2020-06-18 深圳市柔宇科技有限公司 Fingerprint recognition-based interaction method, electronic device and related device
CN111986462A (en) * 2020-09-01 2020-11-24 中国银行股份有限公司 Bank card alarm system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1595461A (en) * 2004-07-12 2005-03-16 武汉大学 Safety and embezzle proofing method of credit card, financial card and savings card
CN104036594A (en) * 2013-12-10 2014-09-10 深圳怡化电脑股份有限公司 Alarm method for ATM abnormal withdrawal
CN105160742A (en) * 2015-09-15 2015-12-16 劳海鹏 Method and system for carrying out judgment, alarming and information shielding on forced unlocking
CN106157561A (en) * 2015-04-23 2016-11-23 中兴通讯股份有限公司 The alarm method of terminal and device
CN206480016U (en) * 2016-09-09 2017-09-08 宇瞻科技股份有限公司 Trigger the portable memory device of anti-stress function
CN107256620A (en) * 2017-06-06 2017-10-17 深圳市泰衡诺科技有限公司 Mobile terminal alarm device and mobile terminal alarming method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1595461A (en) * 2004-07-12 2005-03-16 武汉大学 Safety and embezzle proofing method of credit card, financial card and savings card
CN104036594A (en) * 2013-12-10 2014-09-10 深圳怡化电脑股份有限公司 Alarm method for ATM abnormal withdrawal
CN106157561A (en) * 2015-04-23 2016-11-23 中兴通讯股份有限公司 The alarm method of terminal and device
CN105160742A (en) * 2015-09-15 2015-12-16 劳海鹏 Method and system for carrying out judgment, alarming and information shielding on forced unlocking
CN206480016U (en) * 2016-09-09 2017-09-08 宇瞻科技股份有限公司 Trigger the portable memory device of anti-stress function
CN107256620A (en) * 2017-06-06 2017-10-17 深圳市泰衡诺科技有限公司 Mobile terminal alarm device and mobile terminal alarming method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020118491A1 (en) * 2018-12-10 2020-06-18 深圳市柔宇科技有限公司 Fingerprint recognition-based interaction method, electronic device and related device
CN109872501A (en) * 2019-04-12 2019-06-11 维沃移动通信有限公司 A kind of alarm method and terminal device
CN110096863A (en) * 2019-04-23 2019-08-06 维沃移动通信有限公司 A kind of alarm method and mobile terminal
CN111986462A (en) * 2020-09-01 2020-11-24 中国银行股份有限公司 Bank card alarm system and method

Also Published As

Publication number Publication date
CN108399710B (en) 2020-02-28

Similar Documents

Publication Publication Date Title
CN108399710A (en) A kind of fingerprint recognition alarm method, system and terminal device
CN103745538B (en) The cipher code protection method of finance account and system
CN103455771A (en) System and method for remotely initiating lost mode on a computing device
US11192773B1 (en) System and method for managing fuel dispensing account
CN104346550B (en) A kind of information processing method and a kind of electronic equipment
CN107633573A (en) The method for unlocking and intelligent door lock of a kind of intelligent door lock
CN107533624A (en) Detect and prevent the illegal use of equipment
CN107302586A (en) A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing
CN106504086A (en) A kind of method and bank account system for protecting bank account safety
CN105992125A (en) Electronic device safety protection method and device
CN104680669A (en) Financial business transaction system and method
CN104778587A (en) Safety payment method and device
CN110705988A (en) Interactive blocking method and system for invasive behaviors
CN106446667B (en) Password data processing method, device and equipment
CN110598383A (en) Method and device for removing account permission limitation
CN109255617A (en) Intelligent payment method, mobile terminal and computer-readable storage media
CN116389094A (en) Network information user safety detection management system based on Internet of things
CN107786349B (en) Security management method and device for user account
CN111882425B (en) Service data processing method, device and server
CN103116848B (en) The method of secured electronic charging, equipment and system
CN107040497A (en) Network account theft preventing method and device
CN105427480A (en) Teller machine based on image analysis
WO2015085942A1 (en) Terminal status query method, terminal anti-theft method and corresponding device
CN109074577A (en) wallet management system
CN105653989B (en) A kind of information leakage preventing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 3 / F, C1 area, innovation building, 182 science Avenue, Science City, Guangzhou, Guangdong 510663

Patentee after: Guangzhou Ankai Microelectronics Co.,Ltd.

Address before: 3 / F, C1 area, innovation building, 182 science Avenue, Science City, Guangzhou, Guangdong 510663

Patentee before: ANYKA (GUANGZHOU) MICROELECTRONICS TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP02 Change in the address of a patent holder

Address after: 510555 No. 107 Bowen Road, Huangpu District, Guangzhou, Guangdong

Patentee after: Guangzhou Ankai Microelectronics Co., Ltd

Address before: 3 / F, C1 area, innovation building, 182 science Avenue, Science City, Guangzhou, Guangdong 510663

Patentee before: Guangzhou Ankai Microelectronics Co., Ltd

CP02 Change in the address of a patent holder