Light-operated access control system based on cellphone fingerprint identification
A fingerprint identification and mobile phone technology, applied in the field of light control access control system, can solve the problems of hidden safety hazards, information loss, etc., and achieve the effects of easy portability and use, improved security, and improved user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] see figure 2 , is a schematic diagram of a light-controlled access control system based on mobile phone fingerprint recognition provided in Embodiment 2 of the present invention. Compared with Embodiment 1, the mobile phone 11 also includes:
[0037] The encryption unit 21 is connected to the data processing unit 11b and the optical signal transmitting unit 11c at both ends, and is used to encrypt the digital information converted by the data processing unit 11b.
[0038] Correspondingly, the light-controlled door lock 12 also includes:
[0039] The decryption unit 22 is connected to the receiving unit 12a and the verification unit 12b at both ends, and is used to decrypt the digital information extracted by the receiving unit 12a.
[0040] Compared with Implementation 1, this embodiment encrypts and decrypts digital information during transmission, which further improves the security of fingerprint verification.
[0041] see image 3 , is a schematic diagram of a l...
Embodiment 3
[0045] see Figure 4 , which is a schematic diagram of a light-controlled access control system based on mobile phone fingerprint recognition provided in Embodiment 4 of the present invention. Compared with Embodiment 3, it also includes:
[0046] The storage unit 41 is used for storing the fingerprint information of the user. The storage unit 41 may be a programmable read-only memory, an erasable programmable read-only memory or a flash memory. The fingerprint information can be directly written by the manufacturer or written by the user. The fingerprint information can be written in binary or other computer programming languages such as assembly language and high-level language that are easy to identify. In this embodiment, for the convenience of reading, the fingerprint information is written in a high-level computer language.
[0047] The feature comparison unit 42 is used to obtain the feature value of the fingerprint information scanned by the fingerprint collection...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 