[go: up one dir, main page]

WO2018040029A1 - 安防指纹识别方法及系统 - Google Patents

安防指纹识别方法及系统 Download PDF

Info

Publication number
WO2018040029A1
WO2018040029A1 PCT/CN2016/097677 CN2016097677W WO2018040029A1 WO 2018040029 A1 WO2018040029 A1 WO 2018040029A1 CN 2016097677 W CN2016097677 W CN 2016097677W WO 2018040029 A1 WO2018040029 A1 WO 2018040029A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
fingerprint
fingerprint recognition
fingerprint identification
coordinates
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/097677
Other languages
English (en)
French (fr)
Inventor
张北江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to PCT/CN2016/097677 priority Critical patent/WO2018040029A1/zh
Publication of WO2018040029A1 publication Critical patent/WO2018040029A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/13Sensors therefor

Definitions

  • the invention relates to the field of security, and in particular to a security fingerprint identification method and system.
  • Security is the most commonly used data in video data.
  • face recognition is the key in security data.
  • video files cannot accurately identify fingerprints, and the user experience is low.
  • a security fingerprint identification method is provided, which solves the shortcoming that the prior art cannot be low in user experience.
  • a security fingerprint identification method comprising the following steps:
  • the user is prompted to input a fingerprint in the fingerprint recognition device to implement fingerprint recognition.
  • the method further includes:
  • the method further includes:
  • a security fingerprint identification system comprising:
  • a receiving unit configured to receive positioning coordinates of the user
  • a determining unit configured to determine, according to the coordinates, whether there is a fingerprint identification device around the user
  • the prompting unit is configured to prompt the user to input a fingerprint in the fingerprint identification device to implement fingerprint recognition if the fingerprint identification device is provided.
  • system further includes:
  • a storage unit for recording the time and coordinates of fingerprint recognition.
  • system further includes:
  • a sending unit configured to send a result of fingerprint identification to a remote user.
  • the technical solution provided by the specific embodiment of the present invention receives the positioning coordinates of the user, and determines whether there is a fingerprint identification device around the user according to the coordinates, such as having a fingerprint identification device, prompting the user to input a fingerprint in the fingerprint identification device to implement fingerprint recognition, so the pair has the right User application management, the user experience is high.
  • FIG. 1 is a flowchart of a security fingerprint identification method provided by the present invention
  • FIG. 2 is a structural diagram of a security fingerprint recognition system provided by the present invention.
  • FIG. 1 is a flowchart of a method for identifying a security fingerprint according to a first preferred embodiment of the present invention.
  • the method is implemented by a mobile phone.
  • the method is as shown in FIG. 1 , and includes the following steps:
  • Step S101 Receive positioning coordinates of the user
  • Step S102 Determine, according to the coordinates, whether there is a fingerprint identification device around the user;
  • Step S103 If the fingerprint identification device is provided, the user is prompted to input a fingerprint in the fingerprint recognition device to implement fingerprint recognition.
  • the technical solution provided by the specific embodiment of the present invention receives the positioning coordinates of the user, and determines whether there is a fingerprint identification device around the user according to the coordinates, such as having a fingerprint identification device, prompting the user to input a fingerprint in the fingerprint identification device to implement fingerprint recognition, so the network has a network.
  • the music course realizes the advantages of the lesson.
  • the foregoing method may further include:
  • the foregoing method may further include:
  • FIG. 2 is a security fingerprint identification system according to a second preferred embodiment of the present invention.
  • the system includes:
  • the receiving unit 201 is configured to receive positioning coordinates of the user
  • the determining unit 202 is configured to determine, according to the coordinates, whether there is a fingerprint identification device around the user;
  • the prompting unit 203 is configured to prompt the user to input a fingerprint in the fingerprint identification device to implement fingerprint recognition if the fingerprint identification device is provided.
  • the technical solution provided by the specific embodiment of the present invention receives the positioning coordinates of the user, and determines whether there is a fingerprint identification device around the user according to the coordinates, such as having a fingerprint identification device, prompting the user to input a fingerprint in the fingerprint identification device to implement fingerprint recognition, so the network has a network.
  • the music course realizes the advantages of the lesson.
  • the above system may further include:
  • the storage unit 204 is configured to record the time and coordinates of fingerprint recognition.
  • the above system may further include:
  • the sending unit 205 is configured to send a result of the fingerprint identification to the remote user.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
  • a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种安防指纹识别方法及系统,所述方法包括如下步骤:接收用户的定位坐标;依据坐标判断用户周围是否有指纹识别设备;如具有指纹识别设备,提示用户在指纹识别设备内输入指纹以实现指纹识别。本技术方案具有用户体验度高的优点。

Description

安防指纹识别方法及系统 技术领域
本发明涉及安防领域,尤其涉及一种安防指纹识别方法及系统。
背景技术
安防在视频数据为最常用的数据,对于视频数据来说,人脸识别是安防数据中的关键,现在的视频文件无法实现对指纹的精确识别,用户体验度低。
技术问题
提供一种安防指纹识别方法,其解决了现有技术无法用户体验度低的缺点。
技术解决方案
一方面,提供一种安防指纹识别方法,所述方法包括如下步骤:
接收用户的定位坐标;
依据坐标判断用户周围是否有指纹识别设备;
如具有指纹识别设备,提示用户在指纹识别设备内输入指纹以实现指纹识别。
可选的,所述方法还包括:
记录指纹识别的时间和坐标。
可选的,所述方法还包括:
向远程用户发送指纹识别的结果。
第二方面,提供一种安防指纹识别系统,所述系统包括:
接收单元,用于接收用户的定位坐标;
判断单元,用于依据坐标判断用户周围是否有指纹识别设备;
提示单元,用于如具有指纹识别设备,提示用户在指纹识别设备内输入指纹以实现指纹识别。
可选的,所述系统还包括:
存储单元,用于记录指纹识别的时间和坐标。
可选的,所述系统还包括:
发送单元,用于向远程用户发送指纹识别的结果。
有益效果
本发明具体实施方式提供的技术方案接收用户的定位坐标,依据坐标判断用户周围是否有指纹识别设备,如具有指纹识别设备,提示用户在指纹识别设备内输入指纹以实现指纹识别,所以其具有对用户应用程序进行管理,用户体验度高的优点。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明提供的一种安防指纹识别方法的流程图;
图2为本发明提供的一种安防指纹识别系统的结构图。
本发明的实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
参阅图1,图1为本发明第一较佳实施方式提供的一种安防指纹识别方法的流程图,该方法由手机来完成,该方法如图1所示,包括如下步骤:
步骤S101、接收用户的定位坐标;
步骤S102、依据坐标判断用户周围是否有指纹识别设备;
步骤S103、如具有指纹识别设备,提示用户在指纹识别设备内输入指纹以实现指纹识别。
本发明具体实施方式提供的技术方案接收用户的定位坐标,依据坐标判断用户周围是否有指纹识别设备,如具有指纹识别设备,提示用户在指纹识别设备内输入指纹以实现指纹识别,所以其具有网络音乐课程实现约课的优点。
可选的,上述方法在步骤S103之后还可以包括:
记录指纹识别的时间和坐标。
可选的,上述方法在步骤S103之后还可以包括:
向远程用户发送指纹识别的结果。
参阅图2,图2为本发明第二较佳实施方式提供的一种安防指纹识别系统,该系统包括:
接收单元201,用于接收用户的定位坐标;
判断单元202,用于依据坐标判断用户周围是否有指纹识别设备;
提示单元203,用于如具有指纹识别设备,提示用户在指纹识别设备内输入指纹以实现指纹识别。
本发明具体实施方式提供的技术方案接收用户的定位坐标,依据坐标判断用户周围是否有指纹识别设备,如具有指纹识别设备,提示用户在指纹识别设备内输入指纹以实现指纹识别,所以其具有网络音乐课程实现约课的优点。
可选的,上述系统还可以包括:
存储单元204,用于记录指纹识别的时间和坐标。
可选的,上述系统还可以包括:
发送单元205,用于向远程用户发送指纹识别的结果。
需要说明的是,对于前述的各方法实施方式或实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为根据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述实施方式或实施例均属于优选实施例,所涉及的动作和单元并不一定是本发明所必须的。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
本发明实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。
本发明实施例装置中的单元可以根据实际需要进行合并、划分和删减。本领域的技术人员可以将本说明书中描述的不同实施例以及不同实施例的特征进行结合或组合。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本发明可以用硬件实现,或固件实现,或它们的组合方式来实现。当使用软件实现时,可以将上述功能存储在计算机可读介质中或作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。此外。任何连接可以适当的成为计算机可读介质。例如,如果软件是使用同轴电缆、光纤光缆、双绞线、数字用户线(Digital Subscriber Line,DSL)或者诸如红外线、无线电和微波之类的无线技术从网站、服务器或者其他远程源传输的,那么同轴电缆、光纤光缆、双绞线、DSL或者诸如红外线、无线和微波之类的无线技术包括在所属介质的定影中。如本发明所使用的,盘(Disk)和碟(disc)包括压缩光碟(CD)、激光碟、光碟、数字通用光碟(DVD)、软盘和蓝光光碟,其中盘通常磁性的复制数据,而碟则用激光来光学的复制数据。上面的组合也应当包括在计算机可读介质的保护范围之内。
总之,以上所述仅为本发明技术方案的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (6)

  1. 一种安防指纹识别方法,其特征在于,所述方法包括如下步骤:
    接收用户的定位坐标;
    依据坐标判断用户周围是否有指纹识别设备;
    如具有指纹识别设备,提示用户在指纹识别设备内输入指纹以实现指纹识别。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    记录指纹识别的时间和坐标。
  3. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    向远程用户发送指纹识别的结果。
  4. 一种安防指纹识别系统,其特征在于,所述系统包括:
    接收单元,用于接收用户的定位坐标;
    判断单元,用于依据坐标判断用户周围是否有指纹识别设备;
    提示单元,用于如具有指纹识别设备,提示用户在指纹识别设备内输入指纹以实现指纹识别。
  5. 根据权利要求4所述的系统,其特征在于,所述系统还包括:
    存储单元,用于记录指纹识别的时间和坐标。
  6. 根据权利要求4所述的系统,其特征在于,所述系统还包括:
    发送单元,用于向远程用户发送指纹识别的结果。
PCT/CN2016/097677 2016-08-31 2016-08-31 安防指纹识别方法及系统 Ceased WO2018040029A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/097677 WO2018040029A1 (zh) 2016-08-31 2016-08-31 安防指纹识别方法及系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/097677 WO2018040029A1 (zh) 2016-08-31 2016-08-31 安防指纹识别方法及系统

Publications (1)

Publication Number Publication Date
WO2018040029A1 true WO2018040029A1 (zh) 2018-03-08

Family

ID=61299810

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/097677 Ceased WO2018040029A1 (zh) 2016-08-31 2016-08-31 安防指纹识别方法及系统

Country Status (1)

Country Link
WO (1) WO2018040029A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201796396U (zh) * 2010-03-02 2011-04-13 彭少熙 可远程定位的便携式指纹考勤机
CN105023365A (zh) * 2015-07-31 2015-11-04 华南理工大学 基于nfc的公共自行车管理系统及方法
US20160162729A1 (en) * 2013-09-18 2016-06-09 IDChecker, Inc. Identity verification using biometric data
CN105788016A (zh) * 2016-02-26 2016-07-20 河南智业科技发展有限公司 一种防伪造的互联网考勤方法
CN106326875A (zh) * 2016-08-31 2017-01-11 张北江 安防指纹识别方法及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201796396U (zh) * 2010-03-02 2011-04-13 彭少熙 可远程定位的便携式指纹考勤机
US20160162729A1 (en) * 2013-09-18 2016-06-09 IDChecker, Inc. Identity verification using biometric data
CN105023365A (zh) * 2015-07-31 2015-11-04 华南理工大学 基于nfc的公共自行车管理系统及方法
CN105788016A (zh) * 2016-02-26 2016-07-20 河南智业科技发展有限公司 一种防伪造的互联网考勤方法
CN106326875A (zh) * 2016-08-31 2017-01-11 张北江 安防指纹识别方法及系统

Similar Documents

Publication Publication Date Title
WO2018218806A1 (zh) 终端隐私保护方法及系统
WO2018035698A1 (zh) 房屋的评价方法及系统
WO2018218808A1 (zh) 短信的信息读取方法及系统
WO2018218807A1 (zh) 微信的信息读取方法及系统
WO2018040029A1 (zh) 安防指纹识别方法及系统
WO2018027557A1 (zh) 安防中wifi的考勤记录方法及系统
WO2018223552A1 (zh) 终端app的快捷退出方法及系统
WO2018027466A1 (zh) 分布式系统中大数据的存储方法及系统
WO2018027560A1 (zh) 安防中gprs的考勤记录方法及系统
WO2018227332A1 (zh) 基于定位的终端快捷支付方法及系统
WO2018040028A1 (zh) 视频中人脸识别方法及系统
WO2018032335A1 (zh) 手机应用程序的关闭方法及系统
WO2018032346A1 (zh) 在特定使用场景下app的隐藏方法及系统
WO2018027576A1 (zh) 工作时间在物联网中统计方法及系统
WO2018035775A1 (zh) 卧式绕线机的电流计算方法及系统
WO2018035788A1 (zh) 开环控制在立式绕线机中的应用方法及系统
WO2018027559A1 (zh) 安防中北斗的考勤记录方法及系统
WO2018027561A1 (zh) 安防中楼层的考勤记录方法及系统
WO2018027558A1 (zh) 安防中蓝牙的考勤记录方法及系统
WO2018205272A1 (zh) 指纹识别在终端的应用方法及系统
WO2018040027A1 (zh) 图片调度在即时通信中的应用方法及系统
WO2018027465A1 (zh) 基于大数据的实时备份方法及系统
WO2018227364A1 (zh) 终端组播组的建立方法及系统
WO2018040025A1 (zh) 卧式绕线机的脚转动方法及系统
WO2018027469A1 (zh) 关键词在大数据存储的应用方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16914595

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/07/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16914595

Country of ref document: EP

Kind code of ref document: A1