Help seeking method based on fingerprint identification

A fingerprint identification and fingerprint technology, applied in the field of communication, can solve the problems of malicious operation, inconvenient operation, cumbersome steps, etc., and achieve the effect of ensuring safety, facilitating rescue, improving efficiency and possibility

Inactive Publication Date: 2016-05-11
THUNDERSOFT
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing mobile terminals can only ask for help by making calls, sending messages, or using the information transmission function on the mobile terminal. These help-seeking requires a series of operations on the mobile terminal, the steps are cumbersome, and it is inconvenient to operate in a concealed situation. Cause misoperation and malicious operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Help seeking method based on fingerprint identification
  • Help seeking method based on fingerprint identification
  • Help seeking method based on fingerprint identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] like figure 1 As shown, it is a schematic flowchart of a fingerprint identification-based help-seeking method provided in an embodiment of the present invention, which is applied to a mobile terminal, and the method includes:

[0038] S101. Detect whether the fingerprint identification is successful; if yes, execute S102; otherwise, execute S103.

[0039] In this example, the fingerprint identification sensor built in the mobile terminal is used to detect whether the fingerprint information input by the user matches the preset fingerprint information, and if they match, the identification of the user is successful.

[0040] S102. Detect whether the duration of fingerprint sensing is greater than or equal to a specified duration threshold; if yes, execute S104; otherwise, execute S103.

[0041] In this example, after the fingerprint identification is successful, the application measures the duration of the fingerprint sensing to realize the covert operation and ask for ...

Embodiment 2

[0059] like figure 2 As shown, it is a schematic flowchart of a fingerprint identification-based help-seeking method provided in an embodiment of the present invention, which is applied to a mobile terminal, and the method includes:

[0060] S201. Detect whether the fingerprint recognition is successful; if yes, execute S202; otherwise, execute S203.

[0061] In this example, the fingerprint identification sensor built in the mobile terminal is used to detect whether the fingerprint information input by the user matches the preset fingerprint information, and if they match, the identification of the user is successful.

[0062] S202, detecting whether the frequency of continuous fingerprint sensing and / or the duration of each continuous sensing is greater than or equal to a specified duration threshold; if yes, execute S204, otherwise, execute S203.

[0063] In this example, after the fingerprint identification is successful, continue to detect the frequency of the continuou...

Embodiment 3

[0066] like image 3 As shown, it is a schematic flowchart of a fingerprint identification-based help-seeking method provided in an embodiment of the present invention, which is applied to a mobile terminal, and the method includes:

[0067] S301. Detect whether the fingerprint identification is successful; if yes, execute S302; otherwise, execute S303.

[0068] In this example, the fingerprint identification sensor built in the mobile terminal detects whether the first fingerprint information input by the user matches the preset first fingerprint information, and if they match, the identification of the user is successful. At the same time, the mobile terminal sends out a vibration prompt to prompt the user to input the second fingerprint information.

[0069] S302. Detect whether the second fingerprint information matches the preset second fingerprint information; if yes, execute S304; otherwise, execute S303.

[0070] In this example, after the fingerprint identification ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a help seeking method based on fingerprint identification. The help seeking method is applied to a mobile terminal and comprises steps as follows: A, fingerprint identification is performed; B, when a fingerprint input manner is determined to be matched with a preset manner, a help seeking message is sent. Thus, help seeking is performed in a secret help seeking manner, the help seeking safety of a user is guaranteed, and meanwhile, misoperation and malicious operation during secret operation are avoided.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for seeking help based on fingerprint identification. Background technique [0002] Today's mobile terminals have been widely used, how to make them perform better, effective and meaningful functions is the direction that mobile terminal developers have been pursuing. If an individual encounters a dangerous situation, such as a robbery in a bank, or a personal hijacking, etc., how can the dangerous situation be reported to the police and relatives and friends. In most cases, it is necessary to seek help in a covert way, otherwise it will make the user's situation more dangerous. Existing mobile terminals can only ask for help by making calls, sending messages, or using the information transmission function on the mobile terminal. These help-seeking requires a series of operations on the mobile terminal, the steps are cumbersome, and it is inconvenient to operate in a concealed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/0484G06F21/32
CPCG06F3/0484G06F21/32
Inventor 吴春阳王四军
Owner THUNDERSOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products