Biological feature recognition method and system
A biometric identification and biometric technology, applied in the direction of biometric identification, multiple biometric identification, character and pattern recognition, etc., can solve the problems of increased system burden, increased system consumption, and misidentification, so as to reduce the burden and reduce the The effect of consuming and increasing the speed of comparison
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] figure 1 It is a flow chart of the biometric identification method of Embodiment 1.
[0032] Such as figure 1 As shown, the biometric identification method of this embodiment includes: collecting communication signals sent by the mobile terminal; identifying the user ID corresponding to the mobile terminal through the communication signal; judging whether the user ID is in the sub-database; If the user ID is in the sub-library, send the user’s biological characteristics to the sub-database for comparison and identification; if the user ID is not in the sub-database, then send the user’s biological characteristics to the general library Compare and identify. There is a unique user ID within each communication signal.
[0033] Wherein, the general database stores user information including user IDs and user biometric features; the sub-database stores the user information extracted from the general database according to preset conditions.
[0034] Specifically, the bio...
Embodiment 2
[0040] image 3 It is a flow chart of the biometric identification method of Embodiment 2.
[0041] Such as figure 2As shown, the biometric identification method of this embodiment differs from that of Embodiment 1 in that the sub-base includes a plurality of time sub-identification libraries divided according to time periods, and the sending of the biometric feature of the user to the The step of comparing and identifying the sub-base includes: obtaining the time period during which the user ID corresponding to the mobile terminal is identified through the communication signal; judging whether the user ID exists in the time sub-identification library corresponding to the time period; if If it exists, send the biometric feature of the user to the sub-database for identification; if it does not exist, send the biometric feature of the user to the sub-bank for identification.
[0042] Preferably, if it does not exist, after sending the biometric feature of the user to the sub...
Embodiment 3
[0045] Figure 4 It is a flow chart of the biometric identification method of Embodiment 3.
[0046] Such as Figure 4 As shown, the biometric identification method of this embodiment differs from that of Embodiment 1 in that the sub-base includes multiple sub-identification sub-bases divided by regions, and the biometrics of the user are sent to the The sub-library comparison and identification step includes: obtaining the area where the user ID corresponding to the mobile terminal is identified through the communication signal; judging whether the user ID exists in the area sub-identification library corresponding to the area; The biometric feature of the user is sent to the regional sub-recognition database for identification; if it does not exist, the biometric feature of the user is sent to the sub-database for identification.
[0047] Preferably, if it does not exist, after sending the user's biometric feature to the sub-database for identification, it also includes: i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


