[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN107403317A - A kind of stored value card information sharing method and its system - Google Patents

A kind of stored value card information sharing method and its system Download PDF

Info

Publication number
CN107403317A
CN107403317A CN201710501595.2A CN201710501595A CN107403317A CN 107403317 A CN107403317 A CN 107403317A CN 201710501595 A CN201710501595 A CN 201710501595A CN 107403317 A CN107403317 A CN 107403317A
Authority
CN
China
Prior art keywords
stored value
value card
point
user
characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710501595.2A
Other languages
Chinese (zh)
Inventor
陈建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing First Science And Technology Co Ltd
Original Assignee
Beijing First Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing First Science And Technology Co Ltd filed Critical Beijing First Science And Technology Co Ltd
Priority to CN201710501595.2A priority Critical patent/CN107403317A/en
Publication of CN107403317A publication Critical patent/CN107403317A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a kind of stored value card sharing method and its system based on security mechanism.Businessman issues stored value card, and purchase card user is registered and buys stored value card.Stored value card is not limited to purchase card user consumption and payment.The purchase card user of stored value card can specify its stored value card to be used to shared object, and the shared object can be relatives user, can also be strange user.Meanwhile in order to ensure the safety for all users for using stored value card consumption and payment, it is proposed the above and shares the supporting authentication of stored value card, fingerprint collecting and fingerprint matching of the authentication based on high security.The stored value card sharing method and its system allow a stored value card to share use for multiple user security.

Description

A kind of stored value card information sharing method and its system
Field
The present invention relates to a kind of stored value card information sharing method and its system, more particularly to a kind of storage for having security mechanism It is worth card sharing method and its system.
Background technology
In today's society, the existing occupation mode of stored value card product is:Consumer prestores necessarily to stored-value-card issuance enterprise The amount of money obtain stored value card, and obtain discount or the gift that businessman specifies, the remaining sum in stored value card is available for subsequent consumption.Such storage Value card product has obtained the generally receiving of in the market businessman and consumer, national stored value card sales scale retail firm in 2016 Industry is just up to more than 7,000 hundred million yuan.But due to the fact that the sales volume of stored value card keeps falling in recent years, consumer is to traditional Stored Value The acceptance of card product also constantly declines:
1. entity stored value card is inconvenient for use:Traditional entity card carries trouble, and hair fastener, the equipment cost for testing card are higher, Puzzlement is all brought to businessman and user.
2. traditional stored value card only can holder's use:Purchase card people must just can be used with card or the identity of oneself, can not Easily lend and consumed to friend relatives.On the one hand be because, businessman can not effective and safe identification card people and holder it Between relation, be because can not easily settlement fund between user and holder on the other hand.
3. stored value card price is difficult:Small amount stored value card is prone to sell, but too fast due to consuming, sharp to caused by businessman Profit loss is very big;Wholesale stored value card improves the positive effect managed to businessman, but often beyond the psychological threshold of consumer, it is difficult to Sell.
The key to solve the above problems is the use limitation for breaking stored value card using the technology for sharing economy, makes purchase People and user need not be same people, and can be automatically performed the checking of trade company side, and between purchase card people and user Capital settlement.In this way, loyal user can be excited to have a mind to stored value card of the purchase compared with wholesale, and greet friends to carry out businessman and disappear Take, so as to reach the win-win of businessman, member, non-members.Meanwhile shared economy faces safety issue, for example, if purchase The stored value card of people is usurped by other people, it will is produced larger economic loss to purchaser, while is seriously undermined consumer to stored value card The confidence of consumption pattern.Therefore, matingly, it is necessary to have a set of security mechanism to support the realization of shared stored value card.
The content of the invention
The present invention realizes a kind of stored value card sharing method and its system for having security authentication mechanism, solves prior art In stored value card use limitation, and the safety issue that shared stored value card faces.
The present invention realizes a kind of stored value card sharing method based on security mechanism and a kind of Stored Value based on security mechanism Card shared system, it includes
Step 1000, businessman sets the stored value card of distribution, the stored value card parameter of setting is including extremely by stored value card enterprises end Few stored value card kind of information, buy amount information, give one kind in amount information, discount information and combinations thereof and or more ginseng Number;
Step 2000, card user is purchased in its stored value card logged in client, and stored value card is specified and shares to other users; Other users are notified in a manner of short message or wechat, and are the corresponding attached stored value card of other users generation;Purchase card user passes through storage Value card passes through attached stored value card, the remaining sum of the shared stored value card with other users;
Step 3000, the stored value card client that other users log at it, shared Stored Value is used based on attached rechargeable card Card is consumed;
Step 4000, after other customer consumptions, businessman will be seen that stored value card is consumed, so as to allow other users to complete to hand over Easily;
Data in all of above step are stored in stored value card Platform Server with each step by network.
Alternatively, above method and system may also include:
Stored value card enterprises end, stored value card client include running in the form of App softwares or wechat on mobile terminals.
Alternatively, above method and system may also include:
Step 4000 is specially:
Other customer consumptions include:The actual payment of discount that other users enjoy according to shared stored value card, Payment Amount lead to Cross stored value card Platform Server and directly transfer accounts and pass through stored value card Platform Server to the account of purchase card user, purchase card user stored value card The payment of the denomination payments such as realization, the purchase card user account include at least following a kind of:Bank card account, wechat change account, branch Pay precious account;
Businessman will be seen that stored value card is consumed to be included so as to allow other users to complete transaction:Businessman sees purchase card user storage Value card is consumed with sharing mode, and completes to merchandise;Purchase card user, other users, businessman will receive short message or wechat mode Transaction successfully record;If any one link mistake in other customer consumptions, payment consumption process prompt rollback to business Family, other users, purchase card user, are failed based on shared stored value card transactions.
Alternatively, above method and system may also include:
Other users include:Kith and kin user;
In step 2000, in addition to
It is the attached stored value card of kith and kin to generate corresponding attached Stored Value Card Type for kith and kin user.
Alternatively, above method and system may also include:
Other users include:Stranger user;
Purchase card user can be turned on and off stranger's users to share pattern at any time;
In step 2000, in addition to:
It is strange attached stored value card to generate corresponding attached Stored Value Card Type for strange user.
Alternatively, above method and system may also include:
In step 2000, stored value card is specified before sharing to other users, including sub-step 2200, carry out purchase card user Authentication;
And and/or
In step 3000, before being consumed based on attached rechargeable card by shared stored value card, including sub-step 3200, carry out other authenticating user identifications.
Alternatively, above method and system may also include:Wherein authentication includes:
S5100, authentication user interface is shown to user;
S5200, stored value card client gather the user by fingerprint collecting processing module FingerprintCollector Fingerprint,;
S5300, stored value card client carry out feature extraction to the user fingerprints, obtain fingerprint characteristic value FA;
S5400, stored value card client are digitally signed to the fingerprint characteristic value FA of the user;
S5500, stored value card client are established with stored value card Platform Server and communicate to connect and send certification request;
S5510, the user identifies IDA using the private key PriKeyUser encryption users of user oneself and realizes signature, by this The signature of user sends certification request to stored value card Platform Server, wherein;The use that stored value card Platform Server passes through preservation The public key at family, the signature is verified to obtain the mark IDA of the user;
S5520, stored value card Platform Server produces time limit TAServer, current data NA, by stored value card Platform Server Public key PubKeyServer, current data NA and the time limit TAServer of itself, encrypted with the public key PubKeyUser of the user The user of stored value card client is returned to afterwards;
S5530, the user of stored value card client receive the public key PubKeyServer of stored value card Platform Server, showed When data NA and time limit TAServer, by the above-mentioned fingerprint characteristic value FA of acquisition, tuple { TAServer, NA, FA } is used Stored Value Stored value card Platform Server is sent to after the public key PubKeyServer encryptions of card Platform Server;
S5600, stored value card Platform Server carry out fingerprint matching using fingerprint matching module FingerprintMatch;
S5700, stored value card Platform Server is to stored value card client return authentication result.
Alternatively, above method and system may also include:Wherein fingerprint collecting processing module FingerprintCollector, including:
S7100, fingerprint image acquisition;
S7200, fingerprint image preprocessing, including the normalization of S7210 fingerprint images, S7220 Fingerprint enhancements,
S7230 fingerprint images refine, the fingerprint image ProcessedFingerprintImage after return processing;
S7300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S7300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized carefully The direction of node, tk(k=1,2) is characterized the classification of minutiae point, i.e. k=1 is end points, k=2 is bifurcation;The direction of end points It is the direction of crestal line trend where it, the direction of bifurcation is the folder in three crestal lines where the point between other two crestal lines Angle is all the opposite direction of the crestal line at obtuse angle, is defined as (0≤θ<2π);Fingerprint image is after binaryzation, refinement, each pixel Gray scale be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using 3 × 3 templates are come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2, P3, P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these phases When adjoint point meets formula below, it is possible to judge P classification:
If meet formula (5.1), then pixel P is end points;If meet formula (5.2), then pixel P is Bifurcation;Judge rear and mark the classification of the pixel, scanning is tracked to the pixel not being labeled, always Untill all minutiae features have detected;Then by the row, column coordinate where the pixel P in fingerprint image labeled as thin The position coordinates (x, y) of node diagnostic, the origin using the starting point of image upper left angular direction as coordinate system, it is to the right the pros of x-axis To downward is the positive direction of y-axis;
Pixel P eight neighborhood encodes --- and each pixel of refined image only needs 1bit, by pixel P eight neighborhood picture Element is according to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is compiled by this byte representation Code formula be:
NpShare 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1, Have 8
Kind combination, i.e. NpIn there are 8 kinds of values to represent that pixel P are end points;For bifurcation, there are 3 in its eight neighborhood mutually Disjunct pixel is 1, then NpIn there are 12 kinds of values to be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds can Energy property, defines Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding Dp With complement code D'pRelation be:
……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table that the category table based on eight neighborhood coding is 256 × 1, illustrate pixel P Eight neighborhood coding and its classification between corresponding relation, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 are Bifurcation;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents 8 kinds of tracking directions of advance and row, column increment of coordinate Between relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, between the direction for representing 8 kinds of neighborhood codings and the subsequent point of tracking Relation, first be classified as eight neighborhood coding, second is classified as direction encoding;
Bifurcation direction table --- it is 12 × 4 tables, represents that the eight neighborhood of 12 kinds of bifurcations encodes and three track sides Relation between, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, average distances of the λ between streakline, takes λ=6, in extraction minutiae feature During direction, with the coordinate (x, y) of the point for start position, using the direction searched in the direction table corresponding to the point as starting point side To being then tracked according to the coding track algorithm of eight neighborhood to streakline.For end points direction, end points (x is located at0,y0) place The coordinate that Ridge following terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0- Y))……(5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be by formula (5.5) 3 directions are obtained, then calculate the angle between direction two-by-two, with the streakline that two other streakline angle is obtuse angle Opposite direction is exactly the direction of the bifurcation.Result after tracking terminates is placed in a characteristic vector table, wherein characteristic vector shape Formula is D (x, y, θ, tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S7310, eight neighborhood coding is carried out after fingerprint image refinement and obtains coding and category table, direction and increment of coordinate Table, end points direction table, bifurcation direction table;
S7320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S7330, judge whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S7340 preserves the coordinate of current pixel point, according to search direction and increment of coordinate table renewal coordinate parameters;S7350 According to current eight neighborhood coding lookup direction and category table, end points or bifurcation are determined whether;
S7360, if it is determined that whether being end points or bifurcation result is no, then seek direction complement code renewal direction encoding;
S7370, step-length add 1;Return to step S7330;
If it is determined that reach set step-length be it is yes,
S7380, the coding track algorithm of Finger print characteristic abstract terminate;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics Value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing Finger print informations of the ProcessedFingerprintImage as collection.
Alternatively, above method and system may also include:Wherein fingerprint matching module FingerprintMatch includes:
S9100, select any two characteristic point in template fingerprint image and input fingerprint image as a reference point right;If All possible reference point was investigated, and went to step S9500;
S9200, will be every in the characteristic point series of template fingerprint image and input fingerprint image using formula (S9200-6) Individual characteristic point corresponds to respective reference point and is converted into polar coordinates;
S9300, according to the incremental order of polar angle, arrange the characteristic point series of template fingerprint image and input fingerprint image Characteristic point series;
S9400, the characteristic point series of matching template fingerprint image and the characteristic point of input fingerprint image are serial in sequence In each characteristic point;A framing mask is selected first around the characteristic point of template fingerprint image, framing mask size is by formula (S9400-1) determine, if the characteristic point for having same type in fingerprint image is inputted is located in framing mask, and the input refers to The direction difference of the characteristic point of characteristic point and the template fingerprint image in print image is in threshold range set in advance, then it is assumed that The two Feature Points Matchings, and will matching score value S increases by 1;Finish, go to if all characteristic points have all been investigated in template S9100;
S9500, from all fixed reference feature point centerings, maximum matching score value S is found out, and as template fingerprint figure The matching fraction of picture and input fingerprint image;If the matching fraction is more than threshold value, then it is assumed that input fingerprint comes with template fingerprint From same finger;
Wherein, in S9100 select characteristic point it is as a reference point to including:
A characteristic point on fingerprint image is represented with P (x, y, d, t);Wherein x, y formula rectangular co-ordinate value;D is characteristic point Direction, when rotating counterclockwise angle increase, scope 0 to 359;T is feature vertex type, is worth and represents that this feature point is streakline for 1 End points, it is worth and represents that characteristic point is streakline bifurcation for 2;
In template fingerprint characteristics of image dot pattern characteristic vector set and input fingerprint image characteristics dot pattern in feature to Duration set is expressed as
P={ pi|p1,p2,……,pMFormula (S9100-1)
Q={ qj|q1,q2,……,qNFormula (S9100-2)
In formula, P is template fingerprint characteristics of image point set, including M characteristic point, these characteristic points p1,p2,……,pM Represent;Q is to input fingerprint image characteristics point set, including N number of characteristic point, these characteristic points q1,q2,……,qNRepresent, one As for M ≠ N;
Template fingerprint image is subjected to characteristic point series with the characteristic point in input fingerprint image directly as reference point Matching;The each pair characteristic point inputted in fingerprint image and template fingerprint image is all probably fixed reference feature point pair;Altogether form have M × N is to fixed reference feature point;
Wherein, the reference point in S9200 is converted into polar coordinates and included:
Fixed reference feature point is determined to afterwards, by template fingerprint image characteristic point in formula (S9100-1) and formula (S9100-2) The coordinate transformation of set and each characteristic point in input fingerprint image characteristics point set is polar coordinates;It is assumed that template fingerprint image Characteristic point pi(xi,yi,di,ti) and input fingerprint image characteristics point qr(xr,yr,dr,tr) it is reference point;In gathering input Each characteristic point qj(xj,yj,dj,tj) according to formula (S9200-6) progress coordinate transform;Q is used under polar coordinatesj(rjjj, tj) represent a characteristic point:
θj=arctan [(yj-yr)/(xj-xr)]+di-dr(S9200-6)
αj=dj-dr(S9200-6)
tj=tj(S9200-6)
In formula, rjFor polar diameter, θjFor polar angle, αjFor the direction of characteristic point under polar coordinate system, tjIt is characterized type a little;di- drBe template characteristic point and input feature vector point direction it is poor;
Wherein, the framing mask in S9400 can be identified below:
Radius=ri n/mFormula (S9400-1)
Wherein in formula, n, m are pre-defined integer, take m to be more than n.
Beneficial effects of the present invention:
Referring to Fig. 1, the meaning of this patent is using economic technology is shared, and has transformed traditional stored value card production with overturning formula The flow that uses and market of product so that purchase card people needs not be same person with user, and encourages self passing for purchase card user Broadcast and effectively collected with Stored Value advance fund funding, so as to the stored value card for solving traditional is difficult to fix a price, be difficult to sell, be worth it is opaque Problem so that businessman, purchase block people, can benefited simultaneously in many ways with card kith and kin, strange consumer.Solves shared stored value card simultaneously The safety problem faced so that user and businessman are without the security concern for shared model.
Effective operation for reducing businessman is promoted cost by the use of this patent, while improves sale and the marketing effect of stored value card Fruit.This patent provide one it is complete, can automatic operating techniqueflow scheme and computer program logic code, not only It can be used for creating complete set and brand-new stored value card product platform, can also be with existing stored value card/IT management systems pair Connect, new service is provided in original interface.
Brief description of the drawings
Fig. 1 is the comparison diagram of beneficial effects of the present invention and prior art.
Fig. 2 be in the present invention businessman to share stored value card parameter setting schematic diagram.
Fig. 3 is that interface display schematic diagram when card user sets shared object is purchased in the present invention.
Fig. 4 is that the display interface when stored value card of kith and kin's users to share purchase card user in the present invention carries out consumption and payment is illustrated Figure.
Fig. 5 is that the display interface when stored value card of strange users to share purchase card user in the present invention carries out consumption and payment is illustrated Figure.
Fig. 6 is the block schematic illustration of the shared stored value card plateform system based on security mechanism in the present invention.
Fig. 7 is shared stored value card method and the system flow schematic diagram based on security mechanism in the present invention.
Embodiment
Stored value card in the present invention is a kind of consumption certificate of user in merchant registration, and the voucher can correspond to a physics Entity card, can also no entity card correspond to one virtual " electronic card ".Based on the consumption certificate, user can On the consumption certificate, the amount of money and/or enjoy discount by prestoring, the form such as refund afterwards is even first consumed as credit card, so Consumed and paid in businessman afterwards.Shared stored value card refers to above consumption certificate, not only can by purchase card people carry out consumption and Pay, can also be consumed and be paid by other users such as kith and kin, stranger.The present invention will by corresponding security mechanism come The safety of all users of shared stored value card more than ensureing.
First, the role in method and system and its relation:
Following role is comprised at least in the method and its system of the present invention:Businessman (also known as businessman enterprise, enterprise), purchase card are used Family (also known as purchase card people), kith and kin user (also known as kith and kin, friend), strange user (also known as stranger).
Purchase card user, kith and kin user, strange user can use the stored value card client for example operated on mobile terminal; Businessman can use the stored value card enterprises end for example operated on mobile terminal or other computing devices;Stored-value card data, transaction The data of the inventive method such as data, security information, personal information, company information and its system can stored up by network storage It is worth in card Platform Server.
Optimal enforcement example is these are only, those skilled in the art know, the present invention can be not limited to above client, enterprise End, the mode of stored value card Platform Server are realized.
1st, businessman, which customizes, issues sharable stored value card
Businessman can install stored value card enterprises end (for example, App in the mobile terminal (for example, mobile phone, pad etc.) of oneself Or wechat form etc.), and the personal information of registered trader, and security information (for example, fingerprint etc.) needed for user authentication or Industrial and commercial license of person enterprise etc..
Businessman enterprise can carry out parameter design when issuing stored value card according to the business circumstance of itself, and in day-to-day operations Adjust at any time.The necessary information related to stored value card technology of sharing includes but is not limited to:Stored value card kind of information, purchase amount of money letter Cease, give one kind in amount information, discount information, the term of validity, shared model, negotiable number, closing cost and combinations thereof And/or more parameters (referring to Fig. 2).
2nd, purchase card people sets shared object
Purchase card people can in the mobile terminal (for example, mobile phone, pad etc.) of oneself installation stored value card client (for example, App or wechat form etc.), and the personal information of oneself is registered, and the security information needed for user authentication is (for example, fingerprint Deng).
Purchase card people, which can specify stored value card in the stored value card client of oneself, shares to some friends, stored value card platform clothes Business device will notify these users in a manner of short message or wechat automatically, and generate attached stored value card for them.All main cards and attached The remaining sum of the shared purchase card people of category card (referring to Fig. 3).
3. purchase card people and kith and kin are consumed using stored value card, enjoy privileges
Similarly, the kith and kin or friend for itself not possessing the purchase card people of above stored value card can be in the mobile terminals of oneself Installation stored value card client (for example, App or wechat form etc.) in (for example, mobile phone, pad etc.), and register the personal letter of oneself Breath, and the security information (for example, fingerprint etc.) needed for user authentication.
Purchase card people can be used directly oneself stored value card remaining sum and discount consumed;Kith and kin can also be used be shared it is attached Category card is consumed, and businessman will be seen that corresponding main card is consumed after consumption, so as to allow kith and kin to complete transaction.
Referring to Fig. 4, if the shared model of supplement card is charging mode, kith and kin are stilled need according to Stored Value when consumption The actual payment of the discount of card, Payment Amount will directly be transferred accounts to purchase by stored value card Platform Server blocks the cash account of people, such as Bank card account, wechat change account, Alipay remaining sum etc..For blocking people at this point for purchase, the capital equivalent to purchase card passes through Other people borrow mode and return, directly reduce the risk of the occupation of capital;For kith and kin, it must be enjoyed equivalent to devoid of risk By the special preferential treatment of stored value card, material benefit has been obtained.
Example is these are only, the consumption that kith and kin, friend borrow stored value card can be not limited to above form, can be according to Stored Value Setting during Ka Kaika is more flexibly and various.
4. stranger borrows stored value card consumption
Similarly, the stranger for itself not possessing above stored value card can be in the mobile terminal of oneself (for example, mobile phone, pad Deng) in installation stored value card client (for example, App or wechat form etc.), and register the personal information of oneself, and user authentication Required security information (for example, fingerprint etc.).
Purchase card people also allows for stranger to borrow the shared stored value card of oneself.Now, stranger will be directly according to stored value card The stranger of Platform Server setting shares discount and paid the bill, and Payment Amount will directly be transferred accounts by stored value card Platform Server Block people to purchase, and corresponding consumption fund is deducted in the Stored Value remaining sum that stored value card Platform Server will block people from purchase, and carried to businessman For checking message to complete to merchandise.At this point for purchase block people for, equivalent to purchase card capital other people borrow by way of and Return, not only directly reduce the risk of the occupation of capital, it is also possible to obtain the income of premium;For stranger, quite Special preferential treatment has been enjoyed in calm strategical vantage point, has obtained material benefit.Example is these are only, the consumption that stranger borrows stored value card can not It is limited to above form, setting when card can be opened according to stored value card is more flexibly and various.
Purchase card people can at any time open, close stranger's shared model.
5. businessman receives corresponding transaction message and Information Statistics
In said process, when either purchase card, purchase block people's consumption, kith and kin's consumption, stranger's consumption, businessman can receive phase The transaction message answered, so as to complete to judge in real time.Businessman can also check the sale of stored value card at any time in stored value card enterprises end With service condition statistical analysis, further optimized and revised so as to help itself to carry out relevant parameter.
2nd, the realization of method and system
In order to ensure the identity security of user, purchase card user, kith and kin user, strange user are both needed in stored value card client Registration gathers the authentication information of oneself, such as fingerprint etc..Authentication information will be stored in stored value card Platform Server In database, for each authentication.
As shown in fig. 6, in order to realize above role --- between purchase card user, kith and kin user, strange user, businessman --- The consumption and payment of shared stored value card is carried out, whole stored value card shared system can take system framework chart exemplary in Fig. 6 Reach.
(1) stored value card client
Stored value card client, for example used by purchase card user, kith and kin user, strange user oneself on mobile terminal, It can include authenticating user identification module, fingerprint collecting processing module, stored value card setup module, stored value card consumption module etc..
Authenticating user identification module is used for such as user's registration, login, security and differentiated.Fingerprint collecting processing module is used for Authenticating user identification module is assisted to gather and match the functions such as fingerprint.
Stored value card setup module, in purchase card user in use, which user can for example be set as shared stored value card Object (for example, kith and kin user, strange user), and whether open strange user model etc.;In other users (for example, kith and kin User, strange user) in use, can check whether active user oneself enjoys the stored value card of the unlatching of some stored value card user Shared access right.
Stored value card consumption module, purchase card user in use, can direct consumption and payment, the stored value card can also be inquired about All consumer records;It is that can share the remaining sum and/or folding of purchase card user stored value card in kith and kin user, strange user's use Button, is consumed, can also inquire about all consumer records for oneself sharing other people stored value cards.
(2) stored value card enterprises end
Stored value card enterprises end, there are businessman or enterprise for example to be used in the computing device of oneself on mobile terminal, it can be with Including authenticating user identification module, fingerprint collecting processing module, stored value card setup module, stored value card statistical module etc..
Authenticating user identification module, fingerprint collecting processing module, similar to the respective modules in stored value card client modules Function, the functions such as businessman's user's registration, login, security discriminating, fingerprint collecting, matching can be carried out.
Stored value card setup module, the function that can have include:Businessman set the type of stored value card oneself issued, quantity, The information such as parameter.Wherein parameter information can be found in the example in Fig. 2, but not limited to this.
Stored value card statistical module, the function that can have include:Businessman inquires about the actual issuing amount of stored value card, real-time consumption Payment record, history consumption and payment record, statistics consumption and payment record.Any of the above consumption and payment record can be based on it is various Querying condition is inquired about or statistical analysis --- for example for it is every stored value card, for a period of time, for a species The consumption of the shared object of certain type of stored value card stored value card, for the one section time of type etc. --- above only Can be the various consumption statistic information that those skilled in the art imagine, so as to contribute to businessman to stored value card for example Management condition, prospect make summary and prediction.
(3) stored value card Platform Server
Stored value card Platform Server, communicated by network with stored value card client, stored value card enterprises end, it stores the Stored Value All data messages and security information of card plateform system.Data above information, security information can include but is not limited to, business Family's information, purchase card user information, kith and kin's user profile, strange user profile, Stored Value card information, stored value card share information, Stored Value Card Transaction Information, secure authenticated information, finger print information etc., these are only example, can be with not limited to this.
System frame structure based on foregoing exemplary, the present invention can realize following method and system.
As shown in fig. 7, the present invention realizes a kind of stored value card sharing method based on security mechanism and one kind based on safety The stored value card shared system of mechanism, it includes
Step 1000, businessman sets the stored value card of distribution, the stored value card parameter of setting is including extremely by stored value card enterprises end Few stored value card kind of information, buy amount information, give one kind in amount information, discount information and combinations thereof and or more ginseng Number;
Step 2000, card user is purchased in its stored value card logged in client, and stored value card is specified and shares to other users; Other users are notified in a manner of short message or wechat, and are the corresponding attached stored value card of other users generation;Purchase card user passes through storage Value card passes through attached stored value card, the remaining sum of the shared stored value card with other users;
Step 3000, the stored value card client that other users log at it, shared Stored Value is used based on attached rechargeable card Card is consumed;
Step 4000, after other customer consumptions, businessman will be seen that stored value card is consumed, so as to allow other users to complete to hand over Easily;
Data in all of above step are stored in stored value card Platform Server with each step by network.
Alternatively, above method and system may also include:
Stored value card enterprises end, stored value card client include running in the form of App softwares or wechat on mobile terminals.
Alternatively, above method and system may also include:
Step 4000 is specially:
Other customer consumptions include:The actual payment of discount that other users enjoy according to shared stored value card, Payment Amount lead to Cross stored value card Platform Server and directly transfer accounts and pass through stored value card Platform Server to the account of purchase card user, purchase card user stored value card The payment of the denomination payments such as realization, the purchase card user account include at least following a kind of:Bank card account, wechat change account, branch Pay precious account;
Businessman will be seen that stored value card is consumed to be included so as to allow other users to complete transaction:Businessman sees purchase card user storage Value card is consumed with sharing mode, and completes to merchandise;Purchase card user, other users, businessman will receive short message or wechat mode Transaction successfully record;If any one link mistake in other customer consumptions, payment consumption process prompt rollback to business Family, other users, purchase card user, are failed based on shared stored value card transactions.
Alternatively, above method and system may also include:
Other users include:Kith and kin user;
In step 2000, in addition to
It is the attached stored value card of kith and kin to generate corresponding attached Stored Value Card Type for kith and kin user.
Alternatively, above method and system may also include:
Other users include:Stranger user;
Purchase card user can be turned on and off stranger's users to share pattern at any time;
In step 2000, in addition to:
It is strange attached stored value card to generate corresponding attached Stored Value Card Type for strange user.
Alternatively, above method and system may also include:
In step 2000, stored value card is specified before sharing to other users, including sub-step 2200, carry out purchase card user Authentication;
And and/or
In step 3000, before being consumed based on attached rechargeable card by shared stored value card, including sub-step 3200, carry out other authenticating user identifications.
Alternatively, above method and system may also include:Wherein authentication includes:
S5100, authentication user interface is shown to user;
S5200, stored value card client gather the user by fingerprint collecting processing module FingerprintCollector Fingerprint,;
S5300, stored value card client carry out feature extraction to the user fingerprints, obtain fingerprint characteristic value FA;
S5400, stored value card client are digitally signed to the fingerprint characteristic value FA of the user;
S5500, stored value card client are established with stored value card Platform Server and communicate to connect and send certification request;
S5510, the user identifies IDA using the private key PriKeyUser encryption users of user oneself and realizes signature, by this The signature of user sends certification request to stored value card Platform Server, wherein;The use that stored value card Platform Server passes through preservation The public key at family, the signature is verified to obtain the mark IDA of the user;
S5520, stored value card Platform Server produces time limit TAServer, current data NA, by stored value card Platform Server Public key PubKeyServer, current data NA and the time limit TAServer of itself, encrypted with the public key PubKeyUser of the user The user of stored value card client is returned to afterwards;
S5530, the user of stored value card client receive the public key PubKeyServer of stored value card Platform Server, showed When data NA and time limit TAServer, by the above-mentioned fingerprint characteristic value FA of acquisition, tuple { TAServer, NA, FA } is used Stored Value Stored value card Platform Server is sent to after the public key PubKeyServer encryptions of card Platform Server;
S5600, stored value card Platform Server carry out fingerprint matching using fingerprint matching module FingerprintMatch;
S5700, stored value card Platform Server is to stored value card client return authentication result.
Alternatively, above method and system may also include:Wherein fingerprint collecting processing module FingerprintCollector, including:
S7100, fingerprint image acquisition;
S7200, fingerprint image preprocessing, including the normalization of S7210 fingerprint images, S7220 Fingerprint enhancements,
S7230 fingerprint images refine, the fingerprint image ProcessedFingerprintImage after return processing;
S7300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S7300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized carefully The direction of node, tk(k=1,2) is characterized the classification of minutiae point, i.e. k=1 is end points, k=2 is bifurcation;The direction of end points It is the direction of crestal line trend where it, the direction of bifurcation is the folder in three crestal lines where the point between other two crestal lines Angle is all the opposite direction of the crestal line at obtuse angle, is defined as (0≤θ<2π);Fingerprint image is after binaryzation, refinement, each pixel Gray scale be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using 3 × 3 templates are come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2, P3, P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these phases When adjoint point meets formula below, it is possible to judge P classification:
If meet formula (5.1), then pixel P is end points;If meet formula (5.2), then pixel P is Bifurcation;Judge rear and mark the classification of the pixel, scanning is tracked to the pixel not being labeled, always Untill all minutiae features have detected;Then by the row, column coordinate where the pixel P in fingerprint image labeled as thin The position coordinates (x, y) of node diagnostic, the origin using the starting point of image upper left angular direction as coordinate system, it is to the right the pros of x-axis To downward is the positive direction of y-axis;
Pixel P eight neighborhood encodes --- and each pixel of refined image only needs 1bit, by pixel P eight neighborhood picture Element is according to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is compiled by this byte representation Code formula be:
NpShare 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1, There are 8 kinds of combinations, i.e. NpIn there are 8 kinds of values to represent that pixel P are end points;For bifurcation, there are 3 to be mutually not attached in its eight neighborhood Pixel be 1, then NpIn there are 12 kinds of values to be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds can Energy property, defines Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding Dp With complement code D'pRelation be:
……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table that the category table based on eight neighborhood coding is 256 × 1, illustrate pixel P Eight neighborhood coding and its classification between corresponding relation, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 are Bifurcation;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents 8 kinds of tracking directions of advance and row, column increment of coordinate Between relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, between the direction for representing 8 kinds of neighborhood codings and the subsequent point of tracking Relation, first be classified as eight neighborhood coding, second is classified as direction encoding;
Bifurcation direction table --- it is 12 × 4 tables, represents that the eight neighborhood of 12 kinds of bifurcations encodes and three track sides Relation between, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, average distances of the λ between streakline, takes λ=6, in extraction minutiae feature During direction, with the coordinate (x, y) of the point for start position, using the direction searched in the direction table corresponding to the point as starting point side To being then tracked according to the coding track algorithm of eight neighborhood to streakline.For end points direction, end points (x is located at0,y0) place The coordinate that Ridge following terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0- Y))……(5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be by formula (5.5) 3 directions are obtained, then calculate the angle between direction two-by-two, with the streakline that two other streakline angle is obtuse angle Opposite direction is exactly the direction of the bifurcation.Result after tracking terminates is placed in a characteristic vector table, wherein characteristic vector shape Formula is D (x, y, θ, tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S7310, eight neighborhood coding is carried out after fingerprint image refinement and obtains coding and category table, direction and increment of coordinate Table, end points direction table, bifurcation direction table;
S7320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S7330, judge whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S7340 preserves the coordinate of current pixel point, according to search direction and increment of coordinate table renewal coordinate parameters;S7350 According to current eight neighborhood coding lookup direction and category table, end points or bifurcation are determined whether;
S7360, if it is determined that whether being end points or bifurcation result is no, then seek direction complement code renewal direction encoding;
S7370, step-length add 1;Return to step S7330;
If it is determined that reach set step-length be it is yes,
S7380, the coding track algorithm of Finger print characteristic abstract terminate;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics Value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing Finger print informations of the ProcessedFingerprintImage as collection.
Alternatively, above method and system may also include:Wherein fingerprint matching module FingerprintMatch includes:
S9100, select any two characteristic point in template fingerprint image and input fingerprint image as a reference point right;If All possible reference point was investigated, and went to step S9500;
S9200, will be every in the characteristic point series of template fingerprint image and input fingerprint image using formula (S9200-6) Individual characteristic point corresponds to respective reference point and is converted into polar coordinates;
S9300, according to the incremental order of polar angle, arrange the characteristic point series of template fingerprint image and input fingerprint image Characteristic point series;
S9400, the characteristic point series of matching template fingerprint image and the characteristic point of input fingerprint image are serial in sequence In each characteristic point;A framing mask is selected first around the characteristic point of template fingerprint image, framing mask size is by formula (S9400-1) determine, if the characteristic point for having same type in fingerprint image is inputted is located in framing mask, and the input refers to The direction difference of the characteristic point of characteristic point and the template fingerprint image in print image is in threshold range set in advance, then it is assumed that The two Feature Points Matchings, and will matching score value S increases by 1;Finish, go to if all characteristic points have all been investigated in template S9100;
S9500, from all fixed reference feature point centerings, maximum matching score value S is found out, and as template fingerprint figure The matching fraction of picture and input fingerprint image;If the matching fraction is more than threshold value, then it is assumed that input fingerprint comes with template fingerprint From same finger;
Wherein, in S9100 select characteristic point it is as a reference point to including:
A characteristic point on fingerprint image is represented with P (x, y, d, t);Wherein x, y formula rectangular co-ordinate value;D is characteristic point Direction, when rotating counterclockwise angle increase, scope 0 to 359;T is feature vertex type, is worth and represents that this feature point is streakline for 1 End points, it is worth and represents that characteristic point is streakline bifurcation for 2;
In template fingerprint characteristics of image dot pattern characteristic vector set and input fingerprint image characteristics dot pattern in feature to Duration set is expressed as
P={ pi|p1,p2,……,pMFormula (S9100-1)
Q={ qj|q1,q2,……,qNFormula (S9100-2)
In formula, P is template fingerprint characteristics of image point set, including M characteristic point, these characteristic points p1,p2,……,pM Represent;Q is to input fingerprint image characteristics point set, including N number of characteristic point, these characteristic points q1,q2,……,qNRepresent, one As for M ≠ N;
Template fingerprint image is subjected to characteristic point series with the characteristic point in input fingerprint image directly as reference point Matching;The each pair characteristic point inputted in fingerprint image and template fingerprint image is all probably fixed reference feature point pair;Altogether form have M × N is to fixed reference feature point;
Wherein, the reference point in S9200 is converted into polar coordinates and included:
Fixed reference feature point is determined to afterwards, by template fingerprint image characteristic point in formula (S9100-1) and formula (S9100-2) The coordinate transformation of set and each characteristic point in input fingerprint image characteristics point set is polar coordinates;It is assumed that template fingerprint image Characteristic point pi(xi,yi,di,ti) and input fingerprint image characteristics point qr(xr,yr,dr,tr) it is reference point;In gathering input Each characteristic point qj(xj,yj,dj,tj) according to formula (S9200-6) progress coordinate transform;Q is used under polar coordinatesj(rjjj, tj) represent a characteristic point:
θj=arctan [(yj-yr)/(xj-xr)]+di-dr(S9200-6)
αj=dj-dr(S9200-6)
tj=tj(S9200-6)
In formula, rjFor polar diameter, θjFor polar angle, αjFor the direction of characteristic point under polar coordinate system, tjIt is characterized type a little;di- drBe template characteristic point and input feature vector point direction it is poor;
Wherein, the framing mask in S9400 can be identified below:
Radius=ri n/mFormula (S9400-1)
Wherein in formula, n, m are pre-defined integer, take m to be more than n.
Certainly, the present invention also has many other embodiments, can root in the case of without prejudice to spirit of the invention and its essence Various corresponding changes and deformation are made according to the present invention.
Although previous description and accompanying drawing describes the preferred embodiments of the present invention, but it is understood that:This is not being departed from In the case of the spirit of invention, various additional, modifications can be produced herein and are replaced.Those of ordinary skill in the art will be apparent that: Do not depart from the present invention spirit or essential characteristics in the case of, can with other special shapes, structure, arrangement, ratio and The present invention is realized using other elements, material and part.Those skilled in the art will recognize:The present invention can use hair The bright structure used in practice, arrangement, ratio, material and part and other many modifications, these modifications are not departing from this Particular surroundings and operational requirements are particularly adapted in the case of the principle of invention.Therefore, presently disclosed embodiment is all Aspect should be understood limitation illustrative rather than to its claimed scope.It is all the spirit and principles in the present invention it It is interior, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.

Claims (18)

1. a kind of stored value card sharing method based on security mechanism, it includes:
Step 1000, businessman sets the stored value card of distribution, the stored value card parameter of setting is including at least storing up by stored value card enterprises end Value card type category information, buy amount information, give one kind in amount information, discount information and combinations thereof and/or more parameters;
Step 2000, card user is purchased in its stored value card logged in client, and stored value card is specified and shares to other users;With short Letter or wechat mode notify other users, and are the corresponding attached stored value card of other users generation;Purchase card user passes through stored value card Pass through attached stored value card, the remaining sum of the shared stored value card with other users;
Step 3000, the stored value card client that other users log at it, sticked into based on attached rechargeable card using shared Stored Value Row consumption;
Step 4000, after other customer consumptions, businessman will be seen that stored value card is consumed, so as to allow other users to complete transaction;
Data in all of above step are stored in stored value card Platform Server with each step by network.
2. the method as described in claim 1, it also includes:
Stored value card enterprises end, stored value card client include running in the form of App softwares or wechat on mobile terminals.
3. the method as described in claim 1, it also includes:
Step 4000 is specially:
Other customer consumptions include:The actual payment of discount that other users enjoy according to shared stored value card, Payment Amount pass through storage Value card Platform Server is directly transferred accounts to the account of purchase card user, purchase card user stored value card and realized by stored value card Platform Server Deng the payment of denomination payment, the purchase card user account includes at least following a kind of:Bank card account, wechat change account, Alipay Account;
Businessman will be seen that stored value card is consumed to be included so as to allow other users to complete transaction:Businessman sees purchase card user stored value card Consumed with sharing mode, and complete to merchandise;Purchase card user, other users, businessman will receive the friendship of short message or wechat mode Easily successfully record;If any one link mistake in other customer consumptions, payment consumption process by rollback, and prompt businessman, Other users, purchase card user, are failed based on shared stored value card transactions.
4. the method as described in claim 1, it also includes:
Other users include:Kith and kin user;
In step 2000, in addition to:
It is the attached stored value card of kith and kin to generate corresponding attached Stored Value Card Type for kith and kin user.
5. the method as described in claim 1, it also includes:
Other users include:Stranger user;
Purchase card user can be turned on and off stranger's users to share pattern at any time;
In step 2000, in addition to:
It is strange attached stored value card to generate corresponding attached Stored Value Card Type for strange user.
6. the method as described in claim 1, it also includes:
In step 2000, stored value card is specified before sharing to other users, including sub-step 2200, carry out purchasing card user identity Certification;
And and/or
In step 3000, before being consumed based on attached rechargeable card by shared stored value card, including sub-step 3200, enter The other authenticating user identifications of row.
7. method as claimed in claim 6, wherein authentication include:
S5100, authentication user interface is shown to user;
S5200, stored value card client gather the user by fingerprint collecting processing module FingerprintCollector and referred to Line,;
S5300, stored value card client carry out feature extraction to the user fingerprints, obtain fingerprint characteristic value FA;
S5400, stored value card client are digitally signed to the fingerprint characteristic value FA of the user;
S5500, stored value card client are established with stored value card Platform Server and communicate to connect and send certification request;
S5510, the user identifies IDA using the private key PriKeyUser encryption users of user oneself and realizes signature, by the user Signature to stored value card Platform Server send certification request, wherein;The user's that stored value card Platform Server passes through preservation Public key, the signature is verified to obtain the mark IDA of the user;
S5520, stored value card Platform Server produces time limit TAServer, current data NA, by stored value card Platform Server itself Public key PubKeyServer, current data NA and time limit TAServer, with being returned after the public key PubKeyUser of user encryption Back to the user of stored value card client;
S5530, the user of stored value card client receive the public key PubKeyServer of stored value card Platform Server, current number According to NA and time limit TAServer, the above-mentioned fingerprint characteristic value FA of acquisition equals tuple { TAServer, NA, FA } with stored value card Stored value card Platform Server is sent to after the public key PubKeyServer encryptions of platform server;
S5600, stored value card Platform Server carry out fingerprint matching using fingerprint matching module FingerprintMatch;
S5700, stored value card Platform Server is to stored value card client return authentication result.
8. method as claimed in claim 8, wherein fingerprint collecting processing module FingerprintCollector, including:
S7100, fingerprint image acquisition;
S7200, fingerprint image preprocessing, including the normalization of S7210 fingerprint images, S7220 Fingerprint enhancements, S7230 fingerprints Image thinning, the fingerprint image ProcessedFingerprintImage after return processing;
S7300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S7300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized minutiae point Direction, tk(k=1,2) is characterized the classification of minutiae point, i.e. k=1 is end points, k=2 is bifurcation;The direction of end points is it The direction of place crestal line trend, the direction of bifurcation be angle in three crestal lines where the point between other two crestal lines all For the opposite direction of the crestal line at obtuse angle, (0≤θ is defined as<2π);Fingerprint image is after binaryzation, refinement, the ash of each pixel Degree be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using 3 × 3 Template is come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2, P3, P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these consecutive points When meeting formula below, it is possible to judge P classification:
If meet formula (5.1), then pixel P is end points;If meet formula (5.2), then pixel P is bifurcated Point;Judge rear and mark the classification of the pixel, scanning is tracked to the pixel not being labeled, until institute Untill some minutiae features have detected;Then the row, column coordinate where the pixel P in fingerprint image is labeled as minutiae point The position coordinates (x, y) of feature, the origin using the starting point of image upper left angular direction as coordinate system, it is to the right the positive direction of x-axis, to It is the positive direction of y-axis down;
Pixel P eight neighborhood encodes --- and each pixel of refined image only needs 1bit, and pixel P eight neighborhood pixel is pressed According to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is public by this byte representation, coding Formula is:
NpShare 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1, there is 8 kinds Combination, i.e. NpIn there are 8 kinds of values to represent that pixel P are end points;For bifurcation, there are 3 mutual disjunct pictures in its eight neighborhood Element is 1, then NpIn there are 12 kinds of values to be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds of possibilities, Define Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding DpAnd benefit Code D'pRelation be:
……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table that the category table based on eight neighborhood coding is 256 × 1, illustrate the eight of pixel P Neighborhood encodes the corresponding relation between its classification, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 be bifurcated Point;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents between 8 kinds of tracking directions of advance and row, column increment of coordinate Relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, represents the pass between the direction of 8 kinds of neighborhood codings and the subsequent point of tracking System, first is classified as eight neighborhood coding, and second is classified as direction encoding;
Bifurcation direction table --- be 12 × 4 tables, represent 12 kinds of bifurcations eight neighborhood coding and three tracking directions it Between relation, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, average distances of the λ between streakline, λ=6 are taken, in the direction of extraction minutiae feature When, with the coordinate (x, y) of the point for start position, using the direction searched in the direction table corresponding to the point as starting point direction, so Streakline is tracked according to the coding track algorithm of eight neighborhood afterwards.For end points direction, end points (x is located at0,y0) place streakline The coordinate that tracking terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0-Y))…… (5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be obtained by formula (5.5) To 3 directions, the angle between direction two-by-two is then calculated, with the opposite direction of streakline that two other streakline angle is obtuse angle just It is the direction of the bifurcation.Tracking terminate after result be placed in a characteristic vector table, wherein characteristic vector form be D (x, y,θ,tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S7310, eight neighborhood coding is carried out after fingerprint image refinement and obtains coding and category table, direction and increment of coordinate table, end Point direction table, bifurcation direction table;
S7320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S7330, judge whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S7340 preserves the coordinate of current pixel point, according to search direction and increment of coordinate table renewal coordinate parameters;S7350 foundations Current eight neighborhood coding lookup direction and category table, determine whether end points or bifurcation;S7360, if it is determined that whether be End points or bifurcation result are no, then seek direction complement code renewal direction encoding;S7370, step-length add 1;Return to step S7330;
If it is determined that reach set step-length be it is yes,
S7380, the coding track algorithm of Finger print characteristic abstract terminate;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing Finger print informations of the ProcessedFingerprintImage as collection.
9. method as claimed in claim 7, wherein fingerprint matching module FingerprintMatch includes:
S9100, select any two characteristic point in template fingerprint image and input fingerprint image as a reference point right;It is if all Possible reference point was investigated, and went to step S9500;
S9200, using formula (S9200-6) by template fingerprint image and input fingerprint image characteristic point series in each spy The corresponding respective reference point of sign point is converted into polar coordinates;
S9300, according to the incremental order of polar angle, arrange the characteristic point series of template fingerprint image and the feature of input fingerprint image Point series;
S9400, in sequence in the characteristic point series of matching template fingerprint image and the characteristic point series of input fingerprint image Each characteristic point;A framing mask is selected first around the characteristic point of template fingerprint image, framing mask size is by formula (S9400-1) determine, if the characteristic point for having same type in fingerprint image is inputted is located in framing mask, and the input refers to The direction difference of the characteristic point of characteristic point and the template fingerprint image in print image is in threshold range set in advance, then it is assumed that The two Feature Points Matchings, and will matching score value S increases by 1;Finish, go to if all characteristic points have all been investigated in template S9100;
S9500, from all fixed reference feature point centerings, find out the matching score value S of maximum, and as template fingerprint image and Input the matching fraction of fingerprint image;If the matching fraction is more than threshold value, then it is assumed that input fingerprint is with template fingerprint from same One finger;
Wherein, in S9100 select characteristic point it is as a reference point to including:
A characteristic point on fingerprint image is represented with P (x, y, d, t);Wherein x, y formula rectangular co-ordinate value;D is the side of characteristic point To angle increase, scope 0 to 359 when rotating counterclockwise;T is feature vertex type, is worth and represents that this feature point is streakline end points for 1, It is worth and represents that characteristic point is streakline bifurcation for 2;
Characteristic vector set and set of eigenvectors in input fingerprint image characteristics dot pattern in template fingerprint characteristics of image dot pattern Conjunction is expressed as
P={ pi|p1,p2,……,pMFormula (S9100-1)
Q={ qj|q1,q2,……,qNFormula (S9100-2)
In formula, P is template fingerprint characteristics of image point set, including M characteristic point, these characteristic points p1,p2,……,pMTable Show;Q is to input fingerprint image characteristics point set, including N number of characteristic point, these characteristic points q1,q2,……,qNRepresent, typically For M ≠ N;
Template fingerprint image is subjected to characteristic point series with the characteristic point in input fingerprint image directly as reference point Match somebody with somebody;The each pair characteristic point inputted in fingerprint image and template fingerprint image is all probably fixed reference feature point pair;Forming altogether has M × N To fixed reference feature point;
Wherein, the reference point in S9200 is converted into polar coordinates and included:
Fixed reference feature point is determined to afterwards, by template fingerprint characteristics of image point set in formula (S9100-1) and formula (S9100-2) Coordinate transformation with each characteristic point in input fingerprint image characteristics point set is polar coordinates;It is assumed that template fingerprint characteristics of image Point pi(xi,yi,di,ti) and input fingerprint image characteristics point qr(xr,yr,dr,tr) it is reference point;It is every in gathering input Individual characteristic point qj(x j,yj,dj,t j) according to formula (S9200-6) progress coordinate transform;Q is used under polar coordinatesj(rjjj,tj) represent a characteristic point:
θj=arctan [(yj-yr)/(xj-xr)]+di-dr(S9200-6)
αj=dj-dr(S9200-6)
tj=tj(S9200-6)
In formula, rjFor polar diameter, θjFor polar angle, αjFor the direction of characteristic point under polar coordinate system, tjIt is characterized type a little;di-drIt is The direction of template characteristic point and input feature vector point is poor;
Wherein, the framing mask in S9400 can be identified below:
Radius=ri n/mFormula (S9400-1)
Wherein in formula, n, m are pre-defined integer, take m to be more than n.
10. a kind of stored value card shared system based on security mechanism, the system, which is realized, includes following process:
Step 1000, businessman sets the stored value card of distribution, the stored value card parameter of setting is including at least storing up by stored value card enterprises end Value card type category information, buy amount information, give one kind in amount information, discount information and combinations thereof and/or more parameters;
Step 2000, card user is purchased in its stored value card logged in client, and stored value card is specified and shares to other users;With short Letter or wechat mode notify other users, and are the corresponding attached stored value card of other users generation;Purchase card user passes through stored value card Pass through attached stored value card, the remaining sum of the shared stored value card with other users;
Step 3000, the stored value card client that other users log at it, sticked into based on attached rechargeable card using shared Stored Value Row consumption;
Step 4000, after other customer consumptions, businessman will be seen that stored value card is consumed, so as to allow other users to complete transaction;
Data in all of above step are stored in stored value card Platform Server with each step by network.
11. system as claimed in claim 10, it also includes:
Stored value card enterprises end, stored value card client include running in the form of App softwares or wechat on mobile terminals.
12. system as claimed in claim 10, it also includes:
Step 4000 is specially:
Other customer consumptions include:The actual payment of discount that other users enjoy according to shared stored value card, Payment Amount pass through storage Value card Platform Server is directly transferred accounts to the account of purchase card user, purchase card user stored value card and realized by stored value card Platform Server Deng the payment of denomination payment, the purchase card user account includes at least following a kind of:Bank card account, wechat change account, Alipay Account;
Businessman will be seen that stored value card is consumed to be included so as to allow other users to complete transaction:Businessman sees purchase card user stored value card Consumed with sharing mode, and complete to merchandise;Purchase card user, other users, businessman will receive the friendship of short message or wechat mode Easily successfully record;If any one link mistake in other customer consumptions, payment consumption process by rollback, and prompt businessman, Other users, purchase card user, are failed based on shared stored value card transactions.
13. system as claimed in claim 10, it also includes:
Other users include:Kith and kin user;
In step 2000, in addition to
It is the attached stored value card of kith and kin to generate corresponding attached Stored Value Card Type for kith and kin user.
14. system as claimed in claim 10, it also includes:
Other users include:Stranger user;
Purchase card user can be turned on and off stranger's users to share pattern at any time;
In step 2000, in addition to:
It is strange attached stored value card to generate corresponding attached Stored Value Card Type for strange user.
15. system as claimed in claim 10, it also includes:
In step 2000, stored value card is specified before sharing to other users, including sub-step 2200, carry out purchasing card user identity Certification;
And and/or
In step 3000, before being consumed based on attached rechargeable card by shared stored value card, including sub-step 3200, enter The other authenticating user identifications of row.
16. system as claimed in claim 15, wherein authentication include:
S5100, authentication user interface is shown to user;
S5200, stored value card client gather the user by fingerprint collecting processing module FingerprintCollector and referred to Line,;
S5300, stored value card client carry out feature extraction to the user fingerprints, obtain fingerprint characteristic value FA;
S5400, stored value card client are digitally signed to the fingerprint characteristic value FA of the user;
S5500, stored value card client are established with stored value card Platform Server and communicate to connect and send certification request;
S5510, the user identifies IDA using the private key PriKeyUser encryption users of user oneself and realizes signature, by the user Signature to stored value card Platform Server send certification request, wherein;The user's that stored value card Platform Server passes through preservation Public key, the signature is verified to obtain the mark IDA of the user;
S5520, stored value card Platform Server produces time limit TAServer, current data NA, by stored value card Platform Server itself Public key PubKeyServer, current data NA and time limit TAServer, with being returned after the public key PubKeyUser of user encryption Back to the user of stored value card client;
S5530, the user of stored value card client receive the public key PubKeyServer of stored value card Platform Server, current number According to NA and time limit TAServer, the above-mentioned fingerprint characteristic value FA of acquisition equals tuple { TAServer, NA, FA } with stored value card Stored value card Platform Server is sent to after the public key PubKeyServer encryptions of platform server;
S5600, stored value card Platform Server carry out fingerprint matching using fingerprint matching module FingerprintMatch;
S5700, stored value card Platform Server is to stored value card client return authentication result.
17. system as claimed in claim 16, wherein fingerprint collecting processing module FingerprintCollector, including:
S7100, fingerprint image acquisition;
S7200, fingerprint image preprocessing, including the normalization of S7210 fingerprint images, S7220 Fingerprint enhancements, S7230 fingerprints Image thinning, the fingerprint image ProcessedFingerprintImage after return processing;
S7300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S7300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized minutiae point Direction, tk(k=1,2) is characterized the classification of minutiae point, i.e. k=1 is end points, k=2 is bifurcation;The direction of end points is it The direction of place crestal line trend, the direction of bifurcation be angle in three crestal lines where the point between other two crestal lines all For the opposite direction of the crestal line at obtuse angle, (0≤θ is defined as<2π);Fingerprint image is after binaryzation, refinement, the ash of each pixel Degree be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using 3 × 3 Template is come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2, P3, P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these consecutive points When meeting formula below, it is possible to judge P classification:
If meet formula (5.1), then pixel P is end points;If meet formula (5.2), then pixel P is bifurcated Point;Judge rear and mark the classification of the pixel, scanning is tracked to the pixel not being labeled, until institute Untill some minutiae features have detected;Then the row, column coordinate where the pixel P in fingerprint image is labeled as minutiae point The position coordinates (x, y) of feature, the origin using the starting point of image upper left angular direction as coordinate system, it is to the right the positive direction of x-axis, to It is the positive direction of y-axis down;
Pixel P eight neighborhood encodes --- and each pixel of refined image only needs 1bit, and pixel P eight neighborhood pixel is pressed According to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is public by this byte representation, coding Formula is:
NpShare 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1, there is 8 kinds Combination, i.e. NpIn there are 8 kinds of values to represent that pixel P are end points;For bifurcation, there are 3 mutual disjunct pictures in its eight neighborhood Element is 1, then NpIn there are 12 kinds of values to be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds of possibilities, Define Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding DpAnd benefit Code D'pRelation be:
……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table that the category table based on eight neighborhood coding is 256 × 1, illustrate the eight of pixel P Neighborhood encodes the corresponding relation between its classification, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 be bifurcated Point;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents between 8 kinds of tracking directions of advance and row, column increment of coordinate Relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, represents the pass between the direction of 8 kinds of neighborhood codings and the subsequent point of tracking System, first is classified as eight neighborhood coding, and second is classified as direction encoding;
Bifurcation direction table --- be 12 × 4 tables, represent 12 kinds of bifurcations eight neighborhood coding and three tracking directions it Between relation, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, average distances of the λ between streakline, λ=6 are taken, in the direction of extraction minutiae feature When, with the coordinate (x, y) of the point for start position, using the direction searched in the direction table corresponding to the point as starting point direction, so Streakline is tracked according to the coding track algorithm of eight neighborhood afterwards.For end points direction, end points (x is located at0,y0) place streakline The coordinate that tracking terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0-Y))…… (5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be obtained by formula (5.5) To 3 directions, the angle between direction two-by-two is then calculated, with the opposite direction of streakline that two other streakline angle is obtuse angle just It is the direction of the bifurcation.Tracking terminate after result be placed in a characteristic vector table, wherein characteristic vector form be D (x, y,θ,tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S7310, eight neighborhood coding is carried out after fingerprint image refinement and obtains coding and category table, direction and increment of coordinate table, end Point direction table, bifurcation direction table;
S7320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S7330, judge whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S7340 preserves the coordinate of current pixel point, according to search direction and increment of coordinate table renewal coordinate parameters;S7350 foundations Current eight neighborhood coding lookup direction and category table, determine whether end points or bifurcation;
S7360, if it is determined that whether being end points or bifurcation result is no, then seek direction complement code renewal direction encoding;
S7370, step-length add 1;Return to step S7330;
If it is determined that reach set step-length be it is yes,
S7380, the coding track algorithm of Finger print characteristic abstract terminate;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing Finger print informations of the ProcessedFingerprintImage as collection.
18. system as claimed in claim 16, wherein fingerprint matching module FingerprintMatch includes:
S9100, select any two characteristic point in template fingerprint image and input fingerprint image as a reference point right;It is if all Possible reference point was investigated, and went to step S9500;
S9200, using formula (S9200-6) by template fingerprint image and input fingerprint image characteristic point series in each spy The corresponding respective reference point of sign point is converted into polar coordinates;
S9300, according to the incremental order of polar angle, arrange the characteristic point series of template fingerprint image and the feature of input fingerprint image Point series;
S9400, in sequence in the characteristic point series of matching template fingerprint image and the characteristic point series of input fingerprint image Each characteristic point;A framing mask is selected first around the characteristic point of template fingerprint image, framing mask size is by formula (S9400-1) determine, if the characteristic point for having same type in fingerprint image is inputted is located in framing mask, and the input refers to The direction difference of the characteristic point of characteristic point and the template fingerprint image in print image is in threshold range set in advance, then it is assumed that The two Feature Points Matchings, and will matching score value S increases by 1;Finish, go to if all characteristic points have all been investigated in template S9100;
S9500, from all fixed reference feature point centerings, find out the matching score value S of maximum, and as template fingerprint image and Input the matching fraction of fingerprint image;If the matching fraction is more than threshold value, then it is assumed that input fingerprint is with template fingerprint from same One finger;
Wherein, in S9100 select characteristic point it is as a reference point to including:
A characteristic point on fingerprint image is represented with P (x, y, d, t);Wherein x, y formula rectangular co-ordinate value;D is the side of characteristic point To angle increase, scope 0 to 359 when rotating counterclockwise;T is feature vertex type, is worth and represents that this feature point is streakline end points for 1, It is worth and represents that characteristic point is streakline bifurcation for 2;
Characteristic vector set and set of eigenvectors in input fingerprint image characteristics dot pattern in template fingerprint characteristics of image dot pattern Conjunction is expressed as
P={ pi|p1,p2,……,pMFormula (S9100-1)
Q={ qj|q1,q2,……,qNFormula (S9100-2)
In formula, P is template fingerprint characteristics of image point set, including M characteristic point, these characteristic points p1,p2,……,pMTable Show;Q is to input fingerprint image characteristics point set, including N number of characteristic point, these characteristic points q1,q2,……,qNRepresent, typically For M ≠ N;
Template fingerprint image is subjected to characteristic point series with the characteristic point in input fingerprint image directly as reference point Match somebody with somebody;The each pair characteristic point inputted in fingerprint image and template fingerprint image is all probably fixed reference feature point pair;Forming altogether has M × N To fixed reference feature point;
Wherein, the reference point in S9200 is converted into polar coordinates and included:
Fixed reference feature point is determined to afterwards, by template fingerprint characteristics of image point set in formula (S9100-1) and formula (S9100-2) Coordinate transformation with each characteristic point in input fingerprint image characteristics point set is polar coordinates;It is assumed that template fingerprint characteristics of image Point pi(xi,yi,di,ti) and input fingerprint image characteristics point qr(xr,yr,dr,tr) it is reference point;It is every in gathering input Individual characteristic point qj(x j,yj,dj,t j) according to formula (S9200-6) progress coordinate transform;Q is used under polar coordinatesj(rjjj,tj) represent a characteristic point:
θj=arctan [(yj-yr)/(xj-xr)]+di-dr(S9200-6)
αj=dj-dr(S9200-6)
tj=tj(S9200-6)
In formula, rjFor polar diameter, θjFor polar angle, αjFor the direction of characteristic point under polar coordinate system, tjIt is characterized type a little;di-drIt is The direction of template characteristic point and input feature vector point is poor;
Wherein, the framing mask in S9400 can be identified below:
Radius=ri n/mFormula (S9400-1)
Wherein in formula, n, m are pre-defined integer, take m to be more than n.
CN201710501595.2A 2017-06-27 2017-06-27 A kind of stored value card information sharing method and its system Pending CN107403317A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710501595.2A CN107403317A (en) 2017-06-27 2017-06-27 A kind of stored value card information sharing method and its system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710501595.2A CN107403317A (en) 2017-06-27 2017-06-27 A kind of stored value card information sharing method and its system

Publications (1)

Publication Number Publication Date
CN107403317A true CN107403317A (en) 2017-11-28

Family

ID=60404477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710501595.2A Pending CN107403317A (en) 2017-06-27 2017-06-27 A kind of stored value card information sharing method and its system

Country Status (1)

Country Link
CN (1) CN107403317A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108198032A (en) * 2018-01-02 2018-06-22 北京客度科技有限公司 A kind of management method of shared consumption card
CN108229961A (en) * 2018-01-02 2018-06-29 北京客度科技有限公司 A kind of shared method that consumption card is shared using other people
CN108288175A (en) * 2018-01-02 2018-07-17 北京客度科技有限公司 A kind of method of shared consumption card
CN110517037A (en) * 2019-08-26 2019-11-29 咪咕文化科技有限公司 Electronic value card sharing method and device, electronic equipment and storage medium
CN113066228A (en) * 2021-03-29 2021-07-02 广州广日电梯工业有限公司 Elevator selling method and elevator selling device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103329154A (en) * 2010-03-08 2013-09-25 高通股份有限公司 System and method for creating and managing a shared stored value account associated with a client device
CN105207776A (en) * 2014-06-18 2015-12-30 中标软件有限公司 Fingerprint authentication method and system
CN105869276A (en) * 2016-06-18 2016-08-17 任明和 City intelligent transportation shared payment and identity safety certification method
CN105939343A (en) * 2016-04-14 2016-09-14 江苏马上游科技股份有限公司 Client and server bidirectional authentication method based on information secondary coding
US9672512B1 (en) * 2014-01-02 2017-06-06 Sprint Communications Company L.P. Processor routing number for mobile communication service provider billing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103329154A (en) * 2010-03-08 2013-09-25 高通股份有限公司 System and method for creating and managing a shared stored value account associated with a client device
US9672512B1 (en) * 2014-01-02 2017-06-06 Sprint Communications Company L.P. Processor routing number for mobile communication service provider billing
CN105207776A (en) * 2014-06-18 2015-12-30 中标软件有限公司 Fingerprint authentication method and system
CN105939343A (en) * 2016-04-14 2016-09-14 江苏马上游科技股份有限公司 Client and server bidirectional authentication method based on information secondary coding
CN105869276A (en) * 2016-06-18 2016-08-17 任明和 City intelligent transportation shared payment and identity safety certification method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
车荣禄: ""指纹图像的特征提取与匹配算法研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108198032A (en) * 2018-01-02 2018-06-22 北京客度科技有限公司 A kind of management method of shared consumption card
CN108229961A (en) * 2018-01-02 2018-06-29 北京客度科技有限公司 A kind of shared method that consumption card is shared using other people
CN108288175A (en) * 2018-01-02 2018-07-17 北京客度科技有限公司 A kind of method of shared consumption card
CN110517037A (en) * 2019-08-26 2019-11-29 咪咕文化科技有限公司 Electronic value card sharing method and device, electronic equipment and storage medium
CN113066228A (en) * 2021-03-29 2021-07-02 广州广日电梯工业有限公司 Elevator selling method and elevator selling device

Similar Documents

Publication Publication Date Title
US10521777B2 (en) Crypto digital currency (virtual payment cards) issued by central bank or other issuer for mobile and wearable devices
US11887077B2 (en) Generating exchange item utilization solutions in an exchange item marketplace network
US10521776B2 (en) UN currency (virtual payment cards) issued by central bank or other issuer for mobile and wearable devices
KR102103931B1 (en) Method and system for managing payment and document computing using identifiable tags and artificial intelligence
US11164228B2 (en) Method and medium for determining exchange item compliance in an exchange item marketplace network
CN107403317A (en) A kind of stored value card information sharing method and its system
US20070174208A1 (en) System and Method for Global Automated Address Verification
KR101961899B1 (en) Method for providing auto-payment service considering exchange rate between virtual and flat money
CN103858141A (en) Payment device with integrated chip
KR102173129B1 (en) System for providing local currency and method thereof
CN105164707A (en) Facilitating mobile device payments using mobile payment account, mobile barcode and universal digital mobile currency
WO2018010211A1 (en) Currency transaction application platform and method
JP2000509859A (en) Apparatus and method for issuing and executing guaranteed securities to prepare for foreign exchange losses
CN115605893A (en) System, apparatus and method for tracking certified clean energy using blockchains
KR20190076396A (en) Surplus energy trading system among energy prosumers using block chain system
Serbulova Fintech as a transformation driver of global financial markets
US20230125124A1 (en) Obtaining conditions data for utilizing an exchange item
CN109741051A (en) A kind of electronic card graphic code realizes the method and system of transaction
CN115797060A (en) Method and device for tracking fund flow direction, electronic equipment and storage medium
KR20050111653A (en) System and method for payment by using picture information of face, information storing medium
CN113689215A (en) Tape quantity purchase settlement method, system, computer equipment and storage medium
GB2475301A (en) Payment Authentication System and Processing Method
Zhang The Incompatibility of Bitcoin's Strong Decentralization Ideology and Its Growth as a Scalable Currency
KR20210001915A (en) Crowd funding platform for research goods based on block chain
US20230124708A1 (en) Updating a set of public benefit assets secure token

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171128

RJ01 Rejection of invention patent application after publication