CN109948316A - Fingerprint processing method and device and storage medium - Google Patents
Fingerprint processing method and device and storage medium Download PDFInfo
- Publication number
- CN109948316A CN109948316A CN201910120503.5A CN201910120503A CN109948316A CN 109948316 A CN109948316 A CN 109948316A CN 201910120503 A CN201910120503 A CN 201910120503A CN 109948316 A CN109948316 A CN 109948316A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- determined
- user fingerprints
- user
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 23
- 238000000034 method Methods 0.000 claims abstract description 57
- 238000012545 processing Methods 0.000 claims abstract description 22
- 238000012795 verification Methods 0.000 claims abstract description 4
- 238000004891 communication Methods 0.000 claims description 10
- 239000000284 extract Substances 0.000 claims description 10
- 238000000605 extraction Methods 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 16
- 238000013475 authorization Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 238000012360 testing method Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000002425 crystallisation Methods 0.000 description 1
- 230000008025 crystallization Effects 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 1
- 239000010931 gold Substances 0.000 description 1
- 229910052737 gold Inorganic materials 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The application discloses a fingerprint processing method, a fingerprint processing device and a storage medium, relates to the field of fingerprint processing, and aims to solve the problem that fingerprints of children (such as children under the age of 5) with unformed fingerprints are difficult to identify in a fingerprint lock on the market at present. The method comprises the following steps: acquiring a user fingerprint, and extracting respective widths of ridges and valleys in the user fingerprint; determining the type of the user fingerprint according to the respective widths of the ridges and valleys; if the type of the user fingerprint is determined to be an adult fingerprint, performing identity authentication by adopting a fingerprint authentication method corresponding to the adult fingerprint; and if the type of the user fingerprint is determined to be the child fingerprint, performing identity authentication by adopting a fingerprint authentication method corresponding to the child fingerprint. Therefore, the adult fingerprint and the child fingerprint are classified and the identity verification of the child fingerprint is realized through the respective widths of ridges and valleys in the user fingerprint.
Description
Technical field
This application involves finger prints processing field more particularly to a kind of finger prints processing method, apparatus and storage mediums.
Background technique
Fingerprint Lock is a kind of using the fingerprint at human finger position as the intelligent lock of identification carrier and means, it is computer
The perfect crystallization of information technology, electronic technology, mechanical technique and modern five gold process.Fingerprint Lock is generally by electronic recognition and control
System, mechanical linkage system two parts composition.The uniqueness and non-reproduction of living body finger print determine that Fingerprint Lock is all at present
Lock kind the safest in lockset.
However the fingerprint of children prepattern in developmental process, even if Fingerprint Lock saves the fingerprint of children, but due to
Children's fingerprint can change, and will lead to failure when carrying out authentication, so Fingerprint Lock on the market is not appropriate at present
Children.
Summary of the invention
The embodiment of the present application provides a kind of finger prints processing method, apparatus and storage medium, to solve at present on the market
Fingerprint Lock is directed to the more indiscernible problem of fingerprint of the still unshaped children of fingerprint.
In a first aspect, the embodiment of the present application provides a kind of finger prints processing method, this method comprises:
User fingerprints are obtained, and extract ridge and the respective width in valley in the user fingerprints;
According to the ridge and the respective width in valley, the type of the user fingerprints is determined;
If it is determined that the type of user fingerprints is adult fingerprint, then body is carried out using the corresponding fingerprint authentication method of adult fingerprint
Part verifying;
If it is determined that the type of user fingerprints is children's fingerprint, then body is carried out using the corresponding fingerprint authentication method of children's fingerprint
Part verifying.
Second aspect, the embodiment of the present application provide a kind of finger prints processing method, this method comprises:
Show fingerprint pattern set interface;
According to the type that user inputs in the fingerprint pattern set interface, fingerprint typing request is generated;Wherein, the type
Refer to adult fingerprint or children's fingerprint;
The fingerprint typing request of generation is sent to Fingerprint Lock.
The third aspect, the embodiment of the present application provide a kind of finger prints processing device, which includes:
Module is obtained, for obtaining user fingerprints, and extracts ridge and the respective width in valley in the user fingerprints;
Determining module, for determining the type of the user fingerprints according to the ridge and the respective width in valley;
First authentication module, it is for if it is determined that the type of user fingerprints is adult fingerprint, then corresponding using adult fingerprint
Fingerprint authentication method carries out authentication;
Second authentication module, it is for if it is determined that the type of user fingerprints is children's fingerprint, then corresponding using children's fingerprint
Fingerprint authentication method carries out authentication.
Fourth aspect, the embodiment of the present application provide a kind of finger prints processing device, which includes:
First display module, for showing fingerprint pattern set interface;
First generation module, the type for being inputted according to user in the fingerprint pattern set interface generate fingerprint record
Enter request;Wherein, the type refers to adult fingerprint or children's fingerprint;
First sending module, for the fingerprint typing request of generation to be sent to Fingerprint Lock.
5th aspect, another embodiment of the application additionally provide a kind of computing device, including at least one processor;With
And;
The memory being connect at least one described processor communication;Wherein, the memory be stored with can by it is described extremely
The instruction that a few processor executes, described instruction are executed by least one described processor, so that at least one described processing
Device is able to carry out a kind of finger prints processing method provided by the embodiments of the present application.
6th aspect, another embodiment of the application additionally provide a kind of computer storage medium, wherein the computer is deposited
Storage media is stored with computer executable instructions, and the computer executable instructions are for making computer execute the embodiment of the present application
One of finger prints processing method.
A kind of finger prints processing method, apparatus provided by the embodiments of the present application and storage medium, the user obtained by judgement
Ridge and the width in valley are adult fingerprint or children's fingerprint than the user fingerprints to determine acquisition in fingerprint;And according to determining finger
Line type selects corresponding fingerprint authentication method to carry out authentication.In this way, passing through ridge in user fingerprints and the respective width in valley
Degree, realizes the classification of adult fingerprint Yu children's fingerprint, and realize the authentication for children's fingerprint.
Other features and advantage will illustrate in the following description, also, partly become from specification
It obtains it is clear that being understood and implementing the application.The purpose of the application and other advantages can be by written explanations
Specifically noted structure is achieved and obtained in book, claims and attached drawing.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the flow diagram one of fingerprint processing method in the embodiment of the present application;
Fig. 2 is the flow diagram two of fingerprint processing method in the embodiment of the present application;
Fig. 3 is the flow diagram of typing fingerprint in the embodiment of the present application;
Fig. 4 is the flow diagram three of fingerprint processing method in the embodiment of the present application;
Fig. 5 is fingerprint processing structure schematic diagram one in the embodiment of the present application;
Fig. 6 is fingerprint processing structure schematic diagram two in the embodiment of the present application;
Fig. 7 is the structural schematic diagram according to the computing device of the application embodiment.
Specific embodiment
In order to solve the problems, such as that Fingerprint Lock at present on the market is more indiscernible for the fingerprint of the still unshaped children of fingerprint,
A kind of finger prints processing method, apparatus and storage medium are provided in the embodiment of the present application.In order to better understand the embodiment of the present application
The technical solution of offer does the basic principle of the program once briefly describe here:
1, fingerprint typing
Terminal is attached by close range communication techniques and Fingerprint Lock;Such as: wireless blue tooth technology.After successful connection, if
Typing fingerprint is needed, terminal can choose typing adult fingerprint or children's fingerprint, and the request of fingerprint typing is sent to finger
Line lock;After Fingerprint Lock receives request, need first to obtain the authorization of administrator, authorization acquires fingerprint after passing through, by the finger of acquisition
Line is corresponding with fingerprint pattern to be saved.
2, fingerprint recognition
When carrying out fingerprint recognition, Fingerprint Lock obtain user fingerprints, and according to ridge in the user fingerprints of acquisition with valley respectively
Width come the user fingerprints for determining acquisition be adult fingerprint or children's fingerprint;If adult fingerprint, then using adult fingerprint
Corresponding fingerprint authentication method carries out authentication;If children's fingerprint, then the corresponding fingerprint authentication method of children's fingerprint is used
Carry out authentication.
Finger prints processing is described in detail from Fingerprint Lock side below by specific embodiment.Fig. 1 is finger prints processing side
The flow diagram of method, comprising the following steps:
Step 101: receiving the fingerprint typing request that terminal is sent, include fingerprint to be logged in the fingerprint typing request
Type.
Wherein, the type of fingerprint to be logged includes adult fingerprint and children's fingerprint.
Step 102: being requested according to the fingerprint typing, acquire fingerprint.
Wherein, the fingerprint sensor used includes but is not limited to optical fingerprint sensor and semiconductor fingerprint sensor;It adopts
It is 8 times that the number of collection, which has altogether, that is, the fingerprint characteristic for acquiring same finger different location is 8 times total, every time by the feature to fingerprint
Point extracts and picture reinforcement processing.
In one embodiment, when Fingerprint Lock has acquired fingerprint, the information that an acquisition is completed can be sent to terminal,
The information can make terminal be named the fingerprint;Such as: fingerprint 1, index finger or the name of children.
Step 103: extracting the characteristic point of the fingerprint of acquisition.
Step 104: by the corresponding storage of the type of the characteristic point of extraction, the fingerprint of acquisition and the fingerprint.
In this way, carrying out the typing of fingerprint by terminal, the safety of Fingerprint Lock can be improved.
In the embodiment of the present application, it before Fingerprint Lock executes step 102, needs to obtain the authorization of administrator, specifically may be used
It is embodied as step A1-A2:
Step A1: the request of administrator's typing fingerprint is issued.
Wherein, administrator is the user that the Fingerprint Lock carries out fingerprint typing for the first time, and the user is generally the family of children
Long or other children legal guardians.Fingerprint Lock can be issued by voice and be requested, or the number flashed by indicator light
Issue request.As long as the application does not limit this when it is implemented, can issue request is applicable to the embodiment of the present application
It is fixed.
Step A2: acquiring the fingerprint of typing, and determines that the fingerprint of typing is the fingerprint of the administrator prestored.
In this way, the safety of fingerprint typing can be improved by the authorization of administrator.
In one embodiment, when Fingerprint Lock receives fingerprint typing request, it can be sent to terminal and obtain authorization
Information, administrator can confirm authorization at the terminal, and the information of confirmation authorization is sent to Fingerprint Lock, to complete authorization behaviour
Make.
In the embodiment of the present application, it after the finger print information management request of the transmission in receive, can be carried out according to request
Operation, it is specific implementable are as follows: to receive the finger print information management that terminal is sent and request and execute operation.Wherein, the management request
In include user terminal fingerprint management interface select user identifier and corresponding finger print information management operation.Such as:
The finger print information of preservation is deleted or is added new fingerprint etc..In this way, by management of the terminal to Fingerprint Lock, so that right
It is simpler in the management of fingerprint, improve the experience of user.
Described above by Fingerprint Lock side how typing fingerprint, below by specific embodiment from terminal side to fingerprint
Processing is described in detail.Fig. 2 is the flow diagram of finger prints processing method, comprising the following steps:
Step 201: display fingerprint pattern set interface.
Wherein, Fingerprint Lock can be controlled using the application of control Fingerprint Lock in terminal.
Step 202: the type inputted according to user in the fingerprint pattern set interface generates fingerprint typing request.
Wherein, the type includes adult fingerprint and children's fingerprint.
Step 203: the fingerprint typing request of generation is sent to Fingerprint Lock.
In this way, carrying out the typing of fingerprint by terminal, the safety of Fingerprint Lock can be improved.
It should be noted that the equipment that terminal can be attached for mobile phone, tablet computer etc. with Fingerprint Lock.
In the embodiment of the present application, terminal can be attached with Fingerprint Lock by close range communication techniques, in this way, being convenient for
Management to Fingerprint Lock realizes the intelligence of Fingerprint Lock.
In the embodiment of the present application, terminal can be managed the finger print information of Fingerprint Lock, specific implementable for step
B1-B3:
Step B1: showing fingerprint management interface, includes the finger print information of at least one user in the interface.
Step B2: the operation according to user at the fingerprint management interface generates finger print information management request.
It wherein, include user identifier that user selects at the fingerprint management interface in the management request and corresponding
The management of finger print information operates.
Step B3: finger print information management request is sent to Fingerprint Lock and is executed.
In this way, improving the body of user so that the management for fingerprint is simpler by management of the terminal to Fingerprint Lock
It tests.
To understand technical solution provided by the embodiments of the present application convenient for systematicness, below by specific example to this progress
It further illustrates, the case where this programme is when selecting fingerprint pattern as children's fingerprint.As shown in Figure 3, comprising the following steps:
Step 301: children's fingerprint that terminal is inputted according to user in the fingerprint pattern set interface that terminal is shown, generation refer to
Line typing request.
Step 302: the fingerprint typing request of generation is sent to Fingerprint Lock by terminal.
Step 303: the request of Fingerprint Lock sending administrator's typing fingerprint.
Step 304: Fingerprint Lock acquires the fingerprint of typing, and determines that the fingerprint of typing is the fingerprint of the administrator prestored.
Step 305: Fingerprint Lock is requested according to the fingerprint typing, acquires fingerprint.
Step 306: Fingerprint Lock sends the information that an acquisition is completed to terminal.
Step 307: Fingerprint Lock extracts the characteristic point of the fingerprint of acquisition.
Step 308: the type of the characteristic point of extraction, the fingerprint of acquisition and the fingerprint is corresponded to storage by Fingerprint Lock.
Be described above how typing fingerprint, from Fingerprint Lock side finger prints processing is carried out below by specific embodiment detailed
Explanation.Fig. 4 is the flow diagram of finger prints processing method, comprising the following steps:
Step 401: obtaining user fingerprints, and extract ridge and the respective width in valley in the user fingerprints.
Wherein, the ridge in fingerprint refers to the lines of finger surface protrusion, and valley is the gully part between ridge and ridge.
Step 402: according to the ridge and the respective width in valley, determining the type of the user fingerprints;
Wherein, the type refers to adult fingerprint or children's fingerprint.
Step 403: if it is determined that the type of user fingerprints is adult fingerprint, then using the corresponding fingerprint authentication side of adult fingerprint
Method carries out authentication.
Step 404: if it is determined that the type of user fingerprints is children's fingerprint, then using the corresponding fingerprint authentication side of children's fingerprint
Method carries out authentication.
In this way, the classification of adult fingerprint Yu children's fingerprint is realized by ridge in user fingerprints and the respective width in valley, with
And realize authentication for children's fingerprint.
In the embodiment of the present application, specific implementable for step C1-C3 when Fingerprint Lock executes step 402:
Step C1: judge whether the width ratio in ridge and valley is greater than predetermined width ratio.
Wherein, ridge can change with valley width ratio with the age, growth period, and the width ratio in ridge and valley is greater than predetermined width ratio;
The width ratio in maturity period, ridge and valley is close to predetermined width ratio;The width ratio in declining period, ridge and valley is less than predetermined width ratio.
Step C2: if more than, it is determined that the user fingerprints are children's fingerprints.
Step C3: if being not more than, it is determined that the user fingerprints are adult fingerprints.
In this way, the width ratio by judging ridge and valley, realizes the classification to adult fingerprint and children's fingerprint, thus according to
Classification results carry out different verification methods, so that Fingerprint Lock can be adapted for children.
In the embodiment of the present application, specific implementable for step D1-D6 when Fingerprint Lock executes step 403:
Step D1: extracting multiple characteristic points of the user fingerprints, and determines each characteristic point in the user fingerprints
Position.
Step D2: for the feature that each characteristic point judges position of this feature point in the user fingerprints and pre-saves
Whether distance of the point between the position in its fingerprint be less than the first pre-determined distance.
Step D3: if less than the first pre-determined distance, it is determined that this feature point successful match;If default not less than described first
Distance, it is determined that it fails to match for this feature point.
Step D4: judge that the quantity of the characteristic point of successful match is extracted in the user fingerprints in the user fingerprints
The ratio of quantity of characteristic point whether be greater than the first default ratio.
Step D5: if more than the first default ratio, it is determined that authentication success.
Step D6: if being not more than the first default ratio, it is determined that authentication failure.
In this way, determining whether authentication succeeds by the positional relationship for detecting each characteristic point with each characteristic point prestored.
And in the embodiment of the present application, when Fingerprint Lock executes step 403, this application provides two schemes to be identified
Children's fingerprint.
Scheme one is specific implementable for step E1-E6:
Step E1: extracting the characteristic point of the user fingerprints, and determines position of each characteristic point in the user fingerprints.
Step E2: for the feature that each characteristic point judges position of this feature point in the user fingerprints and pre-saves
Whether distance of the point between the position in its fingerprint be less than the second pre-determined distance.
Wherein, the second pre-determined distance is greater than the first pre-determined distance.
Step E3: if less than the second pre-determined distance, it is determined that this feature point successful match.
Step E4: judge that the quantity of the characteristic point of successful match is extracted in the user fingerprints in the user fingerprints
The ratio of quantity of characteristic point whether be greater than the second default ratio.
Wherein, the second default ratio is less than the first default ratio.
Step E5: if more than the second default ratio, it is determined that authentication success.
Step E6: if being not more than the second default ratio, it is determined that authentication failure.
In this way, since children's fingerprint can change, limits the second pre-determined distance and be greater than the first pre-determined distance, second
Ratio is preset less than the first default ratio.Even if still can be proved to be successful in this way, children's fingerprint changes.
Scheme one is specific implementable for step F1-F3:
Step F1: the scaling extracted between the user fingerprints and the fingerprint to be matched prestored is determined.
Step F2: the user fingerprints are zoomed in and out according to the determining scaling.
Step F3: authentication is carried out with the fingerprint to be matched prestored according to the user fingerprints after scaling.
In this way, since children's fingerprint can change, and fingerprint changes from small to big, thus by determine the ratio of variation come into
Row authentication.Even if still can be proved to be successful in this way, children's fingerprint changes.
In one embodiment, Fingerprint Lock chooses at least one characteristic point as reference characteristic from the characteristic point of extraction
Point, using residue character point as test feature point;Determine the distance between each test feature point and reference characteristic point;By each test
The distance between characteristic point and reference characteristic point are with pre-saving with each test feature point feature corresponding with reference characteristic point
The ratio of the distance between point is compared;If ratio is identical, judge position of each characteristic point in the user fingerprints with
The characteristic point pre-saved is in its fingerprint by the ratio such as described ratio.
In the embodiment of the present application, when adult fingerprint or children's fingerprint authentication fail, user's checking can be prompted to fail,
And record the number of failure.When the number of failure is greater than preset times, then can sound an alarm.In this way, improving Fingerprint Lock
Safety.
Based on identical inventive concept, the embodiment of the present application also provides a kind of finger prints processing devices.As shown in figure 5, should
Device includes:
Module 501 is obtained, for obtaining user fingerprints, and extracts ridge and the respective width in valley in the user fingerprints;
Determining module 502, for determining the type of the user fingerprints according to the ridge and the respective width in valley;
First authentication module 503, for if it is determined that the type of user fingerprints is adult fingerprint, then the adult fingerprint of use to be corresponding
Fingerprint authentication method carry out authentication;
Second authentication module 504, for if it is determined that the type of user fingerprints is children's fingerprint, then using children's fingerprint correspondence
Fingerprint authentication method carry out authentication.
Further, determining module 502 includes:
First judging unit, for judging the width of ridge and valley than whether being greater than predetermined width ratio;
First determination unit, for if more than, it is determined that the user fingerprints are children's fingerprints;
Second determination unit, if for being not more than, it is determined that the user fingerprints are adult fingerprints.
Further, the first authentication module 503 includes:
First extraction unit for extracting multiple characteristic points of the user fingerprints, and determines each characteristic point in the use
Position in the fingerprint of family;
Second judgment unit judges position of this feature point in the user fingerprints for executing for each characteristic point
Whether less than the first pre-determined distance at a distance from the characteristic point that pre-saves is between the position in its fingerprint;If pre- less than first
If distance, it is determined that this feature point successful match;If being not less than first pre-determined distance, it is determined that the matching of this feature point is lost
It loses;
Third judging unit, for judge in the user fingerprints quantity of the characteristic point of successful match in the user
Whether the ratio of the quantity for the characteristic point extracted in fingerprint is greater than the first default ratio;
Third determination unit, for if more than the first default ratio, it is determined that authentication success;
4th determination unit, if for being not more than the first default ratio, it is determined that authentication failure.
Further, the second authentication module 504 includes:
Second extraction unit for extracting the characteristic point of the user fingerprints, and determines that each characteristic point refers in the user
Position in line;
4th judging unit, for for each characteristic point judge position of this feature point in the user fingerprints and in advance
Whether distance of the characteristic point of preservation between the position in its fingerprint be less than the second pre-determined distance;Wherein, the second pre-determined distance
Greater than the first pre-determined distance;
5th determination unit, if for less than the second pre-determined distance, it is determined that this feature point successful match;
5th judging unit, for judge in the user fingerprints quantity of the characteristic point of successful match in the user
Whether the ratio of the quantity for the characteristic point extracted in fingerprint is greater than the second default ratio;Wherein, the second default ratio is less than first
Default ratio;
6th determination unit, for if more than the second default ratio, it is determined that authentication success;
7th determination unit, if for being not more than the second default ratio, it is determined that authentication failure.
Further, the second authentication module 504 includes:
8th determination unit, for determining the pantograph ratio extracted between the user fingerprints and the fingerprint to be matched prestored
Example;
Unit for scaling, for being zoomed in and out according to the determining scaling to the user fingerprints;
Identity authenticating unit is tested for carrying out identity with the fingerprint to be matched prestored according to the user fingerprints after scaling
Card.
Further, corresponding device further include:
First receiving module, include for receiving the fingerprint typing request of terminal transmission, in fingerprint typing request to
The type of typing fingerprint;Wherein, the type refers to adult fingerprint or children's fingerprint;
First acquisition module acquires fingerprint for requesting according to the fingerprint typing;
Extraction module, the characteristic point of the fingerprint for extracting acquisition;
Memory module, the fingerprint of characteristic point, acquisition for that will extract and the corresponding storage of the type of the fingerprint.
Further, corresponding device further include:
Request module is requested for the first acquisition module according to the fingerprint typing, before acquiring fingerprint, issues administrator
The request of typing fingerprint;
Second acquisition module for acquiring the fingerprint of typing, and determines that the fingerprint of typing is the fingerprint of the administrator prestored.
Further, corresponding device further include:
Second receiving module, the finger print information management for receiving terminal transmission request and execute operation;Wherein, the pipe
It include the management behaviour of user identifier and corresponding finger print information that user selects at the fingerprint management interface of terminal in reason request
Make.
Based on identical inventive concept, the embodiment of the present application also provides a kind of finger prints processing devices.As shown in fig. 6, should
Device includes:
First display module 601, for showing fingerprint pattern set interface;
First generation module 602, the type for being inputted according to user in the fingerprint pattern set interface generate fingerprint
Typing request;Wherein, the type refers to adult fingerprint or children's fingerprint;
First sending module 603, for the fingerprint typing request of generation to be sent to Fingerprint Lock.
Further, corresponding device further include:
Link block, for being attached by close range communication techniques and Fingerprint Lock.
Further, corresponding device further include:
Second display module includes the finger print information of at least one user for showing fingerprint management interface, in the interface;
Second generation module generates finger print information management and asks for the operation according to user at the fingerprint management interface
It asks;Wherein, in the management request include user identifier and corresponding fingerprint that user selects at the fingerprint management interface
The management of information operates;
Second sending module is executed for finger print information management request to be sent to Fingerprint Lock.
After describing the finger prints processing method and device of the application illustrative embodiments, next, introducing basis
The computing device of the another exemplary embodiment of the application.
Person of ordinary skill in the field it is understood that the various aspects of the application can be implemented as system, method or
Program product.Therefore, the various aspects of the application can be with specific implementation is as follows, it may be assumed that complete hardware embodiment, complete
The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here
Referred to as circuit, " module " or " system ".
In some possible embodiments, according to an embodiment of the present application, computing device can include at least at least one
A processor and at least one processor.Wherein, memory is stored with program code, when program code is executed by processor
When, so that processor executes the finger prints processing method according to the various illustrative embodiments of the application of this specification foregoing description
In step 401-404.
The computing device 70 of this embodiment according to the application is described referring to Fig. 7.The calculating dress that Fig. 7 is shown
Setting 70 is only an example, should not function to the embodiment of the present application and use scope bring any restrictions.The computing device
Such as can be mobile phone, tablet computer etc..
As shown in fig. 7, computing device 70 is showed in the form of general-purpose calculating appts.The component of computing device 70 may include
But it is not limited to: at least one above-mentioned processor 71, above-mentioned at least one processor 72, (including the storage of the different system components of connection
Device 72 and processor 71) bus 73.
Bus 711 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,
Peripheral bus, processor or the local bus using any bus structures in a variety of bus structures.
Memory 72 may include the readable medium of form of volatile memory, such as random access memory (RAM) 721
And/or cache memory 722, it can further include read-only memory (ROM) 723.
Memory 72 can also include program/utility 725 with one group of (at least one) program module 724, this
The program module 724 of sample includes but is not limited to: operating system, one or more application program, other program modules and journey
It may include the realization of network environment in ordinal number evidence, each of these examples or certain combination.
Computing device 70 can also be communicated with one or more external equipments 74 (such as sensing equipment etc.), can also be with one
Or it is multiple enable a user to the equipment interacted with computing device 70 communication, and/or with enable the computing device 70 and one
Or any equipment (such as router, modem etc.) communication that a number of other computing devices are communicated.This communication can
To be carried out by input/output (I/O) interface 75.Also, computing device 70 can also by network adapter 76 and one or
The multiple networks of person (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown,
Network adapter 76 is communicated by bus 73 with other modules for computing device 70.It will be appreciated that though be not shown in the figure,
Other hardware and/or software module can be used in conjunction with computing device 70, including but not limited to: microcode, device driver, superfluous
Remaining processor, external disk drive array, RAID system, tape drive and data backup storage system etc..
In some possible embodiments, the various aspects of finger prints processing method provided by the present application are also implemented as
A kind of form of program product comprising program code, when program product is run on a computing device, program code is used for
Computer equipment is set to execute the finger prints processing method according to the various illustrative embodiments of the application of this specification foregoing description
In step, execute step 401-404 as shown in Figure 4.
Program product can be using any combination of one or more readable mediums.Readable medium can be readable signal Jie
Matter or readable storage medium storing program for executing.Readable storage medium storing program for executing for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, infrared
The system of line or semiconductor, device or device, or any above combination.The more specific example of readable storage medium storing program for executing is (non-
The list of exhaustion) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM),
Read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, the read-only storage of portable compact disc
Device (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The finger prints processing method of the application embodiment can be using portable compact disc read only memory (CD-ROM) simultaneously
Including program code, and can run on the computing device.However, the program product of the application is without being limited thereto, in this document,
Readable storage medium storing program for executing can be any tangible medium for including or store program, which can be commanded execution system, device
Either device use or in connection.
Readable signal medium may include in a base band or as the data-signal that carrier wave a part is propagated, wherein carrying
Readable program code.The data-signal of this propagation can take various forms, including --- but being not limited to --- electromagnetism letter
Number, optical signal or above-mentioned any appropriate combination.Readable signal medium can also be other than readable storage medium storing program for executing it is any can
Read medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or
Program in connection.
The program code for including on readable medium can transmit with any suitable medium, including --- but being not limited to ---
Wirelessly, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the application operation program
Code, programming language include object oriented program language-Java, C++ etc., further include conventional process
Formula programming language-such as " C " language or similar programming language.Program code can be calculated fully in user
It executes on device, partly execute on a user device, executing, as an independent software package partially in user's computing device
Upper part executes on remote computing device or executes on remote computing device or server completely.It is being related to remotely counting
In the situation for calculating device, remote computing device can pass through the network of any kind --- including local area network (LAN) or wide area network
(WAN)-it is connected to user's computing device, or, it may be connected to external computing device (such as provided using Internet service
Quotient is connected by internet).
It should be noted that although being referred to several unit or sub-units of device in the above detailed description, this stroke
It point is only exemplary not enforceable.In fact, according to presently filed embodiment, it is above-described two or more
The feature and function of unit can embody in a unit.Conversely, the feature and function of an above-described unit can
It is to be embodied by multiple units with further division.
In addition, although in the accompanying drawings sequentially to describe the operation of the application method, this does not require that or implies
These operations must be sequentially executed according to this, or have to carry out operation shown in whole and be just able to achieve desired result.It is attached
Add ground or it is alternatively possible to omit certain steps, multiple steps are merged into a step and are executed, and/or by a step point
Solution is execution of multiple steps.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with side
In the computer-readable memory of formula work, so that it includes instruction dress that instruction stored in the computer readable memory, which generates,
The manufacture set, the command device are realized in one box of one or more flows of the flowchart and/or block diagram or multiple
The function of being specified in box.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications can be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application
Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
Claims (15)
1. a kind of finger prints processing method, which is characterized in that the described method includes:
User fingerprints are obtained, and extract ridge and the respective width in valley in the user fingerprints;
According to the ridge and the respective width in valley, the type of the user fingerprints is determined;
If it is determined that the type of user fingerprints is adult fingerprint, then identity is carried out using the corresponding fingerprint authentication method of adult fingerprint and tested
Card;
If it is determined that the type of user fingerprints is children's fingerprint, then identity is carried out using the corresponding fingerprint authentication method of children's fingerprint and tested
Card.
2. determining institute the method according to claim 1, wherein described according to the ridge and the respective width in valley
The type for stating user fingerprints, specifically includes:
Judge whether the width ratio in ridge and valley is greater than predetermined width ratio;
If more than, it is determined that the user fingerprints are children's fingerprints;
If being not more than, it is determined that the user fingerprints are adult fingerprints.
3. the method according to claim 1, wherein described if it is determined that being adult fingerprint, then using adult fingerprint
Corresponding fingerprint authentication method carries out authentication, specifically includes:
Multiple characteristic points of the user fingerprints are extracted, and determine position of each characteristic point in the user fingerprints;
It is executed for each characteristic point, judges position of this feature point in the user fingerprints with the characteristic point that pre-saves at it
Whether the distance between position in fingerprint is less than the first pre-determined distance;If less than the first pre-determined distance, it is determined that this feature point
Successful match;If being not less than first pre-determined distance, it is determined that it fails to match for this feature point;
Judge the quantity of the characteristic point of successful match in the user fingerprints and the characteristic point extracted in the user fingerprints
Whether the ratio of quantity is greater than the first default ratio;
If more than the first default ratio, it is determined that authentication success;
If being not more than the first default ratio, it is determined that authentication failure.
4. according to the method described in claim 3, it is characterized in that, described if it is determined that being children's fingerprint, then using children's fingerprint
Corresponding fingerprint authentication method carries out authentication, specifically includes:
The characteristic point of the user fingerprints is extracted, and determines position of each characteristic point in the user fingerprints;
It is executed for each characteristic point:
Judge this feature point in the position in the user fingerprints and the characteristic point pre-saved between the position in its fingerprint
Distance whether less than the second pre-determined distance;Wherein, the second pre-determined distance is greater than the first pre-determined distance;
If less than the second pre-determined distance, it is determined that this feature point successful match;
Judge the quantity of the characteristic point of successful match in the user fingerprints and the characteristic point extracted in the user fingerprints
Whether the ratio of quantity is greater than the second default ratio;Wherein, the second default ratio is less than the first default ratio;
If more than the second default ratio, it is determined that authentication success;
If being not more than the second default ratio, it is determined that authentication failure.
5. the method according to claim 1, wherein described if it is determined that being children's fingerprint, then using children's fingerprint
Corresponding fingerprint authentication method carries out authentication, specifically includes:
Determine the scaling extracted between the user fingerprints and the fingerprint to be matched prestored;
The user fingerprints are zoomed in and out according to the determining scaling;
Authentication is carried out with the fingerprint to be matched prestored according to the user fingerprints after scaling.
6. the method according to claim 1, wherein the method also includes:
The fingerprint typing request that terminal is sent is received, includes the type of fingerprint to be logged in the fingerprint typing request;Wherein, should
Type refers to adult fingerprint or children's fingerprint;
It is requested according to the fingerprint typing, acquires fingerprint;
Extract the characteristic point of the fingerprint of acquisition;
By the corresponding storage of the type of the characteristic point of extraction, the fingerprint of acquisition and the fingerprint.
7. according to the method described in claim 6, it is characterized in that, it is described according to the fingerprint typing request, acquisition fingerprint it
Before, the method also includes:
Issue the request of administrator's typing fingerprint;
The fingerprint of typing is acquired, and determines that the fingerprint of typing is the fingerprint of the administrator prestored.
8. the method according to claim 1, wherein the method also includes:
The finger print information management that terminal is sent is received to request and execute operation;It wherein, include user at end in the management request
The user identifier of the fingerprint management interface selection at end and the management operation of corresponding finger print information.
9. a kind of finger prints processing method, which is characterized in that the described method includes:
Show fingerprint pattern set interface;
According to the type that user inputs in the fingerprint pattern set interface, fingerprint typing request is generated;Wherein, the type refers into
People's fingerprint or children's fingerprint;
The fingerprint typing request of generation is sent to Fingerprint Lock.
10. according to the method described in claim 9, it is characterized in that, the method also includes:
It is attached by close range communication techniques and Fingerprint Lock.
11. method according to claim 9 or 10, which is characterized in that the method also includes:
It shows fingerprint management interface, includes the finger print information of at least one user in the interface;
Operation according to user at the fingerprint management interface generates finger print information management request;Wherein, in the management request
Management operation including user identifier and corresponding finger print information that user selects at the fingerprint management interface;
Finger print information management request is sent to Fingerprint Lock to execute.
12. a kind of finger prints processing device, which is characterized in that described device includes:
Module is obtained, for obtaining user fingerprints, and extracts ridge and the respective width in valley in the user fingerprints;
Determining module, for determining the type of the user fingerprints according to the ridge and the respective width in valley;
First authentication module, for if it is determined that the type of user fingerprints is adult fingerprint, then using the corresponding fingerprint of adult fingerprint
Verification method carries out authentication;
Second authentication module, for if it is determined that the type of user fingerprints is children's fingerprint, then using the corresponding fingerprint of children's fingerprint
Verification method carries out authentication.
13. a kind of finger prints processing device, which is characterized in that described device includes:
First display module, for showing fingerprint pattern set interface;
First generation module, the type for being inputted according to user in the fingerprint pattern set interface generate fingerprint typing and ask
It asks;Wherein, the type refers to adult fingerprint or children's fingerprint;
First sending module, for the fingerprint typing request of generation to be sent to Fingerprint Lock.
14. a kind of computer-readable medium, is stored with computer executable instructions, which is characterized in that the computer is executable
Instruction is for executing the method as described in any claim in claim 1-11.
15. a kind of computing device characterized by comprising
At least one processor;And the memory being connect at least one described processor communication;Wherein, the memory is deposited
The instruction that can be executed by least one described processor is contained, described instruction is executed by least one described processor, so that institute
It states at least one processor and is able to carry out method as described in any claim in claim 1-11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910120503.5A CN109948316A (en) | 2019-02-18 | 2019-02-18 | Fingerprint processing method and device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910120503.5A CN109948316A (en) | 2019-02-18 | 2019-02-18 | Fingerprint processing method and device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109948316A true CN109948316A (en) | 2019-06-28 |
Family
ID=67006747
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910120503.5A Pending CN109948316A (en) | 2019-02-18 | 2019-02-18 | Fingerprint processing method and device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109948316A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110851811A (en) * | 2019-11-15 | 2020-02-28 | 美的集团股份有限公司 | Method and device for preventing misoperation of equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104660719A (en) * | 2015-03-20 | 2015-05-27 | 云丁网络技术(北京)有限公司 | Electronic lock system and intelligent management achieving implementation method thereof |
CN106599666A (en) * | 2016-12-21 | 2017-04-26 | 北京小米移动软件有限公司 | Method and device for starting child mode |
CN107016546A (en) * | 2017-03-31 | 2017-08-04 | 上海族蚂信息科技有限公司 | A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism |
US20170365147A1 (en) * | 2016-06-15 | 2017-12-21 | Amanda Pence | Fingerprint reader child tracking system |
CN108683947A (en) * | 2018-03-22 | 2018-10-19 | 江苏大丰和顺电子有限公司 | A kind of television set fingerprint power control and control method |
-
2019
- 2019-02-18 CN CN201910120503.5A patent/CN109948316A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104660719A (en) * | 2015-03-20 | 2015-05-27 | 云丁网络技术(北京)有限公司 | Electronic lock system and intelligent management achieving implementation method thereof |
US20170365147A1 (en) * | 2016-06-15 | 2017-12-21 | Amanda Pence | Fingerprint reader child tracking system |
CN106599666A (en) * | 2016-12-21 | 2017-04-26 | 北京小米移动软件有限公司 | Method and device for starting child mode |
CN107016546A (en) * | 2017-03-31 | 2017-08-04 | 上海族蚂信息科技有限公司 | A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism |
CN108683947A (en) * | 2018-03-22 | 2018-10-19 | 江苏大丰和顺电子有限公司 | A kind of television set fingerprint power control and control method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110851811A (en) * | 2019-11-15 | 2020-02-28 | 美的集团股份有限公司 | Method and device for preventing misoperation of equipment |
CN110851811B (en) * | 2019-11-15 | 2022-02-15 | 美的集团股份有限公司 | Method and device for preventing misoperation of equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104639517B (en) | The method and apparatus for carrying out authentication using human body biological characteristics | |
EP2339496A1 (en) | System and method of biometric authentication using multiple kinds of templates | |
US10878071B2 (en) | Biometric authentication anomaly detection | |
CN106372483A (en) | Information verification method and system | |
CN106713370B (en) | A kind of identity identifying method, server and mobile terminal | |
CN105141427B (en) | A kind of login authentication method, apparatus and system based on Application on Voiceprint Recognition | |
CN105450407A (en) | Identity authentication method and device | |
CN104751038A (en) | Identity authentication method, device and system | |
CN105447927B (en) | Control method, access controller and the access control system that gate inhibition's electric lock is opened | |
CN108877813A (en) | The methods, devices and systems of man-machine identification | |
CN105187412B (en) | A kind of login authentication method based on gesture identification, apparatus and system | |
CN110009776A (en) | A kind of identity identifying method and device | |
CN109887187A (en) | A kind of pickup processing method, device, equipment and storage medium | |
CN110266738A (en) | Identification authentication method and device based on multi-biological characteristic | |
CN108596110A (en) | Image-recognizing method and device, electronic equipment, storage medium | |
CN105809023A (en) | Password verification method and device | |
CN108596752A (en) | Password remapping method, system, self-aided terminal and computer readable storage medium | |
CN110119746A (en) | A kind of characteristic recognition method and device, computer readable storage medium | |
US8260060B2 (en) | Comparison method, comparison system, computer, and program | |
CN109948316A (en) | Fingerprint processing method and device and storage medium | |
CN103986689A (en) | The login verification method of the test system | |
CN113704106A (en) | Off-line detection system, method, equipment and medium for automobile digital key | |
US20210028938A1 (en) | Enrollment device and method of facilitating enrollment of a biometric template | |
CN107615299A (en) | For assessing the method and system of fingerprint template | |
JP6349062B2 (en) | Authentication system, client terminal, authentication server, terminal program, and server program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190628 |
|
RJ01 | Rejection of invention patent application after publication |