WO2010118583A1 - 用户识别系统及其用户数据处理方法 - Google Patents
用户识别系统及其用户数据处理方法 Download PDFInfo
- Publication number
- WO2010118583A1 WO2010118583A1 PCT/CN2009/071346 CN2009071346W WO2010118583A1 WO 2010118583 A1 WO2010118583 A1 WO 2010118583A1 CN 2009071346 W CN2009071346 W CN 2009071346W WO 2010118583 A1 WO2010118583 A1 WO 2010118583A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- information
- feature code
- module
- user identification
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
Definitions
- the present invention relates to an identification system, and more particularly to a user identification system and a user data processing method thereof.
- FIG. 1 is a structural diagram of the fingerprint lock mounted on the door.
- a door handle 101 is mounted on the door, the door handle 101 is rotated to open or close the door, and a fingerprint identifier 103 is mounted on the door handle, and an associated function button 105 is disposed on the door, when the user places the finger
- the fingerprint recognizer 103 is on, if the recognition is successful, the door handle 101 can be rotated, and then the drive shaft 107 can be shortened to open the door.
- the administrator needs to define a user identification system such as a fingerprint lock to allow different people to enter at different times, and for the office work crowd
- a user identification system such as a fingerprint lock
- user identification information such as fingerprints.
- you need to work overtime you need to be authorized by the administrator to pass, and for the hour cleaner, the cleaner can enter and leave the office with the user's characteristic information such as fingerprints during the specific cleaning time every day to complete the cleaning work.
- the time not specified by the administrator Out it will not be recognized by the user recognition system, so that can not enter the office.
- the number of feature information input by each user is often limited.
- the feature information is fingerprint information, and if it is rigidly specified, each user can only have Three fingers are used as fingerprint input. When the user inputs three finger fingerprints, if you want to input fingerprints of more fingers, you must input other finger fingerprints as another user, which is not user-friendly.
- the general user identification system is often limited to the feature information group that is specifically limited, so that flexible user management and feature information management cannot be realized.
- the current user identification system is faulty, then backing up the user's fingerprint data is not true. Often important, but existing user identification systems do not have the ability to back up data. Therefore, the existing user identification system has the defects of single function and no flexible user management function.
- the technical problem to be solved by the present invention is to provide a user identification system and a user data processing method thereof to overcome the problem that the user identification system has a single function and cannot flexibly manage user information in the prior art.
- the present invention provides a user data processing method for a user identification system.
- the user identification system includes a main controller, a storage module, a user identification module, and a user interface module.
- the user data processing method is characterized in that: the user identification module collects characteristics input by the user. Information, generating feature code for feature information, assigning a feature code number to the feature code, storing the feature code and the feature code number, and transmitting the feature code number to the main controller; the user interface module receiving the user status information, and the user status information
- the master controller transmits the user-related information in the memory according to the feature code number and the user state information.
- the feature code includes a first feature code and a second feature code, where the first feature code is a feature code generated by the feature information input by the registered user at the time of registration, and the second feature code is accessed by any user.
- the feature code generated by the feature information input by the user when the system is recognized, and the user data processing method includes:
- the user identification module compares the second feature code with the first feature code stored in the user identification module. When the first feature code matches the second feature code, the user identification module returns a first feature code corresponding to the main controller. Signature number;
- the main controller queries the user-related information in the storage module according to the feature code number of the second feature code, and controls the user's access to the user identification system according to the query result.
- the information acquisition sensor in the user identification module is used to collect the feature information of the registered user and any user, and the feature code generation module in the user identification module generates the feature code, and uses the feature code storage in the user identification module.
- the module stores the feature code, and compares the first feature code with the second feature code by using the feature code comparison module in the user identification module.
- the storage module stores device related information and user related information, wherein the user related information is a user information database, the user information database includes user management information and user personal information, and the device related information includes error record information, Function setting file information.
- the user related information is a user information database
- the user information database includes user management information and user personal information
- the device related information includes error record information, Function setting file information.
- the user management information includes a feature code number - a user number index file and a status index file
- the user personal information includes personal feature information, personal social attribute information, and personal distribution attribute information.
- the state index file includes one or any combination of a rights index file, a pause/enable arch file, and a time allocation index file.
- the feature number number - the user number field of the user number index file The feature code number in the user code module corresponding to the feature code number stored in the user identification module, the feature code number - the user number in the feature code number field of the user number index file and the state index file in the storage module and the user personal database File - Correspondence, Signature Number - The user number in the field of the user number index file corresponds to one or more signature numbers.
- the present invention provides a user identification system including a main controller, a storage module, a user identification module, and a user interface module.
- the user identification module is configured to collect feature information input by the user, generate a feature code for the feature information, assign a feature code number to the feature code, store the feature code and the feature code number, and transmit the feature code number to the main controller.
- the user interface module is configured to receive user status information and communicate status information to the primary controller.
- the main controller is configured to generate user related information in the memory based on the feature code number and user status information.
- an information collection sensor is disposed in the user identification module, and the information collection sensor is configured to collect feature information of the registered user and any user, and the feature identification module is provided in the user identification module, and the feature code generation module generates the feature.
- a code storage module is disposed in the user identification module, a feature code storage module is configured to store the feature code, a feature code comparison module is disposed in the user identification module, and a feature code comparison module is used to compare the feature code.
- the user identification system and user data processing method thereof of the invention utilize a main controller, a user identification module, a system startup module, a user interface module, a mobile module, an electronic clock module, a system detection module, an external communication module, a storage module, and a security encryption Module cooperation, user rights management, user time management, user pause enablement management, system data backup, system data synchronization, system data recovery, and system upgrade functions, thereby improving the prior art function of the user identification system. Therefore, there is no defect in flexible user management functions.
- FIG. 1 is a schematic view of a prior art door lock and its control method.
- FIG. 2 is a schematic diagram showing the overall structure of a user identification system disclosed by the present invention.
- FIG. 3 is a schematic diagram of a data storage structure of a user identification system disclosed by the present invention.
- FIG. 4 is a flow chart showing the operation of the user input system of the present invention.
- FIG. 5 is a flow chart of the system for collecting user fingerprints by the system of the user identification system disclosed by the present invention.
- FIG. 6 is a flow chart of collecting user voice information of the user identification system disclosed by the present invention.
- FIG. 7 is a flow chart of deleting a user of the user identification system disclosed by the present invention.
- FIG. 8 is a flow chart of a modification time/user authority or a user pause/enable state of the user identification system disclosed by the present invention.
- FIG. 9 is a specific operational flow diagram of two methods for selecting users of the user identification system disclosed by the present invention.
- 10 is a specific operational flow of a method for selecting multiple users of a user identification system disclosed by the present invention. Cheng Tu.
- FIG. 11 is a system operation flowchart of a user suspension enable function of the user identification system disclosed by the present invention.
- FIG. 12 is a system operation flowchart of a user time allocation function of the user identification system disclosed by the present invention.
- FIG. 13 is a system operation flowchart of a user authority setting function of the user identification system disclosed by the present invention.
- 14 is a system flowchart of a method for querying a query index file of the user identification system disclosed by the present invention.
- 15 is a system operation flowchart of a method for querying a user personal database of a user identification system disclosed by the present invention.
- 16 is a system operation flowchart of the user information database of the user identification system and the user characteristic information linked to the user identification system.
- Figure 17 is a diagram showing the relationship between the user information database of the user identification system and the user personal database disclosed in the present invention.
- 18 is a system operation flowchart of a user backup function of the user identification system disclosed by the present invention.
- 19 is a system operation flowchart of a user recovery function of the user identification system disclosed by the present invention.
- 20 is a system operation flowchart of data synchronization of the user identification system disclosed by the present invention.
- the user identification system 20 of the present invention includes a main controller 201, a user identification module 203, a system startup module 205, a user interface module 207, an action module 209, an electronic clock module 211, and a system detection module 213.
- the user identification system disclosed by the present invention can have functions such as user authority setting, user usage time allocation, user data backup and upgrade, and user data synchronization and recovery, so that the user identification system and the user are enabled.
- the information database is combined to allow more flexible management of users.
- the main controller 201 is used to control the operation of the above plurality of modules.
- the main controller 201 can communicate with the user identification module 203 to implement various data processing services.
- the system startup module 205 is used to sense an external action. When an external action is made, such as when the user presses the power start switch, the system start module 205 can activate the power of the main controller 201 to activate the main controller 201.
- the user interface module 207 enables the user to perform operations on the user identification system 20.
- the user can implement system function selection, user selection, and judgment operations, such as confirmation, cancellation, etc., on the user interface, wherein the user interface module 207 can utilize voice prompts. , voice recognition, LCD display, touch screen, LED, button, computer operation, etc., in any or any combination.
- the system detection module 213 is configured to implement a system detection function, which obtains information such as a power supply voltage, an external temperature, and the like through a sensor provided on the system, and detects whether each module is legal and works normally by using a specific communication protocol, thereby comprehensively determining system security. In addition, it can alarm, record and lock the device for illegal and unsafe behavior.
- the external communication module 215 is configured to implement the user identification system 20 to communicate with the outside world, and the implementation manner may be any communication technology such as wired or wireless. Through the external communication module 215, the user identification system 20 can transmit information with the outside.
- the security encryption module 219 can encrypt and protect various information, including various information including user information and inter-module communication content.
- the storage module 217 can provide a storage space for the user identification system 20 to store related information.
- the storage module 217 can be implemented using a memory chip, a TF card, an SD card, a USB flash drive, and a remote storage space such as a network space.
- the storage module 217 stores at least user related information and device related information, and may also include user storage information.
- the user related information included in the storage module 217 is a user information database, and the user information database includes user management information and user personal information.
- the user management information includes at least a feature code number-user number index file and a state index file, and the state index file includes one of a rights index file, a pause enable index file, and a time allocation index file, or any combination thereof.
- the status index files you can query the status of the corresponding user number, such as the user number's permission (that is, whether it is the system administrator), whether it is paused or enabled (whether it is disabled by the system administrator), and the working time period (limited by the system administrator).
- the time period to which the system can be recognized by the system), and according to the feature code number-user number index file, the feature code in the user identification module 203 can be associated with the user information in the storage module 217 (this will be detailed below). Introduction).
- the user's personal information includes at least personal characteristic information, personal social attribute information, and personal distribution attribute information.
- the personal characteristic information includes feature attribute information, and is one of user identity information such as a fingerprint, a voiceprint, and an iris.
- the feature attribute information is a fingerprint, which finger is, or if the user feature attribute is iris, whether it is the left eye or the right eye
- the personal feature information exists as a personal information database file, and constitutes a personal information database, a user information database, and an individual.
- the relationship between the information database and the index file will be described in detail below.
- the personal social attribute information includes at least: a name, a photo, a signature, and a user number in the form of voice or text.
- the personal assignment attribute information includes, for example, the organization name, user authority, time allocation section, pause or enable status, and the like.
- the device related information includes, for example, error record information, a function setting file, and the like.
- User deposit information includes, for example, confidential files, personal privacy files, and other information that need to be protected from hiding, as well as authorization data for other devices related to the user, such as passwords of computer software, verification information of bank accounts, algorithms and parameters of special fields. And other information.
- the electronic clock module 211 provides an independent and accurate clock for the system, and the user can modify and adjust the clock time. When in actual operation, the electronic clock module 211 also has the following functions: The main controller 201 can compare the current time obtained from the electronic clock module 211 with the user allocated time period recorded in the user information database, if the current time is During the time period allowed by the user, the user identification system of the present invention may allow the user to pass, and conversely, the user is not allowed to pass.
- the access control system of the user identification system 20 of the present invention is installed, a user is allowed to pass.
- the time period is from 7:00 am to 9:00 am. If the user wants to pass the user identification system 20 at 10:00 in the morning, when the user inputs his characteristic information, for example, inputs its pre-registered fingerprint information, the system can query the stored user information. And make a calculation. If the current time is not found in the allocated time period, the user will not be allowed to pass.
- the action module 209 can be an electromechanical switch as known in the art, such as a motor or an electromagnet switch, controlled by the main controller 201, and receives the control signal from the main controller 201, and the action module 209 realizes the motor rotation or the electromagnet transmission. Operation such as electric/power-off, and also includes hardware devices that generate or record sound, light, and electricity, and software modules that automatically record operations and errors, and can perform related operations in response to the main controller 201.
- the user identification module 203 includes an information collection sensor 203a, a signature generation module 203b, a signature matching module 203c, a signature storage module 203d, and an internal communication module 203e.
- the information collection sensor 203a is configured to collect information unique to the user, such as fingerprint, iris, voiceprint, ID number, and identity card.
- the feature code generating module 203b is configured to generate the corresponding feature encoding information according to a specific algorithm, where the specific algorithm may be, for example, a fingerprint feature grayscale direct extraction algorithm, a PCNN fingerprint feature extraction algorithm, and a zero-crossing detection based iris. Feature extraction algorithm, MD5 algorithm, etc.
- the signature storage module 203d is configured to store the registered signatures in a certain arrangement for comparison or backup.
- the feature code comparison module 203c is configured to determine whether the feature code obtained at the time of registration is consistent with the feature code obtained at the time of access. When the two feature codes meet the same definition of the feature, the description is from the same user feature, for example, the same user. The same finger or the left eye iris of the same user.
- the internal communication module 203e is for communicating with the main controller 201. The main function of the user identification module 203 is to identify the user.
- the specific operation flow is as follows: First, the user registers, at this time, the information collection sensor 203a collects the feature information of the user, and the feature code generation module 203b according to the collected user feature information, according to the certain A specific algorithm generates corresponding signature information, and the signature storage module 203d can store the signature information in order. At this time, the registration is completed. Then, if the user accesses, the information collection sensor 203a collects the feature information input by the user again, and then The feature code generating module 203b generates the feature code information by using the same algorithm as described above. At this time, the feature code comparison module 203c compares the feature code information with the feature code previously stored in the feature code storage module 203d.
- the user identification module 203 sends a corresponding signal to the main controller 201 by using the internal communication module 203e, and the main controller 201 controls the action module 209 to implement the corresponding action according to the corresponding signal of the user identification module 203.
- the workflow of the user identification system 20 will be described in detail in conjunction with Figures 4-10.
- the user interface module 207 is composed of a voice prompt module and a button and a recording module, wherein the voice prompt module is used to prompt the user to perform operations, such as reading a corresponding operation item, and requesting the user to select a button.
- the user interface module 207 disclosed by the present invention is not limited to the combination of the voice prompting module and the button and the recording module, and may be set by various conventional methods or a combination thereof. For example, use a liquid crystal display with buttons, a touch screen, and the like.
- the user feature information described below will be described by taking the fingerprint information of the user as an example.
- the user feature information referred to in the present invention is not limited to the fingerprint information of the user. It can also be unique identification information of the user such as iris, voiceprint, ID number, identity card, etc., and the following uses the fingerprint information as an example for the purpose of more convenient and visual description.
- buttons, voices, gestures, and actions For example, in the case of a button, there may be a confirmation button and a cancel button, and when the confirmation button is pressed, a confirmation operation is performed. The cancel operation is made when the cancel button is pressed.
- the system handles the user input mode in three cases:
- the first case when the system is used for the first time, the first user who enters the fingerprint information by default is the system administrator, and the system administrator Need to manage the user identification system, and perform various editing for ordinary users, such as modifying their permissions, usage time, adding and deleting user data, etc.;
- the second case is when the fingerprint information of the system administrator is entered into the system, and then Users who enter the operation are defaulted to normal users by the system. Ordinary users have lower privileges than system administrators and cannot rely on their feature information management system.
- the system administrator authorizes the normal user to upgrade to the system administrator.
- the information collection sensor 203a in the user identification module 203 collects the input fingerprint information, and the signature generation module 203b generates the signature according to a certain algorithm, and then the feature.
- the code storage module 203d stores the generated feature code information according to a specific manner, including automatic sequential arrangement, upper computer control sequence arrangement, artificially specified sequential arrangement, and low to high ordering, high to low ordering and pressing. The order is filled in, etc.
- the user identification module 203 notifies the main controller 201 through the internal communication module 203e.
- the main controller 201 generates a corresponding user information database in the storage module 217, and in the user information database, the main controller 201 records the user's authority as a system. Administrator rights.
- the information collection sensor 203a in the user identification module 203 collects the fingerprint information input by the user, and the user interface module 207 of the system prompts the administrator to authorize the administrator.
- the signature generation module 203b After the correct authorization (such as after inputting the administrator fingerprint), the signature generation module 203b generates the signature information according to a certain algorithm according to the fingerprint information input by the ordinary user, and then the signature storage module 203d stores the generated signature information.
- the user identification module 203 notifies the main controller 201 through the internal communication module 203e that the main controller 201 is storing after receiving the information.
- the corresponding user information database information is generated in the module 217, and in the user information database information, the user's authority is recorded as a common user right.
- the system can process the user's information according to the second case, but when the user inputs the fingerprint, the user selects a user to upgrade to the system administrator or downgrades by selecting the menu. For low-level users or ordinary users, users need to be authorized by the system administrator before they can be upgraded to system administrators or downgraded.
- the user may select a function of recording the voice of the user's name. If the user selects the function, the voice prompting module prompts the operator to name the new user.
- the recording module records the voice spoken by the user, and the user interface module 207 inputs the voice information into the user information database of the memory module 217 for storage.
- the voice prompt module reads the corresponding selection menu, such as When the voice prompt module reads "Enter new user function", if the current user confirms the operation at this time, it proceeds directly to step 401.
- the user interface module 207 can also use other implementation methods.
- step 401 when the touch screen is used, when the user touches the main menu, the system function operation menu is popped up, and the user can select to enter the function menu of the new user, and then proceeds to step 401.
- the voice recognition function can be used to read out the function menu that the user wants to enter to the user interface module 207 having the voice recognition function, and the user recognition system 20 performs the recognition operation and proceeds directly to step 401.
- step 403 is performed, and the system prompts the administrator to authorize. If the system administrator does not authorize or cancel the authorization, the system directly jumps to step 413 to quit the new user function. If the system administrator makes an authorization, the system prompts the current user to input a fingerprint in step 407.
- step 409 the system prompts the user to enter the voice of the name, and the current user reads the name. At this time, the recording module of the system will record the name voice. After completing the above operations, the system prompts whether to retain the above operation in step 411. If the user cancels the operation, the system directly exits without any saving. If the user confirms the operation, then The system saves the above entered information in step 412, and proceeds to step 413 to exit the entry of the new user function.
- step 501 the user identification system 20 prompts the new user to enter a new finger, and even prompts the user to specifically input a finger, such as the left index finger and the right hand ring finger. After the user inputs the corresponding finger fingerprint and completes step 503, it is determined in step 505 whether the fingerprint is successfully captured by the voice prompt.
- step 501 If not, the process returns to step 501; if the acquisition is successful, the user is confirmed in step 507 whether to collect another The fingerprint of one finger, after the user chooses to stop the entry, in step 509, the next process is performed, for example, step 409 described in FIG.
- step 601 the system prompts the user to name the new user through the voice prompt module.
- step 603 the recording module records the name of the new user. After the name voice of the new user is entered, the voice prompt module will be in the step. The new user name just recorded is played in 605, and then in step 607, the voice prompting module prompts the user to confirm or re-enter or cancel the above operation.
- step 607 the voice prompting module prompts the user to confirm or re-enter or cancel the above operation.
- the process returns to step 601 to request the user to re-enter the voice information.
- step 609 the process proceeds to the next process, for example, step 411 described in FIG.
- step 701 the voice prompting module prompts whether to enter the function of "delete user".
- the voice prompting module prompts the current user to select the user or cancels the operation to exit. If the user confirms the operation, the process proceeds to step 703 to perform the user selection. If the user cancels the operation, the user may skip to step 711 to directly exit the function of deleting the user. A user is selected, and the user selection is described in detail in FIG.
- step 705 the voice prompting module prompts the administrator to authorize, if there is no administrator authorization.
- the system prompts the authorization failure in step 713, prompts re-authorization, and waits for the administrator to re-authorize. If the administrator inputs the correct fingerprint successfully, then The prompt will prompt the authorization to be successful and ask the user to confirm. If the user confirms the operation, the user identification system 20 directly exits the function of deleting the user to complete the deletion operation. If the user cancels the operation at this time, the process returns to step 703, and the user identification system 20 does not save the previous operation.
- step 801 a user operation is performed.
- the user selection operation will be described in detail.
- the system will prompt whether to enter the function of "modifying time period/modifying authority". If the operation is canceled, the function is directly exited (step 813).
- the system can enter the modification function (step 803), and prompts in the user interface module 207. The current user modifies the user information.
- the system After the current user makes the corresponding modification, the system performs corresponding modification on the selected user information (such as time period/permission) in the user information database (step 805). If the user confirms the operation, Then, the system prompts the administrator to authorize (step 807). If the current user cancels the operation, the system directly returns to step 801. If the administrator authorizes (step 809), the modification function is completed, and the next process is entered (step 811). ), if the administrator does not authorize, the above modification operation cannot be completed, and the system directly returns To step 801.
- the selected user information such as time period/permission
- step 703 of FIG. 7 and step 801 of FIG. 8 the operation flow of the selected user of the user identification system 20 disclosed in the present invention (ie, step 703 of FIG. 7 and step 801 of FIG. 8) will be described in detail, and in the steps described above, it may be stored.
- the voice prompting module plays the name of each user recorded at the time of registration, and the user can select a specific user after hearing the name information (step 903). If the current user cancels this operation at this time, the current selected function menu is directly exited.
- step 907 If the user who is operating hears that the voice message played by the voice prompt module is not the name of the specific user, press the page key to let the voice prompt module continue to read the voice of the next user's name until the specific user to be selected is found. .
- the voice prompting module plays the voice information
- the user who is performing the operation may determine the operation to select a specific user. If the user cancels the operation, the process returns to step 903. 905).
- step 905 if the user does not confirm the operation but presses the reselection key, the process returns to step 903.
- step 905 if the user presses the OK button, then the user identification system 20 proceeds to the next flow (step 907).
- the current operation user reads out the name of the user to be searched. If the current user cancels the operation, the user mode is directly exited, if the current user When the name of the user to be searched is read and the operation is confirmed after reading, the system selects the specific user and reads the voice name of the specific user from the user personal database 1703 (step 913), if the user cancels in step 913. After the operation, the process returns to step 911. After the current user hears the voice of the name of the user to be queried by the system, the user determines that the operation can proceed to the next process (step 907), and asks the user to re-enter the name. voice.
- the number of users to be selected is not limited, and different users can be repeatedly selected, and operations of deleting, suspending/enabling, modifying time periods, and modifying permissions for multiple different users are performed, as shown in the figure. 10, describes the operation flow for selecting multiple users.
- the current user can choose to press the End Select button or continue to select the button to obtain a certain user (Step 1001).
- the system can complete A user's selection proceeds to step 1003.
- the system may return to step 1001 to continue selecting the user. If the current user presses the confirm selection button, the process proceeds to step 1005. Therefore, the system can perform the same delete, pause, enable, modify time period, modify permissions, etc. for multiple or individual users at the same time.
- step 1101 after the fingerprint recognition is completed, the main controller 201 obtains the fingerprint number of the user; and in step 1103, the main controller 201 refers to the user number corresponding to the fingerprint number in the user information database.
- step 1105 the main controller 201 refers to the suspended/enabled state of the user in the user information database according to the obtained user number, and in step 1107, when it is found that the user is in the enabled state, returns to the enabled state to the main controller 201 ( Step 1109), if it is found that the user is in the suspended state, return to the main controller 201 (step 1111).
- step 1201 after the user identification module 203 completes the fingerprint recognition, the main controller 201 obtains the fingerprint number of the current user, and in step 1203, the main controller 201 queries the electronic clock module 211 for the current time, and In step 1205, the main controller 201 refers to the fingerprint number in the user information database 1701 (described in detail below) to obtain the corresponding user number, and then in step 1207, the main controller 201 is in the user information database based on the user number.
- step 1209 the main controller 201 determines whether the current time is in the time period allocated by the user. If it is found to be in the time period, step 1211 is performed to return information that the user can use at the current time. If it is found that the current time is not in the time period, step 1213 is performed to return information that the user cannot use at the current time.
- step 1301 after the user identification module 203 completes the fingerprint recognition, the main controller 201 obtains the fingerprint number of the current user, and in step 1303, the main controller 201 refers to the fingerprint in the user information database 1701 by using the fingerprint number. No. corresponding to the user number, and in step 1305, the user's privilege level is consulted in the user information database 1701 according to the obtained user number, and in step 1307, it is determined whether the privilege level of the user is an administrator, and if yes, Then, in step 1309, the information that the user is an administrator is returned. If not, then in step 1311, the information that the user is a normal user is returned.
- the method of querying the user state of the user information database 1701 in the embodiment depicted in FIGS. 11-13 can be implemented, for example, with reference to the two query methods described in FIGS. 14 and 15.
- a method for querying a status index file is introduced.
- the main controller 201 After obtaining a user number (ID) (step 1401), the main controller 201 reads a user status index file in step 1403 according to the user number, wherein the user status index The file is stored in the user information database 1701.
- the user status index may be, for example, a user pause/enable index file, a user-assigned time period index file, and a user privilege level index file.
- step 1405 the corresponding state of the corresponding user number in each state index file is consulted, and then each state result is returned in step 1407.
- another query method is introduced, that is, a method for querying a data file in a user's personal database, and the user's personal database file includes user personal information, wherein the user's personal information includes personal distribution attribute information (as shown in FIG. 3).
- the information includes the rights of the user number, the allocation time period, the pause or the start, and the content of the information is the same as the content recorded in the status index file in the query status index file method shown in FIG. It also records more information than the status index file.
- the user's personal database file may also include voice information and other information recorded by the user (see FIG. 3).
- the user number is obtained in step 1501
- the user personal database file of the user is found according to the user number in step 1503
- the user's personal database file is consulted in the user personal database file in step 1505, for example, checking the user's pause/enabled Status, allocation of allowed time periods, user permissions, etc.
- the status information query result of the user is returned.
- the results obtained by the two query methods shown in Figure 14-15 are the same. The method of querying the index table is faster, and the querying the user information database file is slower because the index file format is smaller, such as characterizing the user.
- the permission When the permission is granted, it can be represented by only the sign of 0/1 binary or the single ticket, and the user's personal database file is larger in format, because it saves the user's voice name information and other information of the user in addition to the user state information. (See Figure 3) and so on.
- each user can input a plurality of fingerprints (or feature information such as an iris), and the specific number will not be limited, so that each user can have an unlimited number of multiple user feature information, thereby being flexible.
- the user adds and deletes the feature information of the user, and can also delete all the fingerprint information of the user by deleting the user.
- FIG. 16 is a workflow diagram of the user information database of the user identification system 20 of the present invention linked to user feature information.
- 1601 denotes a feature code number and a feature code content (for example, a fingerprint feature code is taken as an example), which is stored in the signature storage module 203d of the user identification module 203.
- 1603 denotes an index file for recording the relationship between the fingerprint feature code of the user and the user number.
- the index file 1603 is stored in the user information database 1701 in the storage module 217, and also has a state index file corresponding to the user number and the user authority, and the user.
- a status index file whose number corresponds to the user time allocation, and the like.
- 1605 denotes a state index file corresponding to the user ID and the user right
- 1607 denotes a user number and a user pause/enable state index file
- there should also be a user number and a user assigned time state index file but The reason for this is not shown in FIG.
- a certain user has registered another fingerprint, whenever the user wants to add a fingerprint feature, and the signature code of the signature in the signature storage module 203d is 1 and the fingerprint signature-user number corresponding index file
- the signature number in 1605 is assigned a 1.
- the newly entered fingerprint signature is allowed to be stored to the signature number 4 Position
- the main controller 201 records the feature code number 4 at the position 4 of the feature code number field of the feature code number-user number index file 1603 according to the fingerprint number 4 in the feature code storage module 203d
- the user number obtained by the user interface module 207 (for example, number 1) records the user number 1 in the corresponding user number field of the fingerprint feature code number-user number index file 1603 recorded with the feature number 4, where the feature The code number - the feature code number in the user number index file 1603 corresponds to the feature code number stored in the user identification module 203, the feature number - the user number and the state index file and the user personal database file in the user number index file 1603 User number in the corresponding - corresponding, therefore, through the fingerprint feature code number - user number index file 1603 can be used by the user
- the code number - the feature code number in the user number index file 1603 corresponds to the feature code number stored in the user identification module 203, the feature number - the user
- the mapping relationship is further added in the signature number-user number index file 1603, so that due to the automatic hooking mechanism, the user can input multiple fingerprint data in the same manner as described above, and Subject to specific quantities, and when needed When deleting all the fingerprints of the user, you only need to delete the user number 1.
- the fingerprint number corresponding to the user number is deleted at the same time. Therefore, the user 1 can input a plurality of finger information correspondingly without being limited by a specific number, and since the signature information of each finger is associated with the user number, as in the preferred embodiment, the user number 1 corresponds to the fingerprint. No.
- the user number index file 1603 also implements the flexible registration of the feature code stored in the user identification device 203 with the user personal database 1703 stored in the storage module 217, thereby implementing the second query method described above.
- the user information database 1701 employed by the user identification system 20 disclosed herein will be described in detail.
- the user management information includes: an index file, for example, including a user number-character code
- the number index file and the state index file and the state index file includes a rights index file, a pause start index file, and a time index file, and the status of the corresponding user ID may be queried according to the state index files, such as the authority of the user ID (ie, whether the system administrator ), in a pause or start state (whether it is deactivated by the system administrator) and during the working time period (which time period is limited by the system administrator to be recognized by the system).
- the permission index file and the pause access are determined by the manufacturer according to actual needs. For example, the manufacturer may decide that the user identification system 20 only has the user permission setting and the user pause/enable function, and only the permission table and the user pause/enable can be set.
- the user personal information includes personal characteristic information, personal social attribute information, and personal distribution attribute information, and the like, which constitutes the user personal database 1703.
- the personal characteristic information includes feature attribute information (ie, which one of user personal characteristic information such as fingerprint, voiceprint, iris, etc.), user feature code, signature code accessory information, such as an algorithm used to generate the feature code, and a sensor for acquiring the feature.
- the personal social attribute information includes the name (voice or text, etc.), photo , signature, and user ID number; personal assignment attributes include the name of the organization (which company, etc.), their number within the organization, permissions, assigned time period, pause, or start.
- the rights management index file of the user management information, the pause/enable index file, and the time allocation index file and the personal allocation attribute of the user personal information, the time zone, the pause Or the information content such as startup is consistent.
- the user can be flexibly managed, and the user information database 1701 is further linked with the signature storage module 203d in the user identification module 203, which is specifically represented by: the user number-feature in the user information database 1701.
- the code number index file has a corresponding relationship with the signature storage module 203d.
- a certain user fingerprint signature has a certain fingerprint number, and the fingerprint number and signature code are encoded.
- the signature number in the number-user number index file is consistent, so that the state index file can be associated with the signature storage module 203d according to the same fingerprint number, and in the signature number-user number index file, the corresponding feature
- the code number is linked with the corresponding user number, so that the feature code in the signature storage module 203d is associated with the user number, so that the status index file can be searched for the corresponding authority, time allocation, etc. according to the user number.
- Quickly query the user's information (see Figure 16).
- the corresponding user information can be found in the user personal database 1703 according to the user number, wherein in the personal distribution attribute included in the user personal database 1703, the user's authority, allocation time, pause enablement, and the like are stored.
- the information is consistent with the content of the user state of the index file.
- the system adds the user's status information to the index file, and writes the status information to the user number.
- the corresponding individual assigns attribute information, and when the user modifies the user information, for example, performs a related operation on the user interface module 207 to modify the privilege level, the user identification system 20 not only modifies the corresponding state index file of the user,
- the personal assignment attribute information in the user personal database 1703 is also modified. Therefore, as described above, the user state information is recorded in two places of the user information database 1701, one in each index file and the other in the personal distribution attribute information of the user personal database 1703, both of which are acceptable to the master.
- the query index file will serve as the primary choice for the main controller 201 to query actions, and the query
- the user's personal database is available as an alternative.
- each user number occupies a separate folder, and stores personal characteristic information, personal social attribute information, personal distribution attributes, and the like.
- the backup function which will be described in detail below, the information required for backup is mainly stored in the user personal database 1703.
- the synchronization data is mainly provided by the user personal database 1703, so that each user identification system 20 has the same user object for management, and does not need to be new in the newly added user identification system 20.
- the information in the user personal database 1703 is protected by an encryption algorithm.
- the use of the user information database 1701 makes it very convenient to modify user information, process user data, and has great advantages in implementing backup, synchronization, transfer, modification, cross-platform use, and network use.
- a fingerprint feature code information is added to the signature storage module 203d of the user identification module 203.
- the system creates a new mapping relationship in the index file of the user information database 1701 of the storage module 217, such as in the feature code number-user number index file 1603, so that the data is stored in
- the feature code number of the user feature code in the feature code storage module 203d of the user identification system 203 is stored in the feature code number-user number index file 1603, and since a new user is added, the system newly allocates a new user.
- the number is assigned to the user, so that the mapping relationship between the user feature code in the signature storage module 203d and the user information database in the storage module 217 is established in the signature number-user number index file 1603, and further, the system is based on the new
- the user number establishes a status index file, such as a user number-user authority index file, a user number-user pause index file, a user number-user allocation time index file, thereby establishing a corresponding mapping relationship, at this time, the device management information of the system It is completely established, and the main controller 201 adds the user's data space to the user's personal information in the user information database, and writes the status content (such as authority and time allocation) consistent with the index file in the personal allocation attribute. ).
- a status index file such as a user number-user authority index file, a user number-user pause index file, a user number-user allocation time index file
- the main controller 201 queries all the user numbers and the feature code numbers from the user number-user authority index file, and reads out this from the signature storage module 203d of the user identification module 203 according to the acquired signature code number.
- the feature code data of the feature code number the main controller 201 combines each feature code with related auxiliary information, such as feature attributes (left hand index finger, left eye, etc.), its feature acquisition sensor model, signature generation algorithm or chip model.
- the related auxiliary information is burned to the system firmware or saved to the device management information when the user identification system 20 is manufactured, and the main controller 201 can read the information at any time, and the main controller 201 combines the data.
- the current user can select the backup function in the user interface module 207, and after the administrator authorization is successful, the backup can be performed for one or several or all users, and the manual backup is basically the same as the above automatic backup principle. of.
- the following four steps are mainly performed: 1. Obtain the user number and the corresponding signature number (step 1801); 2. The main controller 201 from the user identification module 203 The signature code data of the number is read in the signature storage module 203d (step 1803); 3.
- the main controller 201 combines each signature with the ancillary information stored in the main controller 201 or the storage module 217 to thereby Generating the combination information (step 1805), wherein the auxiliary information includes at least one of a feature attribute, a feature acquisition sensor model, a signature generation algorithm, and a chip model (as described above); 4.
- the main controller 201 The combined information is stored in the personal feature information space of the user personal database file of the corresponding user number of the storage module 217 (step 1807).
- the main controller 201 is already The created user's personal database file is added with the backup content in it, and for the newly joined user, the main controller 201 assigns a new user number to it, and adds a corresponding user number in the user personal database 1703. The user's personal database file, and then add the backup content in this file.
- the user data recovery is specifically that the user signature stored by the signature storage module 203d in the subscriber identity module 203 is lost for some reason, or the entire subscriber identity module 203 needs to be replaced for some reason, and needs to be backed up.
- the signature information in the good user information database 1701 is re-imported into the signature storage module 203d in the subscriber identity module 203, so that the signature information in the subscriber identity module 203 can be recovered from the backup data after being lost. For example, if the user identification module 203 cannot be used for some reason, it is replaced with a new user identification module 203 for replacement, but since the original user information module does not store the original user information feature.
- the data recovery function can be selected in the user interface module 207 after the user identification module 203 is replaced, and data recovery is performed after the administrator authorizes.
- the workflow of the data recovery is as shown in FIG. 19.
- the main controller 201 acquires the aforementioned combination information from the user information database 1701, which includes the user feature code and the accessory information such as the sensor model, algorithm, and feature attribute. One or more of them (as mentioned above).
- step 1903 the main controller 201 determines whether the signature information of the new user identification module 203, such as the model of the information collection sensor 203a, the signature generation algorithm, and the attachment information stored in the combination information (step 1903 and step 1905). If yes, the feature code saved in the user personal database 1703 is imported into the signature storage module 203d of the new subscriber identity module 203 in a certain order in step 1907, so that the new subscriber identity module 203 can identify If the user characteristic information that has been backed up is inconsistent, the recovery operation cannot be performed and a prompt is made (step 1909).
- the signature information of the new user identification module 203 such as the model of the information collection sensor 203a, the signature generation algorithm, and the attachment information stored in the combination information.
- User data synchronization is specifically if the user identification system 20 needs to allow user logins stored in another user identification system 20 for some reason, in a typical system, it may be required to be stored in another user identification system 20.
- the user enters his/her own identification information in the user identification system 20 one at a time, and asks the administrator to authorize one by one. Obviously, this would be very troublesome.
- the use of the user data synchronization function eliminates the occurrence of such a situation, and the administrator only needs to import the combined information backed up in the other user identification system 20 into the new user identification system 20.
- the subscriber identity system 20 may allow a user of another new subscriber identity system 20 to log in.
- the binding information is obtained from the external device through the external communication module 217, and the combined information obtained from the outside is stored to the storage module 217
- the administrator authorizes After that, data synchronization can be performed.
- the external combination information can be transmitted to the space of the storage module 217 through the external communication module 215 (for example, can be stored in the user storage information space), wherein
- the external combined information is the combined information stored in the user personal database 1703 of the same type of user identification system 20 according to the present invention, that is, the combined information obtained from the external device.
- the main controller 201 acquires the external binding information and places it in a temporary storage.
- the storage location (which may be any storage space of the user identification system 20, such as on the RAM)
- the main controller 201 determines whether the acquired external binding information conforms to the current device usage, that is, determines the external combined information.
- the auxiliary information and the auxiliary information in the current device are specifically determined whether the currently used algorithm is consistent with the algorithm described in the acquired external combined information, and whether the sensor currently recorded and the acquired external combined information are The same model and feature information is iris or fingerprint (or face type), etc.
- the main controller 201 does not further process the obtained external combined information (step 2007), and if, If the data is consistent, the main controller 201 further determines whether there is a duplicate between the personal signature that needs to be restored and the existing signature (if both devices record the same finger of the same user, there is a duplicate).
- the specific implementation is to utilize the feature code information in the external combined information and the current
- the feature code information stored in the signature storage module 203d of the user identification module 203 is compared (step 2009). In step 2015, if no duplication is found, the main controller 201 will combine the features in the external binding information.
- the code is stored in the signature storage module 203d of the user identification module 203, a new user personal database file is generated in the user personal database 1703 (step 2015), and the signature number is added to the user number-signature number index file.
- User number step 2017
- the user signature information that was not originally added is added to the user personal database (step 2013), and in the user number-signature number index file
- the new signature number and the previously used user number (step 2017) are added.
- the main controller 201 finds that all the signatures are repeated, the synchronization operation will not be performed and a corresponding prompt will be given (step 2011).
- the user identification system 20 disclosed by the present invention also has an upgraded function.
- a general identification device it is generally not necessary to perform function expansion on the original basis, but in terms of the user identification system 20 introduced by the present invention, Flexible management and a variety of functions, so developers may need to upgrade their firmware.
- the upgrade works like a normal MP3 player to replace the firmware, so that the firmware file can be placed in a specific storage space. , and then choose to upgrade, and then authorized by the administrator, the system will automatically upgrade, after the upgrade is completed, you can continue to use.
- the user identification system and user data processing method thereof of the invention utilize a main controller, a user identification module, a system startup module, a user interface module, a mobile module, an electronic clock module, a system detection module, an external communication module, a storage module, and a security encryption Module cooperation, user rights management, user time management, user pause enablement management, system data backup, system data synchronization, system data recovery, and system upgrade functions, thereby improving the prior art function of the user identification system. Therefore, there is no defect in flexible user management functions.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Description
用户识别系统及其用户数据处理方法
【技术领域】
本发明涉及一种识别系统, 特别涉及一种用户识别系统及其用户数据处理 方法。
【背景技术】
现有技术的用户识别系统通常仅限于单独一个设备, 而且各个设备间彼此 独立, 如以现有的指纹锁设备为例, 如图 1 所示, 其为该指纹锁安装在门上的 结构图, 在门上安装有门把手 101 , 转动门把手 101可开门或关门, 并在门把手 上安装了指纹识别器 103, 而在门上则设置有相关的功能按键 105, 当用户将手 指放置到指纹识别器 103上时, 若识别成功, 就可转动门把手 101 , 然后可使得 驱动轴 107缩短, 从而开门。 但是, 这种指纹锁通常只是记录了授权指纹的用 户特征数据, 而当安装了另一相同型号的指纹锁后, 若需要允许相同的用户出 入, 则用户需要再次手动输入指纹数据到新的指纹锁中, 这样显得十分麻烦。 同时, 在物业管理中, 通常所安装的用户识别系统一旦对某一用户完成授权后, 此用户以后将会获得永久的进出权限, 这样的话对于管理者而言会造成不便。 管理者一般会希望可对用户进行增加或删除的操作, 举例来说, 在企业中, 当 有员工入职或辞职, 管理者希望能够在识别设备中设置用户的增加或删除, 同 时管理者通常会希望能够对企业的用户识别系统能够进行进一步的灵活管理, 又例如, 在企业中, 管理者有需要限定例如指纹锁等用户识别系统能够在不同 的时间允许不同的人群进入, 而针对办公室上班人群, 在周一至周五的上班时 间能够凭其指纹等用户特征信息进出办公室, 而在其他时间下(如周末或晚上) 则不能凭其指纹等用户特征信息进出办公室, 若一定要在其他时间进出, 如需 要加班的情况, 则需要管理员授权才能通过, 而针对钟点清洁工人而言, 则在 每天特定的清洁时间段清洁工人可凭其指纹等用户特征信息进出办公室以完成 清洁工作, 若其在不被管理员所规定的时间内进出, 则不会被用户识别系统所 识别, 从而不能随便进入到办公室。 再者, 在通常使用的指纹锁等用户识别系 统中, 往往会限定每个用户所输入的特征信息的数量, 在指纹识别设备中, 特 征信息为指纹信息, 如果硬性规定每个用户只能具有三个手指作为指纹输入, 当用户输入了三个手指指纹后, 如果想输入更多手指的指纹时, 就必须以另一 用户的身份输入其他手指指纹, 这样显得不够人性化。 另外, 如果要求能够识 别用户多种特征信息, 那么, 一般的用户识别系统往往限定于其所特定受限的 特征信息组, 从而不能实现灵活的用户管理和特征信息管理。 再者, 若当前所 使用的用户识别系统出现故障问题, 那么对用户的指纹数据进行备份就显得非
常重要, 但现有用户识别系统并不具有备份数据的功能。 因此, 现有的用户识 别系统存在功能单一、 不具备灵活的用户管理功能的缺陷。
【发明内容】
本发明所要解决的技术问题是提供一种用户识别系统及其用户数据处理方 法, 以克服现有技术中用户识别系统功能单一、 不能对用户信息进行灵活管理 的问题。
本发明提供一种用户识别系统的用户数据处理方法, 该用户识别系统包括 主控制器、 存储模块、 用户识别模块、 用户界面模块, 该用户数据处理方法特 征在于: 用户识别模块采集用户输入的特征信息, 将特征信息生成特征码, 并 对特征码分配特征码编号, 存储特征码以及特征码编号, 并将特征码编号传给 主控制器; 用户界面模块接收用户状态信息, 并将用户状态信息传给主控制器; 主控制器根据特征码编号和用户状态信息, 在存储器中产生用户相关信息。
根据本发明一优选实施例, 特征码包括第一特征码和第二特征码, 第一特 征码为注册用户在注册时输入的特征信息所产生的特征码, 第二特征码为任意 用户在访问用户识别系统时输入的特征信息所产生的特征码, 用户数据处理方 法包括:
用户识别模块将第二特征码与存储在用户识别模块中的第一特征码进行比 对, 当第一特征码与第二特征码相符时, 用户识别模块向主控制器返回第一特 征码对应的的特征码编号;
主控制器根据第二特征码的特征码编号在存储模块中查询用户相关信息, 并根据查询结果控制用户对所述用户识别系统的访问。 根据本发明一优选实施 例, 利用用户识别模块中的信息采集传感器采集注册用户以及任意用户的特征 信息, 利用用户识别模块中的特征码生成模块产生特征码, 利用用户识别模块 中的特征码存储模块存储特征码, 利用用户识别模块中的特征码比对模块比对 第一特征码与第二特征码。
根据本发明一优选实施例, 利用存储模块存储设备相关信息以及用户相关 信息, 其中用户相关信息为一用户信息数据库, 用户信息数据库包括用户管理 信息和用户个人信息, 设备相关信息包括错误记录信息、 功能设定文件信息。
根据本发明一优选实施例, 用户管理信息包括特征码编号-用户编号索引文 件和状态索引文件, 用户个人信息包括个人特征信息、 个人社会属性信息以及 个人分配属性信息。
根据本发明一优选实施例, 状态索引文件包括权限索引文件、 暂停 /启用索 弓 I文件以及时间分配索引文件中的一种或任意组合。
根据本发明一优选实施例, 特征码编号-用户编号索引文件的用户编号栏位
中的特征码编号与存储在用户识别模块中的特征码编号——对应, 特征码编号- 用户编号索引文件的特征码编号栏位中的用户编号与存储模块中的状态索引文 件以及用户个人数据库文件——对应, 特征码编号-用户编号索引文件的栏位中 的用户编号与一个或多个特征码编号对应。
本发明提供一种用户识别系统, 其包括主控制器、 存储模块、 用户识别模 块、 用户界面模块。 用户识别模块用于采集用户输入的特征信息, 将特征信息 生成特征码, 并对特征码分配特征码编号, 存储特征码以及特征码编号, 并将 特征码编号传给主控制器。 用户界面模块用于接收用户状态信息, 并将状态信 息传给主控制器。 主控制器用于根据特征码编号和用户状态信息, 在存储器中 产生用户相关信息。
根据本发明一优选实施例, 用户识别模块中设置有信息采集传感器, 信息 采集传感器用于采集注册用户以及任意用户的特征信息, 用户识别模块中设置 有特征码生成模块, 特征码生成模块产生特征码, 用户识别模块中设置有特征 码存储模块, 特征码存储模块用于存储特征码, 用户识别模块中设置有特征码 比对模块, 特征码比对模块用于比对特征码。
本发明的用户识别系统及其用户数据处理方法, 利用主控制器、 用户识别 模块、 系统启动模块、 用户界面模块、 行动模块、 电子时钟模块、 系统检测模 块、 外部通信模块、 存储模块、 安全加密模块的配合, 实现用户权限管理、 用 户使用时间管理、 用户暂停启用管理、 系统数据备份、 系统数据同步、 系统数 据恢复以及系统升级功能, 由此改善了现有技术中由于用户识别系统功能单一, 以致不具备灵活的用户管理功能的缺陷。
【附图说明】
图 1是现有技术的门锁及其控制方法的示意图。
图 2是本发明所揭示的用户识别系统的总体结构示意图。
图 3是本发明所揭示的用户识别系统的数据存储结构示意图。
图 4是本发明所揭示的用户识别系统的录入用户的操作流程图。
图 5是本发明所揭示的用户识别系统的系统采集用户指纹的流程图。
图 6是本发明所揭示的用户识别系统的采集用户语音信息的流程图。
图 7是本发明所揭示的用户识别系统的删除用户的流程图。
图 8是本发明所揭示的用户识别系统的修改时间^/用户权限或者用户暂停 / 启用状态的流程图。
图 9是本发明所揭示的用户识别系统的两种选择用户的方法的具体操作流 程图。
图 10是本发明所揭示的用户识别系统的选择多个用户的方法的具体操作流
程图。
图 11是本发明所揭示的用户识别系统的用户暂停启用功能的系统工作流程图。 图 12是本发明所揭示的用户识别系统的用户时间分配功能的系统工作流程图。 图 13是本发明所揭示的用户识别系统的用户权限设定功能的系统工作流程图。 图 14是本发明所揭示的用户识别系统的查询索引文件的查询方法的系统工 作流程图。
图 15是本发明所揭示的用户识别系统的查询用户个人数据库的查询方法的 系统工作流程图。
图 16是本发明所揭示的用户识别系统的用户信息数据库与用户特征信息相 挂钩的系统工作流程图。
图 17是本发明所揭示的用户识别系统的用户信息数据库与用户个人数据库 的关系图。
图 18是本发明所揭示的用户识别系统的用户备份功能的系统工作流程图。 图 19是本发明所揭示的用户识别系统的用户恢复功能的系统工作流程图。 图 20是本发明所揭示的用户识别系统的数据同步的系统工作流程图。
【具体实施方式】
有关本发明的特征及技术内容, 请参考以下的详细说明与附图, 附图仅提 供参考与说明, 并非用来对本发明加以限制。
如图 2-3所示, 本发明的用户识别系统 20包括主控制器 201、 用户识别模 块 203、 系统启动模块 205、 用户界面模块 207、 行动模块 209、 电子时钟模块 211、 系统检测模块 213、 外部通信模块 215、 存储模块 217、 安全加密模块 219。 透过以上各种模块的协同工作, 可使得本发明所揭示的用户识别系统具有用户 权限设置、 用户使用时间分配、 用户数据备份和升级以及用户数据同步和恢复 等功能, 使得用户识别系统与用户信息数据库相结合, 从而可更灵活地管理用 户。
在本实施例中, 主控制器 201 用于控制以上多个模块工作, 特别地, 主控 制器 201可与用户识别模块 203进行通信, 用以实现多种数据处理服务。
系统启动模块 205 用来感应外部动作, 当外部作出动作时, 例如当用户按 下电源启动开关, 则系统启动模块 205可启动主控制器 201的电源, 从而启动 主控制器 201。
用户界面模块 207使得用户可实现对用户识别系统 20进行操作, 例如, 用 户可在用户界面上实现系统功能选择、 用户选择以及判断操作, 如确认、 取消 等, 其中用户界面模块 207可利用语音提示、 语音识别、 LCD显示、 触摸屏、 LED, 按钮、 电脑操作等任一或任意组合方式实现。
系统检测模块 213 用以实现系统检测功能, 其通过在系统上设置的传感器 获得电源电压、 外部温度等信息, 并且以特定的通信协议检测各个模块是否合 法以及是否正常工作, 从而综合判定系统安全性, 此外还可对非法及不安全行 为进行报警、 记录并且更可锁定设备。
外部通信模块 215用以实现用户识别系统 20与外界通信, 其实现方式可为 有线或无线等任意通信技术。 透过外部通信模块 215 , 用户识别系统 20可与外 部传输信息。
安全加密模块 219可对各种信息进行加密保护, 其中各种信息包括用户信 息以及模块间通信内容等。
存储模块 217, 可为用户识别系统 20提供存储空间, 用以存储相关信息。 存储模块 217可利用存储芯片、 TF卡、 SD卡、 U盘以及例如网络空间的远程存 储空间来实现。 请参阅图 3所示, 存储模块 217中至少存储用户相关信息、 设 备相关信息, 也可包括用户存放信息。 其中, 存储模块 217 中所包括的用户相 关信息为用户信息数据库, 用户信息数据库包括用户管理信息和用户个人信息。 其中, 用户管理信息至少包括特征码编号-用户编号索引文件和状态索引文件, 状态索引文件包括权限索引文件、 暂停启用索引文件以及时间分配索引文件中 的一种或其任意组合。 根据这些状态索引文件可查询对应用户编号的状态, 如 用户编号的权限(即是否系统管理员)、 处于暂停或启用状态(是否被系统管理 员停用) 以及工作时间段(被系统管理员限定到哪个时间段才能被系统识别) 等状态, 而根据特征码编号-用户编号索引文件则可使得用户识别模块 203中的 特征码与存储模块 217中的用户信息建立联系 (下文将对此作详细介绍)。
请再参阅图 3 所示, 用户个人信息则至少包括个人特征信息、 个人社会属 性信息以及个人分配属性信息等。 其中, 个人特征信息包括特征属性信息, 是 指纹、 声纹、 虹膜等用户身份特征信息中的一种。 例如特征属性信息为指纹的 话, 是哪一根手指, 或者用户特征属性为虹膜的话, 是左眼还是右眼, 个人特 征信息以个人信息数据库文件方式存在, 组成个人信息数据库, 用户信息数据 库和个人信息数据库与索引文件的关系将在下文作详细介绍。 个人社会属性信 息至少包括: 可为语音或文字等形式的姓名、 相片、 签名以及用户编号。 个人 分配属性信息例如包括所在组织名称、 用户权限、 时间分配段、 暂停或启用状 态等。
设备相关信息例如包括错误记录信息、 功能设定文件等信息。
用户存放信息例如包括机密文件、 个人隐私文件等需要保护隐藏的信息, 以及与用户相关的用于其他设备的授权数据, 如电脑软件的密码、 银行帐户的 校验信息、 特殊领域的算法和参数等信息。
电子时钟模块 211 可为系统提供独立精确的时钟, 用户可修改、 调整时钟 时间。 当在实际工作时, 电子时钟模块 211还具有以下功能: 主控制器 201可 将从电子时钟模块 211 所获得的当前时间与用户信息数据库中记录的用户分配 时间段作比对, 若当前时间在用户允许通过的时间段内, 则本发明的用户识别 系统可允许用户通过, 反之, 则不让用户通过, 举例来说, 若安装有本发明的 用户识别系统 20的门禁系统允许某用户通过的时间段是早上 7点到 9点, 若用 户在早上 10点想通过用户识别系统 20, 当用户输入其特征信息, 例如输入其预 先注册好的指纹信息时, 系统可查询到所存储的用户信息, 并作出计算, 若发 现当前时间不在其分配时间段内, 则不会允许这个用户通过。
行动模块 209可为电机或电磁铁开关等本领域习知的电子机械开关, 其受 控于主控制器 201 , 透过接收主控制器 201发出的控制信号, 行动模块 209实现 电机转动或电磁铁通电 /断电等操作, 另外还包括产生或者记录声音、 光、 电的 硬件设备, 以及自动记录操作和错误的软件模块, 可响应主控制器 201 而作出 相关操作。
用户识别模块 203包括信息采集传感器 203a、 特征码生成模块 203b、 特征 码比对模块 203c、特征码存储模块 203d以及内部通信模块 203e。 其中, 信息采 集传感器 203a用于采集用户独有的信息, 例如为指纹、 虹膜、 声纹、 身份证编 号、 身份卡等特征信息。 特征码生成模块 203b用于将采集的信息根据特定算法 生成对应的特征编码信息, 其中, 特定算法可例如为指纹特征灰度图直接提取 算法、基于 PCNN指纹特征提取算法、基于过零检测的虹膜特征提取算法、 MD5 算法等。特征码存储模块 203d用于将已注册的特征码,按照一定排列存储起来, 以供比对或备份。 特征码比对模块 203c用于判定注册时获得的特征码与访问时 获得的特征码是否一致, 当两个特征码符合特征相同的定义时, 说明是来自同 一用户特征, 例如是同一个用户的同一根手指或者是同一用户的左眼虹膜等。 内部通信模块 203e用于与主控制器 201进行通信。 用户识别模块 203的主要功 能为识别用户, 其具体操作流程为: 首先, 用户注册, 这时信息采集传感器 203a 采集用户的特征信息, 特征码生成模块 203b根据所采集到的用户特征信息, 根 据某一特定算法生成对应特征码信息, 特征码存储模块 203d可将特征码信息按 顺序存储, 这时, 就完成注册, 之后, 若用户访问, 则信息采集传感器 203a再 次采集用户输入的特征信息, 而后特征码生成模块 203b利用前述相同算法将所 采集到的特征信息生成特征码信息, 这时, 特征码比对模块 203c将特征码信息 与之前存储在特征码存储模块 203d中的特征码比对, 当发现相同时, 用户识别 模块 203利用内部通信模块 203e向主控制器 201发出相应信号, 主控制器 201 则根据用户识别模块 203的相应信号而相应控制行动模块 209实现相应动作。
在下文的优选实施例中,将结合图 4-10对用户识别系统 20的工作流程作详 细介绍。 于下文中, 为了方便介绍, 以用户界面模块 207 由语音提示模块和按 键以及录音模块组成为例, 其中语音提示模块用于提示用户如何操作, 如读出 相应的操作项目, 并且要求用户选择按键进行操作等, 但是, 应注意到, 本发 明所揭示的用户界面模块 207 并不仅限于应用语音提示模块和按键以及录音模 块这种组合方式, 其还可由各种习知的方式或其组合进行设置, 例如使用液晶 显示屏搭配按键、 触摸屏等。 进一步来说, 为了便于说明, 下文中所述的用户 特征信息将以用户的指纹信息为例进行说明, 同样应注意到, 本发明中所指的 用户特征信息并不仅局限于用户的指纹信息, 其亦可为虹膜、 声纹、 身份证编 号、 身份卡等用户独有的识别信息, 下文仅出于更方便并且形象地说明之目的 而采用指纹信息为例来说明。 另外关于下文所提及的确认和取消, 其方法有按 键、 语音、 手势和动作, 举例来说, 就按键而言, 可有确认键以及取消键, 当 按下确认键就表示作出确认操作, 当按下取消键就作出取消操作。
现将详细介绍本发明所揭示的用户识别系统录入新用户的工作流程。 在本 实施例中, 系统对用户录入方式分三种情况处理: 第一种情况为在系统第一次 使用时, 系统会默认第一个录入指纹信息的用户为系统管理员, 系统管理员根 据需要管理用户识别系统, 并对普通用户进行各种编辑, 例如修改其权限、 使 用时间、 对用户数据进行添加删除等; 第二种情况为当系统管理员的指纹信息 被录入到系统, 之后进行录入操作的用户均被系统默认为普通用户。 普通用户 的权限比系统管理员低, 并且不能凭借其特征信息管理系统。 第三种情况为系 统管理员授权普通用户, 将其升级为系统管理员。 在第一种情况中, 当系统正 常启动后, 用户识别模块 203中的信息采集传感器 203a采集到所输入的指纹信 息, 特征码生成模块 203b将上述指纹信息根据某种算法生成特征码, 然后特征 码存储模块 203d就将所生成的特征码信息根据特定方式存储起来, 特定方式包 括自动顺序排列、 上位机控制顺序排列、 人为规定顺序排列, 以及从低到高排 序、 从高到低排序和按顺序补空等。 用户识别模块 203透过内部通信模块 203e 告知主控制器 201 , 主控制器 201在存储模块 217中生成相应的用户信息数据 库, 而在用户信息数据库中, 主控制器 201 会记录用户的权限为系统管理员权 限。 在第二种情况中, 当系统正常启动后, 用户识别模块 203 中的信息采集传 感器 203a采集到用户所输入的指紋信息, 这时系统的用户界面模块 207会提示 请管理员授权, 当管理员正确授权后 (如输入管理员指紋后), 特征码生成模块 203b将上述普通用户输入的指紋信息根据某种算法生成特征码信息, 然后特征 码存储模块 203d就将所生成的特征码信息存储起来, 并且用户识别模块 203透 过内部通信模块 203e通知主控制器 201 , 主控制器 201在接收到信息后在存储
模块 217 中生成相应的用户信息数据库信息, 并在用户信息数据库信息中, 记 录用户的权限为普通用户权限。 在第三种情况中, 当用户录入指纹后, 系统可 按照前面第二种情况处理用户的信息, 但是当用户在输入指纹后, 用户若通过 选择菜单选择某个用户升级为系统管理员或者降级为低级用户或者普通用户, 则需要在系统管理员授权后, 用户才能升级为系统管理员或者降级。 另外, 在 以上三种情况中, 当用户成功录入指纹信息后, 用户可选择记录用户姓名语音 的功能, 若用户选择了这个功能, 那么语音提示模块会提示操作者说出新用户 的名字, 当讲出新用户名字时, 录音模块会录下用户说输入的语音, 用户界面 模块 207将语音信息输入到存储器模块 217的用户信息数据库中保存。 总而言 之, 录入普通用户的一般操作流程如图 4所示, 在步骤 401 中, 用户界面模块 207例如是采用语音提示的用户界面模块 207时,其中的语音提示模块会读出相 应的选择菜单, 如当语音提示模块读出 "进入录入新用户功能" 时, 若当前用 户此时确认此操作, 则直接进入到步骤 401 中。 当然, 用户界面模块 207也可 以使用其他的实现方法, 例如采用触摸屏时, 当用户触摸主菜单, 就会弹出系 统功能操作菜单, 用户可选择录入新用户的功能菜单, 从而进入到步骤 401中, 又或者, 可利用语音识别功能, 向用户具有语音识别功能的用户界面模块 207 读出想要进入的功能菜单,由用户识别系统 20进行识别运算后直接进入步骤 401 中。 在步骤 401后进行步骤 403 , 系统提示请管理员授权, 若此时系统管理员不 作出授权或者取消授权, 则系统会直接跳至步骤 413 , 退出录入新用户功能。 若 系统管理员作出授权, 这时系统在步骤 407 中会提示当前用户输入指纹, 在当 前用户输入指纹后, 在步骤 409 中系统会提示用户录入其名字的语音, 当前用 户读出自己的名字, 此时系统的录音模块会录下名字语音, 完成以上操作后, 系统在步骤 411 中提示是否保留以上操作, 若用户取消此操作, 则系统直接退 出, 不作任何保存, 若用户确认此操作, 则系统在步骤 412将以上录入的信息 保存, 然后进入步骤 413 , 退出录入新用户功能。
图 5和图 6分别详细描述了本发明用户识别系统 20中采集用户指纹和采集 用户语音两种操作的流程。 参照图 5 , 将详细介绍本发明所揭示的用户识别系统 在图 4的步骤 407中如何采集新用户指纹。 在步骤 501中, 用户识别系统 20会 提示新用户输入新的手指, 甚至提示用户专门输入某个手指, 比如左手食指、 右手无名指。 当用户输入对应手指指纹而完成步骤 503后, 在步骤 505 中判断 并由语音提示采集指纹是否成功, 若不成功, 则返回步骤 501 ; 若采集成功, 则 在步骤 507中让用户确认是否采集另一个手指的指纹, 当用户选择停止录入后, 在步骤 509中则进行下一流程, 例如进行图 4所介绍的步骤 409。
参照图 6, 将详细介绍本发明所揭示的用户识别系统 20在图 4的步骤 409
中实现采集新用户语音名字的操作流程。 在步骤 601 中, 系统透过语音提示模 块提示使用者说出新用户的姓名, 在步骤 603 中, 录音模块将记录新用户的姓 名, 在录入新用户的姓名语音后, 语音提示模块会在步骤 605 中播放刚记录的 新用户姓名, 然后在步骤 607 中语音提示模块提示使用者确认或重新录入或取 消以上操作, 当用户选择重新录入时, 会返回步骤 601 , 要求用户重新录入语音 信息, 当用户选择确认时, 在随后的步骤 609 中则进入下一个流程, 例如进行 图 4所介绍的步骤 411。
现将详细介绍本发明所揭示的用户识别系统 20的删除用户的操作流程。 删 除用户的操作流程如图 7所示, 在步骤 701 中, 语音提示模块会提示是否进入 "删除用户" 的功能, 当用户选择某一功能, 并按下确认按键后, 系统进入删 除用户模式, 此时语音提示模块会提示当前用户选择用户或者取消此操作退出, 若用户确认此操作则进入步骤 703 进行用户选择, 若用户取消此操作, 则可跳 至步骤 711 直接退出删除用户的功能, 当选择了某一个用户, 于下文将在图 9 中详细介绍如何进行用户选择, 并且在当前用户确认此操作后, 在步骤 705语 音提示模块会提示请管理员授权, 若无管理员授权, 则会返回步骤 703 , 当用户 识别系统 20验证到管理员授权失败, 系统会在步骤 713中提示授权失败, 提示 请重新授权, 并等待管理员重新授权, 若管理员输入其正确指纹成功授权后, 则提示会提示授权成功, 并要求用户确认, 若用户确认此操作, 则用户识别系 统 20会直接退出删除用户的功能而完成删除动作, 而若此时用户取消此操作, 则返回步骤 703中, 用户识别系统 20对刚才的操作不作保存。
参照图 8 , 将详细介绍本发明所揭示的用户识别系统 20的修改时间段 /修改 权限或用户暂停 /启用状态的操作流程。 在步骤 801进行选择用户操作, 于下文 图 9 中将详细介绍如何进行用户选择操作, 当用户选择好用户并且确认此操作 后, 系统会提示是否进入 "修改时间段 /修改权限" 的功能, 若取消此操作则直 接退出功能(步骤 813 ), 在当前用户选择某一功能(如修改时间段)按下确认 后, 就可以系统进入到修改功能(步骤 803 ), 并在用户界面模块 207中提示当 前用户修改用户信息, 在当前用户作出相应修改后, 系统会在用户信息数据库 中对所选择的用户的信息(如时间段 /权限)进行相应的修改(步骤 805 ) , 若用 户确认此操作, 则此时系统会提示请管理员授权(步骤 807 ), 若当前用户取消 此操作, 则系统直接退回步骤 801 , 若管理员授权(步骤 809 ), 则完成修改功 能, 进入下一流程(步骤 811 ), 若管理员并未授权则不能完成以上的修改操作, 系统直接返回到步骤 801中。
参照图 9, 将详细介绍本发明所揭示的用户识别系统 20的选择用户的操作 流程 (即上述图 7的步骤 703和图 8的步骤 801 ), 在上文所述的步骤中, 可存
在两种方式以实现选择用户的功能。 在方案一中, 在当前用户选择了用户选择 功能后 (步骤 901 ), 语音提示模块会播放在注册时所录入各用户的姓名, 用户 在听到姓名信息后可选择特定用户 (步骤 903 ), 若此时当前用户取消此操作则 直接退出当前所选择的功能菜单。 若正在进行操作的用户听到语音提示模块所 播放的语音信息不是特定用户的名字时, 则按翻页键让语音提示模块继续读出 下一用户的名字语音, 直到找到所要选择的特定用户为止。 如当语音提示模块 播放语音信息后, 若所播放语音为所要选择的用户名字, 则正在进行操作的用 户可确定此操作以选择特定的用户, 此时若用户取消此操作则退回步骤 903 (步 骤 905 )。 在步骤 905中, 若用户不是确认此操作, 而是按下了重新选择键, 则 返回到步骤中 903。 在步骤 905 中, 若用户按下确定键, 这时用户识别系统 20 会进入到下一流程(步骤 907 )。
在方案二中, 在当前用户选择了用户选择功能后 (步骤 901 ), 当前操作用 户读出所要查找的用户姓名, 若这时当前用户取消此操作, 则直接退出选择用 户模式, 若当前用户这时读出了所要查找的用户名字并在读完后确认此操作, 则系统会选择到特定用户, 并从用户个人数据库 1703中读出特定用户的语音名 字 (步骤 913 ) , 若用户在步骤 913取消此操作, 则返回到步骤 911 , 当前用户 在听到系统读出自己所要查询的用户的名字语音后, 确定此操作则可进完成选 择进入到下一流程(步骤 907 ), 要求用户重新输入名字语音。
在以上两种方案中, 并不限定要选择的用户数量为一个, 可以重复选择不 同的用户, 对多个不同的用户进行删除、 暂停 /启用、 修改时间段、 修改权限等 操作, 如在图 10中, 介绍选择多个用户的操作流程。 当播放名字 (方案一)或 使用语音识别 (方案二) 时, 当前用户可选择按下结束选择键或继续选择键获 得某一用户 (步骤 1001 ), 在用户选择结束选人后, 系统可完成一个用户的选择 到达步骤 1003, 在当前的用户选择继续选人后, 系统可返回到步骤 1001中, 继 续选择用户, 若当前用户按下确认选择键, 则进入步骤 1005。 因此, 系统可同 时对多个或单个用户进行相同的删除、 暂停、 启用、 修改时间段、 修改权限等 操作。
参照图 11 , 详细描述了本发明用户识别系统 20的用户暂停 /启用功能的工 作流程。 在图 11中, 于步骤 1101 , 当完成指纹识别后, 主控制器 201就会获得 用户的指纹编号; 而在步骤 1103 , 主控制器 201在用户信息数据库中查阅此指 纹编号对应的用户编号, 在步骤 1105中, 主控制器 201根据所获得用户编号在 用户信息数据库中查阅用户的暂停 /启用状态, 而在步骤 1107中, 当发现用户处 于启用状态, 则返回启用状态给主控制器 201 (步骤 1109 ), 若当发现用户处于 暂停状态, 则返回暂停状态给主控制器 201 (步骤 1111 )。
参照图 12,详细描述了本发明用户识别系统 20的用户时间分配功能的工作 流程。 在图 12中, 于步骤 1201 , 当用户识别模块 203完成指纹识别后, 主控制 器 201获得当前用户的指纹编号, 在步骤 1203中, 主控制器 201向电子时钟模 块 211查询当前的时间,并在步骤 1205中,主控制器 201在用户信息数据库 1701 (下文将会详细介绍)中查阅指纹编号而获得对应的用户编号,接着在步骤 1207 中, 主控制器 201 根据用户编号在用户信息数据库中查阅用户时间分配情况, 在步骤 1209中, 主控制器 201判断当前时间是否在用户所分配的时间段中, 若 发现是在时间段中, 则执行步骤 1211 , 返回用户可在当前时间使用的信息; 若 发现当前时间不在时间段中, 则执行步骤 1213, 返回用户不可在当前时间使用 的信息。
参照图 13,详细描述了本发明用户识别系统 20的用户权限级别功能的工作 流程。 在图 13中, 于步骤 1301 , 当用户识别模块 203完成指纹识别后, 主控制 器 201获得当前用户的指纹编号, 在步骤 1303中, 主控制器 201利用指纹编号 在用户信息数据库 1701 中查阅指纹编号对应的用户编号, 并于步骤 1305 中根 据所获取的用户编号在用户信息数据库 1701中查阅这个用户的权限级别, 并于 步骤 1307中判断此用户的权限级别是否为管理员, 若为是, 则在步骤 1309返 回此用户是管理员的信息,若否,则在步骤 1311返回此用户是普通用户的信息。
图 11-13所描述的实施例中查询用户信息数据库 1701的用户状态的方法例 如可参照图 14和图 15中所描述的两种查询方法来实现。 参阅图 14所示, 介绍 了查询状态索引文件的方法, 在获得用户编号(ID )后(步骤 1401 ), 主控制器 201根据用户编号在步骤 1403中读取用户状态索引文件, 其中用户状态索引文 件存储在用户信息数据库 1701中, 用户状态索引例如可为: 用户暂停 /启用索引 文件、 用户分配时间段索引文件、 用户权限级别索引文件。 于步骤 1405中, 查 阅各状态索引文件中相应用户编号的对应状态, 然后在步骤 1407中返回各状态 结果。 而在图 15中, 则介绍了另外一种查询方法, 即查询用户个人数据库中的 数据文件的方法, 用户个人数据库文件包括用户个人信息, 其中用户个人信息 包括个人分配属性信息(如图 3所示), 其包括了用户编号的权限、分配时间段、 暂停或启动等信息, 这些信息的内容与图 14所示的查询状态索引文件方法中的 状态索引文件内所记载的内容是一样的, 并且还比状态索引文件记录了较多的 信息, 例如, 用户个人数据库文件中还可包括用户所录入的语音信息以及其他 信息(参见图 3所示)。 首先, 在步骤 1501中获得用户编号, 在步骤 1503中根 据用户编号找到这个用户的用户个人数据库文件, 在步骤 1505中在用户个人数 据库文件中查阅用户的状态信息, 例如, 查阅用户的暂停 /启用状态、 分配允许 使用的时间段、用户的权限等。在步骤 1507中则返回用户的状态信息查询结果。
图 14-15所示的两种查询方法所获得的结果是一样的, 其中, 查询索引表的方法 比较快速, 而查询用户信息数据库文件速度较慢, 原因在于索引文件格式比较 小, 如表征用户权限时, 可以仅用 0/1二位元或者筒单的标志来表示, 而用户个 人数据库文件则格式较大, 因为其除保存有用户状态信息外还保存用户语音名 字信息、 用户的其他信息 (参见图 3所示)等。
在本发明用户识别系统 20 中每个用户可输入多个指纹(或虹膜等特征信 息), 并且具体数目将不作限制, 使得每一用户可具有不限定数量的多个用户特 征信息, 从而可灵活地对用户的特征信息进行添加和删除, 并且亦可通过删除 用户来删除用户的所有指紋信息。
图 16是本发明用户识别系统 20的用户信息数据库与用户特征信息相挂钩 的工作流程。 在图 16中, 1601表示特征码编号以及特征码内容 (如以指纹特征 码为例进行说明),其存储于用户识别模块 203的特征码存储模块 203d中。 1603 表示记录用户的指纹特征码与用户编号的关系的索引文件, 索引文件 1603是存 储在存储模块 217中的用户信息数据库 1701中, 同时, 还具有用户编号与用户 权限对应的状态索引文件、 用户编号与用户时间分配对应的状态索引文件等。 1605表示用户编号与用户权限对应的状态索引文件, 1607表示用户编号与用户 暂停 /启用状态索引文件, 就本发明而言, 还应存在一用户编号与用户分配时间 状态索引文件, 但出于筒明的原因在图 16中并未绘示。 假设某个用户已经注册 了另一指纹, 每当此用户要增加一个指纹特征时, 并且其特征码在特征码存储 模块 203d中的特征码编号是 1并且在指纹特征码-用户编号对应索引文件 1605 中的特征码编号被分配为 1。 当此用户在管理员授权后输入新手指的指纹,假设 用户识别模块 203检测到在特征码存储模块 203d中的位置 4是空的, 新录入的 指纹特征码被允许存放到特征码编号为 4的位置, 同时主控制器 201根据在特 征码存储模块 203d中的指纹编号 4而在特征码编号 -用户编号索引文件 1603的 特征码编号栏位的位置 4上记录特征码编号 4,同时根据从用户界面模块 207所 获取的用户编号 (比如为编号 1 ) 而在指纹特征码编号 -用户编号索引文件 1603 的记录有特征码编号 4的对应用户编号栏位上记录用户编号 1 , 于此, 特征码编 号 -用户编号索引文件 1603中的特征码编号与用户识别模块 203中存储的特征码 编号——对应,特征码编号 -用户编号索引文件 1603中的用户编号与状态索引文 件和用户个人数据库文件中的用户编号——对应, 因此, 透过指纹特征码编号- 用户编号索引文件 1603可将用户个人数据库 1609以及状态索引文件与用户识 别模块 203联系起来。 若用户继续输入其他指纹, 则继续在特征码编号-用户编 号索引文件 1603中添加映射关系, 从而, 由于这种自动挂钩的机制, 用户可按 照与上述相同的方法输入多个指纹数据, 并且不受具体数量的限制, 而当需要
删除用户的所有指纹时, 只需将用户编号 1 删除, 这时用户编号对应的指纹编 号则被同时删除掉。 因此, 用户 1 可对应输入多个手指信息, 而不受到具体数 量上的限制, 并且由于每个手指的特征码信息与用户编号建立对应关系, 如在 本优选实施例中, 用户编号 1对应指纹编号 1和 4, 从而实现了用户识别设备 203中存储的特征码与存储模块 217中存储的状态索引文件的灵活挂钩,从而实 现上文所述的第一种查询方法, 另外,特征码编号 -用户编号索引文件 1603还实 现了用户识别设备 203 中存储的特征码与存储模块 217中存储的用户个人数据 库 1703灵活挂钩, 从而实现上文所述的第二种查询方法。
参照图 17,将详细介绍本发明所揭示的用户识别系统 20所采用的用户信息 数据库 1701。 如上述, 用户信息数据库 1701设置在存储模块 217中, 其包括有 两大部分, 分别为用户管理信息和用户个人信息, 其中, 用户管理信息包括: 索引文件,索引文件例如包括用户编号 -特征码编号索引文件以及状态索引文件, 而状态索引文件包括权限索引文件、 暂停启动索引文件以及时间索引文件, 可 根据这些状态索引文件查询对应用户 ID的状态, 如用户 ID的权限(即是否系 统管理员)、处于暂停或启动状态(是否被系统管理员停用)以及工作时间段(被 系统管理员限定到哪个时间段才能被系统识别)等状态。 权限索引文件、 暂停 取根据实际需要由制造商决定, 举例来说, 制造商可决定用户识别系统 20只具 有用户权限设定和用户暂停 /启用功能, 则可只设置权限表和用户暂停 /启用两个 索引文件。 而用户个人信息则包括个人特征信息、 个人社会属性信息以及个人 分配属性信息等, 这些信息组成用户个人数据库 1703。 其中个人特征信息包括 特征属性信息(即是指纹、 声纹、 虹膜等用户个人特征信息中的哪一种)、 用户 特征码、 特征码附属信息如生成特征码所使用的算法、 采集特征的传感器、 特 征所属信息 (例如用户特征属性为指纹的话, 是哪一根手指, 或者用户特征属 性为虹膜的话, 是左眼还是右眼等); 个人社会属性信息包括姓名 (语音或文字 等)、 相片、 签名以及用户 ID号; 个人分配属性包括所在组织名称(哪个公司 等等)、 本人在组织内的编号、 权限、 分配时间段、 暂停或启动。 其中就相同的 用户而言, 在同一个用户识别设备内, 用户管理信息的权限索引文件、 暂停 /启 用索引文件以及时间分配索引文件与用户个人信息的个人分配属性中的权限、 时间段、 暂停或启动等信息内容是相一致的。 透过用户信息数据库 1701 , 可对 用户进行灵活管理, 而用户信息数据库 1701又与用户识别模块 203中的特征码 存储模块 203d相挂钩, 其具体表现为: 用户信息数据库 1701中的用户编号-特 征码编号索引文件与特征码存储模块 203d存在对应关系, 在特征码存储模块 203d 中, 某一特定用户指纹特征码具有某一指纹编号, 该指纹编号与特征码编
号-用户编号索引文件中的特征码编号是一致的, 从而根据相同的指纹编号可将 状态索引文件与特征码存储模块 203d联系起来,而在特征码编号-用户编号索引 文件中, 对应的特征码编号与相应的用户编号挂钩, 从而使得特征码存储模块 203d 中的特征码与所属用户编号联系起来, 从而可根据用户编号, 到状态索引 文件查找对应的权限、 时间分配等等状态, 因此可快速地查询用户的信息 (见 附图 16 )。 另外在获得用户编号后, 根据用户编号可以到用户个人数据库 1703 中查找到相应的用户信息, 其中在用户个人数据库 1703所包括的个人分配属性 中, 用户的权限、 分配时间、 暂停启用等信息存储在个人分配属性的存储空间 中, 这些信息与索引文件的用户状态的内容相一致, 当用户录入指纹, 系统会 在索引文件中添加用户的状态信息, 并且会将这些状态信息写入到用户编号所 对应的个人分配属性信息中, 而当用户修改用户信息, 比如在用户界面模块 207 上作相关的操作来修改权限级别, 此时用户识别系统 20不仅会对用户的相应状 态索引文件作出修改, 还会对用户个人数据库 1703中的个人分配属性信息作出 修改。 因此, 如上文所述, 用户状态信息记录在用户信息数据库 1701的两个地 方, 一为在各索引文件中, 另一为在用户个人数据库 1703的个人分配属性信息 中, 二者均可接受主控制器 201 的查询, 然而, 如上文所述, 查询索引文件的 速度比查询用户个人数据库快很多, 因此, 一般而言, 查询索引文件将会作为 主控制器 201 查询动作的首要选择, 而查询用户个人数据库则可作为备用的选 择。 并且, 用户个人数据库 1703中, 每个用户编号均占有一个独立文件夹, 存 储个人特征信息、 个人社会属性信息、 个人分配属性等文件。 同时, 在下文将 要详细介绍的备份功能中, 所需备份的信息主要是存储在用户个人数据库 1703 中。 并且, 在各个设备的同步过程中, 主要由用户个人数据库 1703提供同步数 据, 使得每一用户识别系统 20均具有相同的用户对象进行管理, 而不需要在新 增设的用户识别系统 20 中从新输入用户个人数据。 其中用户个人数据库 1703 内的信息是经过加密算法保护的。 使用用户信息数据库 1701在管理上能够十分 方便地修改用户信息、 处理用户数据, 并且在实现备份、 同步、 转移、 修改、 跨平台使用以及网络使用中具有很大优势。
参照图 18,将详细介绍本发明用户识别系统 20如何进行备份。在本发明中, 备份可有很多种, 可针对个人备份, 也可针对所有人备份, 可在录入新用户时 自动备份, 也可定时备份, 主要针对用户需要而灵活设定, 而备份的对象主要 针对用户的指纹特征信息, 就自动备份而言, 当有新用户录入一指纹时, 如前 面所述, 在用户识别模块 203的特征码存储模块 203d中新增了一个指纹特征码 信息, 这时, 系统会在存储模块 217的用户信息数据库 1701的索引文件中, 比 如在特征码编号 -用户编号索引文件 1603中建立一个新的映射关系,使得存储在
用户识别系统 203的特征码存储模块 203d中的用户特征码的特征码编号存储在 特征码编号 -用户编号索引文件 1603中, 而因为新增了一新用户, 因此系统会新 分配一新的用户编号给用户,从而在特征码编号 -用户编号索引文件 1603中建立 了特征码存储模块 203d中的用户特征码与存储模块 217中的用户信息数据库之 间的映射关系, 进而, 系统会在根据新的用户编号建立状态索引文件, 如用户 编号-用户权限索引文件、 用户编号 -用户暂停启用索引文件、 用户编号-用户分 配时间索引文件, 从而建立对应的映射关系, 这时, 系统的设备管理信息就完 全建立了, 而且, 主控制器 201 会在用户信息数据库的用户个人信息中新增用 户的数据空间, 并在个人分配属性中写入与索引文件一致的状态内容(如权限 及时间分配等)。 当自动备份开始,主控制器 201从用户编号 -用户权限索引文件 中查询所有的用户编号以及特征码编号, 根据所获取的特征码编号从用户识别 模块 203的特征码存储模块 203d中读出这个特征码编号的特征码数据, 主控制 器 201会将每一特征码与相关附属信息, 如特征属性(左手食指、 左眼等)、 其 特征采集传感器型号、 特征码生成算法或者芯片型号结合, 其中这些相关附属 信息在用户识别系统 20 制造时会被烧录到系统固件或被保存到设备管理信息 中, 而主控制器 201可随时读取到这些信息, 主控制器 201将结合起来的数据 存放在存储模块 217 的对应用户编号的个人数据库文件中, 从而完成了数据备 份功能。 而手动备份则可由当前用户在用户界面模块 207 中选择备份功能, 并 在管理员授权成功后可针对一个或几个或全部的用户进行备份, 而手动备份与 上述的自动备份原理基本上是相同的。 如图 18所示, 一般而言, 无论是何种备 份, 主要依照以下 4 个步骤进行: 1.获得用户编号以及对应特征码编号 (步骤 1801 ); 2.主控制器 201从用户识别模块 203的特征码存储模块 203d中读取出此 编号的特征码数据 (步骤 1803 ); 3.主控制器 201将每一特征码与存储在主控制 器 201或存储模块 217中的附属信息结合起来从而生成结合信息 (步骤 1805 ), 其中所述附属信息至少包括特征属性、 特征采集传感器型号、 特征码生成算法、 芯片型号中的一种或多种(如前所述); 4.主控制器 201将结合信息存放到存储 模块 217 的对应用户编号的用户个人数据库文件的个人特征信息空间中 (步骤 1807 )。 而在以上的步骤中, 针对已存在的用户, 由于已存在的用户在前已经被 主控制器 201 分配了一用户编号, 并且在其用户个人数据库文件已经建立好, 所以主控制器 201 在已建立的用户个人数据库文件的基础上在其内添加备份的 内容, 而针对新加入的用户, 主控制器 201 会为其分配一新的用户编号, 并且 在用户个人数据库 1703中新增对应用户编号的用户个人数据库文件, 再在此文 件内新增备份的内容。
参照图 18,现将详细介绍本发明所揭示的用户识别系统 20的用户数据恢复
流程。 用户数据恢复具体而言是在用户识别模块 203中的特征码存储模块 203d 所存储的用户特征码由于某种原因丟失, 或者是整个用户识别模块 203 由于某 种原因需要更换时, 需要将所备份好的用户信息数据库 1701内的特征码信息重 新导入到用户识别模块 203中的特征码存储模块 203d中, 从而使得在用户识别 模块 203 内的特征码信息在丟失后能够从备份数据中得到恢复, 举例来说, 若 用户识别模块 203 由于某种原因不能使用, 于是用了一个用以替换的新的用户 识别模块 203更换, 但是由于新的用户识别模块 203 内并没有存储有原来的用 户信息特征码, 因此, 这个新的用户识别系统 20不可能识别出原来的用户。 所 以, 在这种情况下, 可在更换用户识别模块 203后在用户界面模块 207中选择 数据恢复功能, 在管理员授权后, 进行数据恢复。 数据恢复的工作流程如图 19 所示, 首先, 在步骤 1901 中, 主控制器 201从用户信息数据库 1701 中获取前 述的结合信息, 其包括用户特征码以及传感器型号、 算法、 特征属性等附属信 息中的一种或多种(如前述)。 在步骤 1903 中, 主控制器 201判断新的用户识 别模块 203的特征码附属信息, 如信息采集传感器 203a型号、 特征码生成算法 与结合信息中所保存的附属信息是否一致(步骤 1903与步骤 1905 ) , 若一致, 则在步骤 1907中将用户个人数据库 1703 中所保存的特征码按一定次序导入到 新的用户识别模块 203的特征码存储模块 203d中, 从而使得新的用户识别模块 203能够识别原来已所备份的用户特征信息, 若不一致, 则不能进行恢复操作并 作出提示 (步骤 1909 )。
现将详细介绍本发明所揭示的用户识别系统的用户数据同步流程。 用户数 据同步具体而言是若用户识别系统 20由于某种原因需要允许另一用户识别系统 20中所存储的用户登入, 在一般的系统中, 可能会要求在另一用户识别系统 20 中所存储的用户一次一次地在用户识别系统 20中录入自己的识别信息, 并请管 理员逐一授权, 很明显, 这样做的话会非常的麻烦。 对此, 在本发明中, 利用 用户数据同步的功能免却了这种情形的发生, 管理员只需将另一用户识别系统 20中所备份的结合信息导入到新的用户识别系统 20中去, 这时, 用户识别系统 20就可允许另一新的用户识别系统 20的用户登入。举例来说, 透过外部通信模 块 217从外部设备获得结合信息, 并将从外部获得的结合信息存储到存储模块 217后, 当用户在用户界面模块 207中选择数据同步功能, 则在管理员授权后, 就可以进行数据同步, 如图 20所示, 在步骤 2001 中, 外部结合信息可通过外 部通信模块 215传入到存储模块 217的空间中 (例如可存放到用户存放信息空 间中), 其中外部结合信息为另一根据本发明的相同类型的用户识别系统 20 的 用户个人数据库 1703中所存储的结合信息, 即从外部设备所获得的结合信息。 在步骤 2003中, 主控制器 201获取此外部结合信息, 并将其放置到某一临时存
储位置(可以是用户识别系统 20的任何存储空间,如在 RAM上 ),在步骤 2005 中, 主控制器 201 会判断所获取的外部结合信息是否符合当前设备使用, 即判 断外部结合信息中的附属信息与当前设备中的附属信息, 具体而言是判断当前 所用算法与所获取的外部结合信息所记载的算法是否一致、 当前使用的采集传 感器与所获取的外部结合信息所记载的传感器是否为同一型号以及特征信息是 虹膜或是指纹(或是面型)等, 如果发现上述数据不一致, 则主控制器 201 不 对所获得的外部结合信息作进一步处理(步骤 2007 ), 再者, 如果发现上述数据 相一致, 则主控制器 201 进一步判断需要恢复的个人特征码与已有的特征码是 否存在有重复(如两个设备均记录了同一个用户的同一根手指即为存在重复的 情况), 其具体实现为利用外部结合信息中的特征码信息与当前使用的用户识别 模块 203的特征码存储模块 203d中所存储的特征码信息进行比较(步骤 2009 ), 在步骤 2015中, 如果在没有发现存在重复, 则主控制器 201会将外部结合信息 中的特征码存放到用户识别模块 203的特征码存储模块 203d中, 在用户个人数 据库 1703中生成新的用户个人数据库文件(步骤 2015 ), 并在用户编号-特征码 编号索引文件中新增特征码编号以及用户编号(步骤 2017 ), 如果存在一个或几 个重复(但不是全部), 则在用户个人数据库中添加原先没有的用户特征码信息 (步骤 2013 ), 并在用户编号-特征码编号索引文件中新增特征码编号以及之前 所使用的用户编号 (步骤 2017 ), 当主控制器 201发现所有特征码均重复的话, 就不会进行同步操作并作出相应提示 (步骤 2011 )。
本发明所揭示的用户识别系统 20还具有升级的功能,在一般的识别设备中, 通常不需要在原有的基础上作功能扩展, 但就本发明所介绍的用户识别系统 20 而言, 由于其可灵活管理性, 以及功能的多样性, 因此开发人员可能要对其进 行固件升级, 其升级工作如一般的 MP3播放器更换固件的操作类似, 即可将固 件文件放置在某一特定存储空间中, 然后选择进行升级操作, 之后经过管理员 授权, 系统就会自动进行升级, 在升级完毕后进行即可继续使用。
本发明的用户识别系统及其用户数据处理方法, 利用主控制器、 用户识别 模块、 系统启动模块、 用户界面模块、 行动模块、 电子时钟模块、 系统检测模 块、 外部通信模块、 存储模块、 安全加密模块的配合, 实现用户权限管理、 用 户使用时间管理、 用户暂停启用管理、 系统数据备份、 系统数据同步、 系统数 据恢复以及系统升级功能, 由此改善了现有技术中由于用户识别系统功能单一, 以致不具备灵活的用户管理功能的缺陷。
在上述实施例中, 仅对本发明进行了示范性介绍, 但是本领域技术人员在 阅读本专利申请后可以在不脱离本发明的精神和范围的情况下对本发明进行各 种修改。
Claims
1. 一种用户识别系统的用户数据处理方法, 所述用户识别系统包括主控制 器、 存储模块、 用户识别模块、 用户界面模块, 所述用户数据处理方法特征在 于:
所述用户识别模块采集用户输入的特征信息, 将所述特征信息生成特征码, 并对所述特征码分配特征码编号, 存储所述特征码以及所述特征码编号, 并将 所述特征码编号传给所述主控制器;
所述用户界面模块接收用户状态信息, 并将所述用户状态信息传给所述主 控制器;
所述主控制器根据所述特征码编号和所述用户状态信息, 在所述存储器中 储存用户相关信息。
2. 如权利要求 1所述的用户识别系统的用户数据处理方法, 其特征在于, 所述特征码包括第一特征码和第二特征码, 所述第一特征码为注册用户在注册 时输入的特征信息所产生的特征码, 所述第二特征码为任意用户在访问所述用 户识别系统时输入的特征信息所产生的特征码, 所述用户数据处理方法包括: 所述用户识别模块将所述第二特征码与存储在所述用户识别模块中的所述 第一特征码进行比对, 当所述第一特征码与所述第二特征码相符时, 所述用户 识别模块向所述主控制器返回所述第一特征码对应的特征码编号;
所述主控制器根据所述第一特征码的特征码编号在所述存储模块中查询所 述用户相关信息, 并根据查询结果控制所述用户对所述用户识别系统的访问。
3. 根据权利要求 2所述的用户识别系统的用户数据处理方法,其特征在于: 利用所述用户识别模块中的信息采集传感器采集所述注册用户以及所述任意用 户的所述特征信息, 利用所述用户识别模块中的特征码生成模块产生所述特征 码, 利用所述用户识别模块中的特征码存储模块存储所述特征码, 利用所述用 户识别模块中的特征码比对模块比对所述第一特征码与所述第二特征码。
4. 根据权利要求 2所述的用户识别系统的用户数据处理方法,其特征在于: 利用所述存储模块存储设备相关信息以及所述用户相关信息, 其中所述用户相 关信息为一用户信息数据库, 所述用户信息数据库包括用户管理信息和用户个 人信息, 所述设备相关信息包括错误记录信息、 功能设定文件信息。
5. 根据权利要求 4所述的用户识别系统的用户数据处理方法,其特征在于:
所述用户管理信息包括特征码编号-用户编号索引文件和状态索引文件, 所述用 户个人信息包括个人特征信息、 个人社会属性信息以及个人分配属性信息。
6. 根据权利要求 5所述的用户识别系统的用户数据处理方法,其特征在于: 所述状态索引文件包括权限索引文件、 暂停 /启用索引文件以及时间分配索引文 件中的一种或任意组合。
7. 根据权利要求 5所述的用户识别系统的用户数据处理方法,其特征在于: 所述特征码编号-用户编号索引文件的用户编号栏位中的所述特征码编号与存储 在所述用户识别模块中的特征码编号——对应, 所述特征码编号-用户编号索引 文件的特征码编号栏位中的所述用户编号与所述存储模块中的所述状态索引文 件以及所述用户个人数据库文件——对应, 所述特征码编号-用户编号索引文件 的所述栏位中的所述用户编号与一个或多个所述特征码编号对应。
8. 一种用户识别系统, 其包括主控制器、 存储模块、 用户识别模块、 用户 界面模块, 其特征在于:
所述用户识别模块用于采集用户输入的特征信息, 将所述特征信息生成特 征码, 并对所述特征码分配特征码编号, 存储所述特征码以及特征码编号, 并 将所述特征码编号传给所述主控制器;
所述用户界面模块用于接收用户状态信息, 并将所述状态信息传给所述主 控制器;
所述主控制器用于根据所述特征码编号和所述用户状态信息, 在所述存储 器中产生用户相关信息。
9. 根据权利要求 8所述的用户识别系统, 其特征在于: 所述用户识别模块 中设置有信息采集传感器, 所述信息采集传感器用于采集所述注册用户以及所 述任意用户的所述特征信息, 所述用户识别模块中设置有特征码生成模块, 所 述特征码生成模块产生所述特征码, 所述用户识别模块中设置有特征码存储模 块, 所述特征码存储模块用于存储所述特征码, 所述用户识别模块中设置有特 征码比对模块, 所述特征码比对模块用于比对所述特征码。
10.根据权利要求 8所述的用户识别系统, 其特征在于: 所述用户界面模块 为语音提示模块、 语音识别模块、 LCD显示模块、 触摸屏、 LED模块、 按钮以 及电脑操作模块中的任一种模块或其组合。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2009/071346 WO2010118583A1 (zh) | 2009-04-18 | 2009-04-18 | 用户识别系统及其用户数据处理方法 |
CN2009801587937A CN102439615A (zh) | 2009-04-18 | 2009-04-18 | 用户识别系统及其用户数据处理方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2009/071346 WO2010118583A1 (zh) | 2009-04-18 | 2009-04-18 | 用户识别系统及其用户数据处理方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010118583A1 true WO2010118583A1 (zh) | 2010-10-21 |
Family
ID=42982127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/071346 WO2010118583A1 (zh) | 2009-04-18 | 2009-04-18 | 用户识别系统及其用户数据处理方法 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102439615A (zh) |
WO (1) | WO2010118583A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106355149A (zh) * | 2016-08-29 | 2017-01-25 | 恒银金融科技股份有限公司 | 一种金融自助终端交易操作用识别模块及识别方法 |
US11328285B2 (en) | 2020-02-11 | 2022-05-10 | Capital One Services, Llc | Techniques to generate and store characteristics of a signature on a transaction card circuit |
CN114674102A (zh) * | 2022-03-29 | 2022-06-28 | Tcl家用电器(合肥)有限公司 | 冰箱、冰箱信息码的存储系统和存储方法 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108667774A (zh) * | 2017-03-30 | 2018-10-16 | 芜湖美的厨卫电器制造有限公司 | 浴室的多媒体内容提供系统、方法及浴室镜 |
CN109009036A (zh) * | 2018-07-27 | 2018-12-18 | 上海斐讯数据通信技术有限公司 | 一种基于智能手机的血压检测的方法和系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1567346A (zh) * | 2003-06-30 | 2005-01-19 | 深圳市派思数码科技有限公司 | 带红外摄像、无线功能的嵌入式指纹门禁系统 |
JP2005113451A (ja) * | 2003-10-06 | 2005-04-28 | Mitsubishi Electric Corp | 出入管理システム |
CN1658222A (zh) * | 2005-03-22 | 2005-08-24 | 成都翔宇信息技术有限公司 | 生物活体指纹出入控制方法和系统 |
CN1991800A (zh) * | 2005-12-31 | 2007-07-04 | 联想(北京)有限公司 | 一种指纹识别存储设备及指纹识别方法 |
-
2009
- 2009-04-18 WO PCT/CN2009/071346 patent/WO2010118583A1/zh active Application Filing
- 2009-04-18 CN CN2009801587937A patent/CN102439615A/zh active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1567346A (zh) * | 2003-06-30 | 2005-01-19 | 深圳市派思数码科技有限公司 | 带红外摄像、无线功能的嵌入式指纹门禁系统 |
JP2005113451A (ja) * | 2003-10-06 | 2005-04-28 | Mitsubishi Electric Corp | 出入管理システム |
CN1658222A (zh) * | 2005-03-22 | 2005-08-24 | 成都翔宇信息技术有限公司 | 生物活体指纹出入控制方法和系统 |
CN1991800A (zh) * | 2005-12-31 | 2007-07-04 | 联想(北京)有限公司 | 一种指纹识别存储设备及指纹识别方法 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106355149A (zh) * | 2016-08-29 | 2017-01-25 | 恒银金融科技股份有限公司 | 一种金融自助终端交易操作用识别模块及识别方法 |
US11328285B2 (en) | 2020-02-11 | 2022-05-10 | Capital One Services, Llc | Techniques to generate and store characteristics of a signature on a transaction card circuit |
CN114674102A (zh) * | 2022-03-29 | 2022-06-28 | Tcl家用电器(合肥)有限公司 | 冰箱、冰箱信息码的存储系统和存储方法 |
Also Published As
Publication number | Publication date |
---|---|
CN102439615A (zh) | 2012-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101594351B (zh) | 信息处理装置、认证系统以及信息处理方法 | |
JP5458597B2 (ja) | 照合装置及び認証装置 | |
CN1985260A (zh) | 使用外部设备的计算机控制方法及计算机控制系统 | |
CN104992091A (zh) | 访问终端的方法及装置 | |
JP2006511893A (ja) | ポータブル・データを保護するためのシステム及び方法 | |
CN103827811A (zh) | 管理基本输入/输出系统(bios)的访问 | |
WO2010118583A1 (zh) | 用户识别系统及其用户数据处理方法 | |
WO2006001153A1 (ja) | ファイル管理プログラム | |
CN109643356A (zh) | 阻止网络钓鱼或勒索软件攻击的方法和系统 | |
JPWO2005017758A1 (ja) | 電子データ管理装置、その制御プログラム及び電子データ管理方法 | |
JP3587045B2 (ja) | 認証管理装置及び認証管理システム | |
JP2019144695A (ja) | 顔認証システム、顔認証サーバおよび顔認証方法 | |
JP6818309B1 (ja) | 期限管理サーバー、エージェント・プログラム及び端末貸出システム | |
JP2004302875A (ja) | 入退室管理システム、入退室管理サーバ及び入退室管理方法 | |
CN111478894A (zh) | 一种外部用户授权方法、装置、设备及可读存储介质 | |
CN107026749A (zh) | 多用户配置方法及装置、多用户切换方法及装置、终端 | |
CN101025769B (zh) | 多用户安全芯片资源配置的方法和多用户安全系统 | |
US10730482B1 (en) | Vehicular biometric system with automatically renewed sunset periods for data retention | |
WO2018006326A1 (zh) | 一种通过移动终端和图片密码验证智能门禁的方法及系统 | |
JP4498012B2 (ja) | 電子機器 | |
JP6154683B2 (ja) | 計算機システム | |
JP2012115992A (ja) | 画像形成装置及び画像形成システム | |
JP2007304785A (ja) | ビルセキュリティシステム、利用者情報生成装置および入退室管理方法 | |
CN106951797A (zh) | 文件加锁方法、装置及终端 | |
WO2007099717A1 (ja) | データ処理システムおよび可搬型メモリ |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980158793.7 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09843217 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09843217 Country of ref document: EP Kind code of ref document: A1 |