CN107016546A - A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism - Google Patents

A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism Download PDF

Info

Publication number
CN107016546A
CN107016546A CN201710200990.7A CN201710200990A CN107016546A CN 107016546 A CN107016546 A CN 107016546A CN 201710200990 A CN201710200990 A CN 201710200990A CN 107016546 A CN107016546 A CN 107016546A
Authority
CN
China
Prior art keywords
user
point
information
fingerprint
characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710200990.7A
Other languages
Chinese (zh)
Inventor
杜传奎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Mdt Infotech Ltd
Original Assignee
Shanghai Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Mdt Infotech Ltd filed Critical Shanghai Mdt Infotech Ltd
Priority to CN201710200990.7A priority Critical patent/CN107016546A/en
Publication of CN107016546A publication Critical patent/CN107016546A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a kind of autonomous transaction flow custom-built system based on biological identification security mechanism and method.Wherein autonomous transaction flow customization includes the first user and independently sets the Transaction Information that second user needs are provided by " seller's enquirement " mode according to the transaction flow feature of commodity/service;Second user fills in answer information when buying commodity/service;Information is answered above and is supplied to the first user with sequence information instrument, so as to complete transaction.Above procedure avoids the process linked up repeatedly with regard to Transaction Information between the first user and second user, effectively realizes the success rate of online " silent to clap " commodity/service.Simultaneously by fingerprint recognition certification and matching technique, it is ensured that the authentication safety and data communications security of e-commerce system, the security of transaction is improved, data-handling efficiency is improved.

Description

A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism
First, technical field
The present invention relates to a kind of system and method for autonomous formulation transaction flow, particularly one kind possesses biological identification The system and method for the autonomous formulation transaction flow of security mechanism, improve computational efficiency, have saved the time and have linked up cost, Human resources are saved, data-handling efficiency is improved, reduces cumbersome examination and approval procedures etc., effectively promote technological progress.
2nd, background technology
With the progress of computer science and technology, the upper many facilities of human lives are brought.Plus the flourishing hair of ecommerce Exhibition, many commodity or service content, all can pass through electronic trade platform (electronic trading platform) and carry out Trade deal.Ecommerce (electronic commerce) or electronic transaction, refer to that enterprise or businessman provide one soon Fast and efficient transaction platform, the client of enterprise or ordinary consumer can be traded through this transaction platform, purchase Buy commodity or other service items.
In daily life, the net purchase based on ecommerce has become the important component of people's production and living.But Be the electronic business platforms such as Taobao, day cat, Jingdone district, Amazon Web or APP user interfaces in, be subordinate to different industries, kind The commodity of class and/or service, it is presented to buyer and the user interface and Transaction Information of seller are similar, it is impossible to meet each The difference varied with required user profile of formula various kinds commodity or service transacting flow, causes user before concluding the transaction Need that numerous demand for commodity information, user profile are discussed by chatting, transaction can be facilitated, taken time and effort.
For example:Example 1 (see Fig. 1, Fig. 2):Robot and machine industry, because both parties are needed under substantial amounts of line Exchange, and cause transaction not reach directly on line.Because adding shopping cart link, only exist one " giving seller's message " Functional areas, and a large amount of industries in reality, the demand information that seller very must accurately obtain buyer is possible to and buys Family concludes the transaction.For example, robot and machine industry have different, specific demand to the precision of processing, these exist It can not present and obtain in traditional net purchase transaction interface.
Example 2 (see Fig. 3, Fig. 4):The International Express business on the line of certain electronic business platform.Because seller is necessary Obtain the sending and receiving part people information and cargo item information of the express delivery and be in no position to take possession of, force both parties to be forced through Chat tool or other communication way, confirm above- mentioned information.Trading efficiency is caused to reduce.And shopping cart link is being added, buy Family can not provide the address information of express delivery in transaction page.Greatly reduce the consumption experience of buyer.
Example 3 (see Fig. 5, Fig. 6):Insured business in the line of certain electronic business platform.Determined by business platform amount body " frame is filled out in choosing " of one date of birth, it is achieved thereby that seller obtains rapidly the function of seller's age information.Clicking on " immediately Insure " after, the page of buyer's fill message has been customized by e-commerce platform, has helped seller quickly to obtain buyer significantly Transaction Information, the commodity online transaction quantity has reached 29995 parts.
Shown " buyer's fill message " function, is opened by the webpage/APP and IT of e-commerce platform completely in case 3 Hair team is customized for industry, but the information requirement content of all trades and professions is entirely different, it is necessary to which IT technical researches team is Each different types of industry carries out substantial amounts of investigation and housekeeping, takes huge, and often due to electric business platform Industry investigation is inaccurate, causes " buyer's fill message " Pages Design unreasonable, and then causes frequently modification or even reduction consumption Person experiences.
Accordingly, it would be desirable to a kind of technical scheme so that e-commerce platform research staff is no longer needed for different commodity/services The miscellaneous transaction flow of customization that varies of transaction flow, it is to avoid e-commerce platform is miscellaneous due to not knowing about The dealing custom of commodity/service transaction flow and information requirement, so as to customize the product trading flow made mistake.By " seller carries Ask " function is released to " online seller ", and " seller's enquirement " is independently carried out by seller and independently determines transaction flow equivalent to by seller, Help seller is disposable in buyer claps monocyclic section to obtain the necessary information related to transaction, so as to reduce the time exchanged under line And the cycle, quickly allow both parties to complete transaction, the buying experience of buyer is lifted, while people also greatly reduces to businessman Power capital.
The technical scheme is a kind of adaptive solution.Applicable industry includes and is not limited to:Banking and insurance business field, Robot industry, machine industry, repairs profession, real estate industry, leasing industry, automobile services industry, legal services industry, section Skill service trade, raw material industry, Express Logistics industry, processing service industry, physical culture and entertainment industry, beauty and personal nursing row Industry, lodging industry, neghborhood services industry, business service industry etc..
On the other hand, in existing e-commerce platform, the security authentication mechanism of user is mostly just based on user, close There is user and easily forget, be easily intercepted by a third party, easily by viral wooden horse in the means such as code, short message verification code, above means The potential safety hazard such as steal.User the information of e-commerce platform relate generally to the important Transaction Information of user, business secret and Financial Information, if being invaded by other people, can cause the great economy of user.Therefore the system needs a kind of new safety simultaneously Mechanism, it is to avoid the leakage of sensitive transactions data and third party falsely use seller's identity and/or buyer's identity.
3rd, the content of the invention
In order to solve the problem of above transaction flow can not adaptively be customized by seller, and existing e-commerce platform peace The deficiency that full mechanism village is present, the present invention provides a kind of following technical scheme, and the program can be a kind of method.
A kind of method for the autonomous formulation transaction flow for possessing security mechanism, it includes
The step of identity when being logged in based on the user of biometrics certification first or second user;
First user is by the first subscription client when electronic trade platform uploads commodity/service, and the first user passes through " addition is putd question to " function, sets " seller's enquirement ", is included in " the seller's enquirement " of setting --- according to commodity/service species characteristics And need the Transaction Information of answer;
Second user in purchase commodity/service and enters payment circle by second user client on electronic trade platform Before face, the first user of display is " seller's enquirement " set in advance, and second user fills in answer information for " seller's enquirement ", And pay the bill;
First subscription client is connected by network service and with the webserver, network service with second user client " seller's enquirement ", the answer information, the Transaction Information, the sequence information, the webserver described in device collection and storage Store the first user, the secure authenticated information of second user;
The safe step that the first user or second user pass through transmitted data on network is ensured based on biometrics;
First user obtains while above commodity/service sequence information is received and answers information above, completes transaction.
Further, this method also includes:
It is described to set " seller's enquirement " also to include --- the first user " is sold by " addition is putd question to " function, self-defined addition Family put question to " the problem of column, title content, whether the self-defined setting problem column is to fill out, it is self-defined setting the problem column Purpose answer type.
Further, this method also includes:
It is described to set " seller's enquirement " also to include --- the first user is self-defined by clicking on once " attachment request " function Increase by one uploads attachment request, and the first user sets type of attachment title in " filling in attachment title " column, and sets Whether the annex is to upload, and set the type of attachment, and wherein the type of attachment at least may include file, picture.
Further, this method also includes:
It is described to set " seller's enquirement " also to include --- the first user puts question to form simultaneously by " form enquirement " function, generation Line number, columns are set, by puing question to the drop-down menu in form to select the answer type each arranged requirement, setting what is each arranged " title ", by selecting " single file text " or " multiline text " to define the height of " OK ", adjusts each by drag operation The width of row.
Further, this method also includes:
The Transaction Information for needing to answer may include --- following at least one and combinations thereof:
If commodity/service is related to general merchandise/service, the Transaction Information for needing to answer can at least include --- buy Family's name, age, sex, date of birth, identification card number, Business Name, place city, better address, postcode, contact People, phone number, landline telephone are OK, contact before delivery;
If commodity/service is related to on-line purchase international courier service, the Transaction Information for needing to answer can be wrapped at least Include --- sender information, sender information, express delivery article title, unit price, the amount of money, weight information;
If commodity/service is related to online sales insurance products, the Transaction Information for needing to answer can be wrapped at least Include --- insurer's information, insurant's information, beneficiary's information;
If commodity/service is related to online sales house property, the Transaction Information for needing to answer can at least include --- buy People from room identity card picture copy and the other relevant informations of buyer;
If commodity/service is related to online sales " law Online reference service ", the Transaction Information for needing to answer can At least include buyer's name, phone number, telephone call date and time;
If commodity/service is related to " lease house property " service online, the Transaction Information for needing to answer can be wrapped at least Include --- identity card picture copy, buyer's Real Name and phone number;
If commodity/service is related to " moving service " online transaction, the Transaction Information for needing to answer can be wrapped at least Include --- origin, destination and the floor information of removal of home;
If commodity/service is related to online sales packed in cases thing and printing is serviced, the Transaction Information for needing to answer Can at least include --- packing material and the print content or upload document of printing service;
If commodity/service is related to machine-building service, the Transaction Information for needing to answer can at least include --- weldering Connect technique specific requirement, welding material, welding maximum gauge, special welding requirements, due date.
The present invention provides a kind of following technical scheme, and the program can be a kind of system.
A kind of system for the autonomous formulation transaction flow for possessing security mechanism, it includes:
Authenticating user identification module, identity when being logged in based on the user of biometrics certification first or second user;
First subscription client, the first user uploads commodity/service by the first subscription client in electronic trade platform When, the first user is set " seller's enquirement ", included in " the seller's enquirement " of setting by " addition is putd question to " function --- according to business Product/type service feature and need answer Transaction Information;
Second user client, second user by second user client on electronic trade platform purchase commodity/ Service and enter before payment interface, will show that the first user is " seller's enquirement " set in advance, second user is for " seller carries Ask " answer information is filled in, and pay the bill;
The webserver, the first subscription client connects by network service and with the webserver with second user client Connect, " seller's enquirement ", the answer information, the Transaction Information, the sequence information described in webserver collection and storage, The user of webserver storage first, the secure authenticated information of second user;
Data transmission security module, ensures that the first user or second user pass through network transmission number based on biometrics According to safety;
First user obtains while above commodity/service sequence information is received and answers information above, completes transaction.
Further, the system can also include:
It is described to set " seller's enquirement " also to include --- the first user " is sold by " addition is putd question to " function, self-defined addition Family put question to " the problem of column, title content, whether the self-defined setting problem column is to fill out, it is self-defined setting the problem column Purpose answer type.
Further, the system can also include:
It is described to set " seller's enquirement " also to include --- the first user is self-defined by clicking on once " attachment request " function Increase by one uploads attachment request, and the first user sets type of attachment title in " filling in attachment title " column, and sets Whether the annex is to upload, and set the type of attachment, and wherein the type of attachment at least may include file, picture.
Further, the system can also include:
It is described to set " seller's enquirement " also to include --- the first user puts question to form simultaneously by " form enquirement " function, generation Line number, columns are set, by puing question to the drop-down menu in form to select the answer type each arranged requirement, setting what is each arranged " title ", by selecting " single file text " or " multiline text " to define the height of " OK ", adjusts each by drag operation The width of row.
Further, the system can also include:
The Transaction Information for needing to answer may include --- following at least one and combinations thereof:
If commodity/service is related to general merchandise/service, the Transaction Information for needing to answer can at least include --- buy Family's name, age, sex, date of birth, identification card number, Business Name, place city, better address, postcode, contact People, phone number, landline telephone are OK, contact before delivery;
If commodity/service is related to on-line purchase international courier service, the Transaction Information for needing to answer can be wrapped at least Include --- sender information, sender information, express delivery article title, unit price, the amount of money, weight information;
If commodity/service is related to online sales insurance products, the Transaction Information for needing to answer can be wrapped at least Include --- insurer's information, insurant's information, beneficiary's information;
If commodity/service is related to online sales house property, the Transaction Information for needing to answer can at least include --- buy People from room identity card picture copy and the other relevant informations of buyer;
If commodity/service is related to online sales " law Online reference service ", the Transaction Information for needing to answer can At least include buyer's name, phone number, telephone call date and time;
If commodity/service is related to " lease house property " service online, the Transaction Information for needing to answer can be wrapped at least Include --- identity card picture copy, buyer's Real Name and phone number;
If commodity/service is related to " moving service " online transaction, the Transaction Information for needing to answer can be wrapped at least Include --- origin, destination and the floor information of removal of home;
If commodity/service is related to online sales packed in cases thing and printing is serviced, the Transaction Information for needing to answer Can at least include --- packing material and the print content or upload document of printing service;
If commodity/service is related to machine-building service, the Transaction Information for needing to answer can at least include --- weldering Connect technique specific requirement, welding material, welding maximum gauge, special welding requirements, due date.
Further, in above method or system, the peace that the first user or second user pass through transmitted data on network is ensured Entirely, it may further include:
Wherein user is the first user or second user, and wherein client is the first user client corresponding with the first user End or second user client corresponding with second user;
S2100, the information input of user is completed, and when clicking on submission, user fingerprints are gathered by client;Wherein by referring to Line acquisition processing module FingerprintCollector obtains user fingerprints information, and the user fingerprints information is included after processing Fingerprint image ProcessedFingerprintImage and fingerprint characteristic value FA;
S2200, input information after MD5 is hashed, is signed with user fingerprints information with the RSA private keys of user, is formed Digital signature;
S2300, client generates a random IDEA key, using the RSA public key encryptions of data server, forms numeral Envelope;
S2400, input information, digital signature are encrypted with IDEA keys, ciphertext is formed;
S2500, data server is sent to by ciphertext and digital envelope;
S2600, after data server is received, opens digital envelope with the RSA private keys of data server, obtains client IDEA keys;
S2700, data server uses the IDEA keys of client, unties ciphertext;
S2800, input information obtains hashed value 1 by MD5, while untiing digital signature using the RSA public keys of client Hashed value 2 is obtained, whether consistent compares two results;If consistent, pass through fingerprint matching module FingerprintMatch schools The fingerprint of user is tested, if finger-mark check passes through, starts the operation that input information is stored in data server, and preservation result Client is sent back, data transfer still uses IDEA encryption;Otherwise, refusal input information is stored in the operation of data server;
S2900, client is received after the response of data server, if being stored in successfully, generation input information deposit daily record, is carried Show user's input information success.
Further, in above method or system, the identity when user of certification first or second user are logged in can enter one Step includes:
Wherein user is the first user or second user, and wherein client is the first user client corresponding with the first user End or second user client corresponding with second user;
S3100, user's login user interface is shown to user;
S3200, client gathers the user fingerprints by fingerprint collecting processing module FingerprintCollector,;
S3300, client carries out feature extraction to the user fingerprints, obtains fingerprint characteristic value FA;
S3400, client is digitally signed to the fingerprint characteristic value FA of the user;
S3500, client is set up with data server and communicates to connect and send certification request;
S3510, the user realizes signature using private key PriKeyUser encryption user's marks IDA of user oneself, by this The signature of user sends certification request to data server, wherein;The public key for the user that data server passes through preservation, checking The signature obtains the mark IDA of the user;
S3520, data server produces time limit TAServer, current data NA, by the public key of data server itself PubKeyServer, current data NA and time limit TAServer, visitor is returned to after being encrypted with the public key PubKeyUser of the user The user at family end;
S3530, the user of client receive the public key PubKeyServer of data server, current data NA and when TAServer is limited, by the above-mentioned fingerprint characteristic value FA of acquisition, the public key of tuple { TAServer, NA, FA } data server Data server is sent to after PubKeyServer encryptions;
S3600, data server carries out fingerprint matching using fingerprint matching module FingerprintMatch;
S3700, data server is to client return authentication result.
Further, in above method or system, fingerprint collecting processing module FingerprintCollector, Ke Yijin One step includes:
S5100, fingerprint image acquisition;
S5200, fingerprint image preprocessing, including the normalization of S5210 fingerprint images, S5220 Fingerprint enhancements, S5230 Fingerprint image is refined,
Fingerprint image ProcessedFingerprintImage after return processing;
S5300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S5300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized carefully The direction of node, tkIt is that end points, k=2 are bifurcation that (k=1,2), which is characterized the classification of minutiae point, i.e. k=1,;The direction of end points It is the direction of crestal line trend where it, the direction of bifurcation is the folder in three crestal lines where the point between other two crestal lines Angle is all the opposite direction of the crestal line at obtuse angle, is defined as (0≤θ<2π);Fingerprint image is after binaryzation, refinement, each pixel Gray scale be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using 3 × 3 templates are come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2, P3, P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these phases When adjoint point meets formula below, it is possible to judge P classification:
If meeting formula (5.1), then pixel P is end points;If meeting formula (5.2), then pixel P is Bifurcation;Classification that is rear and marking the pixel is judged, scanning is tracked to not labeled pixel, always Untill all minutiae features have been detected;Then by the row, column coordinate where the pixel P in fingerprint image labeled as thin The position coordinates (x, y) of node diagnostic, is to the right the pros of x-axis using the starting point of image upper left angular direction as the origin of coordinate system To downward is the positive direction of y-axis;
Pixel P eight neighborhood is encoded --- and each pixel of refined image only needs 1bit, by pixel P eight neighborhood picture Element is according to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is compiled by this byte representation Code formula be:
NpHave 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1, There are 8 kinds of combinations, i.e. NpIn there are 8 kinds of values to represent that pixel P is end points;For bifurcation, there are 3 to be mutually not attached in its eight neighborhood Pixel be 1, then NpIn have 12 kinds of values be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds can Can property, definition Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding Dp With complement code D'pRelation be:……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table for being 256 × 1 based on the category table that eight neighborhood is encoded, illustrate pixel P Eight neighborhood coding its classification between corresponding relation, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 are Bifurcation;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents 8 kinds of tracking directions of advance and row, column increment of coordinate Between relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, between the direction for representing 8 kinds of neighborhoods codings and the subsequent point of tracking Relation, first be classified as eight neighborhood coding, second is classified as direction encoding;
Bifurcation direction table --- it is 12 × 4 tables, represents that the eight neighborhood of 12 kinds of bifurcations is encoded and three track sides Relation between, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, λ is the average distance between streakline, takes λ=6, extracting minutiae feature During direction, with the coordinate (x, y) of the point for start position, starting point side is in the direction searched using in the direction table corresponding to the point To being then tracked according to the coding track algorithm of eight neighborhood to streakline.For end points direction, end points (x is located at0,y0) place The coordinate that Ridge following terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0- Y))……(5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be by formula (5.5) 3 directions are obtained, the angle between direction two-by-two is then calculated, with the streakline that two other streakline angle is obtuse angle Opposite direction is exactly the direction of the bifurcation.Result after tracking terminates is placed in a characteristic vector table, wherein characteristic vector shape Formula is D (x, y, θ, tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S5310, carries out eight neighborhood coding and obtains coding and category table, direction and increment of coordinate after fingerprint image refinement Table, end points direction table, bifurcation direction table;
S5320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S5330, judges whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S5340 preserves the coordinate of current pixel point, and coordinate parameters are updated with increment of coordinate table according to search direction;S5350 According to current eight neighborhood coding lookup direction and category table, end points or bifurcation are determined whether;
S5360, if it is determined that whether being end points or bifurcation result is no, then asks direction complement code to update direction encoding;
S5370, step-length adds 1;Return to step S5330;
If it is determined that reach set step-length be it is yes,
S5380, the coding track algorithm of Finger print characteristic abstract terminates;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics Value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing ProcessedFingerprintImage as collection finger print information.
Further, in above method or system, fingerprint matching module FingerprintMatch can be wrapped further Include:
Step S6100:Datum mark is asked for using 3, three side similar principles, is referred to according to input fingerprint image and input template Datum mark is to asking for X, the position deviation in Y-coordinate direction and the rotation transformation factor in print image, so that it is determined that transformation factor collection;
Step S6200:First time matching is carried out to input fingerprint image and template fingerprint image, input fingerprint is calculated respectively Image and the bifurcation and end points number in template fingerprint interesting image area, determine whether to enter next stage matching;
Step S6300:Second is carried out using the method for variable gauge box to match, the rectangular area around selected characteristic point As gauge box, as long as the characteristic point of the fingerprint to be identified after conversion falls in this region, direction is consistent and type is identical, then It is considered match point;
Step S6400:Set the point logarithm of successful match, the ratio of pairing points and corresponding fingerprint characteristic sum, each With point to the threshold value such as discrepancy score summation finally judge whether input fingerprint image matches with template fingerprint image;
Wherein step S6100 further comprises:
The set of characteristic points Q of set of characteristic points P and master-fingerprint image for the characteristic value of the fingerprint image of input, point It is not expressed as:
P={ p1,p2,...,pm}={ (xp1,yp1p1,Tp1),(xp2,yp2p2,Tp2),...,(xpm,ypmpm, Tpm)};
Q={ q1,q2,...,qn}={ (xq1,yq1q1,Tq1),(xq2,yq2q2,Tq2),...,(xqn,yqnqn, Tqn)};
Wherein (xpi,ypipi,Tpi) and (xqj,yqjqj,Tqj) ith feature point and point set in point set P are have recorded respectively 4 information of j-th of characteristic point in Q:X-coordinate, Y-coordinate, direction θ and feature vertex type T;
Assuming that the certain point p in input point set PiCharacteristic information be (xpi,ypipi,Tpi), it is corresponding in template point set Q Point qjCharacteristic information be (xqj,yqjqj,Tqj), solved according to formula 6.1 and formula 6.2,
If changed factor (Δ x, Δ y, Δ θ) can be tried to achieve, then it is assumed that piWith qjIt is similar;Δ x and Δ y distinguishes wherein in above formula For the parallel factor in X, Y-direction, Δ θ is then twiddle factor;
It is after fortranCorresponding point q in template point set QjCharacteristic information be (xqj, yqjqj,Tqj);IfIt is (Δ x, Δ y, Δ θ), p then to think transformation factoriWith qjPhase Seemingly;
Any one characteristic point p inputted in fingerprint characteristic point set PiWith any one in template fingerprint feature point set Q Characteristic point qjForm point pair;Found in input fingerprint image apart from piNearest characteristic point, is designated as p1, find apart from piIt is secondary near Characteristic point, be designated as p2;Similarly, q is found1, q2;So in input fingerprint image and template fingerprint image 2 triangles of formation (pi,p1,p2) and (qj,q1,q2);Two triangle similarity degrees are judged, if similarity degree is high, for possible matching pair, root According to two groups of characteristic point subsets ask for transformation parameter be exactly this two images transformation parameter.According to required transformation parameter to two width Fingerprint image is rotated and/or translation transformation, determines whether the similitude of two images;
Judge the two triangles according to the distance between 3 characteristic points of the above and the mutual alignment relation between them The similarity degree of shape, the similarity of triangle judge and transformation parameter to ask for step as follows:
Step 6110 calculates summit p respectivelyiAnd qjThe corresponding length of side | p1p2| and | q1q2|, setting error amount D1 and D2;
If step 6120 | | p1p2|-|q1q2||>D1, then illustrate that triangle can not possibly be congruent, this judgement terminates, again Selection needs the summit p judgediAnd qjAnd the 2 characteristic point ps nearest apart from them1, p2And q1, q2, return to step 6110;
Otherwise step 6130, calculates p respectivelyiAnd qjTo p1, p2And q1, q2Distance | pip1|, | pip2| and | qjq1|, | qjq2 |;If | | pip1|-|pip2||<=D2And | | qjq1|-|qjq2||<=D2, then two triangles, 3 sides distinguish approximate phase Deng illustrating that 2 triangles are approximately congruent;Otherwise the summit p for needing to judge is reselectediAnd qjAnd nearest 2 apart from them Characteristic point p1, p2And q1, q2, return to step 6110;
Step 6140 is according to the corresponding summit of 2 triangles, and the direction calculated respectively between the characteristic point that may be matched is poor ValueDirection mathematic interpolation formula:
If the angle difference approximately equal between corresponding vertex, i.e.,Then think this 2 spies Levy a subset (pi,p1,p2) and (qj,q1,q2) between angle meet a kind of rotation transformation relation, rotation transformation now because The calculation formula of son is as follows:
Otherwise judge that between this 2 character subsets a kind of matching relationship can not be formed, reselect the summit for needing to judge piAnd qjAnd the 2 characteristic point ps nearest apart from them1, p2And q1, q2, return to step 6110;
Step 6150 chooses (pi,qj) as the conversion origin of rotation transformation, to (qj,q1,q2) make rotation change Change, the value after conversion is (qj,q′1,q′2), and X, the position deviation in Y-direction after rotation transformation are calculated respectivelyIts calculation formula is as follows:
Δxpq=xp-xqFormula 6.5;
Δypq=yp-yqFormula 6.6;
IfAndThen think this 2 characteristic point subsets (pi,p1,p2) and (qj,q1,q2) a kind of conversion is also met in the x, y direction, it is believed that this 2 characteristic point subset (pi,p1,p2) (qj,q1,q2) between form a kind of matching relationship, translation and the transformation factor of rotation now are respectively (Δ x, Δ y, Δ θ);Wherein, Δ x, Δ y, Δ θ are respectively:
Wherein step S6200 further comprises:Matching is as follows for the first time:
Using reference point as the center of circle, regular length is radius, and one is marked respectively in template fingerprint image and input fingerprint image Individual equal region of interest ROI, is matched interval as first time;
It is 64 that step 6210, which chooses ROI radiuses, and unit is pixel;
The number of end points and bifurcation, the bifurcation number of logging template fingerprint image and end in step 6220 search ROI Point number is respectively Mb, Me, input fingerprint image characteristics point number is Nb, Ne
Step 6230 is calculated | Mb-Nb|, | Me-Ne|;
If | Mb-Nb| < ε1And | Me-Ne| < ε2, then enter next stage and match;Otherwise directly think to mismatch.Wherein ε1 =0.5min (Mb,Nb), ε2=0.5min (Me,Ne);
Wherein step S6300 further comprises:Second of matching is as follows:
Q each characteristic point is concentrated to template fingerprint image characteristic point, a rectangular area conduct around it is chosen Its gauge box;Distance of the size of gauge box between this feature point and central point is determined, in the local pole near from central point Radius diminishes, and polar angle becomes big;On the contrary, the place remote from central point should polar radius become big, polar angle diminishes;As long as after conversion The characteristic point of fingerprint to be identified falls in this region, and type is identical, and direction is basically identical, then it is believed that the two features Put the characteristic point to being a pair of matchings.
Wherein step S6400 further comprises:
Multiple matching judgment condition includes:(1) the point logarithm of successful match;(2) pairing points and corresponding fingerprint characteristic are total Several ratio;(3) weighted sum of the discrepancy score summation of each matching double points, i.e. direction difference and range difference, it is final to determine that input refers to Whether print image matches with template fingerprint image.
4th, illustrate
Fig. 1 is the defect in being presented in the prior art on robot welding commodity interface.
Fig. 2 is defect in the prior art on " being left a message to seller ".
Fig. 3 is the defect in being presented in the prior art on international courier service interface.
Fig. 4 is the defect in being presented in the prior art on international courier service interface.
Fig. 5 is the situation that e-commerce platform side has made insurance service transaction interface to measure to seller in the prior art.
Fig. 6 is that e-commerce platform side has made insuring in insurance service transaction interface to measure to seller in the prior art People and the situation of warrantee's information interface.
Fig. 7 is the situation that e-commerce platform customizes transaction flow to seller in the prior art.
Fig. 8 is the effect of the self-defined transaction flow of seller in the present invention.
Fig. 9 is technical scheme as a general frame figure during system.
Figure 10 is that the step of technical scheme is as during a method is schemed.
Figure 11 be during seller puts question in the embodiment of the present invention addition put question to, the interfacial effect schematic diagram figure of addition annex.
Figure 12 is the interfacial effect schematic diagram that form is putd question to during seller puts question in the embodiment of the present invention.
Figure 13 is that buyer answers and fills in the schematic diagram that seller puts question to, uploads annex etc. in the embodiment of the present invention.
Figure 14 is that seller receives and sees that user puts question to seller letter in reply to cease after trading order form in the embodiment of the present invention Schematic diagram.
5th, embodiment
In the actual practice of e-commerce platform, substantial amounts of commodity/service is when both parties conclude the transaction, it is necessary to buy Family submits necessary information to buyer.E-commerce platform operator is in order to meeting the sale demand of different product, electronics Business platform developer needs to put into the transaction characteristics that substantial amounts of manpower and materials investigate each product type, and is variety classes Commodity and service product formulate special online transaction flow (as shown in Figure 7).The present invention is in order to avoid so repeatedly Work, this patent is to set up a set of flow and related computer program logical code, is independently putd question to from seller to buyer, passes through net Page/APP form is presented to buyer, is filled in (as shown in Figure 8) by buyer.
The design of the present invention at least goes in forms such as e-commerce platform webpage/APP, and business is uploaded in seller The webpage of the product/service/APP pages.On the webpage/APP pages, asked questions content is customized by seller;Custom form is for buying Family fills in;Customization uploads the title of annex and uploads the function of annex, and annex is uploaded for buyer.Seller specifies answer type, is It is no to fill out, buyer can be evaded and fill out and fail to fill in by mistake answer information.Because seller knows quite well the information requirement of sold goods/service , answered by the formulation problematic item of seller independently for buyer, a product trading has been customized equivalent to instead of e-commerce platform The flow page.It is constantly different products/service classification product customization transaction flow that e-commerce platform, which can effectively be evaded, Trouble, lift buyer consumer purchase experiences, promote Transaction apparatus meeting of online order transaction, reduce seller's customer service and buyer in friendship Workload (for example link up and lack and necessary Transaction Information, the clear and definite and unclear Transaction Information of needs repeatedly) after easily, is carried Rise " silence " and clap single probability.
First, overall architecture and general steps of the invention:
The present invention can realize in the way of a system, can also the mode of the corresponding method of the system realize.
A kind of overall architecture (as shown in Figure 9) when the present invention is realized as system:
A kind of system for the autonomous formulation transaction flow for possessing security mechanism, it includes:
Authenticating user identification module, identity when being logged in based on the user of biometrics certification first or second user;
First subscription client, the first user uploads commodity/service by the first subscription client in electronic trade platform When, the first user is set " seller's enquirement ", included in " the seller's enquirement " of setting by " addition is putd question to " function --- according to business Product/type service feature and need answer Transaction Information;
Second user client, second user by second user client on electronic trade platform purchase commodity/ Service and enter before payment interface, will show that the first user is " seller's enquirement " set in advance, second user is for " seller carries Ask " answer information is filled in, and pay the bill;
The webserver, the first subscription client connects by network service and with the webserver with second user client Connect, " seller's enquirement ", the answer information, the Transaction Information, the sequence information described in webserver collection and storage, The user of webserver storage first, the secure authenticated information of second user;
Data transmission security module, ensures that the first user or second user pass through network transmission number based on biometrics According to safety;
First user obtains while above commodity/service sequence information is received and answers information above, completes transaction.
A kind of overall procedure (as shown in Figure 10) when the present invention is realized as method:
A kind of method for the autonomous formulation transaction flow for possessing security mechanism, it includes:
The step of identity when being logged in based on the user of biometrics certification first or second user;
First user is by the first subscription client when electronic trade platform uploads commodity/service, and the first user passes through " addition is putd question to " function, sets " seller's enquirement ", is included in " the seller's enquirement " of setting --- according to commodity/service species characteristics And need the Transaction Information of answer;
Second user in purchase commodity/service and enters payment circle by second user client on electronic trade platform Before face, the first user of display is " seller's enquirement " set in advance, and second user fills in answer information for " seller's enquirement ", And pay the bill;
First subscription client is connected by network service and with the webserver, network service with second user client " seller's enquirement ", the answer information, the Transaction Information, the sequence information, the webserver described in device collection and storage Store the first user, the secure authenticated information of second user;
The safe step that the first user or second user pass through transmitted data on network is ensured based on biometrics;
First user obtains while above commodity/service sequence information is received and answers information above, completes transaction.
2nd, seller sets transaction flow template
(content will be in authenticating user identification embodiment by user's authentication module by seller (the first user) In be discussed in detail), log in the first user terminal.
Seller enters transaction flow and sets user interface.
Seller is set in transaction flow in user interface, selects transaction flow template.Transaction flow template at least includes:It is logical With template, banking and insurance business domain template, robot industry template, machine industry template, repairs profession template, real estate row Industry template, leasing industry template, automobile services industry template, legal services industry template, Sci Tech cadre template, raw material industry mould Plate, Express Logistics industry template, processing service industry template, physical culture and entertainment industry template, beauty and personal care industries mould Plate, lodging industry template, neghborhood services industry template, business service industry template, the fresh template of food etc..Wherein common template is Father's template of other templates, other templates are the subtemplate of common template.
In the present invention, seller can be specific according to the transaction of actuals/service, the transaction that self-defining addition needs Information, so as to adaptively formulate the transaction flow of commodity/service.On the self-defined setting transaction flow template of seller, at least may be used To proceed as follows:The newly-built transaction flow template of seller, seller's addition are putd question to, seller adds annex, seller adds form, sold Family, which preserves, submits transaction flow template, seller's selection transaction flow template etc..
1st, the newly-built transaction flow template of seller
Seller can a newly-built transaction flow template, the newly-built transaction flow template in the present invention, can be empty White transaction flow template or inherit word above general transaction flow template or the above some specific transaction mould Plate etc..
Seller it is newly-built or open a transaction flow template after, seller can proceed as follows:
2nd, seller's addition problem
Seller by e-commerce platform webpage or APP when uploading commodity/service, and by " click ", "+addition is carried seller Ask " button, adds seller's question information, seller can fill in the title content of enquirement in " seller's asked questions " column.Seller Whether be able to must be filled out with self-defining, self-defining answer type.E-commerce platform is filled out by computer program control to buyer The answer write accordingly is limited.The problem of " seller's enquirement " is related to type is roughly divided into herein below, referring to subordinate list 1 and figure 11, by taking machine manufacturing product/service as an example.
Subordinate list 1
Based on shown in Figure 11, the Transaction Information that " seller's enquirement " is answered the need for being related in the present invention may include --- it is following At least one and combinations thereof:
If commodity/service is related to general merchandise/service, the Transaction Information for needing to answer can at least include --- buy Family's name, age, sex, date of birth, identification card number, Business Name, place city, better address, postcode, contact People, phone number, landline telephone are OK, contact before delivery;
If commodity/service is related to on-line purchase international courier service, the Transaction Information for needing to answer can be wrapped at least Include --- sender information, sender information, express delivery article title, unit price, the amount of money, weight information;
If commodity/service is related to online sales insurance products, the Transaction Information for needing to answer can be wrapped at least Include --- insurer's information, insurant's information, beneficiary's information;
If commodity/service is related to online sales house property, the Transaction Information for needing to answer can at least include --- buy People from room identity card picture copy and the other relevant informations of buyer;
If commodity/service is related to online sales " law Online reference service ", the Transaction Information for needing to answer can At least include buyer's name, phone number, telephone call date and time;
If commodity/service is related to " lease house property " service online, the Transaction Information for needing to answer can be wrapped at least Include --- identity card picture copy, buyer's Real Name and phone number;
If commodity/service is related to " moving service " online transaction, the Transaction Information for needing to answer can be wrapped at least Include --- origin, destination and the floor information of removal of home;
If commodity/service is related to online sales packed in cases thing and printing is serviced, the Transaction Information for needing to answer Can at least include --- packing material and the print content or upload document of printing service;
If commodity/service is related to machine-building service, the Transaction Information for needing to answer can at least include --- weldering Connect technique specific requirement, welding material, welding maximum gauge, special welding requirements, due date etc..
Exemplary illustration is these are only, not as limitation of the present invention.
3rd, seller's addition attachment request
Seller by e-commerce platform webpage or APP when uploading commodity/service, and seller is by clicking on once "+annex Request " button, increase by one attachment request;Seller can fill in type of attachment title in " filling in attachment title " column.Sell Whether family be able to must be uploaded with self-defining, self-defining type of attachment.E-commerce platform is right by computer program control The file type that buyer uploads accordingly is limited.Refer to subordinate list 3 and Figure 11.The type of attachment of addition can at least include figure Piece, file etc., the content that the annex " annex enquirement " of addition can include includes identity card picture, other certificate pictures, various Picture of transaction material requested etc..
Subordinate list 3
4th, seller's addition form is putd question to seller
Seller by e-commerce platform webpage or APP when uploading commodity/service, and seller is by clicking on once "+form Put question to " button, and fill in line number, columns.Computer generates form according to request by advance program setting in webpage. The answer type requirement that seller can each be arranged by the drop-down menu selection in form, is that each row set " title ". Seller can be by selecting " single file text " or " multiline text " define the height of " OK ", can also be by the side of mouse drag Formula adjusts the width of each row.E-commerce platform is by computer program control, and the answer filled in buyer is accordingly limited. (problem types is roughly divided into herein below) refer to subordinate list 1 and Figure 12.
For example, filling in form single file text, multiline text can be used to limit;Data type can use numeral, with And specific which kind of numeral (natural number, positive number, negative, do not limit) is limited;Identity document can use identity card, driver's license, shield According to, home return permit, Taiwan compatriot certificate etc. be defined.It the above is only example, not as limitation of the present invention.
5th, seller, which preserves, submits transaction flow template
Seller is preserved and is submitted to database server after the editor to current transaction flow template is completed to it In.The transaction flow template of the editing process is stored in seller's User Defined transaction flow ATL, is available for subsequently using. When submitting the template editted, it can use and ensure safety of the user by transmitted data on network based on biometrics (content is discussed in detail in follow-up " data transmission security embodiment ").
6th, seller's selection transaction flow template
Seller selects a conjunction according to being actually needed that commodity/service is merchandised in existing multiple transaction flow templates Suitable template conduct, the transaction flow template needed for the commodity/service of the actual upload.I.e. buyer purchase pay the commodity/ , it is necessary to the problem of filling in all " the seller's enquirements " answered in the transaction flow template content during service.Submitting the mould of selection During plate, it can use and ensure user based on biometrics (content is in follow-up " data by the safety of transmitted data on network Transmit safe embodiment " in be discussed in detail).
3rd, buyer fills in answer " seller's enquirement "
(content will be in authenticating user identification embodiment by user's authentication module by buyer's (second user) In be discussed in detail), log in second user terminal.
Buyer finds commodity or the service displaying interface of seller by search.
7th, buyer fills in ecommerce webpage/APP
E-commerce website transaction page is being logged in, buyer is taking product into before paying the page, and webpage will be shown Seller is " seller's enquirement " (see Figure 13) set in advance in webpage, and buyer is by the asked questions set according to seller and answer class Type rule fills in data message.If the answer class that buyer is not filled in " must fill out " item or fill substance is set with seller Type is not consistent, and computer website will be pointed out and reported an error to buyer.The platform development personnel of ecommerce are pre-configured every kind of The rule of answer type limits (seeing attached list 1), by the control of computer software, realizes that required item has to fill out, fills in item symbol Close the rule that the condition of software design patterns, option selection mode meet seller's setting.
For example, being related to " the seller's enquirement " of machine-building commodity/service in Figure 13.Except general Transaction Information needs to fill out Write, buyer must also pointedly fill in " welding procedure specific requirement " in " seller's enquirement ":Need to support weld diameter Welded in 15cm, depth 2m pipeline;Welding material, weld diameter, welding minimum diameter, special welding requirements, date of acceptance The problem of phase has corresponding needs to answer (see Figure 13).Ditch is repeated with regard to Transaction Information problem this avoid seller and buyer It is logical, save the manpower and materials of transaction.
After the completion of information above is filled in, buyer sends order.The user profile (answer information) that buyer submits passes through " data Transmission security module " (content will be discussed in detail in data transmission security embodiment) is sent to data aggregation service Device is simultaneously preserved, and seller is sent to again by " data transmission security module " by data collection server.
8th, seller receives trading order form information "
After buyer takes order and successful payment, seller simultaneously, also obtain buyer in the sequence information obtained The complete information filled in (see Figure 14).So as to put through deal.
As shown in figure 14, " the seller's enquirement " that seller feeds back in trading order form information is answered in information and can see oneself All " seller's enquirement " information to be answered formulated, include the specific transaction information of particular commodity/service, such as Welder The Transaction Information at skill specific requirement, welding material, weld diameter, welding minimum diameter, special welding requirements, due date etc. is returned Answer and demand.So as to realize that the probability of single (online transaction) is clapped in lifting " silence ".
4th, data transmission security embodiment
The present invention can be according to commodity and/or the transaction flow feature of service, by customizing buyer in the form of " seller's enquirement " User needs the data message filled in.No matter the data message of seller and buyer are usually directed to individual privacy or business is believed above Breath is, it is necessary to improve traditional data transmission security measure and lifted.
In the system and method realized specific to the present invention, the technology based on biological identification includes fingerprint, people's eye iris, the palm Line, vocal print, fingerprint etc..The present invention is to use the biometrics based on fingerprint come exemplified by ensureing data transmission security.
Before user (including the first user seller, second user buyer) logs in the present invention for the first time, user should be to Associated bank or industrial and commercial administrative department, carry out input to the fingerprint of oneself and put on record so that the finger print information of oneself passes through Fingerprint collecting is put on record, in the database server for being stored in the present invention.
When each user (including seller or seller) carries out data submission, the guarantee first that data transmission security is realized is used Family or second user by the safety of transmitted data on network, including:
Wherein user is the first user or second user, and wherein client is the first user client corresponding with the first user End or second user client corresponding with second user;
S2100, the information input of user is completed, and when clicking on submission, user fingerprints are gathered by client;Wherein by referring to Line acquisition processing module FingerprintCollector obtains user fingerprints information, and the user fingerprints information is included after processing Fingerprint image ProcessedFingerprintImage and fingerprint characteristic value FA;
S2200, input information after MD5 is hashed, is signed with user fingerprints information with the RSA private keys of user, is formed Digital signature;
S2300, client generates a random IDEA key, using the RSA public key encryptions of data server, forms numeral Envelope;
S2400, input information, digital signature are encrypted with IDEA keys, ciphertext is formed;
S2500, data server is sent to by ciphertext and digital envelope;
S2600, after data server is received, opens digital envelope with the RSA private keys of data server, obtains client IDEA keys;
S2700, data server uses the IDEA keys of client, unties ciphertext;
S2800, input information obtains hashed value 1 by MD5, while untiing digital signature using the RSA public keys of client Hashed value 2 is obtained, whether consistent compares two results;If consistent, pass through fingerprint matching module FingerprintMatch schools The fingerprint of user is tested, if finger-mark check passes through, starts the operation that input information is stored in data server, and preservation result Client is sent back, data transfer still uses IDEA encryption;Otherwise, refusal input information is stored in the operation of data server;
S2900, client is received after the response of data server, if being stored in successfully, generation input information deposit daily record, is carried Show user's input information success.
5th, authenticating user identification embodiment
Meanwhile, the present invention be not limited to traditional user, password, short message verification code in the authentication that user logs in, It further comprises the biometrics based on fingerprint.
Before user (including the first user seller, second user buyer) logs in the present invention for the first time, user should be to Associated bank or industrial and commercial administrative department, carry out input to the fingerprint of oneself and put on record so that the finger print information of oneself passes through Fingerprint collecting is put on record, in the database server for being stored in the present invention.
Specifically, in the present invention, the first user can be authenticated when each user logs in or when second user is logged in Identity authenticating user identification mechanism, including:
Wherein user is the first user or second user, and wherein client is the first user client corresponding with the first user End or second user client corresponding with second user;
S3100, user's login user interface is shown to user;
S3200, client gathers the user fingerprints by fingerprint collecting processing module FingerprintCollector,;
S3300, client carries out feature extraction to the user fingerprints, obtains fingerprint characteristic value FA;
S3400, client is digitally signed to the fingerprint characteristic value FA of the user;
S3500, client is set up with data server and communicates to connect and send certification request;
S3510, the user realizes signature using private key PriKeyUser encryption user's marks IDA of user oneself, by this The signature of user sends certification request to data server, wherein;The public key for the user that data server passes through preservation, checking The signature obtains the mark IDA of the user;
S3520, data server produces time limit TAServer, current data NA, by the public key of data server itself PubKeyServer, current data NA and time limit TAServer, visitor is returned to after being encrypted with the public key PubKeyUser of the user The user at family end;
S3530, the user of client receive the public key PubKeyServer of data server, current data NA and when TAServer is limited, by the above-mentioned fingerprint characteristic value FA of acquisition, the public key of tuple { TAServer, NA, FA } data server Data server is sent to after PubKeyServer encryptions;
S3600, data server carries out fingerprint matching using fingerprint matching module FingerprintMatch;
S3700, data server is to client return authentication result.
6th, the embodiment of fingerprint collecting processing
The specific reality for the fingerprint collecting processing being related in above-mentioned data transmission security mechanism, above-mentioned authenticating user identification mechanism Apply mode as follows:
S5100, fingerprint image acquisition;
S5200, fingerprint image preprocessing, including the normalization of S5210 fingerprint images, S5220 Fingerprint enhancements, S5230 Fingerprint image is refined, the fingerprint image ProcessedFingerprintImage after return processing;
S5300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S5300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized carefully The direction of node, tkIt is that end points, k=2 are bifurcation that (k=1,2), which is characterized the classification of minutiae point, i.e. k=1,;The direction of end points It is the direction of crestal line trend where it, the direction of bifurcation is the folder in three crestal lines where the point between other two crestal lines Angle is all the opposite direction of the crestal line at obtuse angle, is defined as (0≤θ<2π);Fingerprint image is after binaryzation, refinement, each pixel Gray scale be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using 3 × 3 templates are come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2, P3, P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these phases When adjoint point meets formula below, it is possible to judge P classification:
If meeting formula (5.1), then pixel P is end points;If meeting formula (5.2), then pixel P is Bifurcation;Classification that is rear and marking the pixel is judged, scanning is tracked to not labeled pixel, always Untill all minutiae features have been detected;Then by the row, column coordinate where the pixel P in fingerprint image labeled as thin The position coordinates (x, y) of node diagnostic, is to the right the pros of x-axis using the starting point of image upper left angular direction as the origin of coordinate system To downward is the positive direction of y-axis;
Pixel P eight neighborhood is encoded --- and each pixel of refined image only needs 1bit, by pixel P eight neighborhood picture Element is according to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is compiled by this byte representation Code formula be:
NpHave 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1, There are 8 kinds of combinations, i.e. NpIn there are 8 kinds of values to represent that pixel P is end points;For bifurcation, there are 3 to be mutually not attached in its eight neighborhood Pixel be 1, then NpIn have 12 kinds of values be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds can Can property, definition Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding Dp With complement code D'pRelation be:……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4(5.4);
Coding and category table --- the dimensional table for being 256 × 1 based on the category table that eight neighborhood is encoded, illustrate pixel P Eight neighborhood coding its classification between corresponding relation, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 are Bifurcation;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents 8 kinds of tracking directions of advance and row, column increment of coordinate Between relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, between the direction for representing 8 kinds of neighborhoods codings and the subsequent point of tracking Relation, first be classified as eight neighborhood coding, second is classified as direction encoding;
Bifurcation direction table --- it is 12 × 4 tables, represents that the eight neighborhood of 12 kinds of bifurcations is encoded and three track sides Relation between, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, λ is the average distance between streakline, takes λ=6, extracting minutiae feature During direction, with the coordinate (x, y) of the point for start position, starting point side is in the direction searched using in the direction table corresponding to the point To being then tracked according to the coding track algorithm of eight neighborhood to streakline.For end points direction, end points (x is located at0,y0) place The coordinate that Ridge following terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0- Y))……(5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be by formula (5.5) 3 directions are obtained, the angle between direction two-by-two is then calculated, with the streakline that two other streakline angle is obtuse angle Opposite direction is exactly the direction of the bifurcation.Result after tracking terminates is placed in a characteristic vector table, wherein characteristic vector shape Formula is D (x, y, θ, tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S5310, carries out eight neighborhood coding and obtains coding and category table, direction and increment of coordinate after fingerprint image refinement Table, end points direction table, bifurcation direction table;
S5320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S5330, judges whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S5340 preserves the coordinate of current pixel point, and coordinate parameters are updated with increment of coordinate table according to search direction;S5350 According to current eight neighborhood coding lookup direction and category table, end points or bifurcation are determined whether;
S5360, if it is determined that whether being end points or bifurcation result is no, then asks direction complement code to update direction encoding;
S5370, step-length adds 1;Return to step S5330;
If it is determined that reach set step-length be it is yes,
S5380, the coding track algorithm of Finger print characteristic abstract terminates;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics Value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing ProcessedFingerprintImage as collection finger print information.
7th, the embodiment of fingerprint matching
The specific embodiment party for the fingerprint matching being related in above-mentioned data transmission security mechanism, above-mentioned authenticating user identification mechanism Formula is as follows:
Step S6100:Datum mark is asked for using 3, three side similar principles, is referred to according to input fingerprint image and input template Datum mark is to asking for X, the position deviation in Y-coordinate direction and the rotation transformation factor in print image, so that it is determined that transformation factor collection;
Step S6200:First time matching is carried out to input fingerprint image and template fingerprint image, input fingerprint is calculated respectively Image and the bifurcation and end points number in template fingerprint interesting image area, determine whether to enter next stage matching;
Step S6300:Second is carried out using the method for variable gauge box to match, the rectangular area around selected characteristic point As gauge box, as long as the characteristic point of the fingerprint to be identified after conversion falls in this region, direction is consistent and type is identical, then It is considered match point;
Step S6400:Set the point logarithm of successful match, the ratio of pairing points and corresponding fingerprint characteristic sum, each With point to the threshold value such as discrepancy score summation finally judge whether input fingerprint image matches with template fingerprint image;
Wherein step S6100 further comprises:
The set of characteristic points Q of set of characteristic points P and master-fingerprint image for the characteristic value of the fingerprint image of input, point It is not expressed as:
P={ p1,p2,...,pm}={ (xp1,yp1p1,Tp1),(xp2,yp2p2,Tp2),...,(xpm,ypmpm, Tpm)};
Q={ q1,q2,...,qn}={ (xq1,yq1q1,Tq1),(xq2,yq2q2,Tq2),...,(xqn,yqnqn, Tqn)};
Wherein (xpi,ypipi,Tpi) and (xqj,yqjqj,Tqj) ith feature point and point set in point set P are have recorded respectively 4 information of j-th of characteristic point in Q:X-coordinate, Y-coordinate, direction θ and feature vertex type T;
Assuming that the certain point p in input point set PiCharacteristic information be (xpi,ypipi,Tpi), it is corresponding in template point set Q Point qjCharacteristic information be (xqj,yqjqj,Tqj), solved according to formula 6.1 and formula 6.2,
If changed factor (Δ x, Δ y, Δ θ) can be tried to achieve, then it is assumed that piWith qjIt is similar;Δ x and Δ y distinguishes wherein in above formula For the parallel factor in X, Y-direction, Δ θ is then twiddle factor;
It is after fortranCorresponding point q in template point set QjCharacteristic information be (xqj, yqjqj,Tqj);IfIt is (Δ x, Δ y, Δ θ), p then to think transformation factoriWith qjPhase Seemingly;
Any one characteristic point p inputted in fingerprint characteristic point set PiWith any one in template fingerprint feature point set Q Characteristic point qjForm point pair;Found in input fingerprint image apart from piNearest characteristic point, is designated as p1, find apart from piIt is secondary near Characteristic point, be designated as p2;Similarly, q is found1, q2;So in input fingerprint image and template fingerprint image 2 triangles of formation (pi,p1,p2) and (qj,q1,q2);Two triangle similarity degrees are judged, if similarity degree is high, for possible matching pair, root According to two groups of characteristic point subsets ask for transformation parameter be exactly this two images transformation parameter.According to required transformation parameter to two width Fingerprint image is rotated and/or translation transformation, determines whether the similitude of two images;
Judge the two triangles according to the distance between 3 characteristic points of the above and the mutual alignment relation between them The similarity degree of shape, the similarity of triangle judge and transformation parameter to ask for step as follows:
Step 6110 calculates summit p respectivelyiAnd qjThe corresponding length of side | p1p2| and | q1q2|, setting error amount D1And D2
If step 6120 | | p1p2|-|q1q2||>D1, then illustrate that triangle can not possibly be congruent, this judgement terminates, again Selection needs the summit p judgediAnd qjAnd the 2 characteristic point ps nearest apart from them1, p2And q1, q2, return to step 6110;
Otherwise step 6130, calculates p respectivelyiAnd qjTo p1, p2And q1, q2Distance | pip1|, | pip2| and | qjq1|, | qjq2 |;If | | pip1|-|pip2||<=D2And | | qjq1|-|qjq2||<=D2, then two triangles, 3 sides distinguish approximate phase Deng illustrating that 2 triangles are approximately congruent;Otherwise the summit p for needing to judge is reselectediAnd qjAnd nearest 2 apart from them Characteristic point p1, p2And q1, q2, return to step 6110;
Step 6140 is according to the corresponding summit of 2 triangles, and the direction calculated respectively between the characteristic point that may be matched is poor ValueDirection mathematic interpolation formula:
If the angle difference approximately equal between corresponding vertex, i.e.,Then think this 2 Characteristic point subset (pi,p1,p2) and (qj,q1,q2) between angle meet a kind of rotation transformation relation, rotation transformation now The calculation formula of the factor is as follows:
Otherwise judge that between this 2 character subsets a kind of matching relationship can not be formed, reselect the summit for needing to judge piAnd qjAnd the 2 characteristic point ps nearest apart from them1, p2And q1, q2, return to step 6110;
Step 6150 chooses (pi,qj) as the conversion origin of rotation transformation, to (qj,q1,q2) make rotation change Change, the value after conversion is (qj,q′1,q′2), and X, the position deviation in Y-direction after rotation transformation are calculated respectivelyIts calculation formula is as follows:
Δxpq=xp-xqFormula 6.5;
Δypq=yp-yqFormula 6.6;
IfAndThen think this 2 characteristic point subsets (pi,p1,p2) and (qj,q1,q2) a kind of conversion is also met in the x, y direction, it is believed that this 2 characteristic point subset (pi,p1,p2) (qj,q1,q2) between form a kind of matching relationship, translation and the transformation factor of rotation now are respectively (Δ x, Δ y, Δ θ);Wherein, Δ x, Δ y, Δ θ are respectively:
Wherein step S6200 further comprises:Matching is as follows for the first time:
Using reference point as the center of circle, regular length is radius, and one is marked respectively in template fingerprint image and input fingerprint image Individual equal region of interest ROI, is matched interval as first time;
It is 64 that step 6210, which chooses ROI radiuses, and unit is pixel;
The number of end points and bifurcation, the bifurcation number of logging template fingerprint image and end in step 6220 search ROI Point number is respectively Mb, Me, input fingerprint image characteristics point number is Nb, Ne
Step 6230 is calculated | Mb-Nb|, | Me-Ne|;
If | Mb-Nb| < ε1And | Me-Ne| < ε2, then enter next stage and match;Otherwise directly think to mismatch.Wherein ε1 =0.5min (Mb,Nb), ε2=0.5min (Me,Ne);
Wherein step S6300 further comprises:Second of matching is as follows:
Q each characteristic point is concentrated to template fingerprint image characteristic point, a rectangular area conduct around it is chosen Its gauge box;Distance of the size of gauge box between this feature point and central point is determined, in the local pole near from central point Radius diminishes, and polar angle becomes big;On the contrary, the place remote from central point should polar radius become big, polar angle diminishes;As long as after conversion The characteristic point of fingerprint to be identified falls in this region, and type is identical, and direction is basically identical, then it is believed that the two features Put the characteristic point to being a pair of matchings.
Wherein step S6400 further comprises:
Multiple matching judgment condition includes:(1) the point logarithm of successful match;(2) pairing points and corresponding fingerprint characteristic are total Several ratio;(3) weighted sum of the discrepancy score summation of each matching double points, i.e. direction difference and range difference, it is final to determine that input refers to Whether print image matches with template fingerprint image.
8th, meaning of the present invention
Meaning of the present invention is effectively strengthen the information exchange of ecommerce online trading platform seller and buyer, helped Seller is helped independently to customize " asked questions ", the Format Type of reasonable standard buyer's answer content.E-commerce platform is set to research and develop people Member no longer needs the miscellaneous transaction flow of customization that varies for different commodity/service transaction flows, it is to avoid electronics business Dealing custom and information requirement of the business platform due to not knowing about miscellaneous commodity/service transaction flow, so as to customize error Product trading flow by mistake." seller's enquirement " function is released to " online seller ", " seller's enquirement " phase is independently carried out by seller When in independently determining transaction flow by seller, helping, seller is disposable in buyer claps monocyclic section to obtain necessity related to transaction Information, so as to reduce the time and cycle exchanged under line, quickly allows both parties to complete transaction, lifts the purchase body of buyer Test, be a solution put things right once and for all while human capital also greatly reduces to businessman.
The present invention is using biological identification and security mechanism based on fingerprint recognition simultaneously so that user identity, Transaction Information The security mechanism for obtaining more preferable safety assurance, improving existing e-commerce platform.
Content in being embodied in the present invention is exemplary illustration, it is intended to illustrate principle and the design of the present invention, and It is not used in and limits the scope of the invention.As long as scheme in present invention guidance and scope and combinations thereof, is belonged to Protection scope of the present invention.
Certainly, the present invention also has many other embodiments, can root in the case of without prejudice to spirit of the invention and its essence Various corresponding changes and deformation are made according to the present invention.
Although previous description and accompanying drawing describes the preferred embodiments of the present invention, but it is understood that:This is not being departed from In the case of the spirit of invention, various additional, modifications can be produced herein and are replaced.Those of ordinary skill in the art will be apparent that: Do not depart from the present invention spirit or essential characteristics in the case of, can with other special shapes, structure, arrangement, ratio and The present invention is realized using other elements, material and part.Those skilled in the art will recognize:The present invention can use hair The bright structure used in practice, arrangement, ratio, material and part and other many modifications, these modifications are not departing from this Particular surroundings and operational requirements are particularly adapted in the case of the principle of invention.Therefore, presently disclosed embodiment is all Aspect should be understood limitation illustrative rather than to its claimed scope.It is all the spirit and principles in the present invention it Interior, any modification, equivalent substitution and improvements made etc. should be included in the scope of the protection.

Claims (18)

1. a kind of method for the autonomous formulation transaction flow for possessing security mechanism, it includes:
The step of identity when being logged in based on the user of biometrics certification first or second user;
First user is by the first subscription client when electronic trade platform uploads commodity/service, and the first user passes through " addition Put question to " function, set " seller's enquirement ", included in " the seller's enquirement " of setting --- the need according to commodity/service species characteristics The Transaction Information to be answered;
Second user by second user client on electronic trade platform purchase commodity/service and enter payment interface it Before, the first user of display is " seller's enquirement " set in advance, and second user fills in answer information for " seller's enquirement ", and pays Money;
First subscription client is connected by network service and with the webserver with second user client, and the webserver is received " seller's enquirement ", the answer information, the Transaction Information, the sequence information, webserver storage described in collection and storage First user, the secure authenticated information of second user;
When data are submitted or preserved by the first user every time or second user, ensure that first uses based on biometrics The safe step that family or second user pass through transmitted data on network;
First user obtains while above commodity/service sequence information is received and answers information above, completes transaction.
2. the method as described in claim 1, it also includes:
It is described to set " seller's enquirement " also to include --- the first user is by " addition is putd question to " function, and " seller carries for self-defined addition Ask " the problem of column, title content, whether the self-defined setting problem column be to fill out, self-defined to set the problem column Answer type.
3. the method as described in claim 1, it also includes:
It is described to set " seller's enquirement " also to include --- the first user is by clicking on once " attachment request " function, self-defined increase One uploads attachment request, and the first user sets type of attachment title in " filling in attachment title " column, and it is attached to set this Whether part is to upload, and set the type of attachment, and wherein the type of attachment at least may include file, picture.
4. the method as described in claim 1, it also includes:
It is described to set " seller's enquirement " also to include --- the first user is by " form enquirement " function, and generation is putd question to form and set Line number, columns, by puing question to the drop-down menu in form to select the answer type each arranged requirement, setting the " gauge outfit each arranged Title ", by selecting " single file text " or " multiline text " to define the height of " OK ", the width of each row is adjusted by drag operation Degree.
5. the method as described in claim 1, it also includes:
The Transaction Information for needing to answer may include --- following at least one and combinations thereof:
If commodity/service is related to general merchandise/service, the Transaction Information for needing to answer can at least include --- buyer's surname Name, age, sex, date of birth, identification card number, Business Name, place city, better address, postcode, contact person, hand Machine number, landline telephone are OK, delivery is preceding contacts;
If commodity/service is related to on-line purchase international courier service, the Transaction Information for needing to answer can be wrapped at least Include --- sender information, sender information, express delivery article title, unit price, the amount of money, weight information;
If commodity/service is related to online sales insurance products, the Transaction Information for needing to answer can at least include --- throw Guarantor's information, insurant's information, beneficiary's information;
If commodity/service is related to online sales house property, the Transaction Information for needing to answer can at least include --- buyer Identity card picture copy and the other relevant informations of buyer;
If commodity/service is related to online sales " law Online reference service ", the Transaction Information for needing to answer can be at least Including buyer's name, phone number, telephone call date and time;
If commodity/service is related to " lease house property " service online, the Transaction Information for needing to answer can at least include --- Identity card picture copy, buyer's Real Name and phone number;
If commodity/service is related to " moving service " online transaction, the Transaction Information for needing to answer can at least include --- Origin, destination and the floor information of removal of home;
If commodity/service is related to online sales packed in cases thing and printing is serviced, the Transaction Information for needing to answer can be extremely Include less --- packing material and the print content or upload document of printing service;
If commodity/service is related to machine-building service, the Transaction Information for needing to answer can at least include --- Welder Skill specific requirement, welding material, welding maximum gauge, special welding requirements, due date.
6. the method as described in claim 1, wherein the safety of the first user or second user by transmitted data on network is ensured, Including:
User is that client is corresponding with the first user in the first user or second user, the claim in the claim First subscription client or second user client corresponding with second user;
S2100, the information input of user is completed, and when clicking on submission, user fingerprints are gathered by client;Wherein adopted by fingerprint Collection processing module FingerprintCollector obtains user fingerprints information, and the user fingerprints information includes the fingerprint after processing Image ProcessedFingerprintImage and fingerprint characteristic value FA;
S2200, input information after MD5 is hashed, is signed with user fingerprints information with the RSA private keys of user, forms numeral Signature;
S2300, client generates a random IDEA key, using the RSA public key encryptions of data server, forms numeral letter Envelope;
S2400, input information, digital signature are encrypted with IDEA keys, ciphertext is formed;
S2500, data server is sent to by ciphertext and digital envelope;
S2600, after data server is received, opens digital envelope with the RSA private keys of data server, obtains the IDEA of client Key;
S2700, data server uses the IDEA keys of client, unties ciphertext;
S2800, input information obtains hashed value 1 by MD5, is obtained while untiing digital signature using the RSA public keys of client Whether consistent hashed value 2, compare two results;If consistent, verified and used by fingerprint matching module FingerprintMatch The fingerprint at family, if finger-mark check passes through, starts the operation that input information is stored in data server, and preservation result is sent Client is returned, data transfer still uses IDEA encryption;Otherwise, refusal input information is stored in the operation of data server;
S2900, client is received after the response of data server, if being stored in successfully, generation input information deposit daily record, points out to use Family input information success.
7. the method as described in claim 1, identity when wherein the user of certification first or second user are logged in, including:
User is that client is corresponding with the first user in the first user or second user, the claim in the claim First subscription client or second user client corresponding with second user;
S3100, user's login user interface is shown to user;
S3200, client gathers the user fingerprints by fingerprint collecting processing module FingerprintCollector,;
S3300, client carries out feature extraction to the user fingerprints, obtains fingerprint characteristic value FA;
S3400, client is digitally signed to the fingerprint characteristic value FA of the user;
S3500, client is set up with data server and communicates to connect and send certification request;
S3510, the user realizes signature using private key PriKeyUser encryption user's marks IDA of user oneself, by the user Signature to data server send certification request, wherein;The public key for the user that data server passes through preservation, verifies the label Name obtains the mark IDA of the user;
S3520, data server produces time limit TAServer, current data NA, by the public key of data server itself PubKeyServer, current data NA and time limit TAServer, visitor is returned to after being encrypted with the public key PubKeyUser of the user The user at family end;
S3530, user of client receives the public key PubKeyServer of data server, current data NA and time limit TAServer, by the above-mentioned fingerprint characteristic value FA of acquisition, the public key of tuple { TAServer, NA, FA } data server Data server is sent to after PubKeyServer encryptions;
S3600, data server carries out fingerprint matching using fingerprint matching module FingerprintMatch;
S3700, data server is to client return authentication result.
8. the method as described in claim 6,7, wherein fingerprint collecting processing module FingerprintCollector, including:
S5100, fingerprint image acquisition;
S5200, fingerprint image preprocessing, including the normalization of S5210 fingerprint images, S5220 Fingerprint enhancements,
S5230 fingerprint images are refined, the fingerprint image ProcessedFingerprintImage after return processing;
S5300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S5300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized minutiae point Direction, tkIt is that end points, k=2 are bifurcation that (k=1,2), which is characterized the classification of minutiae point, i.e. k=1,;The direction of end points is it The direction of place crestal line trend, the direction of bifurcation be angle in three crestal lines where the point between other two crestal lines all For the opposite direction of the crestal line at obtuse angle, (0≤θ is defined as<2π);Fingerprint image is after binaryzation, refinement, the ash of each pixel Degree be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using 3 × 3 Template is come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2, P3, P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these consecutive points When meeting formula below, it is possible to judge P classification:
If meeting formula (5.1), then pixel P is end points;If meeting formula (5.2), then pixel P is bifurcated Point;Classification that is rear and marking the pixel is judged, scanning is tracked to not labeled pixel, until institute Untill some minutiae features have been detected;Then the row, column coordinate where the pixel P in fingerprint image is labeled as minutiae point The position coordinates (x, y) of feature, is to the right the positive direction of x-axis using the starting point of image upper left angular direction as the origin of coordinate system, to It is the positive direction of y-axis down;
Pixel P eight neighborhood is encoded --- and each pixel of refined image only needs 1bit, and pixel P eight neighborhood pixel is pressed According to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is by this byte representation, and coding is public Formula is:
NpHave 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1, there is 8 kinds Combination, i.e. NpIn there are 8 kinds of values to represent that pixel P is end points;For bifurcation, there are 3 mutual disjunct pictures in its eight neighborhood Element is 1, then NpIn have 12 kinds of values be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds of possibilities, Define Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding DpAnd benefit Code D'pRelation be:
……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table for being 256 × 1 based on the category table that eight neighborhood is encoded, illustrate the eight of pixel P Neighborhood encodes the corresponding relation between its classification, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 be bifurcated Point;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents between 8 kinds of tracking directions of advance and row, column increment of coordinate Relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, represents the pass between the direction of 8 kinds of neighborhoods codings and the subsequent point of tracking System, first is classified as eight neighborhood coding, and second is classified as direction encoding;
Bifurcation direction table --- be 12 × 4 tables, represent 12 kinds of bifurcations eight neighborhood coding and three tracking directions it Between relation, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, λ is the average distance between streakline, takes λ=6, extracting the direction of minutiae feature When, with the coordinate (x, y) of the point for start position, starting point direction is in the direction searched using in the direction table corresponding to the point, so Streakline is tracked according to the coding track algorithm of eight neighborhood afterwards.For end points direction, end points (x is located at0,y0) place streakline The coordinate that tracking terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0-Y))…… (5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be obtained by formula (5.5) To 3 directions, the angle between direction two-by-two is then calculated, with the opposite direction of streakline that two other streakline angle is obtuse angle just It is the direction of the bifurcation.Tracking terminate after result be placed in a characteristic vector table, wherein characteristic vector form be D (x, y,θ,tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S5310, carries out eight neighborhood coding and obtains coding and category table, direction and increment of coordinate table, end after fingerprint image refinement Point direction table, bifurcation direction table;
S5320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S5330, judges whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S5340 preserves the coordinate of current pixel point, and coordinate parameters are updated with increment of coordinate table according to search direction;S5350 foundations Current eight neighborhood coding lookup direction and category table, determine whether end points or bifurcation;
S5360, if it is determined that whether being end points or bifurcation result is no, then asks direction complement code to update direction encoding;
S5370, step-length adds 1;Return to step S5330;
If it is determined that reach set step-length be it is yes,
S5380, the coding track algorithm of Finger print characteristic abstract terminates;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing ProcessedFingerprintImage as collection finger print information.
9. the method as described in claim 6,7, wherein fingerprint matching module FingerprintMatch, including:
Step S6100:Datum mark is asked for using 3, three side similar principles, according to input fingerprint image and input template fingerprint image Datum mark is to asking for X, the position deviation in Y-coordinate direction and the rotation transformation factor as in, so that it is determined that transformation factor collection;
Step S6200:First time matching is carried out to input fingerprint image and template fingerprint image, input fingerprint image is calculated respectively With the bifurcation and end points number in template fingerprint interesting image area, determine whether to enter next stage matching;
Step S6300:Second is carried out using the method for variable gauge box to match, the rectangular area conduct around selected characteristic point Gauge box, as long as the characteristic point of the fingerprint to be identified after conversion falls in this region, direction is consistent and type is identical, then it is assumed that It is match point;
Step S6400:Set ratio, each match point of point logarithm, pairing points and the corresponding fingerprint characteristic sum of successful match To the threshold value such as discrepancy score summation finally judge whether input fingerprint image matches with template fingerprint image;
Wherein step S6100 further comprises:
The set of characteristic points Q of set of characteristic points P and master-fingerprint image for the characteristic value of the fingerprint image of input, difference table It is shown as:
P={ p1,p2,...,pm}={ (xp1,yp1p1,Tp1),(xp2,yp2p2,Tp2),...,(xpm,ypmpm,Tpm)};
Q={ q1,q2,...,qn}={ (xq1,yq1q1,Tq1),(xq2,yq2q2,Tq2),...,(xqn,yqnqn,Tqn)};
Wherein (xpi,ypipi,Tpi) and (xqj,yqjqj,Tqj) have recorded respectively in point set P in ith feature point and point set Q 4 information of j characteristic point:X-coordinate, Y-coordinate, direction θ and feature vertex type T;
Assuming that the certain point p in input point set PiCharacteristic information be (xpi,ypipi,Tpi), corresponding point q in template point set Qj Characteristic information be (xqj,yqjqj,Tqj), solved according to formula 6.1 and formula 6.2,
If changed factor (Δ x, Δ y, Δ θ) can be tried to achieve, then it is assumed that piWith qjIt is similar;Δ x and Δ y is respectively X, Y wherein in above formula Parallel factor on direction, Δ θ is then twiddle factor;
It is after fortranCorresponding point q in template point set QjCharacteristic information be (xqj,yqj, θqj,Tqj);IfIt is (Δ x, Δ y, Δ θ), p then to think transformation factoriWith qjIt is similar;
Any one characteristic point p inputted in fingerprint characteristic point set PiWith any one characteristic point in template fingerprint feature point set Q qjForm point pair;Found in input fingerprint image apart from piNearest characteristic point, is designated as p1, find apart from piSecondary near feature Point, is designated as p2;Similarly, q is found1, q2;So in 2 triangle (p of input fingerprint image and the formation of template fingerprint imagei,p1, p2) and (qj,q1,q2);Judge two triangle similarity degrees, if similarity degree is high, for it is possible matching pair, according to two groups Characteristic point subset ask for transformation parameter be exactly this two images transformation parameter.According to required transformation parameter to two width fingerprint images As being rotated and/or translation transformation, the similitude of two images is determined whether;
Judge the two triangles according to the distance between 3 characteristic points of the above and the mutual alignment relation between them Similarity degree, the similarity of triangle judge and transformation parameter to ask for step as follows:
Step 6110 calculates summit p respectivelyiAnd qjThe corresponding length of side | p1p2| and | q1q2|, setting error amount D1 and D2;
If step 6120 | | p1p2|-|q1q2||>D1, then illustrate that triangle can not possibly be congruent, this judgement terminates, reselected Need the summit p judgediAnd qjAnd the 2 characteristic point ps nearest apart from them1, p2And q1, q2, return to step 6110;
Otherwise step 6130, calculates p respectivelyiAnd qjTo p1, p2And q1, q2Distance | pip1|, | pip2| and | qjq1|, | qjq2|;Such as Fruit has | | pip1|-|pip2||<=D2And | | qjq1|-|qjq2||<=D2, then two triangles, 3 side difference approximately equals, say Bright 2 triangles are approximately congruent;Otherwise the summit p for needing to judge is reselectediAnd qjAnd 2 features nearest apart from them Point p1, p2And q1, q2, return to step 6110;
Step 6140 calculates the direction difference between the characteristic point that may be matched respectively according to the corresponding summit of 2 trianglesDirection mathematic interpolation formula:
If the angle difference approximately equal between corresponding vertex, i.e.,Then think this 2 features Point subset (pi,p1,p2) and (qj,q1,q2) between angle meet a kind of rotation transformation relation, the rotation transformation factor now Calculation formula it is as follows:
Otherwise judge that between this 2 character subsets a kind of matching relationship can not be formed, reselect the summit p for needing to judgeiAnd qj And the 2 characteristic point ps nearest apart from them1, p2And q1, q2, return to step 6110;
Step 6150 chooses (pi,qj) as the conversion origin of rotation transformation, to (qj,q1,q2) make rotation transformation, convert Value afterwards is (qj,q′1,q′2), and X, the position deviation in Y-direction after rotation transformation are calculated respectivelyIts calculation formula is as follows:
Δxpq=xp-xqFormula 6.5;
Δypq=yp-yqFormula 6.6;
IfAndThen think this 2 characteristic point subset (pi,p1, p2) and (qj,q1,q2) a kind of conversion is also met in the x, y direction, it is believed that this 2 characteristic point subset (pi,p1,p2) and (qj, q1,q2) between form a kind of matching relationship, translation and the transformation factor of rotation now are respectively (Δ x, Δ y, Δ θ);Its In, Δ x, Δ y, Δ θ is respectively:
Wherein step S6200 further comprises:Matching is as follows for the first time:
Using reference point as the center of circle, regular length is radius, and a phase is marked respectively in template fingerprint image and input fingerprint image Deng region of interest ROI, be used as match for the first time it is interval;
It is 64 that step 6210, which chooses ROI radiuses, and unit is pixel;
The number of end points and bifurcation, the bifurcation number and end points of logging template fingerprint image in step 6220 search ROI Number is respectively Mb, Me, input fingerprint image characteristics point number is Nb, Ne
Step 6230 is calculated | Mb-Nb|, | Me-Ne|;
If | Mb-Nb| < ε1And | Me-Ne| < ε2, then enter next stage and match;Otherwise directly think to mismatch.Wherein ε1= 0.5min(Mb,Nb), ε2=0.5min (Me,Ne);
Wherein step S6300 further comprises:Second of matching is as follows:
Q each characteristic point is concentrated to template fingerprint image characteristic point, choose a rectangular area around it as it Gauge box;Distance of the size of gauge box between this feature point and central point is determined, in the local polar radius near from central point Diminish, polar angle becomes big;On the contrary, the place remote from central point should polar radius become big, polar angle diminishes;As long as treating after conversion is known The characteristic point of other fingerprint falls in this region, and type is identical, and direction is basically identical, then it is believed that the two characteristic points pair It is the characteristic point of a pair of matchings.
Wherein step S6400 further comprises:
Multiple matching judgment condition includes:(1) the point logarithm of successful match;(2) pairing points and corresponding fingerprint characteristic sum Ratio;(3) weighted sum of the discrepancy score summation of each matching double points, i.e. direction difference and range difference, it is final to determine input fingerprint image As whether being matched with template fingerprint image.
10. a kind of system for the autonomous formulation transaction flow for possessing security mechanism, it includes:
Authenticating user identification module, identity when being logged in based on the user of biometrics certification first or second user;
First subscription client, the first user by the first subscription client when electronic trade platform uploads commodity/service, the One user is set " seller's enquirement ", included in " the seller's enquirement " of setting by " addition is putd question to " function --- according to commodity/clothes Business species characteristics and need answer Transaction Information;
Second user client, second user is buying commodity/service by second user client on electronic trade platform And enter before payment interface, the first user of display is " seller's enquirement " set in advance, and second user is directed to " seller's enquirement " Answer information is filled in, and is paid the bill;
The webserver, the first subscription client is connected by network service and with the webserver with second user client, " seller's enquirement ", the answer information, the Transaction Information, the sequence information, net described in webserver collection and storage The user of network server storage first, the secure authenticated information of second user;
Data transmission security module, when data are submitted or preserved by the first user every time or second user, based on biology Authentication techniques ensure the safety that the first user or second user pass through transmitted data on network;
First user obtains while above commodity/service sequence information is received and answers information above, completes transaction.
11. system as claimed in claim 10, it also includes:
It is described to set " seller's enquirement " also to include --- the first user is by " addition is putd question to " function, and " seller carries for self-defined addition Ask " the problem of column, title content, whether the self-defined setting problem column be to fill out, self-defined to set the problem column Answer type.
12. system as claimed in claim 10, it also includes:
It is described to set " seller's enquirement " also to include --- the first user is by clicking on once " attachment request " function, self-defined increase One uploads attachment request, and the first user sets type of attachment title in " filling in attachment title " column, and it is attached to set this Whether part is to upload, and set the type of attachment, and wherein the type of attachment at least may include file, picture.
13. system as claimed in claim 10, it also includes:
It is described to set " seller's enquirement " also to include --- the first user is by " form enquirement " function, and generation is putd question to form and set Line number, columns, by puing question to the drop-down menu in form to select the answer type each arranged requirement, setting the " gauge outfit each arranged Title ", by selecting " single file text " or " multiline text " to define the height of " OK ", the width of each row is adjusted by drag operation Degree.
14. system as claimed in claim 10, it also includes:
The Transaction Information for needing to answer may include --- following at least one and combinations thereof:
If commodity/service is related to general merchandise/service, the Transaction Information for needing to answer can at least include --- buyer's surname Name, age, sex, date of birth, identification card number, Business Name, place city, better address, postcode, contact person, hand Machine number, landline telephone are OK, delivery is preceding contacts;
If commodity/service is related to on-line purchase international courier service, the Transaction Information for needing to answer can be wrapped at least Include --- sender information, sender information, express delivery article title, unit price, the amount of money, weight information;
If commodity/service is related to online sales insurance products, the Transaction Information for needing to answer can at least include --- throw Guarantor's information, insurant's information, beneficiary's information;
If commodity/service is related to online sales house property, the Transaction Information for needing to answer can at least include --- buyer Identity card picture copy and the other relevant informations of buyer;
If commodity/service is related to online sales " law Online reference service ", the Transaction Information for needing to answer can be at least Including buyer's name, phone number, telephone call date and time;
If commodity/service is related to " lease house property " service online, the Transaction Information for needing to answer can at least include --- Identity card picture copy, buyer's Real Name and phone number;
If commodity/service is related to " moving service " online transaction, the Transaction Information for needing to answer can at least include --- Origin, destination and the floor information of removal of home;
If commodity/service is related to online sales packed in cases thing and printing is serviced, the Transaction Information for needing to answer can be extremely Include less --- packing material and the print content or upload document of printing service;
If commodity/service is related to machine-building service, the Transaction Information for needing to answer can at least include --- Welder Skill specific requirement, welding material, welding maximum gauge, special welding requirements, due date.
15. system as claimed in claim 10, wherein ensureing the peace of the first user or second user by network transmission of dataEntirely, Including:
User is that client is corresponding with the first user in the first user or second user, the claim in the claim First subscription client or second user client corresponding with second user;
S2100, the information input of user is completed, and when clicking on submission, user fingerprints are gathered by client;Wherein adopted by fingerprint Collection processing module FingerprintCollector obtains user fingerprints information, and the user fingerprints information includes the fingerprint after processing Image ProcessedFingerprintImage and fingerprint characteristic value FA;
S2200, input information after MD5 is hashed, is signed with user fingerprints information with the RSA private keys of user, forms numeral Signature;
S2300, client generates a random IDEA key, using the RSA public key encryptions of data server, forms numeral letter Envelope;
S2400, input information, digital signature are encrypted with IDEA keys, ciphertext is formed;
S2500, data server is sent to by ciphertext and digital envelope;
S2600, after data server is received, opens digital envelope with the RSA private keys of data server, obtains the IDEA of client Key;
S2700, data server uses the IDEA keys of client, unties ciphertext;
S2800, input information obtains hashed value 1 by MD5, is obtained while untiing digital signature using the RSA public keys of client Whether consistent hashed value 2, compare two results;If consistent, verified and used by fingerprint matching module FingerprintMatch The fingerprint at family, if finger-mark check passes through, starts the operation that input information is stored in data server, and preservation result is sent Client is returned, data transfer still uses IDEA encryption;Otherwise, refusal input information is stored in the operation of data server;
S2900, client is received after the response of data server, if being stored in successfully, generation input information deposit daily record, points out to use Family input information success.
16. system as claimed in claim 10, identity when wherein the user of certification first or second user are logged in, including:
User is that client is corresponding with the first user in the first user or second user, the claim in the claim First subscription client or second user client corresponding with second user;
S3100, user's login user interface is shown to user;
S3200, client gathers the user fingerprints by fingerprint collecting processing module FingerprintCollector,;
S3300, client carries out feature extraction to the user fingerprints, obtains fingerprint characteristic value FA;
S3400, client is digitally signed to the fingerprint characteristic value FA of the user;
S3500, client is set up with data server and communicates to connect and send certification request;
S3510, the user realizes signature using private key PriKeyUser encryption user's marks IDA of user oneself, by the user Signature to data server send certification request, wherein;The public key for the user that data server passes through preservation, verifies the label Name obtains the mark IDA of the user;
S3520, data server produces time limit TAServer, current data NA, by the public key of data server itself PubKeyServer, current data NA and time limit TAServer, visitor is returned to after being encrypted with the public key PubKeyUser of the user The user at family end;
S3530, user of client receives the public key PubKeyServer of data server, current data NA and time limit TAServer, by the above-mentioned fingerprint characteristic value FA of acquisition, the public key of tuple { TAServer, NA, FA } data server Data server is sent to after PubKeyServer encryptions;
S3600, data server carries out fingerprint matching using fingerprint matching module FingerprintMatch;
S3700, data server is to client return authentication result.
17. the system as described in claim 15,16, wherein fingerprint collecting processing module FingerprintCollector, bag Include:
S5100, fingerprint image acquisition;
S5200, fingerprint image preprocessing, including the normalization of S5210 fingerprint images, S5220 Fingerprint enhancements, S5230 fingerprints Image thinning, the fingerprint image ProcessedFingerprintImage after return processing;
S5300, Finger print characteristic abstract, and return to fingerprint characteristic value FA;
The wherein S5300 Finger print characteristic abstracts further comprise:
Characteristic details point information is by vectorial D (x, y, θ, tk) represent, wherein x is abscissa, and y is ordinate, and θ is characterized minutiae point Direction, tkIt is that end points, k=2 are bifurcation that (k=1,2), which is characterized the classification of minutiae point, i.e. k=1,;The direction of end points is it The direction of place crestal line trend, the direction of bifurcation be angle in three crestal lines where the point between other two crestal lines all For the opposite direction of the crestal line at obtuse angle, (0≤θ is defined as<2π);Fingerprint image is after binaryzation, refinement, the ash of each pixel Degree be 0 or 1,0 expression background area in pixel gray scale, and 1 represent streakline on pixel gray scale;By using 3 × 3 Template is come the end points and bifurcation of the streakline that takes the fingerprint;Pixel to be detected is P (P=1), P in fingerprint image1, P2, P3, P4, P5, P6, P7, P8The gray value of pixel P respectively to be detected eight neighborhood consecutive points, takes 0 or 1;When these consecutive points When meeting formula below, it is possible to judge P classification:
If meeting formula (5.1), then pixel P is end points;If meeting formula (5.2), then pixel P is bifurcated Point;Classification that is rear and marking the pixel is judged, scanning is tracked to not labeled pixel, until institute Untill some minutiae features have been detected;Then the row, column coordinate where the pixel P in fingerprint image is labeled as minutiae point The position coordinates (x, y) of feature, is to the right the positive direction of x-axis using the starting point of image upper left angular direction as the origin of coordinate system, to It is the positive direction of y-axis down;
Pixel P eight neighborhood is encoded --- and each pixel of refined image only needs 1bit, and pixel P eight neighborhood pixel is pressed According to P8To P1Order arrangement, be put into a 8bit byte, pixel P eight neighborhood information is by this byte representation, and coding is public Formula is:
NpHave 28=256 kinds of coded combinations, wherein for end points, pixel that one and only one in eight neighborhood is put is 1, there is 8 kinds Combination, i.e. NpIn there are 8 kinds of values to represent that pixel P is end points;For bifurcation, there are 3 mutual disjunct pictures in its eight neighborhood Element is 1, then NpIn have 12 kinds of values be bifurcation;Also 40 kinds of value is continuity point;
Coding and complement code --- during Ridge following, from pixel P to next pixel PiDirection have 8 kinds of possibilities, Define Dp=i is pixel P to PiDirection encoding, make D'pIt is P for its complement codeiTo P direction encoding, direction encoding DpAnd benefit Code D'pRelation be:
……D'p=Dp+ 4, if Dp≤ 4 or D'p=Dp- 4, if Dp>4 (5.4);
Coding and category table --- the dimensional table for being 256 × 1 based on the category table that eight neighborhood is encoded, illustrate the eight of pixel P Neighborhood encodes the corresponding relation between its classification, such as tk, t represents its encoded radio, and k represents type, and 1 is end points, and 2 be bifurcated Point;
Direction and increment of coordinate table --- it is the table of one 8 × 3, represents between 8 kinds of tracking directions of advance and row, column increment of coordinate Relation, first row represents 8 kinds of direction encodings, and second and third row represents row x-axis, the increment in row y-axis direction respectively;
End points direction table --- it is the table of one 8 × 2, represents the pass between the direction of 8 kinds of neighborhoods codings and the subsequent point of tracking System, first is classified as eight neighborhood coding, and second is classified as direction encoding;
Bifurcation direction table --- be 12 × 4 tables, represent 12 kinds of bifurcations eight neighborhood coding and three tracking directions it Between relation, first be classified as eight neighborhood coding, second and third, four row be respectively 3 tracking directions direction encoding;
The step-length of tracking minutiae point is set as λ, λ is the average distance between streakline, takes λ=6, extracting the direction of minutiae feature When, with the coordinate (x, y) of the point for start position, starting point direction is in the direction searched using in the direction table corresponding to the point, so Streakline is tracked according to the coding track algorithm of eight neighborhood afterwards.For end points direction, end points (x is located at0,y0) place streakline The coordinate that tracking terminates last rear pixel is (X, Y), direction θ=arctan ((x of the end points0-X)/(y0-Y))…… (5.5);
For bifurcation, using bifurcation as starting point, 3 streak lines being connected with the point are tracked successively, can be obtained by formula (5.5) To 3 directions, the angle between direction two-by-two is then calculated, with the opposite direction of streakline that two other streakline angle is obtuse angle just It is the direction of the bifurcation.Tracking terminate after result be placed in a characteristic vector table, wherein characteristic vector form be D (x, y,θ,tk), eventually form fingerprint characteristic template;
The direction of minutiae feature is extracted using the coding tracking process of eight neighborhood, it is as follows:
S5310, carries out eight neighborhood coding and obtains coding and category table, direction and increment of coordinate table, end after fingerprint image refinement Point direction table, bifurcation direction table;
S5320, the start position of setting tracking streakline, direction, step-length, if starting step size is 0;
S5330, judges whether to reach setting step-length;
If it is determined that reach set step-length be it is no,
S5340 preserves the coordinate of current pixel point, and coordinate parameters are updated with increment of coordinate table according to search direction;
S5350 determines whether end points or bifurcation according to current eight neighborhood coding lookup direction and category table;
S5360, if it is determined that whether being end points or bifurcation result is no, then asks direction complement code to update direction encoding;
S5370, step-length adds 1;Return to step S5330;
If it is determined that reach set step-length be it is yes,
S5380, the coding track algorithm of Finger print characteristic abstract terminates;Result is placed on characteristic vector D (x, y, θ, tk) in;
By multiple characteristic vector D (x, y, θ, the ts corresponding with characteristic point quantityk) set constitute fingerprint image characteristics value FA;
The fingerprint collecting processing module returns to the fingerprint image after fingerprint image characteristics value FA and image procossing ProcessedFingerprintImage as collection finger print information.
18. the system as described in claim 15,16, wherein fingerprint matching module FingerprintMatch, including:
Step S6100:Datum mark is asked for using 3, three side similar principles, according to input fingerprint image and input template fingerprint image Datum mark is to asking for X, the position deviation in Y-coordinate direction and the rotation transformation factor as in, so that it is determined that transformation factor collection;
Step S6200:First time matching is carried out to input fingerprint image and template fingerprint image, input fingerprint image is calculated respectively With the bifurcation and end points number in template fingerprint interesting image area, determine whether to enter next stage matching;
Step S6300:Second is carried out using the method for variable gauge box to match, the rectangular area conduct around selected characteristic point Gauge box, as long as the characteristic point of the fingerprint to be identified after conversion falls in this region, direction is consistent and type is identical, then it is assumed that It is match point;
Step S6400:Set ratio, each match point of point logarithm, pairing points and the corresponding fingerprint characteristic sum of successful match To the threshold value such as discrepancy score summation finally judge whether input fingerprint image matches with template fingerprint image;
Wherein step S6100 further comprises:
The set of characteristic points Q of set of characteristic points P and master-fingerprint image for the characteristic value of the fingerprint image of input, difference table It is shown as:
P={ p1,p2,...,pm}={ (xp1,yp1p1,Tp1),(xp2,yp2p2,Tp2),...,(xpm,ypmpm,Tpm)};
Q={ q1,q2,...,qn}={ (xq1,yq1q1,Tq1),(xq2,yq2q2,Tq2),...,(xqn,yqnqn,Tqn)};
Wherein (xpi,ypipi,Tpi) and (xqj,yqjqj,Tqj) have recorded respectively in point set P in ith feature point and point set Q 4 information of j characteristic point:X-coordinate, Y-coordinate, direction θ and feature vertex type T;
Assuming that the certain point p in input point set PiCharacteristic information be (xpi,ypipi,Tpi), corresponding point q in template point set Qj Characteristic information be (xqj,yqjqj,Tqj), solved according to formula 6.1 and formula 6.2,
If changed factor (Δ x, Δ y, Δ θ) can be tried to achieve, then it is assumed that piWith qjIt is similar;Δ x and Δ y is respectively X, Y wherein in above formula Parallel factor on direction, Δ θ is then twiddle factor;
It is after fortranCorresponding point q in template point set QjCharacteristic information be (xqj,yqj, θqj,Tqj);IfIt is (Δ x, Δ y, Δ θ), p then to think transformation factoriWith qjIt is similar;
Any one characteristic point p inputted in fingerprint characteristic point set PiWith any one characteristic point in template fingerprint feature point set Q qjForm point pair;Found in input fingerprint image apart from piNearest characteristic point, is designated as p1, find apart from piSecondary near feature Point, is designated as p2;Similarly, q is found1, q2;So in 2 triangle (p of input fingerprint image and the formation of template fingerprint imagei,p1, p2) and (qj,q1,q2);Judge two triangle similarity degrees, if similarity degree is high, for it is possible matching pair, according to two groups Characteristic point subset ask for transformation parameter be exactly this two images transformation parameter.According to required transformation parameter to two width fingerprint images As being rotated and/or translation transformation, the similitude of two images is determined whether;
Judge the two triangles according to the distance between 3 characteristic points of the above and the mutual alignment relation between them Similarity degree, the similarity of triangle judge and transformation parameter to ask for step as follows:
Step 6110 calculates summit p respectivelyiAnd qjThe corresponding length of side | p1p2| and | q1q2|, setting error amount D1 and D2;
If step 6120 | | p1p2|-|q1q2||>D1, then illustrate that triangle can not possibly be congruent, this judgement terminates, reselected Need the summit p judgediAnd qjAnd the 2 characteristic point ps nearest apart from them1, p2And q1, q2, return to step 6110;
Otherwise step 6130, calculates p respectivelyiAnd qjTo p1, p2And q1, q2Distance | pip1|, | pip2| and | qjq1|, | qjq2|;Such as Fruit has | | pip1|-|pip2||<=D2And | | qjq1|-|qjq2||<=D2, then two triangles, 3 side difference approximately equals, say Bright 2 triangles are approximately congruent;Otherwise the summit p for needing to judge is reselectediAnd qjAnd 2 features nearest apart from them Point p1, p2And q1, q2, return to step 6110;
Step 6140 calculates the direction difference between the characteristic point that may be matched respectively according to the corresponding summit of 2 trianglesDirection mathematic interpolation formula:
If the angle difference approximately equal between corresponding vertex, i.e.,Then think this 2 spies Levy a subset (pi,p1,p2) and (qj,q1,q2) between angle meet a kind of rotation transformation relation, rotation transformation now because The calculation formula of son is as follows:
Otherwise judge that between this 2 character subsets a kind of matching relationship can not be formed, reselect the summit p for needing to judgeiAnd qj And the 2 characteristic point ps nearest apart from them1, p2And q1, q2, return to step 6110;
Step 6150 chooses (pi,qj) as the conversion origin of rotation transformation, to (qj,q1,q2) make rotation transformation, convert Value afterwards is (qj,q′1,q′2), and X, the position deviation in Y-direction after rotation transformation are calculated respectivelyIts calculation formula is as follows:
Δxpq=xp-xqFormula 6.5;
Δypq=yp-yqFormula 6.6;
IfAndThen think this 2 characteristic point subset (pi, p1,p2) and (qj,q1,q2) a kind of conversion is also met in the x, y direction, it is believed that this 2 characteristic point subset (pi,p1,p2) and (qj,q1,q2) between form a kind of matching relationship, translation and the transformation factor of rotation now are respectively (Δ x, Δ y, Δ θ);Wherein, Δ x, Δ y, Δ θ are respectively:
Wherein step S6200 further comprises:Matching is as follows for the first time:
Using reference point as the center of circle, regular length is radius, and a phase is marked respectively in template fingerprint image and input fingerprint image Deng region of interest ROI, be used as match for the first time it is interval;
It is 64 that step 6110, which chooses ROI radiuses, and unit is pixel;
The number of end points and bifurcation, the bifurcation number and end points of logging template fingerprint image in step 6220 search ROI Number is respectively Mb, Me, input fingerprint image characteristics point number is Nb, Ne
Step 6230 is calculated | Mb-Nb|, | Me-Ne|;
If | Mb-Nb| < ε1And | Me-Ne| < ε2, then enter next stage and match;Otherwise directly think to mismatch.Wherein ε1= 0.5min(Mb,Nb), ε2=0.5min (Me,Ne);
Wherein step S6300 further comprises:Second of matching is as follows:
Q each characteristic point is concentrated to template fingerprint image characteristic point, choose a rectangular area around it as it Gauge box;Distance of the size of gauge box between this feature point and central point is determined, in the local polar radius near from central point Diminish, polar angle becomes big;On the contrary, the place remote from central point should polar radius become big, polar angle diminishes;As long as treating after conversion is known The characteristic point of other fingerprint falls in this region, and type is identical, and direction is basically identical, then it is believed that the two characteristic points pair It is the characteristic point of a pair of matchings;
Wherein step S6400 further comprises:
Multiple matching judgment condition includes:(1) the point logarithm of successful match;(2) pairing points and corresponding fingerprint characteristic sum Ratio;(3) weighted sum of the discrepancy score summation of each matching double points, i.e. direction difference and range difference, it is final to determine input fingerprint image As whether being matched with template fingerprint image.
CN201710200990.7A 2017-03-31 2017-03-31 A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism Pending CN107016546A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710200990.7A CN107016546A (en) 2017-03-31 2017-03-31 A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710200990.7A CN107016546A (en) 2017-03-31 2017-03-31 A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism

Publications (1)

Publication Number Publication Date
CN107016546A true CN107016546A (en) 2017-08-04

Family

ID=59444825

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710200990.7A Pending CN107016546A (en) 2017-03-31 2017-03-31 A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism

Country Status (1)

Country Link
CN (1) CN107016546A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108416262A (en) * 2018-01-25 2018-08-17 杭州电子科技大学 A kind of fingerprint image characteristics matching algorithm based on multiple characteristic values
CN109948316A (en) * 2019-02-18 2019-06-28 珠海格力电器股份有限公司 A kind of finger prints processing method, apparatus and storage medium
CN110535649A (en) * 2019-04-15 2019-12-03 清华大学 Data circulation method, system and service platform, first terminal equipment
CN111489162A (en) * 2020-04-07 2020-08-04 上海优扬新媒信息技术有限公司 Data processing method and device based on biological characteristics
CN111931756A (en) * 2020-10-15 2020-11-13 上海一嗨成山汽车租赁南京有限公司 Method, computing device, and computer storage medium for generating electronic signatures
CN112541171A (en) * 2019-09-23 2021-03-23 北京嘉诚至盛科技有限公司 Identity authentication method and device, electronic equipment and computer readable medium
CN113781162A (en) * 2021-08-31 2021-12-10 欧冶云商股份有限公司 User personalized steel trade order generation method, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102999840A (en) * 2012-11-30 2013-03-27 江苏乐买到网络科技有限公司 Network transaction method for payment through fingerprint authentication
CN104484810A (en) * 2014-12-17 2015-04-01 景德镇陶瓷学院 Ceramic product personalized online customizing system based on ceramic cloud platform
TW201610890A (en) * 2014-09-04 2016-03-16 剛谷科技股份有限公司 Internet shopping and trading system, method of operating thereof, and communication platform using the system
CN106447461A (en) * 2016-10-18 2017-02-22 成都花娃网络科技有限公司 Network flower ordering method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102999840A (en) * 2012-11-30 2013-03-27 江苏乐买到网络科技有限公司 Network transaction method for payment through fingerprint authentication
TW201610890A (en) * 2014-09-04 2016-03-16 剛谷科技股份有限公司 Internet shopping and trading system, method of operating thereof, and communication platform using the system
CN104484810A (en) * 2014-12-17 2015-04-01 景德镇陶瓷学院 Ceramic product personalized online customizing system based on ceramic cloud platform
CN106447461A (en) * 2016-10-18 2017-02-22 成都花娃网络科技有限公司 Network flower ordering method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
夏振华: "指纹识别算法及小规模指纹识别系统的开发", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
常玉: "基于多参考点和相似三角形原理的指纹识别算法研究", 《基于多参考点和相似三角形原理的指纹识别算法研究",常玉,《中国优秀硕士学位论文全文数据库 信息科技辑》 *
钟雄: "指纹识别技术在电子商务安全认证中的应用研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108416262A (en) * 2018-01-25 2018-08-17 杭州电子科技大学 A kind of fingerprint image characteristics matching algorithm based on multiple characteristic values
CN109948316A (en) * 2019-02-18 2019-06-28 珠海格力电器股份有限公司 A kind of finger prints processing method, apparatus and storage medium
CN110535649A (en) * 2019-04-15 2019-12-03 清华大学 Data circulation method, system and service platform, first terminal equipment
CN110535649B (en) * 2019-04-15 2020-11-03 清华大学 Data circulation method and system, service platform and first terminal device
CN112541171A (en) * 2019-09-23 2021-03-23 北京嘉诚至盛科技有限公司 Identity authentication method and device, electronic equipment and computer readable medium
CN111489162A (en) * 2020-04-07 2020-08-04 上海优扬新媒信息技术有限公司 Data processing method and device based on biological characteristics
CN111931756A (en) * 2020-10-15 2020-11-13 上海一嗨成山汽车租赁南京有限公司 Method, computing device, and computer storage medium for generating electronic signatures
CN113781162A (en) * 2021-08-31 2021-12-10 欧冶云商股份有限公司 User personalized steel trade order generation method, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107016546A (en) A kind of system and method for the autonomous formulation transaction flow for possessing security mechanism
CN103765453B (en) Snap mobile payment device, method and system
CN110264288A (en) Data processing method and relevant apparatus based on information discriminating technology
US20120191517A1 (en) Prepaid virtual card
CN108293054A (en) System and method for the biometric authentication for using social networks
CN107210918A (en) Use the token and password of transaction-specific information
CN106557929A (en) Logistics information processing method and processing device
CN105069607A (en) System and method for implementing demand-supply integration by building enterprise cloud platform based on mobile OA
CN104616389B (en) Seal recognition methods and device
CN107464166A (en) Inquiry interaction processing method, server and terminal
CN111445246A (en) Block chain-based data recording method, device, equipment and storage medium
US20200219080A1 (en) System for processing a transaction by a user at a transaction point
CN105069643A (en) Cloud trading system for automobile and accessory products thereof
CN108701311A (en) Method and system for the certification mobile device based on browser and user
CN209149354U (en) Two dimensional code identifies the interactive transaction service system of commodity
KR20140046829A (en) System and method for user identifying
CN107194779A (en) Method, device and the computer-readable recording medium being sold under line
CN108985431A (en) A kind of method of antifalsification label and its commodity genuine piece of Testing and appraisal registered trademark
US10956698B2 (en) Systems and methods for using machine learning to determine an origin of a code
CN107909451A (en) After a kind of online shopping can under line picking automatically vending system and method
CN107871266A (en) Method for acquiring interactive certificate and related device
CN109523274A (en) Identification code specifies the interactive transaction service method of commodity
JP2007168924A (en) System and method for certification of receiver in article delivery, computer program, and computer-readable recording medium
CN115147197A (en) Intelligent bid inviting management system
JP2020079995A (en) Information processing method, information processing device, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170804

WD01 Invention patent application deemed withdrawn after publication