Intelligent fingerprint security and protection system
A security system and fingerprint technology, applied in the directions of instruments, character and pattern recognition, cleaning methods and utensils, etc., can solve the problems of intrusion, fingerprint placement system loopholes, fingerprint reader single fingerprint reading device, etc., to protect information security. , The effect of protecting personal and property safety and preventing fingerprint information from being stolen
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] Example 1: See Figure 1-3 , an intelligent fingerprint security system, comprising:
[0026] Fingerprint reader: used to collect fingerprint information, verify the fingerprint information, and give the verification result;
[0027] Fingerprint eraser: used to erase fingerprint traces on the fingerprint reader after each fingerprint recognition;
[0028] Alarm: It is used to send an alarm message when the fingerprint verification fails for many times;
[0029] Camera: used to collect the screen information of the current area;
[0030] Electronic switch: used to control the opening and closing of the electronic lock;
[0031] CPU: for comprehensive signal processing;
[0032] The CPU is respectively connected with a fingerprint reader, a fingerprint eraser, an alarm, a camera and an electronic switch. There is also a memory connected to the CPU: it is used to store valid fingerprint information as a standard for later fingerprint verification. A wireless communic...
Embodiment 2
[0034] Embodiment 2. On the basis of Embodiment 1, the CPU is also connected with a power supply module for power supply. The power supply module includes a step-down rectification module, a voltage stabilizer, a relay J and a storage battery E, and the input terminal of the step-down rectification module Connect to 220V AC, the output terminal of the step-down rectifier module is respectively connected to the capacitor C1, the CPU and the input terminal of the voltage regulator, the output terminal of the voltage regulator is connected to the fixed terminal 1 of the contact of the relay J, and the movable terminal of the contact of the relay J The terminal is connected to the voltage output terminal U1, and the fixed terminal 2 of the contact of the relay J is connected to the backup power supply E1. After the 220V mains passes through the step-down rectifier module, the output DC voltage is filtered by the capacitor and then added to the voltage stabilizer, and the output of t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


