CN107403317A - A kind of stored value card information sharing method and its system - Google Patents
A kind of stored value card information sharing method and its system Download PDFInfo
- Publication number
- CN107403317A CN107403317A CN201710501595.2A CN201710501595A CN107403317A CN 107403317 A CN107403317 A CN 107403317A CN 201710501595 A CN201710501595 A CN 201710501595A CN 107403317 A CN107403317 A CN 107403317A
- Authority
- CN
- China
- Prior art keywords
- stored value
- value card
- point
- user
- characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides a kind of stored value card sharing method and its system based on security mechanism.Businessman issues stored value card, and purchase card user is registered and buys stored value card.Stored value card is not limited to purchase card user consumption and payment.The purchase card user of stored value card can specify its stored value card to be used to shared object, and the shared object can be relatives user, can also be strange user.Meanwhile in order to ensure the safety for all users for using stored value card consumption and payment, it is proposed the above and shares the supporting authentication of stored value card, fingerprint collecting and fingerprint matching of the authentication based on high security.The stored value card sharing method and its system allow a stored value card to share use for multiple user security.
Description
Field
The present invention relates to a kind of stored value card information sharing method and its system, more particularly to a kind of storage for having security mechanism
It is worth card sharing method and its system.
Background technology
In today's society, the existing occupation mode of stored value card product is:Consumer prestores necessarily to stored-value-card issuance enterprise
The amount of money obtain stored value card, and obtain discount or the gift that businessman specifies, the remaining sum in stored value card is available for subsequent consumption.Such storage
Value card product has obtained the generally receiving of in the market businessman and consumer, national stored value card sales scale retail firm in 2016
Industry is just up to more than 7,000 hundred million yuan.But due to the fact that the sales volume of stored value card keeps falling in recent years, consumer is to traditional Stored Value
The acceptance of card product also constantly declines:
1. entity stored value card is inconvenient for use:Traditional entity card carries trouble, and hair fastener, the equipment cost for testing card are higher,
Puzzlement is all brought to businessman and user.
2. traditional stored value card only can holder's use:Purchase card people must just can be used with card or the identity of oneself, can not
Easily lend and consumed to friend relatives.On the one hand be because, businessman can not effective and safe identification card people and holder it
Between relation, be because can not easily settlement fund between user and holder on the other hand.
3. stored value card price is difficult:Small amount stored value card is prone to sell, but too fast due to consuming, sharp to caused by businessman
Profit loss is very big;Wholesale stored value card improves the positive effect managed to businessman, but often beyond the psychological threshold of consumer, it is difficult to
Sell.
The key to solve the above problems is the use limitation for breaking stored value card using the technology for sharing economy, makes purchase
People and user need not be same people, and can be automatically performed the checking of trade company side, and between purchase card people and user
Capital settlement.In this way, loyal user can be excited to have a mind to stored value card of the purchase compared with wholesale, and greet friends to carry out businessman and disappear
Take, so as to reach the win-win of businessman, member, non-members.Meanwhile shared economy faces safety issue, for example, if purchase
The stored value card of people is usurped by other people, it will is produced larger economic loss to purchaser, while is seriously undermined consumer to stored value card
The confidence of consumption pattern.Therefore, matingly, it is necessary to have a set of security mechanism to support the realization of shared stored value card.
The content of the invention
The present invention realizes a kind of stored value card sharing method and its system for having security authentication mechanism, solves prior art
In stored value card use limitation, and the safety issue that shared stored value card faces.
The present invention realizes a kind of stored value card sharing method based on security mechanism and a kind of Stored Value based on security mechanism
Card shared system, it includes
Step 1000, businessman sets the stored value card of distribution, the stored value card parameter of setting is including extremely by stored value card enterprises end
Few stored value card kind of information, buy amount information, give one kind in amount information, discount information and combinations thereof and or more ginseng
Number;
Step 2000, card user is purchased in its stored value card logged in client, and stored value card is specified and shares to other users;
Other users are notified in a manner of short message or wechat, and are the corresponding attached stored value card of other users generation;Purchase card user passes through storage
Value card passes through attached stored value card, the remaining sum of the shared stored value card with other users;
Step 3000, the stored value card client that other users log at it, shared Stored Value is used based on attached rechargeable card
Card is consumed;
Step 4000, after other customer consumptions, businessman will be seen that stored value card is consumed, so as to allow other users to complete to hand over
Easily;
Data in all of above step are stored in stored value card Platform Server with each step by network.
Alternatively, above method and system may also include:
Stored value card enterprises end, stored value card client include running in the form of App softwares or wechat on mobile terminals.
Alternatively, above method and system may also include:
Step 4000 is specially:
Other customer consumptions include:The actual payment of discount that other users enjoy according to shared stored value card, Payment Amount lead to
Cross stored value card Platform Server and directly transfer accounts and pass through stored value card Platform Server to the account of purchase card user, purchase card user stored value card
The payment of the denomination payments such as realization, the purchase card user account include at least following a kind of:Bank card account, wechat change account, branch
Pay precious account;
Businessman will be seen that stored value card is consumed to be included so as to allow other users to complete transaction:Businessman sees purchase card user storage
Value card is consumed with sharing mode, and completes to merchandise;Purchase card user, other users, businessman will receive short message or wechat mode
Transaction successfully record;If any one link mistake in other customer consumptions, payment consumption process prompt rollback to business
Family, other users, purchase card user, are failed based on shared stored value card transactions.
Alternatively, above method and system may also include:
Other users include:Kith and kin user;
In step 2000, in addition to
It is the attached stored value card of kith and kin to generate corresponding attached Stored Value Card Type for kith and kin user.
Alternatively, above method and system may also include:
Other users include:Stranger user;
Purchase card user can be turned on and off stranger's users to share pattern at any time;
In step 2000, in addition to:
It is strange attached stored value card to generate corresponding attached Stored Value Card Type for strange user.
Alternatively, above method and system may also include:
In step 2000, stored value card is specified before sharing to other users, including sub-step 2200, carry out purchase card user
Authentication;
And and/or
In step 3000, before being consumed based on attached rechargeable card by shared stored value card, including sub-step
3200, carry out other authenticating user identifications.
Alternatively, above method and system may also include:Wherein authentication includes:
S5100, authentication user interface is shown to user;
S5200, stored value card client gather the user by fingerprint collecting processing module FingerprintCollector
Fingerprint,;
S5300, stored value card client carry out feature extraction to the user fingerprints, obtain fingerprint characteristic value FA;
S5400, stored value card client are digitally signed to the fingerprint characteristic value FA of the user;
S5500, stored value card client are established with stored value card Platform Server and communicate to connect and send certification request;
S5510, the user identifies IDA using the private key PriKeyUser encryption users of user oneself and realizes signature, by this
The signature of user sends certification request to stored value card Platform Server, wherein;The use that stored value card Platform Server passes through preservation
The public key at family, the signature is verified to obtain the mark IDA of the user;
S5520, stored value card Platform Server produces time limit TAServer, current data NA, by stored value card Platform Server
Public key PubKeyServer, current data NA and the time limit TAServer of itself, encrypted with the public key PubKeyUser of the user
The user of stored value card client is returned to afterwards;
S5530, the user of stored value card client receive the public key PubKeyServer of stored value card Platform Server, showed
When data NA and time limit TAServer, by the above-mentioned fingerprint characteristic value FA of acquisition, tuple { TAServer, NA, FA } is used Stored Value
Stored value card Platform Server is sent to after the public key PubKeyServer encryptions of card Platform Server;
S5600, stored value card Platform Server carry out fingerprint matching using fingerprint matching module FingerprintMatch;
S5700, stored value card Platform Server is to stored value card client return authentication result.
Alternatively, above method and system may also include:Wherein fingerprint collecting processing module
FingerprintCollector, including:
S7100, fingerprint image acquisition;
S7200, fingerprint image preprocessing, including the normalization of S7210 fingerprint images, S7220 Fingerprint enhancements,
S7230 fingerprint images refine, the fingerprint image ProcessedFingerprintImage after return processing;
S7300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S7300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized carefully
The direction of node, tk(k=1,2) is characterized the classification of minutiae point, i.e. k=1 is end points, k=2 is bifurcation;The direction of end points
It is the direction of crestal line trend where it, the direction of bifurcation is the folder in three crestal lines where the point between other two crestal lines
Angle is all the opposite direction of the crestal line at obtuse angle, is defined as (0≤θ<2π);Fingerprint image is after binaryzation, refinement, each pixel
Gray scale be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using
3 × 3 templates are come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2,
P3, P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these phases
When adjoint point meets formula below, it is possible to judge P classification:
If meet formula (5.1), then pixel P is end points;If meet formula (5.2), then pixel P is
Bifurcation;Judge rear and mark the classification of the pixel, scanning is tracked to the pixel not being labeled, always
Untill all minutiae features have detected;Then by the row, column coordinate where the pixel P in fingerprint image labeled as thin
The position coordinates (x, y) of node diagnostic, the origin using the starting point of image upper left angular direction as coordinate system, it is to the right the pros of x-axis
To downward is the positive direction of y-axis;
Pixel P eight neighborhood encodes --- and each pixel of refined image only needs 1bit, by pixel P eight neighborhood picture
Element is according to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is compiled by this byte representation
Code formula be:
NpShare 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1,
Have 8
Kind combination, i.e. NpIn there are 8 kinds of values to represent that pixel P are end points;For bifurcation, there are 3 in its eight neighborhood mutually
Disjunct pixel is 1, then NpIn there are 12 kinds of values to be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds can
Energy property, defines Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding Dp
With complement code D'pRelation be:
……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table that the category table based on eight neighborhood coding is 256 × 1, illustrate pixel P
Eight neighborhood coding and its classification between corresponding relation, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 are
Bifurcation;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents 8 kinds of tracking directions of advance and row, column increment of coordinate
Between relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, between the direction for representing 8 kinds of neighborhood codings and the subsequent point of tracking
Relation, first be classified as eight neighborhood coding, second is classified as direction encoding;
Bifurcation direction table --- it is 12 × 4 tables, represents that the eight neighborhood of 12 kinds of bifurcations encodes and three track sides
Relation between, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, average distances of the λ between streakline, takes λ=6, in extraction minutiae feature
During direction, with the coordinate (x, y) of the point for start position, using the direction searched in the direction table corresponding to the point as starting point side
To being then tracked according to the coding track algorithm of eight neighborhood to streakline.For end points direction, end points (x is located at0,y0) place
The coordinate that Ridge following terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0-
Y))……(5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be by formula
(5.5) 3 directions are obtained, then calculate the angle between direction two-by-two, with the streakline that two other streakline angle is obtuse angle
Opposite direction is exactly the direction of the bifurcation.Result after tracking terminates is placed in a characteristic vector table, wherein characteristic vector shape
Formula is D (x, y, θ, tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S7310, eight neighborhood coding is carried out after fingerprint image refinement and obtains coding and category table, direction and increment of coordinate
Table, end points direction table, bifurcation direction table;
S7320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S7330, judge whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S7340 preserves the coordinate of current pixel point, according to search direction and increment of coordinate table renewal coordinate parameters;S7350
According to current eight neighborhood coding lookup direction and category table, end points or bifurcation are determined whether;
S7360, if it is determined that whether being end points or bifurcation result is no, then seek direction complement code renewal direction encoding;
S7370, step-length add 1;Return to step S7330;
If it is determined that reach set step-length be it is yes,
S7380, the coding track algorithm of Finger print characteristic abstract terminate;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics
Value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing
Finger print informations of the ProcessedFingerprintImage as collection.
Alternatively, above method and system may also include:Wherein fingerprint matching module FingerprintMatch includes:
S9100, select any two characteristic point in template fingerprint image and input fingerprint image as a reference point right;If
All possible reference point was investigated, and went to step S9500;
S9200, will be every in the characteristic point series of template fingerprint image and input fingerprint image using formula (S9200-6)
Individual characteristic point corresponds to respective reference point and is converted into polar coordinates;
S9300, according to the incremental order of polar angle, arrange the characteristic point series of template fingerprint image and input fingerprint image
Characteristic point series;
S9400, the characteristic point series of matching template fingerprint image and the characteristic point of input fingerprint image are serial in sequence
In each characteristic point;A framing mask is selected first around the characteristic point of template fingerprint image, framing mask size is by formula
(S9400-1) determine, if the characteristic point for having same type in fingerprint image is inputted is located in framing mask, and the input refers to
The direction difference of the characteristic point of characteristic point and the template fingerprint image in print image is in threshold range set in advance, then it is assumed that
The two Feature Points Matchings, and will matching score value S increases by 1;Finish, go to if all characteristic points have all been investigated in template
S9100;
S9500, from all fixed reference feature point centerings, maximum matching score value S is found out, and as template fingerprint figure
The matching fraction of picture and input fingerprint image;If the matching fraction is more than threshold value, then it is assumed that input fingerprint comes with template fingerprint
From same finger;
Wherein, in S9100 select characteristic point it is as a reference point to including:
A characteristic point on fingerprint image is represented with P (x, y, d, t);Wherein x, y formula rectangular co-ordinate value;D is characteristic point
Direction, when rotating counterclockwise angle increase, scope 0 to 359;T is feature vertex type, is worth and represents that this feature point is streakline for 1
End points, it is worth and represents that characteristic point is streakline bifurcation for 2;
In template fingerprint characteristics of image dot pattern characteristic vector set and input fingerprint image characteristics dot pattern in feature to
Duration set is expressed as
P={ pi|p1,p2,……,pMFormula (S9100-1)
Q={ qj|q1,q2,……,qNFormula (S9100-2)
In formula, P is template fingerprint characteristics of image point set, including M characteristic point, these characteristic points p1,p2,……,pM
Represent;Q is to input fingerprint image characteristics point set, including N number of characteristic point, these characteristic points q1,q2,……,qNRepresent, one
As for M ≠ N;
Template fingerprint image is subjected to characteristic point series with the characteristic point in input fingerprint image directly as reference point
Matching;The each pair characteristic point inputted in fingerprint image and template fingerprint image is all probably fixed reference feature point pair;Altogether form have M ×
N is to fixed reference feature point;
Wherein, the reference point in S9200 is converted into polar coordinates and included:
Fixed reference feature point is determined to afterwards, by template fingerprint image characteristic point in formula (S9100-1) and formula (S9100-2)
The coordinate transformation of set and each characteristic point in input fingerprint image characteristics point set is polar coordinates;It is assumed that template fingerprint image
Characteristic point pi(xi,yi,di,ti) and input fingerprint image characteristics point qr(xr,yr,dr,tr) it is reference point;In gathering input
Each characteristic point qj(xj,yj,dj,tj) according to formula (S9200-6) progress coordinate transform;Q is used under polar coordinatesj(rj,θj,αj,
tj) represent a characteristic point:
θj=arctan [(yj-yr)/(xj-xr)]+di-dr(S9200-6)
αj=dj-dr(S9200-6)
tj=tj(S9200-6)
In formula, rjFor polar diameter, θjFor polar angle, αjFor the direction of characteristic point under polar coordinate system, tjIt is characterized type a little;di-
drBe template characteristic point and input feature vector point direction it is poor;
Wherein, the framing mask in S9400 can be identified below:
Radius=ri n/mFormula (S9400-1)
Wherein in formula, n, m are pre-defined integer, take m to be more than n.
Beneficial effects of the present invention:
Referring to Fig. 1, the meaning of this patent is using economic technology is shared, and has transformed traditional stored value card production with overturning formula
The flow that uses and market of product so that purchase card people needs not be same person with user, and encourages self passing for purchase card user
Broadcast and effectively collected with Stored Value advance fund funding, so as to the stored value card for solving traditional is difficult to fix a price, be difficult to sell, be worth it is opaque
Problem so that businessman, purchase block people, can benefited simultaneously in many ways with card kith and kin, strange consumer.Solves shared stored value card simultaneously
The safety problem faced so that user and businessman are without the security concern for shared model.
Effective operation for reducing businessman is promoted cost by the use of this patent, while improves sale and the marketing effect of stored value card
Fruit.This patent provide one it is complete, can automatic operating techniqueflow scheme and computer program logic code, not only
It can be used for creating complete set and brand-new stored value card product platform, can also be with existing stored value card/IT management systems pair
Connect, new service is provided in original interface.
Brief description of the drawings
Fig. 1 is the comparison diagram of beneficial effects of the present invention and prior art.
Fig. 2 be in the present invention businessman to share stored value card parameter setting schematic diagram.
Fig. 3 is that interface display schematic diagram when card user sets shared object is purchased in the present invention.
Fig. 4 is that the display interface when stored value card of kith and kin's users to share purchase card user in the present invention carries out consumption and payment is illustrated
Figure.
Fig. 5 is that the display interface when stored value card of strange users to share purchase card user in the present invention carries out consumption and payment is illustrated
Figure.
Fig. 6 is the block schematic illustration of the shared stored value card plateform system based on security mechanism in the present invention.
Fig. 7 is shared stored value card method and the system flow schematic diagram based on security mechanism in the present invention.
Embodiment
Stored value card in the present invention is a kind of consumption certificate of user in merchant registration, and the voucher can correspond to a physics
Entity card, can also no entity card correspond to one virtual " electronic card ".Based on the consumption certificate, user can
On the consumption certificate, the amount of money and/or enjoy discount by prestoring, the form such as refund afterwards is even first consumed as credit card, so
Consumed and paid in businessman afterwards.Shared stored value card refers to above consumption certificate, not only can by purchase card people carry out consumption and
Pay, can also be consumed and be paid by other users such as kith and kin, stranger.The present invention will by corresponding security mechanism come
The safety of all users of shared stored value card more than ensureing.
First, the role in method and system and its relation:
Following role is comprised at least in the method and its system of the present invention:Businessman (also known as businessman enterprise, enterprise), purchase card are used
Family (also known as purchase card people), kith and kin user (also known as kith and kin, friend), strange user (also known as stranger).
Purchase card user, kith and kin user, strange user can use the stored value card client for example operated on mobile terminal;
Businessman can use the stored value card enterprises end for example operated on mobile terminal or other computing devices;Stored-value card data, transaction
The data of the inventive method such as data, security information, personal information, company information and its system can stored up by network storage
It is worth in card Platform Server.
Optimal enforcement example is these are only, those skilled in the art know, the present invention can be not limited to above client, enterprise
End, the mode of stored value card Platform Server are realized.
1st, businessman, which customizes, issues sharable stored value card
Businessman can install stored value card enterprises end (for example, App in the mobile terminal (for example, mobile phone, pad etc.) of oneself
Or wechat form etc.), and the personal information of registered trader, and security information (for example, fingerprint etc.) needed for user authentication or
Industrial and commercial license of person enterprise etc..
Businessman enterprise can carry out parameter design when issuing stored value card according to the business circumstance of itself, and in day-to-day operations
Adjust at any time.The necessary information related to stored value card technology of sharing includes but is not limited to:Stored value card kind of information, purchase amount of money letter
Cease, give one kind in amount information, discount information, the term of validity, shared model, negotiable number, closing cost and combinations thereof
And/or more parameters (referring to Fig. 2).
2nd, purchase card people sets shared object
Purchase card people can in the mobile terminal (for example, mobile phone, pad etc.) of oneself installation stored value card client (for example,
App or wechat form etc.), and the personal information of oneself is registered, and the security information needed for user authentication is (for example, fingerprint
Deng).
Purchase card people, which can specify stored value card in the stored value card client of oneself, shares to some friends, stored value card platform clothes
Business device will notify these users in a manner of short message or wechat automatically, and generate attached stored value card for them.All main cards and attached
The remaining sum of the shared purchase card people of category card (referring to Fig. 3).
3. purchase card people and kith and kin are consumed using stored value card, enjoy privileges
Similarly, the kith and kin or friend for itself not possessing the purchase card people of above stored value card can be in the mobile terminals of oneself
Installation stored value card client (for example, App or wechat form etc.) in (for example, mobile phone, pad etc.), and register the personal letter of oneself
Breath, and the security information (for example, fingerprint etc.) needed for user authentication.
Purchase card people can be used directly oneself stored value card remaining sum and discount consumed;Kith and kin can also be used be shared it is attached
Category card is consumed, and businessman will be seen that corresponding main card is consumed after consumption, so as to allow kith and kin to complete transaction.
Referring to Fig. 4, if the shared model of supplement card is charging mode, kith and kin are stilled need according to Stored Value when consumption
The actual payment of the discount of card, Payment Amount will directly be transferred accounts to purchase by stored value card Platform Server blocks the cash account of people, such as
Bank card account, wechat change account, Alipay remaining sum etc..For blocking people at this point for purchase, the capital equivalent to purchase card passes through
Other people borrow mode and return, directly reduce the risk of the occupation of capital;For kith and kin, it must be enjoyed equivalent to devoid of risk
By the special preferential treatment of stored value card, material benefit has been obtained.
Example is these are only, the consumption that kith and kin, friend borrow stored value card can be not limited to above form, can be according to Stored Value
Setting during Ka Kaika is more flexibly and various.
4. stranger borrows stored value card consumption
Similarly, the stranger for itself not possessing above stored value card can be in the mobile terminal of oneself (for example, mobile phone, pad
Deng) in installation stored value card client (for example, App or wechat form etc.), and register the personal information of oneself, and user authentication
Required security information (for example, fingerprint etc.).
Purchase card people also allows for stranger to borrow the shared stored value card of oneself.Now, stranger will be directly according to stored value card
The stranger of Platform Server setting shares discount and paid the bill, and Payment Amount will directly be transferred accounts by stored value card Platform Server
Block people to purchase, and corresponding consumption fund is deducted in the Stored Value remaining sum that stored value card Platform Server will block people from purchase, and carried to businessman
For checking message to complete to merchandise.At this point for purchase block people for, equivalent to purchase card capital other people borrow by way of and
Return, not only directly reduce the risk of the occupation of capital, it is also possible to obtain the income of premium;For stranger, quite
Special preferential treatment has been enjoyed in calm strategical vantage point, has obtained material benefit.Example is these are only, the consumption that stranger borrows stored value card can not
It is limited to above form, setting when card can be opened according to stored value card is more flexibly and various.
Purchase card people can at any time open, close stranger's shared model.
5. businessman receives corresponding transaction message and Information Statistics
In said process, when either purchase card, purchase block people's consumption, kith and kin's consumption, stranger's consumption, businessman can receive phase
The transaction message answered, so as to complete to judge in real time.Businessman can also check the sale of stored value card at any time in stored value card enterprises end
With service condition statistical analysis, further optimized and revised so as to help itself to carry out relevant parameter.
2nd, the realization of method and system
In order to ensure the identity security of user, purchase card user, kith and kin user, strange user are both needed in stored value card client
Registration gathers the authentication information of oneself, such as fingerprint etc..Authentication information will be stored in stored value card Platform Server
In database, for each authentication.
As shown in fig. 6, in order to realize above role --- between purchase card user, kith and kin user, strange user, businessman ---
The consumption and payment of shared stored value card is carried out, whole stored value card shared system can take system framework chart exemplary in Fig. 6
Reach.
(1) stored value card client
Stored value card client, for example used by purchase card user, kith and kin user, strange user oneself on mobile terminal,
It can include authenticating user identification module, fingerprint collecting processing module, stored value card setup module, stored value card consumption module etc..
Authenticating user identification module is used for such as user's registration, login, security and differentiated.Fingerprint collecting processing module is used for
Authenticating user identification module is assisted to gather and match the functions such as fingerprint.
Stored value card setup module, in purchase card user in use, which user can for example be set as shared stored value card
Object (for example, kith and kin user, strange user), and whether open strange user model etc.;In other users (for example, kith and kin
User, strange user) in use, can check whether active user oneself enjoys the stored value card of the unlatching of some stored value card user
Shared access right.
Stored value card consumption module, purchase card user in use, can direct consumption and payment, the stored value card can also be inquired about
All consumer records;It is that can share the remaining sum and/or folding of purchase card user stored value card in kith and kin user, strange user's use
Button, is consumed, can also inquire about all consumer records for oneself sharing other people stored value cards.
(2) stored value card enterprises end
Stored value card enterprises end, there are businessman or enterprise for example to be used in the computing device of oneself on mobile terminal, it can be with
Including authenticating user identification module, fingerprint collecting processing module, stored value card setup module, stored value card statistical module etc..
Authenticating user identification module, fingerprint collecting processing module, similar to the respective modules in stored value card client modules
Function, the functions such as businessman's user's registration, login, security discriminating, fingerprint collecting, matching can be carried out.
Stored value card setup module, the function that can have include:Businessman set the type of stored value card oneself issued, quantity,
The information such as parameter.Wherein parameter information can be found in the example in Fig. 2, but not limited to this.
Stored value card statistical module, the function that can have include:Businessman inquires about the actual issuing amount of stored value card, real-time consumption
Payment record, history consumption and payment record, statistics consumption and payment record.Any of the above consumption and payment record can be based on it is various
Querying condition is inquired about or statistical analysis --- for example for it is every stored value card, for a period of time, for a species
The consumption of the shared object of certain type of stored value card stored value card, for the one section time of type etc. --- above only
Can be the various consumption statistic information that those skilled in the art imagine, so as to contribute to businessman to stored value card for example
Management condition, prospect make summary and prediction.
(3) stored value card Platform Server
Stored value card Platform Server, communicated by network with stored value card client, stored value card enterprises end, it stores the Stored Value
All data messages and security information of card plateform system.Data above information, security information can include but is not limited to, business
Family's information, purchase card user information, kith and kin's user profile, strange user profile, Stored Value card information, stored value card share information, Stored Value
Card Transaction Information, secure authenticated information, finger print information etc., these are only example, can be with not limited to this.
System frame structure based on foregoing exemplary, the present invention can realize following method and system.
As shown in fig. 7, the present invention realizes a kind of stored value card sharing method based on security mechanism and one kind based on safety
The stored value card shared system of mechanism, it includes
Step 1000, businessman sets the stored value card of distribution, the stored value card parameter of setting is including extremely by stored value card enterprises end
Few stored value card kind of information, buy amount information, give one kind in amount information, discount information and combinations thereof and or more ginseng
Number;
Step 2000, card user is purchased in its stored value card logged in client, and stored value card is specified and shares to other users;
Other users are notified in a manner of short message or wechat, and are the corresponding attached stored value card of other users generation;Purchase card user passes through storage
Value card passes through attached stored value card, the remaining sum of the shared stored value card with other users;
Step 3000, the stored value card client that other users log at it, shared Stored Value is used based on attached rechargeable card
Card is consumed;
Step 4000, after other customer consumptions, businessman will be seen that stored value card is consumed, so as to allow other users to complete to hand over
Easily;
Data in all of above step are stored in stored value card Platform Server with each step by network.
Alternatively, above method and system may also include:
Stored value card enterprises end, stored value card client include running in the form of App softwares or wechat on mobile terminals.
Alternatively, above method and system may also include:
Step 4000 is specially:
Other customer consumptions include:The actual payment of discount that other users enjoy according to shared stored value card, Payment Amount lead to
Cross stored value card Platform Server and directly transfer accounts and pass through stored value card Platform Server to the account of purchase card user, purchase card user stored value card
The payment of the denomination payments such as realization, the purchase card user account include at least following a kind of:Bank card account, wechat change account, branch
Pay precious account;
Businessman will be seen that stored value card is consumed to be included so as to allow other users to complete transaction:Businessman sees purchase card user storage
Value card is consumed with sharing mode, and completes to merchandise;Purchase card user, other users, businessman will receive short message or wechat mode
Transaction successfully record;If any one link mistake in other customer consumptions, payment consumption process prompt rollback to business
Family, other users, purchase card user, are failed based on shared stored value card transactions.
Alternatively, above method and system may also include:
Other users include:Kith and kin user;
In step 2000, in addition to
It is the attached stored value card of kith and kin to generate corresponding attached Stored Value Card Type for kith and kin user.
Alternatively, above method and system may also include:
Other users include:Stranger user;
Purchase card user can be turned on and off stranger's users to share pattern at any time;
In step 2000, in addition to:
It is strange attached stored value card to generate corresponding attached Stored Value Card Type for strange user.
Alternatively, above method and system may also include:
In step 2000, stored value card is specified before sharing to other users, including sub-step 2200, carry out purchase card user
Authentication;
And and/or
In step 3000, before being consumed based on attached rechargeable card by shared stored value card, including sub-step
3200, carry out other authenticating user identifications.
Alternatively, above method and system may also include:Wherein authentication includes:
S5100, authentication user interface is shown to user;
S5200, stored value card client gather the user by fingerprint collecting processing module FingerprintCollector
Fingerprint,;
S5300, stored value card client carry out feature extraction to the user fingerprints, obtain fingerprint characteristic value FA;
S5400, stored value card client are digitally signed to the fingerprint characteristic value FA of the user;
S5500, stored value card client are established with stored value card Platform Server and communicate to connect and send certification request;
S5510, the user identifies IDA using the private key PriKeyUser encryption users of user oneself and realizes signature, by this
The signature of user sends certification request to stored value card Platform Server, wherein;The use that stored value card Platform Server passes through preservation
The public key at family, the signature is verified to obtain the mark IDA of the user;
S5520, stored value card Platform Server produces time limit TAServer, current data NA, by stored value card Platform Server
Public key PubKeyServer, current data NA and the time limit TAServer of itself, encrypted with the public key PubKeyUser of the user
The user of stored value card client is returned to afterwards;
S5530, the user of stored value card client receive the public key PubKeyServer of stored value card Platform Server, showed
When data NA and time limit TAServer, by the above-mentioned fingerprint characteristic value FA of acquisition, tuple { TAServer, NA, FA } is used Stored Value
Stored value card Platform Server is sent to after the public key PubKeyServer encryptions of card Platform Server;
S5600, stored value card Platform Server carry out fingerprint matching using fingerprint matching module FingerprintMatch;
S5700, stored value card Platform Server is to stored value card client return authentication result.
Alternatively, above method and system may also include:Wherein fingerprint collecting processing module
FingerprintCollector, including:
S7100, fingerprint image acquisition;
S7200, fingerprint image preprocessing, including the normalization of S7210 fingerprint images, S7220 Fingerprint enhancements,
S7230 fingerprint images refine, the fingerprint image ProcessedFingerprintImage after return processing;
S7300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S7300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized carefully
The direction of node, tk(k=1,2) is characterized the classification of minutiae point, i.e. k=1 is end points, k=2 is bifurcation;The direction of end points
It is the direction of crestal line trend where it, the direction of bifurcation is the folder in three crestal lines where the point between other two crestal lines
Angle is all the opposite direction of the crestal line at obtuse angle, is defined as (0≤θ<2π);Fingerprint image is after binaryzation, refinement, each pixel
Gray scale be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using
3 × 3 templates are come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2,
P3, P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these phases
When adjoint point meets formula below, it is possible to judge P classification:
If meet formula (5.1), then pixel P is end points;If meet formula (5.2), then pixel P is
Bifurcation;Judge rear and mark the classification of the pixel, scanning is tracked to the pixel not being labeled, always
Untill all minutiae features have detected;Then by the row, column coordinate where the pixel P in fingerprint image labeled as thin
The position coordinates (x, y) of node diagnostic, the origin using the starting point of image upper left angular direction as coordinate system, it is to the right the pros of x-axis
To downward is the positive direction of y-axis;
Pixel P eight neighborhood encodes --- and each pixel of refined image only needs 1bit, by pixel P eight neighborhood picture
Element is according to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is compiled by this byte representation
Code formula be:
NpShare 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1,
There are 8 kinds of combinations, i.e. NpIn there are 8 kinds of values to represent that pixel P are end points;For bifurcation, there are 3 to be mutually not attached in its eight neighborhood
Pixel be 1, then NpIn there are 12 kinds of values to be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds can
Energy property, defines Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding Dp
With complement code D'pRelation be:
……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table that the category table based on eight neighborhood coding is 256 × 1, illustrate pixel P
Eight neighborhood coding and its classification between corresponding relation, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 are
Bifurcation;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents 8 kinds of tracking directions of advance and row, column increment of coordinate
Between relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, between the direction for representing 8 kinds of neighborhood codings and the subsequent point of tracking
Relation, first be classified as eight neighborhood coding, second is classified as direction encoding;
Bifurcation direction table --- it is 12 × 4 tables, represents that the eight neighborhood of 12 kinds of bifurcations encodes and three track sides
Relation between, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, average distances of the λ between streakline, takes λ=6, in extraction minutiae feature
During direction, with the coordinate (x, y) of the point for start position, using the direction searched in the direction table corresponding to the point as starting point side
To being then tracked according to the coding track algorithm of eight neighborhood to streakline.For end points direction, end points (x is located at0,y0) place
The coordinate that Ridge following terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0-
Y))……(5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be by formula
(5.5) 3 directions are obtained, then calculate the angle between direction two-by-two, with the streakline that two other streakline angle is obtuse angle
Opposite direction is exactly the direction of the bifurcation.Result after tracking terminates is placed in a characteristic vector table, wherein characteristic vector shape
Formula is D (x, y, θ, tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S7310, eight neighborhood coding is carried out after fingerprint image refinement and obtains coding and category table, direction and increment of coordinate
Table, end points direction table, bifurcation direction table;
S7320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S7330, judge whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S7340 preserves the coordinate of current pixel point, according to search direction and increment of coordinate table renewal coordinate parameters;S7350
According to current eight neighborhood coding lookup direction and category table, end points or bifurcation are determined whether;
S7360, if it is determined that whether being end points or bifurcation result is no, then seek direction complement code renewal direction encoding;
S7370, step-length add 1;Return to step S7330;
If it is determined that reach set step-length be it is yes,
S7380, the coding track algorithm of Finger print characteristic abstract terminate;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics
Value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing
Finger print informations of the ProcessedFingerprintImage as collection.
Alternatively, above method and system may also include:Wherein fingerprint matching module FingerprintMatch includes:
S9100, select any two characteristic point in template fingerprint image and input fingerprint image as a reference point right;If
All possible reference point was investigated, and went to step S9500;
S9200, will be every in the characteristic point series of template fingerprint image and input fingerprint image using formula (S9200-6)
Individual characteristic point corresponds to respective reference point and is converted into polar coordinates;
S9300, according to the incremental order of polar angle, arrange the characteristic point series of template fingerprint image and input fingerprint image
Characteristic point series;
S9400, the characteristic point series of matching template fingerprint image and the characteristic point of input fingerprint image are serial in sequence
In each characteristic point;A framing mask is selected first around the characteristic point of template fingerprint image, framing mask size is by formula
(S9400-1) determine, if the characteristic point for having same type in fingerprint image is inputted is located in framing mask, and the input refers to
The direction difference of the characteristic point of characteristic point and the template fingerprint image in print image is in threshold range set in advance, then it is assumed that
The two Feature Points Matchings, and will matching score value S increases by 1;Finish, go to if all characteristic points have all been investigated in template
S9100;
S9500, from all fixed reference feature point centerings, maximum matching score value S is found out, and as template fingerprint figure
The matching fraction of picture and input fingerprint image;If the matching fraction is more than threshold value, then it is assumed that input fingerprint comes with template fingerprint
From same finger;
Wherein, in S9100 select characteristic point it is as a reference point to including:
A characteristic point on fingerprint image is represented with P (x, y, d, t);Wherein x, y formula rectangular co-ordinate value;D is characteristic point
Direction, when rotating counterclockwise angle increase, scope 0 to 359;T is feature vertex type, is worth and represents that this feature point is streakline for 1
End points, it is worth and represents that characteristic point is streakline bifurcation for 2;
In template fingerprint characteristics of image dot pattern characteristic vector set and input fingerprint image characteristics dot pattern in feature to
Duration set is expressed as
P={ pi|p1,p2,……,pMFormula (S9100-1)
Q={ qj|q1,q2,……,qNFormula (S9100-2)
In formula, P is template fingerprint characteristics of image point set, including M characteristic point, these characteristic points p1,p2,……,pM
Represent;Q is to input fingerprint image characteristics point set, including N number of characteristic point, these characteristic points q1,q2,……,qNRepresent, one
As for M ≠ N;
Template fingerprint image is subjected to characteristic point series with the characteristic point in input fingerprint image directly as reference point
Matching;The each pair characteristic point inputted in fingerprint image and template fingerprint image is all probably fixed reference feature point pair;Altogether form have M ×
N is to fixed reference feature point;
Wherein, the reference point in S9200 is converted into polar coordinates and included:
Fixed reference feature point is determined to afterwards, by template fingerprint image characteristic point in formula (S9100-1) and formula (S9100-2)
The coordinate transformation of set and each characteristic point in input fingerprint image characteristics point set is polar coordinates;It is assumed that template fingerprint image
Characteristic point pi(xi,yi,di,ti) and input fingerprint image characteristics point qr(xr,yr,dr,tr) it is reference point;In gathering input
Each characteristic point qj(xj,yj,dj,tj) according to formula (S9200-6) progress coordinate transform;Q is used under polar coordinatesj(rj,θj,αj,
tj) represent a characteristic point:
θj=arctan [(yj-yr)/(xj-xr)]+di-dr(S9200-6)
αj=dj-dr(S9200-6)
tj=tj(S9200-6)
In formula, rjFor polar diameter, θjFor polar angle, αjFor the direction of characteristic point under polar coordinate system, tjIt is characterized type a little;di-
drBe template characteristic point and input feature vector point direction it is poor;
Wherein, the framing mask in S9400 can be identified below:
Radius=ri n/mFormula (S9400-1)
Wherein in formula, n, m are pre-defined integer, take m to be more than n.
Certainly, the present invention also has many other embodiments, can root in the case of without prejudice to spirit of the invention and its essence
Various corresponding changes and deformation are made according to the present invention.
Although previous description and accompanying drawing describes the preferred embodiments of the present invention, but it is understood that:This is not being departed from
In the case of the spirit of invention, various additional, modifications can be produced herein and are replaced.Those of ordinary skill in the art will be apparent that:
Do not depart from the present invention spirit or essential characteristics in the case of, can with other special shapes, structure, arrangement, ratio and
The present invention is realized using other elements, material and part.Those skilled in the art will recognize:The present invention can use hair
The bright structure used in practice, arrangement, ratio, material and part and other many modifications, these modifications are not departing from this
Particular surroundings and operational requirements are particularly adapted in the case of the principle of invention.Therefore, presently disclosed embodiment is all
Aspect should be understood limitation illustrative rather than to its claimed scope.It is all the spirit and principles in the present invention it
It is interior, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.
Claims (18)
1. a kind of stored value card sharing method based on security mechanism, it includes:
Step 1000, businessman sets the stored value card of distribution, the stored value card parameter of setting is including at least storing up by stored value card enterprises end
Value card type category information, buy amount information, give one kind in amount information, discount information and combinations thereof and/or more parameters;
Step 2000, card user is purchased in its stored value card logged in client, and stored value card is specified and shares to other users;With short
Letter or wechat mode notify other users, and are the corresponding attached stored value card of other users generation;Purchase card user passes through stored value card
Pass through attached stored value card, the remaining sum of the shared stored value card with other users;
Step 3000, the stored value card client that other users log at it, sticked into based on attached rechargeable card using shared Stored Value
Row consumption;
Step 4000, after other customer consumptions, businessman will be seen that stored value card is consumed, so as to allow other users to complete transaction;
Data in all of above step are stored in stored value card Platform Server with each step by network.
2. the method as described in claim 1, it also includes:
Stored value card enterprises end, stored value card client include running in the form of App softwares or wechat on mobile terminals.
3. the method as described in claim 1, it also includes:
Step 4000 is specially:
Other customer consumptions include:The actual payment of discount that other users enjoy according to shared stored value card, Payment Amount pass through storage
Value card Platform Server is directly transferred accounts to the account of purchase card user, purchase card user stored value card and realized by stored value card Platform Server
Deng the payment of denomination payment, the purchase card user account includes at least following a kind of:Bank card account, wechat change account, Alipay
Account;
Businessman will be seen that stored value card is consumed to be included so as to allow other users to complete transaction:Businessman sees purchase card user stored value card
Consumed with sharing mode, and complete to merchandise;Purchase card user, other users, businessman will receive the friendship of short message or wechat mode
Easily successfully record;If any one link mistake in other customer consumptions, payment consumption process by rollback, and prompt businessman,
Other users, purchase card user, are failed based on shared stored value card transactions.
4. the method as described in claim 1, it also includes:
Other users include:Kith and kin user;
In step 2000, in addition to:
It is the attached stored value card of kith and kin to generate corresponding attached Stored Value Card Type for kith and kin user.
5. the method as described in claim 1, it also includes:
Other users include:Stranger user;
Purchase card user can be turned on and off stranger's users to share pattern at any time;
In step 2000, in addition to:
It is strange attached stored value card to generate corresponding attached Stored Value Card Type for strange user.
6. the method as described in claim 1, it also includes:
In step 2000, stored value card is specified before sharing to other users, including sub-step 2200, carry out purchasing card user identity
Certification;
And and/or
In step 3000, before being consumed based on attached rechargeable card by shared stored value card, including sub-step 3200, enter
The other authenticating user identifications of row.
7. method as claimed in claim 6, wherein authentication include:
S5100, authentication user interface is shown to user;
S5200, stored value card client gather the user by fingerprint collecting processing module FingerprintCollector and referred to
Line,;
S5300, stored value card client carry out feature extraction to the user fingerprints, obtain fingerprint characteristic value FA;
S5400, stored value card client are digitally signed to the fingerprint characteristic value FA of the user;
S5500, stored value card client are established with stored value card Platform Server and communicate to connect and send certification request;
S5510, the user identifies IDA using the private key PriKeyUser encryption users of user oneself and realizes signature, by the user
Signature to stored value card Platform Server send certification request, wherein;The user's that stored value card Platform Server passes through preservation
Public key, the signature is verified to obtain the mark IDA of the user;
S5520, stored value card Platform Server produces time limit TAServer, current data NA, by stored value card Platform Server itself
Public key PubKeyServer, current data NA and time limit TAServer, with being returned after the public key PubKeyUser of user encryption
Back to the user of stored value card client;
S5530, the user of stored value card client receive the public key PubKeyServer of stored value card Platform Server, current number
According to NA and time limit TAServer, the above-mentioned fingerprint characteristic value FA of acquisition equals tuple { TAServer, NA, FA } with stored value card
Stored value card Platform Server is sent to after the public key PubKeyServer encryptions of platform server;
S5600, stored value card Platform Server carry out fingerprint matching using fingerprint matching module FingerprintMatch;
S5700, stored value card Platform Server is to stored value card client return authentication result.
8. method as claimed in claim 8, wherein fingerprint collecting processing module FingerprintCollector, including:
S7100, fingerprint image acquisition;
S7200, fingerprint image preprocessing, including the normalization of S7210 fingerprint images, S7220 Fingerprint enhancements, S7230 fingerprints
Image thinning, the fingerprint image ProcessedFingerprintImage after return processing;
S7300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S7300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized minutiae point
Direction, tk(k=1,2) is characterized the classification of minutiae point, i.e. k=1 is end points, k=2 is bifurcation;The direction of end points is it
The direction of place crestal line trend, the direction of bifurcation be angle in three crestal lines where the point between other two crestal lines all
For the opposite direction of the crestal line at obtuse angle, (0≤θ is defined as<2π);Fingerprint image is after binaryzation, refinement, the ash of each pixel
Degree be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using 3 × 3
Template is come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2, P3,
P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these consecutive points
When meeting formula below, it is possible to judge P classification:
If meet formula (5.1), then pixel P is end points;If meet formula (5.2), then pixel P is bifurcated
Point;Judge rear and mark the classification of the pixel, scanning is tracked to the pixel not being labeled, until institute
Untill some minutiae features have detected;Then the row, column coordinate where the pixel P in fingerprint image is labeled as minutiae point
The position coordinates (x, y) of feature, the origin using the starting point of image upper left angular direction as coordinate system, it is to the right the positive direction of x-axis, to
It is the positive direction of y-axis down;
Pixel P eight neighborhood encodes --- and each pixel of refined image only needs 1bit, and pixel P eight neighborhood pixel is pressed
According to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is public by this byte representation, coding
Formula is:
NpShare 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1, there is 8 kinds
Combination, i.e. NpIn there are 8 kinds of values to represent that pixel P are end points;For bifurcation, there are 3 mutual disjunct pictures in its eight neighborhood
Element is 1, then NpIn there are 12 kinds of values to be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds of possibilities,
Define Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding DpAnd benefit
Code D'pRelation be:
……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table that the category table based on eight neighborhood coding is 256 × 1, illustrate the eight of pixel P
Neighborhood encodes the corresponding relation between its classification, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 be bifurcated
Point;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents between 8 kinds of tracking directions of advance and row, column increment of coordinate
Relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, represents the pass between the direction of 8 kinds of neighborhood codings and the subsequent point of tracking
System, first is classified as eight neighborhood coding, and second is classified as direction encoding;
Bifurcation direction table --- be 12 × 4 tables, represent 12 kinds of bifurcations eight neighborhood coding and three tracking directions it
Between relation, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, average distances of the λ between streakline, λ=6 are taken, in the direction of extraction minutiae feature
When, with the coordinate (x, y) of the point for start position, using the direction searched in the direction table corresponding to the point as starting point direction, so
Streakline is tracked according to the coding track algorithm of eight neighborhood afterwards.For end points direction, end points (x is located at0,y0) place streakline
The coordinate that tracking terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0-Y))……
(5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be obtained by formula (5.5)
To 3 directions, the angle between direction two-by-two is then calculated, with the opposite direction of streakline that two other streakline angle is obtuse angle just
It is the direction of the bifurcation.Tracking terminate after result be placed in a characteristic vector table, wherein characteristic vector form be D (x,
y,θ,tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S7310, eight neighborhood coding is carried out after fingerprint image refinement and obtains coding and category table, direction and increment of coordinate table, end
Point direction table, bifurcation direction table;
S7320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S7330, judge whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S7340 preserves the coordinate of current pixel point, according to search direction and increment of coordinate table renewal coordinate parameters;S7350 foundations
Current eight neighborhood coding lookup direction and category table, determine whether end points or bifurcation;S7360, if it is determined that whether be
End points or bifurcation result are no, then seek direction complement code renewal direction encoding;S7370, step-length add 1;Return to step S7330;
If it is determined that reach set step-length be it is yes,
S7380, the coding track algorithm of Finger print characteristic abstract terminate;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing
Finger print informations of the ProcessedFingerprintImage as collection.
9. method as claimed in claim 7, wherein fingerprint matching module FingerprintMatch includes:
S9100, select any two characteristic point in template fingerprint image and input fingerprint image as a reference point right;It is if all
Possible reference point was investigated, and went to step S9500;
S9200, using formula (S9200-6) by template fingerprint image and input fingerprint image characteristic point series in each spy
The corresponding respective reference point of sign point is converted into polar coordinates;
S9300, according to the incremental order of polar angle, arrange the characteristic point series of template fingerprint image and the feature of input fingerprint image
Point series;
S9400, in sequence in the characteristic point series of matching template fingerprint image and the characteristic point series of input fingerprint image
Each characteristic point;A framing mask is selected first around the characteristic point of template fingerprint image, framing mask size is by formula
(S9400-1) determine, if the characteristic point for having same type in fingerprint image is inputted is located in framing mask, and the input refers to
The direction difference of the characteristic point of characteristic point and the template fingerprint image in print image is in threshold range set in advance, then it is assumed that
The two Feature Points Matchings, and will matching score value S increases by 1;Finish, go to if all characteristic points have all been investigated in template
S9100;
S9500, from all fixed reference feature point centerings, find out the matching score value S of maximum, and as template fingerprint image and
Input the matching fraction of fingerprint image;If the matching fraction is more than threshold value, then it is assumed that input fingerprint is with template fingerprint from same
One finger;
Wherein, in S9100 select characteristic point it is as a reference point to including:
A characteristic point on fingerprint image is represented with P (x, y, d, t);Wherein x, y formula rectangular co-ordinate value;D is the side of characteristic point
To angle increase, scope 0 to 359 when rotating counterclockwise;T is feature vertex type, is worth and represents that this feature point is streakline end points for 1,
It is worth and represents that characteristic point is streakline bifurcation for 2;
Characteristic vector set and set of eigenvectors in input fingerprint image characteristics dot pattern in template fingerprint characteristics of image dot pattern
Conjunction is expressed as
P={ pi|p1,p2,……,pMFormula (S9100-1)
Q={ qj|q1,q2,……,qNFormula (S9100-2)
In formula, P is template fingerprint characteristics of image point set, including M characteristic point, these characteristic points p1,p2,……,pMTable
Show;Q is to input fingerprint image characteristics point set, including N number of characteristic point, these characteristic points q1,q2,……,qNRepresent, typically
For M ≠ N;
Template fingerprint image is subjected to characteristic point series with the characteristic point in input fingerprint image directly as reference point
Match somebody with somebody;The each pair characteristic point inputted in fingerprint image and template fingerprint image is all probably fixed reference feature point pair;Forming altogether has M × N
To fixed reference feature point;
Wherein, the reference point in S9200 is converted into polar coordinates and included:
Fixed reference feature point is determined to afterwards, by template fingerprint characteristics of image point set in formula (S9100-1) and formula (S9100-2)
Coordinate transformation with each characteristic point in input fingerprint image characteristics point set is polar coordinates;It is assumed that template fingerprint characteristics of image
Point pi(xi,yi,di,ti) and input fingerprint image characteristics point qr(xr,yr,dr,tr) it is reference point;It is every in gathering input
Individual characteristic point qj(x j,yj,dj,t j) according to formula (S9200-6) progress coordinate transform;Q is used under polar coordinatesj(rj,θj,αj,tj) represent a characteristic point:
θj=arctan [(yj-yr)/(xj-xr)]+di-dr(S9200-6)
αj=dj-dr(S9200-6)
tj=tj(S9200-6)
In formula, rjFor polar diameter, θjFor polar angle, αjFor the direction of characteristic point under polar coordinate system, tjIt is characterized type a little;di-drIt is
The direction of template characteristic point and input feature vector point is poor;
Wherein, the framing mask in S9400 can be identified below:
Radius=ri n/mFormula (S9400-1)
Wherein in formula, n, m are pre-defined integer, take m to be more than n.
10. a kind of stored value card shared system based on security mechanism, the system, which is realized, includes following process:
Step 1000, businessman sets the stored value card of distribution, the stored value card parameter of setting is including at least storing up by stored value card enterprises end
Value card type category information, buy amount information, give one kind in amount information, discount information and combinations thereof and/or more parameters;
Step 2000, card user is purchased in its stored value card logged in client, and stored value card is specified and shares to other users;With short
Letter or wechat mode notify other users, and are the corresponding attached stored value card of other users generation;Purchase card user passes through stored value card
Pass through attached stored value card, the remaining sum of the shared stored value card with other users;
Step 3000, the stored value card client that other users log at it, sticked into based on attached rechargeable card using shared Stored Value
Row consumption;
Step 4000, after other customer consumptions, businessman will be seen that stored value card is consumed, so as to allow other users to complete transaction;
Data in all of above step are stored in stored value card Platform Server with each step by network.
11. system as claimed in claim 10, it also includes:
Stored value card enterprises end, stored value card client include running in the form of App softwares or wechat on mobile terminals.
12. system as claimed in claim 10, it also includes:
Step 4000 is specially:
Other customer consumptions include:The actual payment of discount that other users enjoy according to shared stored value card, Payment Amount pass through storage
Value card Platform Server is directly transferred accounts to the account of purchase card user, purchase card user stored value card and realized by stored value card Platform Server
Deng the payment of denomination payment, the purchase card user account includes at least following a kind of:Bank card account, wechat change account, Alipay
Account;
Businessman will be seen that stored value card is consumed to be included so as to allow other users to complete transaction:Businessman sees purchase card user stored value card
Consumed with sharing mode, and complete to merchandise;Purchase card user, other users, businessman will receive the friendship of short message or wechat mode
Easily successfully record;If any one link mistake in other customer consumptions, payment consumption process by rollback, and prompt businessman,
Other users, purchase card user, are failed based on shared stored value card transactions.
13. system as claimed in claim 10, it also includes:
Other users include:Kith and kin user;
In step 2000, in addition to
It is the attached stored value card of kith and kin to generate corresponding attached Stored Value Card Type for kith and kin user.
14. system as claimed in claim 10, it also includes:
Other users include:Stranger user;
Purchase card user can be turned on and off stranger's users to share pattern at any time;
In step 2000, in addition to:
It is strange attached stored value card to generate corresponding attached Stored Value Card Type for strange user.
15. system as claimed in claim 10, it also includes:
In step 2000, stored value card is specified before sharing to other users, including sub-step 2200, carry out purchasing card user identity
Certification;
And and/or
In step 3000, before being consumed based on attached rechargeable card by shared stored value card, including sub-step 3200, enter
The other authenticating user identifications of row.
16. system as claimed in claim 15, wherein authentication include:
S5100, authentication user interface is shown to user;
S5200, stored value card client gather the user by fingerprint collecting processing module FingerprintCollector and referred to
Line,;
S5300, stored value card client carry out feature extraction to the user fingerprints, obtain fingerprint characteristic value FA;
S5400, stored value card client are digitally signed to the fingerprint characteristic value FA of the user;
S5500, stored value card client are established with stored value card Platform Server and communicate to connect and send certification request;
S5510, the user identifies IDA using the private key PriKeyUser encryption users of user oneself and realizes signature, by the user
Signature to stored value card Platform Server send certification request, wherein;The user's that stored value card Platform Server passes through preservation
Public key, the signature is verified to obtain the mark IDA of the user;
S5520, stored value card Platform Server produces time limit TAServer, current data NA, by stored value card Platform Server itself
Public key PubKeyServer, current data NA and time limit TAServer, with being returned after the public key PubKeyUser of user encryption
Back to the user of stored value card client;
S5530, the user of stored value card client receive the public key PubKeyServer of stored value card Platform Server, current number
According to NA and time limit TAServer, the above-mentioned fingerprint characteristic value FA of acquisition equals tuple { TAServer, NA, FA } with stored value card
Stored value card Platform Server is sent to after the public key PubKeyServer encryptions of platform server;
S5600, stored value card Platform Server carry out fingerprint matching using fingerprint matching module FingerprintMatch;
S5700, stored value card Platform Server is to stored value card client return authentication result.
17. system as claimed in claim 16, wherein fingerprint collecting processing module FingerprintCollector, including:
S7100, fingerprint image acquisition;
S7200, fingerprint image preprocessing, including the normalization of S7210 fingerprint images, S7220 Fingerprint enhancements, S7230 fingerprints
Image thinning, the fingerprint image ProcessedFingerprintImage after return processing;
S7300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S7300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized minutiae point
Direction, tk(k=1,2) is characterized the classification of minutiae point, i.e. k=1 is end points, k=2 is bifurcation;The direction of end points is it
The direction of place crestal line trend, the direction of bifurcation be angle in three crestal lines where the point between other two crestal lines all
For the opposite direction of the crestal line at obtuse angle, (0≤θ is defined as<2π);Fingerprint image is after binaryzation, refinement, the ash of each pixel
Degree be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using 3 × 3
Template is come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2, P3,
P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these consecutive points
When meeting formula below, it is possible to judge P classification:
If meet formula (5.1), then pixel P is end points;If meet formula (5.2), then pixel P is bifurcated
Point;Judge rear and mark the classification of the pixel, scanning is tracked to the pixel not being labeled, until institute
Untill some minutiae features have detected;Then the row, column coordinate where the pixel P in fingerprint image is labeled as minutiae point
The position coordinates (x, y) of feature, the origin using the starting point of image upper left angular direction as coordinate system, it is to the right the positive direction of x-axis, to
It is the positive direction of y-axis down;
Pixel P eight neighborhood encodes --- and each pixel of refined image only needs 1bit, and pixel P eight neighborhood pixel is pressed
According to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is public by this byte representation, coding
Formula is:
NpShare 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1, there is 8 kinds
Combination, i.e. NpIn there are 8 kinds of values to represent that pixel P are end points;For bifurcation, there are 3 mutual disjunct pictures in its eight neighborhood
Element is 1, then NpIn there are 12 kinds of values to be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds of possibilities,
Define Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding DpAnd benefit
Code D'pRelation be:
……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table that the category table based on eight neighborhood coding is 256 × 1, illustrate the eight of pixel P
Neighborhood encodes the corresponding relation between its classification, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 be bifurcated
Point;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents between 8 kinds of tracking directions of advance and row, column increment of coordinate
Relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, represents the pass between the direction of 8 kinds of neighborhood codings and the subsequent point of tracking
System, first is classified as eight neighborhood coding, and second is classified as direction encoding;
Bifurcation direction table --- be 12 × 4 tables, represent 12 kinds of bifurcations eight neighborhood coding and three tracking directions it
Between relation, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, average distances of the λ between streakline, λ=6 are taken, in the direction of extraction minutiae feature
When, with the coordinate (x, y) of the point for start position, using the direction searched in the direction table corresponding to the point as starting point direction, so
Streakline is tracked according to the coding track algorithm of eight neighborhood afterwards.For end points direction, end points (x is located at0,y0) place streakline
The coordinate that tracking terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0-Y))……
(5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be obtained by formula (5.5)
To 3 directions, the angle between direction two-by-two is then calculated, with the opposite direction of streakline that two other streakline angle is obtuse angle just
It is the direction of the bifurcation.Tracking terminate after result be placed in a characteristic vector table, wherein characteristic vector form be D (x,
y,θ,tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S7310, eight neighborhood coding is carried out after fingerprint image refinement and obtains coding and category table, direction and increment of coordinate table, end
Point direction table, bifurcation direction table;
S7320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S7330, judge whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S7340 preserves the coordinate of current pixel point, according to search direction and increment of coordinate table renewal coordinate parameters;S7350 foundations
Current eight neighborhood coding lookup direction and category table, determine whether end points or bifurcation;
S7360, if it is determined that whether being end points or bifurcation result is no, then seek direction complement code renewal direction encoding;
S7370, step-length add 1;Return to step S7330;
If it is determined that reach set step-length be it is yes,
S7380, the coding track algorithm of Finger print characteristic abstract terminate;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing
Finger print informations of the ProcessedFingerprintImage as collection.
18. system as claimed in claim 16, wherein fingerprint matching module FingerprintMatch includes:
S9100, select any two characteristic point in template fingerprint image and input fingerprint image as a reference point right;It is if all
Possible reference point was investigated, and went to step S9500;
S9200, using formula (S9200-6) by template fingerprint image and input fingerprint image characteristic point series in each spy
The corresponding respective reference point of sign point is converted into polar coordinates;
S9300, according to the incremental order of polar angle, arrange the characteristic point series of template fingerprint image and the feature of input fingerprint image
Point series;
S9400, in sequence in the characteristic point series of matching template fingerprint image and the characteristic point series of input fingerprint image
Each characteristic point;A framing mask is selected first around the characteristic point of template fingerprint image, framing mask size is by formula
(S9400-1) determine, if the characteristic point for having same type in fingerprint image is inputted is located in framing mask, and the input refers to
The direction difference of the characteristic point of characteristic point and the template fingerprint image in print image is in threshold range set in advance, then it is assumed that
The two Feature Points Matchings, and will matching score value S increases by 1;Finish, go to if all characteristic points have all been investigated in template
S9100;
S9500, from all fixed reference feature point centerings, find out the matching score value S of maximum, and as template fingerprint image and
Input the matching fraction of fingerprint image;If the matching fraction is more than threshold value, then it is assumed that input fingerprint is with template fingerprint from same
One finger;
Wherein, in S9100 select characteristic point it is as a reference point to including:
A characteristic point on fingerprint image is represented with P (x, y, d, t);Wherein x, y formula rectangular co-ordinate value;D is the side of characteristic point
To angle increase, scope 0 to 359 when rotating counterclockwise;T is feature vertex type, is worth and represents that this feature point is streakline end points for 1,
It is worth and represents that characteristic point is streakline bifurcation for 2;
Characteristic vector set and set of eigenvectors in input fingerprint image characteristics dot pattern in template fingerprint characteristics of image dot pattern
Conjunction is expressed as
P={ pi|p1,p2,……,pMFormula (S9100-1)
Q={ qj|q1,q2,……,qNFormula (S9100-2)
In formula, P is template fingerprint characteristics of image point set, including M characteristic point, these characteristic points p1,p2,……,pMTable
Show;Q is to input fingerprint image characteristics point set, including N number of characteristic point, these characteristic points q1,q2,……,qNRepresent, typically
For M ≠ N;
Template fingerprint image is subjected to characteristic point series with the characteristic point in input fingerprint image directly as reference point
Match somebody with somebody;The each pair characteristic point inputted in fingerprint image and template fingerprint image is all probably fixed reference feature point pair;Forming altogether has M × N
To fixed reference feature point;
Wherein, the reference point in S9200 is converted into polar coordinates and included:
Fixed reference feature point is determined to afterwards, by template fingerprint characteristics of image point set in formula (S9100-1) and formula (S9100-2)
Coordinate transformation with each characteristic point in input fingerprint image characteristics point set is polar coordinates;It is assumed that template fingerprint characteristics of image
Point pi(xi,yi,di,ti) and input fingerprint image characteristics point qr(xr,yr,dr,tr) it is reference point;It is every in gathering input
Individual characteristic point qj(x j,yj,dj,t j) according to formula (S9200-6) progress coordinate transform;Q is used under polar coordinatesj(rj,θj,αj,tj) represent a characteristic point:
θj=arctan [(yj-yr)/(xj-xr)]+di-dr(S9200-6)
αj=dj-dr(S9200-6)
tj=tj(S9200-6)
In formula, rjFor polar diameter, θjFor polar angle, αjFor the direction of characteristic point under polar coordinate system, tjIt is characterized type a little;di-drIt is
The direction of template characteristic point and input feature vector point is poor;
Wherein, the framing mask in S9400 can be identified below:
Radius=ri n/mFormula (S9400-1)
Wherein in formula, n, m are pre-defined integer, take m to be more than n.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710501595.2A CN107403317A (en) | 2017-06-27 | 2017-06-27 | A kind of stored value card information sharing method and its system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710501595.2A CN107403317A (en) | 2017-06-27 | 2017-06-27 | A kind of stored value card information sharing method and its system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107403317A true CN107403317A (en) | 2017-11-28 |
Family
ID=60404477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710501595.2A Pending CN107403317A (en) | 2017-06-27 | 2017-06-27 | A kind of stored value card information sharing method and its system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107403317A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108198032A (en) * | 2018-01-02 | 2018-06-22 | 北京客度科技有限公司 | A kind of management method of shared consumption card |
CN108229961A (en) * | 2018-01-02 | 2018-06-29 | 北京客度科技有限公司 | A kind of shared method that consumption card is shared using other people |
CN108288175A (en) * | 2018-01-02 | 2018-07-17 | 北京客度科技有限公司 | A kind of method of shared consumption card |
CN110517037A (en) * | 2019-08-26 | 2019-11-29 | 咪咕文化科技有限公司 | Electronic value card sharing method and device, electronic equipment and storage medium |
CN113066228A (en) * | 2021-03-29 | 2021-07-02 | 广州广日电梯工业有限公司 | Elevator selling method and elevator selling device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103329154A (en) * | 2010-03-08 | 2013-09-25 | 高通股份有限公司 | System and method for creating and managing a shared stored value account associated with a client device |
CN105207776A (en) * | 2014-06-18 | 2015-12-30 | 中标软件有限公司 | Fingerprint authentication method and system |
CN105869276A (en) * | 2016-06-18 | 2016-08-17 | 任明和 | City intelligent transportation shared payment and identity safety certification method |
CN105939343A (en) * | 2016-04-14 | 2016-09-14 | 江苏马上游科技股份有限公司 | Client and server bidirectional authentication method based on information secondary coding |
US9672512B1 (en) * | 2014-01-02 | 2017-06-06 | Sprint Communications Company L.P. | Processor routing number for mobile communication service provider billing |
-
2017
- 2017-06-27 CN CN201710501595.2A patent/CN107403317A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103329154A (en) * | 2010-03-08 | 2013-09-25 | 高通股份有限公司 | System and method for creating and managing a shared stored value account associated with a client device |
US9672512B1 (en) * | 2014-01-02 | 2017-06-06 | Sprint Communications Company L.P. | Processor routing number for mobile communication service provider billing |
CN105207776A (en) * | 2014-06-18 | 2015-12-30 | 中标软件有限公司 | Fingerprint authentication method and system |
CN105939343A (en) * | 2016-04-14 | 2016-09-14 | 江苏马上游科技股份有限公司 | Client and server bidirectional authentication method based on information secondary coding |
CN105869276A (en) * | 2016-06-18 | 2016-08-17 | 任明和 | City intelligent transportation shared payment and identity safety certification method |
Non-Patent Citations (1)
Title |
---|
车荣禄: ""指纹图像的特征提取与匹配算法研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108198032A (en) * | 2018-01-02 | 2018-06-22 | 北京客度科技有限公司 | A kind of management method of shared consumption card |
CN108229961A (en) * | 2018-01-02 | 2018-06-29 | 北京客度科技有限公司 | A kind of shared method that consumption card is shared using other people |
CN108288175A (en) * | 2018-01-02 | 2018-07-17 | 北京客度科技有限公司 | A kind of method of shared consumption card |
CN110517037A (en) * | 2019-08-26 | 2019-11-29 | 咪咕文化科技有限公司 | Electronic value card sharing method and device, electronic equipment and storage medium |
CN113066228A (en) * | 2021-03-29 | 2021-07-02 | 广州广日电梯工业有限公司 | Elevator selling method and elevator selling device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10521777B2 (en) | Crypto digital currency (virtual payment cards) issued by central bank or other issuer for mobile and wearable devices | |
US11887077B2 (en) | Generating exchange item utilization solutions in an exchange item marketplace network | |
US10521776B2 (en) | UN currency (virtual payment cards) issued by central bank or other issuer for mobile and wearable devices | |
KR102103931B1 (en) | Method and system for managing payment and document computing using identifiable tags and artificial intelligence | |
US11164228B2 (en) | Method and medium for determining exchange item compliance in an exchange item marketplace network | |
CN107403317A (en) | A kind of stored value card information sharing method and its system | |
US20070174208A1 (en) | System and Method for Global Automated Address Verification | |
KR101961899B1 (en) | Method for providing auto-payment service considering exchange rate between virtual and flat money | |
CN103858141A (en) | Payment device with integrated chip | |
KR102173129B1 (en) | System for providing local currency and method thereof | |
CN105164707A (en) | Facilitating mobile device payments using mobile payment account, mobile barcode and universal digital mobile currency | |
WO2018010211A1 (en) | Currency transaction application platform and method | |
JP2000509859A (en) | Apparatus and method for issuing and executing guaranteed securities to prepare for foreign exchange losses | |
CN115605893A (en) | System, apparatus and method for tracking certified clean energy using blockchains | |
KR20190076396A (en) | Surplus energy trading system among energy prosumers using block chain system | |
Serbulova | Fintech as a transformation driver of global financial markets | |
US20230125124A1 (en) | Obtaining conditions data for utilizing an exchange item | |
CN109741051A (en) | A kind of electronic card graphic code realizes the method and system of transaction | |
CN115797060A (en) | Method and device for tracking fund flow direction, electronic equipment and storage medium | |
KR20050111653A (en) | System and method for payment by using picture information of face, information storing medium | |
CN113689215A (en) | Tape quantity purchase settlement method, system, computer equipment and storage medium | |
GB2475301A (en) | Payment Authentication System and Processing Method | |
Zhang | The Incompatibility of Bitcoin's Strong Decentralization Ideology and Its Growth as a Scalable Currency | |
KR20210001915A (en) | Crowd funding platform for research goods based on block chain | |
US20230124708A1 (en) | Updating a set of public benefit assets secure token |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171128 |
|
RJ01 | Rejection of invention patent application after publication |