WO2020216022A1 - 次卡凭证的创建方法和装置,以及核销方法和装置 - Google Patents

次卡凭证的创建方法和装置,以及核销方法和装置 Download PDF

Info

Publication number
WO2020216022A1
WO2020216022A1 PCT/CN2020/082507 CN2020082507W WO2020216022A1 WO 2020216022 A1 WO2020216022 A1 WO 2020216022A1 CN 2020082507 W CN2020082507 W CN 2020082507W WO 2020216022 A1 WO2020216022 A1 WO 2020216022A1
Authority
WO
WIPO (PCT)
Prior art keywords
sub
verification
certificate
voucher
verification code
Prior art date
Application number
PCT/CN2020/082507
Other languages
English (en)
French (fr)
Inventor
周仕成
胡晓喻
王新盟
Original Assignee
口碑(上海)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 口碑(上海)信息技术有限公司 filed Critical 口碑(上海)信息技术有限公司
Publication of WO2020216022A1 publication Critical patent/WO2020216022A1/zh
Priority to US17/506,948 priority Critical patent/US20220068075A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/101Collaborative creation, e.g. joint development of products or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/342Cards defining paid or billed services or quantities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/02Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
    • G07F7/025Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices by means, e.g. cards, providing billing information at the time of purchase, e.g. identification of seller or purchaser, quantity of goods delivered or to be delivered

Definitions

  • the present disclosure relates to the field of Internet technology, and in particular to a method and device for creating a secondary card certificate, and a method and device for verification.
  • the secondary card can lock the purpose of consumption in advance, and can increase the utilization rate of users. Accordingly, it is particularly important to sell secondary cards.
  • the present disclosure is proposed to provide a method and device for creating a secondary card credential, and a verification method and device that overcome the above problems or at least partially solve the above problems.
  • a method for creating secondary card credentials including:
  • a verification method for a secondary card certificate including:
  • the verification request for at least one sub-certificate of the secondary card analyze the verification code carried in the verification request; where the verification code is the first verification code of the primary certificate corresponding to the secondary card, or is the corresponding secondary card
  • the second verification code of one sub-certificate in at least one of the sub-certificates; and, the quantity of at least one sub-certificate is consistent with the number of times that the secondary card can be used; and at least one sub-certificate of the corresponding secondary card Select the sub-certificate to be verified, and verify the sub-certificate to be verified.
  • a verification method for a secondary card certificate including:
  • analyze the verification code carried in the verification request where the verification code is the first verification code corresponding to the primary certificate or the second verification code corresponding to a sub-certificate; according to the analysis
  • the sub-certificate to be verified is selected from at least one sub-certificate of the corresponding secondary card, and the sub-certificate to be verified is verified.
  • a device for creating secondary card credentials including:
  • the receiving module is adapted to receive the acquisition request of the secondary card; the creation module is adapted to create the primary certificate and at least one sub-certificate corresponding to the secondary card according to the acquisition request; wherein the quantity of at least one sub-certificate and the number of times the secondary card can be used Consistent; the generation module is adapted to generate a first verification code corresponding to the master certificate, or generate a second verification code corresponding to at least one sub-voucher for verification of at least one sub-voucher.
  • a secondary card certificate verification device including:
  • the analysis module is adapted to analyze the verification code carried in the verification request according to the verification request for at least one sub-certificate of the secondary card; wherein the verification code is the first verification code of the primary certificate corresponding to the secondary card, Or it is the second verification code of one sub-certificate in at least one sub-certificate corresponding to the secondary card; and, the number of at least one sub-certificate is consistent with the number of times the secondary card can be used; the selection module is suitable for analyzing the result Select the sub-certificate to be verified from at least one sub-certificate of the corresponding secondary card; the verification module is suitable for verifying the sub-certificate to be verified.
  • a secondary card credential verification system which includes the secondary card credential creation device described in any one of the above, and the secondary card credential verification described in any one of the above items. PIN device.
  • a computing device including: a processor, a memory, a communication interface, and a communication bus.
  • the processor, the memory, and the communication interface communicate with each other through the communication bus; the memory is used to store at least one Executing the instruction, the executable instruction causes the processor to execute the operation corresponding to the method for creating the secondary card credential.
  • a computing device including: a processor, a memory, a communication interface, and a communication bus.
  • the processor, the memory, and the communication interface communicate with each other through the communication bus; the memory is used to store at least one Executable instructions, the executable instructions cause the processor to perform the operations corresponding to the verification method of the secondary card certificate.
  • non-volatile computer-readable storage medium stores at least one executable instruction, and the executable instruction causes a processor to execute as described above The operation corresponding to the creation method of the secondary card voucher.
  • a computer program product includes a computer program stored on a non-volatile computer storage medium, the computer program includes program instructions, when the program instructions are executed by a processor , Enabling the processor to perform the operations corresponding to the above-mentioned secondary card credential creation method.
  • a non-volatile computer-readable storage medium stores at least one executable instruction, and the executable instruction causes a processor to execute as described above The operation corresponding to the verification method of the secondary card certificate.
  • a computer program product includes a computer program stored on a non-volatile computer storage medium, the computer program includes program instructions, and when the program instructions are executed by a processor , Enabling the processor to perform the operations corresponding to the above-mentioned secondary card verification method.
  • a primary credential and at least one sub-certificate corresponding to the secondary card are created instead of just one Unique voucher; and, by using the generated first verification code corresponding to the master voucher, or generating a second verification code corresponding to at least one sub-voucher, at least one sub-voucher can be verified instead of Write off the unique voucher created.
  • this embodiment provides a brand-new secondary card credential creation solution. After at least one child credential corresponding to the secondary card is created, one child credential can be used for one-time verification, and the verification process is more complicated. Stable and orderly, improving the accuracy of write-off results.
  • Fig. 1 shows a flowchart of a method for creating a secondary card voucher according to an embodiment of the present disclosure
  • Fig. 2 shows a flowchart of a method for verifying a secondary card certificate according to an embodiment of the present disclosure
  • FIG. 3 shows a flowchart of a method for verifying a secondary card certificate according to another embodiment of the present disclosure
  • FIG. 4 shows a flowchart of a method for verifying and verifying a secondary card certificate according to another embodiment of the present disclosure
  • Figure 5 shows a schematic diagram of creating a secondary card voucher in a specific implementation
  • FIG. 6 shows a schematic diagram of selecting a sub-certificate for verification in a specific implementation
  • FIG. 7 shows a flowchart of a method for verifying and verifying a secondary card certificate according to still another embodiment of the present disclosure
  • FIG. 8 shows a schematic diagram of a user terminal displaying a fixed code or a variable code in a specific implementation
  • Figure 9 shows a functional block diagram of a secondary card credential creation device according to an embodiment of the present disclosure
  • FIG. 10 shows a functional block diagram of a secondary card certificate verification device according to an embodiment of the present disclosure
  • FIG. 11 shows a schematic structural diagram of a computing device according to an embodiment of the present disclosure
  • Fig. 12 shows a schematic structural diagram of another computing device according to an embodiment of the present disclosure.
  • Fig. 13 shows a schematic structural diagram of yet another computing device according to an embodiment of the present disclosure.
  • Fig. 1 shows a flowchart of a method for creating a secondary card credential according to an embodiment of the present disclosure. As shown in Figure 1, the method includes:
  • Step S101 Receive a request for obtaining the secondary card.
  • the acquisition request can be initiated by the user.
  • the user will initiate the acquisition request when purchasing or receiving the secondary card; or, it is initiated by the online platform, for example, the platform presents the secondary card to the user to initiate the acquisition request.
  • the online platform for example, the platform presents the secondary card to the user to initiate the acquisition request.
  • Step S102 Create a primary certificate and at least one sub-certificate corresponding to the secondary card according to the acquisition request; wherein the quantity of the at least one sub-certificate is consistent with the number of times the secondary card can be used.
  • one primary certificate is created at the same time, and at least one sub-certificate consistent with the number of times the secondary card can be used is created. For example, if a user purchases a secondary card a of a beauty salon, the secondary card a can be used for three beauty purchases, and corresponding to the secondary card a, a primary certificate and three sub-certificates need to be created.
  • a secondary card acquisition request is received, and a primary credential corresponding to the secondary card is created based on the secondary card detailed information carried in the acquisition request, where the secondary card detailed information includes store information, product information, and/or service information, and the primary credential
  • the number of times of use of the secondary card is recorded therein, and/or the credential information of at least one sub-certificate of the same primary card associated with the primary credential, where the number of usage information further includes the number of times that can be used and the remaining number of uses, the voucher
  • the information includes voucher identification and verification status.
  • at least one sub-certificate corresponding to the secondary card is created, and the at least one sub-certificate is used for each verification.
  • Step S103 Generate a first verification code corresponding to the master voucher, or generate a second verification code corresponding to at least one sub-voucher, for verifying at least one sub-voucher.
  • the first verification code corresponding to the master voucher is generated, and the sub-voucher to be verified can be selected from the at least one sub-voucher based on the correspondence between the main voucher pointed to by the first verification code and the at least one sub-voucher
  • the master certificate and sub-certificate of the same primary card have a corresponding relationship.
  • generating a second verification code corresponding to at least one sub-voucher may directly determine the sub-voucher to be verified from the at least one sub-voucher for verification based on the sub-voucher pointed to by the second verification code.
  • using the secondary card credential created in this embodiment and the verification code corresponding to the secondary card credential can be used to verify one sub-certificate each time it is verified instead of verifying the same credential each time.
  • a primary voucher and at least one sub-voucher corresponding to the secondary card are created, instead of just creating a unique voucher; and Using the generated first verification code corresponding to the master voucher, or generating the second verification code corresponding to at least one sub-voucher, at least one sub-voucher can be used for verification, instead of the unique voucher created Write off.
  • this embodiment provides a brand-new secondary card credential creation solution. After at least one child credential corresponding to the secondary card is created, one child credential can be used for one-time verification, and the verification process is more complicated. Stable and orderly, improving the accuracy of write-off results.
  • the fund information allocated to each sub-voucher is calculated; the fund information is recorded in the corresponding sub-voucher,
  • the fund information includes the amount actually received by the merchant when using the sub-vouchers, the amount actually paid by the user, and/or the amount of subsidies on the platform.
  • the user buys a secondary card that can buy chicken legs for 3 times (1 each time) with 10 yuan, and the fund information of each sub-voucher is calculated by means of the actual amount paid by the user is 10/3 ⁇ 3.3 Yuan, the actual amount paid by the client is recorded in three sub-vouchers.
  • the average calculation method in the above example is not limited.
  • the funds can also be allocated to each sub-voucher according to a preset ratio. For example, in the above example, if If the ratio is 1:1:3, the actual amount paid by the client recorded in the three sub-vouchers is 2 yuan, 2 yuan, and 6 yuan respectively.
  • the verification method of the secondary card certificate is determined before generating the first verification code corresponding to the primary certificate or generating the second verification code corresponding to at least one sub-voucher; the verification method includes Perform verification based on the first verification code, or perform verification based on the second verification code.
  • determining the verification method of the secondary card certificate can reduce the risk of the secondary card certificate being stolen.
  • the verification method of the secondary card voucher it is mainly based on the following considerations: the credibility of the store, the size of the store, the value of the goods or services, and/or the verification method required by the store.
  • a fixed code can be used for verification, that is, according to the 1. Verification code for verification; conversely, the lower the credibility of the store or the smaller the scale of the store, it indicates that the credibility of the store needs to be improved, and the verification code is more likely to be stolen.
  • the code is changed and written off to avoid being stolen.
  • the code can be changed for verification; on the contrary, the value of the goods or services included in the secondary card If it is lower, the fixed code can be used for verification.
  • the first verification code corresponding to the primary verification code is generated, where the The first verification code is a fixed code that can be used for multiple verifications. For example, after a master voucher and three sub-vouchers are created, the first verification code corresponding to the master voucher is generated, and the first verification is The code can be used for three verifications, and each time a sub-voucher is verified. During the three verifications, the first verification code always remains unchanged. Or, when it is determined that the verification method of the secondary card certificate is to perform verification according to the second verification code, a second verification code corresponding to at least one sub-certificate is generated, wherein the second verification code is used for each verification The code is changing.
  • the unverified sub-vouchers are found according to the verification status of at least one sub-voucher; one sub-voucher that has not been verified is selected.
  • the voucher serves as the sub-voucher to be verified; then, a second verification code corresponding to the sub-voucher to be verified is generated.
  • the verification status of each sub-voucher in at least one sub-voucher will be continuously updated and changed as the verification goes on, and the sub-vouchers that have not been verified will change.
  • the selected sub-vouchers to be verified will be changed.
  • the voucher and the generated second verification code corresponding to the sub-voucher to be verified will also change. It can be seen that by generating the second verification code corresponding to the sub-voucher to be verified, the verification code can be changed and the risk of the verification code being stolen can be reduced.
  • the un-verified sub-vouchers are searched out according to the verification status of the at least one sub-voucher.
  • the currently unwritten sub-vouchers are found, and then a new second verification code can be generated according to the current verification progress. It is used to verify the sub-vouchers that have not been verified.
  • Method 1 According to the voucher ID of the unapplied sub-voucher, select a sub-voucher from the unapplied sub-vouchers as the sub-voucher to be verified. Optionally, you can select in the order of the correct or reversed order of the voucher ID , For example, select in descending order of number.
  • Method 2 According to the fund information recorded in the sub-vouchers that have not been verified, a sub-voucher is selected as the sub-voucher to be verified from the sub-vouchers that have not been verified.
  • the impact of the fund information on the promotion of user consumption can be selected The size is selected, and the sub-certificate to which the fund information with a large impact on the user's consumption is promoted will be selected to attract the user to use the remaining number of times. For example, the higher the subsidy amount of the platform, the greater the impact of promoting user consumption, the sub-voucher with the lower subsidy amount is selected first, and then the sub-voucher with the higher subsidy amount is selected.
  • the first verification code or the second verification code is sent To the user end, the user end provides the first verification code or the second verification code to the merchant end for verifying at least one sub-certificate. Wherein, the first verification code or the second verification code is sent to the user terminal.
  • the user terminal After the user terminal receives the first verification code or the second verification code, when the user has any purchase of the goods or services included in the secondary card When required, provide the first verification code or the second verification code to the merchant, and initiate a verification request when the merchant obtains the first verification code or the second verification code; and, the merchant indicates A device that can obtain the verification code provided by the client in the store where the card can be used.
  • the scan code gun scans the first verification code displayed on the user terminal to initiate a verification request.
  • Fig. 2 shows a flow chart of a method for verifying a secondary card certificate according to an embodiment of the present disclosure. As shown in Figure 2, the method includes:
  • Step S201 Analyze the verification code carried in the verification request according to the verification request for at least one sub-certificate of the secondary card.
  • the verification code is the first verification code of the primary certificate corresponding to the secondary card, or the second verification code of one of the at least one sub-certificate corresponding to the secondary card.
  • the number of at least one sub-certificate is consistent with the number of times the card can be used.
  • the verification request for at least one sub-certificate of the secondary card includes a verification request for at least one sub-certificate of the secondary card initiated by the merchant terminal obtaining the verification code provided by the user terminal.
  • the scanner scans the verification code to initiate a verification request.
  • the secondary card After obtaining the secondary card on the user side, the secondary card can be used in exchange for corresponding goods or services, and after each use, it needs to be written off to update the remaining use times of the secondary card.
  • each time a verification request is received a sub-certificate that has not been verified is verified, and each time a sub-certificate is verified, the remaining number of uses of the secondary card is reduced by one.
  • the verification request is received, where the verification request can be initiated by obtaining the verification code, for example, entering the identification code or scanning the two-dimensional code, etc.; analyzing the verification code carried in the verification request to determine which The master voucher or the sub-voucher facilitates the accurate determination of the only sub-voucher to be applied for verification.
  • the verification code carried in the verification request may be the first verification code corresponding to the master certificate, or the second verification code corresponding to one of the at least one sub-certificate, and the verification request carries
  • the type of verification code (first verification code or second verification code) is determined and generated by the voucher system of the online platform.
  • Step S202 Select a sub-certificate to be verified from at least one sub-certificate of the corresponding secondary card according to the analysis result, and verify the sub-certificate to be verified.
  • the sub-certificate to be verified can be selected based on the corresponding relationship between the master certificate and at least one sub-certificate. Among them, the master certificate and the sub-certificate of the same card Have a corresponding relationship. Or, after the sub-vouchers to which the verification code points are determined through analysis, the sub-vouchers to be verified can be directly selected based on the sub-vouchers. Then, the sub-vouchers to be written off are to be written off, that is, one sub-voucher is written off every time it is written off instead of the same certificate every time.
  • the verification code is the QR code corresponding to the master certificate.
  • a verification request is initiated, and the QR code carried in the verification request is parsed.
  • the number of sub-certificates that have not been verified will be reduced by one, and the remaining use times of the secondary card will also be reduced by one.
  • each time a verification request is received one of the at least one sub-certificate is verified according to the verification code carried in the verification request , Instead of verifying the unique voucher created.
  • the method of verifying the unique voucher each time has the problem of preempting the unique voucher.
  • one of the sub-vouchers is verified each time the verification is performed, so that the verification process is It is more stable and orderly, and the accuracy of the write-off results is improved.
  • the settlement processing at the merchant side is completed according to the fund information recorded in the sub-vouchers to be verified.
  • only one electronic voucher is generated, which must be dynamically calculated based on the fund pool each time it is written off.
  • the allocation logic is complicated, which is not conducive to adjusting the payment strategy.
  • each verification is After the sale, the funds to be paid or refunded to the merchant are all allocated in advance, which can overcome the above-mentioned problems in the prior art and make the allocation of funds simple and controllable. Still take the example of a user who bought a secondary card that can buy chicken legs 3 times (1 each time) with 10 yuan.
  • the actual amount received by the merchant is the actual amount paid by the user.
  • the actual amount received by the merchant is calculated as 10/3 ⁇ 3.3 yuan.
  • the actual amount received by the merchant is calculated again as (10- 3.3)/2 ⁇ 3.4 yuan
  • the verification code carried in the verification request may be the first verification code or the second verification code.
  • the specific verification process will be described below for these two situations:
  • the verification code is the first verification code of the primary certificate corresponding to the secondary card.
  • the first verification code is parsed to determine at least one sub-certificate associated with the main certificate corresponding to the first verification code, where at least one sub-voucher associated with the main certificate is a sub-certificate corresponding to the same primary card certificate.
  • the verification status of at least one sub-voucher find out the unverified sub-vouchers, where the verification status of at least one sub-voucher can be recorded in the master voucher or in the corresponding sub-vouchers, for example, in the master voucher
  • the verification status of each associated sub-voucher recorded in is "Verified" or "Available". Select a sub-voucher from the sub-vouchers that have not been verified as the sub-vouchers to be verified.
  • the sub-vouchers to be verified are used for verification. Generally speaking, all sub-vouchers that have not been verified can be used for current verification. If you select the sub-certificate to be verified for verification, it is different from the sub-certificate that was previously verified during verification. Correspondingly, even if there are consecutive or concurrent multiple verification requests, the same voucher will not be used for verification. The resulting problem of failure to grab locks makes the write-off process more stable and orderly.
  • selecting a sub-voucher from the sub-vouchers that have not been verified as the sub-vouchers to be verified is specifically: selecting a sub-voucher as the sub-vouchers that have not been verified according to the voucher identifier of the un-verified sub-vouchers Sub-vouchers to be verified; or, according to the fund information recorded in the un-verified sub-vouchers, select a sub-voucher from the un-verified sub-vouchers as the sub-vouchers to be verified.
  • the verification code is the second verification code of one of the at least one sub-certificates corresponding to the secondary card.
  • FIG. 3 shows a flowchart of a method for verifying and verifying a secondary card certificate according to another embodiment of the present disclosure. As shown in Figure 3, the method includes:
  • Step S301 Receive an acquisition request for the secondary card, and create a primary certificate and at least one sub-certificate corresponding to the secondary card according to the acquisition request.
  • the number of at least one sub-certificate is consistent with the number of times the card can be used.
  • Step S302 Analyze the verification code carried in the verification request according to the verification request for at least one sub-certificate of the secondary card.
  • the secondary card After obtaining the secondary card on the user side, the secondary card can be used in exchange for corresponding goods or services, and after each use, it needs to be written off to update the remaining use times of the secondary card.
  • each time a verification request is received a sub-certificate that has not been verified is verified, and each time a sub-certificate is verified, the remaining number of uses of the secondary card is reduced by one.
  • the verification request is received, where the verification request can be initiated by obtaining the verification code, for example, entering the identification code or scanning the two-dimensional code, etc.; analyzing the verification code carried in the verification request to determine which The master voucher or the sub-voucher facilitates the accurate determination of the only sub-voucher to be applied for verification.
  • the verification code carried in the verification request may be the first verification code corresponding to the master certificate, or the second verification code corresponding to one of the at least one sub-certificate, and the verification request carries
  • the type of verification code (first verification code or second verification code) is determined and generated by the voucher system of the online platform.
  • Step S303 Select a sub-certificate to be verified from at least one sub-certificate of the corresponding secondary card according to the analysis result, and verify the sub-certificate to be verified.
  • the sub-certificate to be verified can be selected based on the corresponding relationship between the master certificate and at least one sub-certificate. Among them, the master certificate and the sub-certificate of the same card Have a corresponding relationship. Or, after the sub-vouchers to which the verification code points are determined through analysis, the sub-vouchers to be verified can be directly selected based on the sub-vouchers. Then, the sub-vouchers to be written off are to be written off, that is, one sub-voucher is written off every time it is written off instead of the same certificate every time.
  • the verification method for the secondary card voucher when a request for obtaining the secondary card is received, the primary voucher and at least one sub-voucher corresponding to the secondary card are created, instead of just creating a unique voucher;
  • the verification code carried in the verification request is used to verify one of the at least one sub-vouchers, instead of verifying the created unique voucher. It can be seen that this embodiment provides a brand-new verification scheme.
  • one sub-certificate can be used for one-time verification; and, in the prior art, each time The method of verifying the unique certificate has the problem of preempting the unique certificate, and the disclosed solution will verify one of the sub-certificates every time the verification is performed, making the verification process more stable and orderly, and improve The accuracy of the write-off results.
  • the allowed verification method is determined for different secondary cards. For example, for a store with a good reputation, the possibility of a merchant stealing the verification code of the secondary card certificate for verification is low. For such a store, it is determined that the secondary card issued by it can pass the fixed code (corresponding to the implementation in Figure 4). For example, the verification code is always the first verification code) for verification; on the contrary, for shops with poor reputation, in order to prevent the merchant from stealing the secondary card, it is determined that the secondary card issued must be changed (corresponding to Figure 7).
  • the verification code is a different second verification code) for verification.
  • the verification codes carried in different verification requests are different.
  • the following are respectively for the verification by the fixed code (that is, the case of verification according to the first verification code corresponding to Figure 4) or the case of the transformation verification (the situation of verification according to the second verification code corresponding to Figure 7). A way to write off is explained.
  • Fig. 4 shows a flowchart of a method for verifying a secondary card certificate according to another embodiment of the present disclosure. This embodiment mainly describes the method of verifying and canceling according to the first verification code. As shown in Figure 4, the method includes:
  • Step S401 Receive a request for obtaining a secondary card, and create a primary certificate and at least one sub-certificate corresponding to the secondary card according to the obtaining request.
  • the fund information allocated to each sub-voucher is calculated; the fund information is recorded in the corresponding sub-voucher, so that the settlement process can be directly performed according to the fund information, There is no need to calculate the settlement amount based on the dynamics of the fund pool and then perform settlement processing every time it is written off.
  • the fund information includes the amount actually received by the merchant when using the sub-vouchers, the amount actually paid by the user, and/or the amount of subsidies on the platform.
  • Figure 5 shows a schematic diagram of creating a secondary card voucher in a specific implementation.
  • the electronic voucher system of the online platform creates an electronic voucher, and creates a primary voucher and four sub-certificates corresponding to the secondary card.
  • Step S402 Determine the verification method of the secondary card certificate.
  • the verification method includes verification based on the first verification code, or verification based on the second verification code.
  • the verification is performed according to the first verification code, that is, the verification is performed through the first verification code corresponding to the master certificate each time.
  • the verification code is a fixed code; and, according to the second verification code.
  • the verification code is used for verification, that is, the verification is performed through the second verification code corresponding to a different sub-certificate each time.
  • the verification code is a variable code.
  • the verification method of the secondary card certificate is determined to reduce the risk of the secondary card certificate being stolen. Specifically, when determining the verification method of the secondary card voucher, it is mainly based on the following considerations: the credibility of the store, the size of the store, the value of the goods or services, and/or the verification method required by the store.
  • Step S403 When it is determined that the verification method of the secondary card certificate is to perform verification according to the first verification code, generate the first verification code corresponding to the primary verification, and send the first verification code to the client terminal for the client terminal Provide the first verification code to the merchant for verification of at least one sub-certificate.
  • the voucher system when the verification method of the secondary card certificate is determined to be based on the first verification code, the voucher system generates the first verification code corresponding to the primary certificate, and the first verification code is used to provide the merchant terminal To initiate a verification request, for example, the first verification code is provided to a code scanner for scanning to initiate a verification request. In the embodiment of performing verification based on the first verification code, it is only necessary to generate the second verification code once and send it to the user terminal. In the subsequent verifications, the first verification code is passed. Initiate a write-off request.
  • Step S404 Analyze the first verification code carried in the verification request according to the at least one sub-certificate verification request for the secondary card, and verify the sub-certificate to be verified based on the analysis result.
  • the first verification code After receiving the first verification code at the user end, when the user has a demand for consumption of the goods or services included in the secondary card, the first verification code is provided to the merchant, and the first verification code is obtained at the merchant end. Initiate a verification request when the code is cancelled.
  • the merchant side refers to a device that can obtain the verification code provided by the user side in a store where the secondary card can be used, such as a code scanner.
  • the verification status of at least one sub-voucher find out the unverified sub-vouchers, where the verification status of at least one sub-voucher can be recorded in the master voucher or in the corresponding sub-vouchers, for example, in the master voucher
  • the verification status of each associated sub-voucher recorded in is "Verified” or "Available”. Select a sub-voucher from the sub-vouchers that have not been verified as the sub-vouchers to be verified, and verify the sub-vouchers to be verified. Generally speaking, all sub-vouchers that have not been verified can be used for current verification. Select the sub-vouchers to be verified for verification. This is different from the sub-vouchers that were previously verified. Accordingly, even if there are continuous or Concurrent multiple write-off requests will not have the problem of lock grab failure caused by preempting the same credential for verification, making the verification process more stable and orderly.
  • selecting a sub-voucher from the sub-vouchers that have not been verified as the sub-voucher to be verified is specifically: selecting a sub-voucher from the sub-vouchers that have not been verified according to the voucher identifier of the un-verified sub-voucher
  • the sub-vouchers to be verified can optionally be selected according to the positive or reverse order of the voucher identification, for example, according to the order of the number from small to large; or according to the fund information recorded in the sub-vouchers that have not been verified Select a sub-voucher from the sub-vouchers that have not been verified as the sub-vouchers to be verified.
  • the settlement processing at the merchant side is completed according to the fund information.
  • the fund information is recorded in the sub-vouchers
  • the settlement processing at the merchant side is completed according to the fund information.
  • only one electronic voucher is generated, which must be dynamically calculated based on the fund pool each time it is written off.
  • the allocation logic is complicated, which is not conducive to adjusting the payment strategy.
  • each verification is After the sale, the funds to be paid or refunded to the merchant are all allocated in advance, which can overcome the above-mentioned problems in the prior art and make the allocation of funds simple and controllable.
  • Fig. 6 shows a schematic diagram of selecting a sub-certificate for verification in a specific implementation.
  • the coupon code shown by the user terminal in Figure 6 is the first verification code
  • the electronic voucher system recognizes the first verification code and determines that there are two available (Unverified) sub-vouchers, and then select the sub-vouchers to be verified from the two sub-vouchers for verification.
  • the verification method for the secondary card certificate when a request for obtaining the secondary card is received, the primary certificate and at least one sub-certificate corresponding to the secondary card are created, instead of just creating a unique voucher;
  • the verification method of the card voucher is to generate the first verification code corresponding to the primary voucher for verification for the secondary card verification that is verified according to the first verification code; when verification is performed, the verification request is resolved through
  • the carried first verification code selects an unverified sub-certificate from at least one sub-voucher associated with the main voucher for verification.
  • the verification is performed by means of a fixed code, that is, one code with multiple cores; and, each verification is performed for a sub-certificate that has not been verified, so that an exclusive lock based on the corresponding sub-voucher can be used to avoid
  • a fixed code that is, one code with multiple cores
  • each verification is performed for a sub-certificate that has not been verified, so that an exclusive lock based on the corresponding sub-voucher can be used to avoid
  • lock grab failure occurs, making the verification process more stable and orderly, and improving the accuracy of the verification results.
  • the funds are calculated and pre-allocated for each sub-voucher, and settlement is performed based on the funds when writing off, which simplifies the capital allocation logic and has strong controllability, which is conducive to the adjustment of payment strategies.
  • Fig. 7 shows a flow chart of a method for verifying a secondary card certificate according to another embodiment of the present disclosure. This embodiment mainly describes the way of verification based on the second verification code. As shown in Figure 7, the method includes:
  • Step S701 Receive an acquisition request for the secondary card, and create a primary certificate and at least one sub-certificate corresponding to the secondary card according to the acquisition request.
  • the number of at least one sub-certificate is consistent with the number of times the card can be used.
  • the fund information allocated to each sub-voucher is calculated; the fund information is recorded in the corresponding sub-voucher so that the settlement process can be directly performed according to the fund information, There is no need to perform payment processing based on the dynamic calculation of the fund pool after each write-off.
  • Step S702 Determine the verification method of the secondary card certificate.
  • the verification method includes verification based on the first verification code, or verification based on the second verification code.
  • step S701 and step S702 correspond to step S401 and step S402 in FIG. 4, and for details, please refer to the description of step S401 and step S402, which will not be repeated here.
  • Step S703 When it is determined that the verification method of the secondary card certificate is to perform verification based on the second verification code, generate a second verification code corresponding to the sub-certificate to be verified, and send the second verification code to the user terminal, The user terminal provides the second verification code to the merchant terminal for verification of at least one sub-certificate.
  • the un-verified sub-vouchers are found according to the verification status of at least one sub-voucher; Select a sub-voucher from the sub-vouchers, among which, the selected one is the sub-voucher to be verified, and the specific sub-vouchers selected from the sub-vouchers that have not been verified are as follows: Voucher ID Select a sub-voucher from the sub-vouchers that have not been verified as the sub-voucher to be verified; or, select a sub-voucher from the sub-vouchers that have not been verified according to the fund information recorded in the un-verified sub-vouchers As a sub-certificate to be verified.
  • the foregoing implementation principle and process of selecting a sub-certificate are similar to the selection process of step S404 in the embodiment corresponding to FIG. 4, and for details, please refer to the description of step S404,
  • a second verification code corresponding to a sub-voucher is generated, and the second verification code is sent to the client terminal for the client terminal Provide the second verification code to the merchant for verification of at least one sub-certificate.
  • the verification code presented by the user for verification is the second verification code, and the second verification code presented during verification each time corresponds to the selected sub-certificate to be verified this time
  • the verification code that is, the verification code can be changed, and the situation of the merchants from stealing the card vouchers is avoided.
  • step S703 after each verification is completed or after at least one sub-voucher is created, one sub-voucher is selected and a second verification code corresponding to one sub-voucher is generated for the next time Write-off provides the ability to change codes, and solves the risk of fraud caused by code changes.
  • Step S704 According to the verification request for the secondary card certificate, analyze the second verification code, determine the sub-certificate corresponding to the second verification code, and select the sub-certificate corresponding to the second verification code as the sub-certificate to be verified. The sub-vouchers to be verified are verified.
  • the second verification code carried in the verification request is analyzed to perform the corresponding sub-certificate. Write off.
  • the second verification code is the verification code corresponding to a selected sub-voucher after the last verification is completed or after at least one sub-voucher is created.
  • the verification request initiated by acquiring the second verification code is received, the second verification code is analyzed, the sub-vouchers to be verified corresponding to the second verification code are determined, and the sub-vouchers to be verified are verified.
  • the second verification code is the verification code corresponding to the sub-voucher to be verified, and the second verification code can be analyzed to directly determine the sub-voucher to be verified and perform verification.
  • the merchant-side settlement processing is completed according to the fund information.
  • the settlement process refer to the description of the corresponding position of step S404 in the embodiment corresponding to FIG. 4, which will not be repeated here.
  • the coupon code shown by the client in Figure 6 is the second verification code corresponding to the sub-voucher to be verified, and the electronic voucher system recognizes the second verification code.
  • Cancellation code determine the sub-voucher to be verified (it is one of the two available sub-vouchers in Figure 6), and perform verification.
  • the verification method for the secondary card certificate when a request for obtaining the secondary card is received, the primary certificate and at least one sub-certificate corresponding to the secondary card are created, instead of just creating a unique voucher;
  • the voucher is verified.
  • the solution of this embodiment can provide the ability to change codes and perform verification through code conversion, thereby solving the risk of fraud caused by the inability to change codes and improving user experience; and, each verification and payment is for one Sub-certificates that have not been verified can be used to perform exclusive locks based on the corresponding sub-certificates, avoiding the failure of lock grabbing in concurrent scenarios caused by only generating a single voucher, making the verification process more stable and orderly, and improve The accuracy of the write-off results.
  • the funds are calculated and pre-allocated for each sub-voucher, and payment is made based on the funds when writing off, which simplifies the capital allocation logic and has strong controllability, which is conducive to the adjustment of payment strategies.
  • FIG. 8 shows a schematic diagram of a fixed code or a transcoded code displayed at the user end in a specific implementation. As shown in Figure 8, the electronic voucher system can decide the verification method according to the card coupon details of the secondary card.
  • the first verification code ( The fixed code) is displayed on the user side; if the code needs to be changed, that is, to write off according to the second verification code, select the sub-certificate to be verified and the second verification code corresponding to the sub-certificate to be verified (change Code) displayed on the user side.
  • Fig. 9 shows a functional block diagram of an apparatus for creating a secondary card credential according to an embodiment of the present disclosure. As shown in Figure 9, the device includes:
  • the receiving module 901 is adapted to receive an acquisition request for the secondary card; the creating module 902 is adapted to create a primary certificate and at least one sub-certificate corresponding to the secondary card according to the acquisition request; wherein the quantity of the at least one sub-certificate and the availability of the secondary card The number of uses is the same; the generation module 903 is adapted to generate a first verification code corresponding to the master certificate, or generate a second verification code corresponding to at least one sub-voucher for verification of at least one sub-voucher.
  • the device further includes: a recording module, adapted to calculate the fund information allocated to each sub-voucher; and record the fund information in the corresponding sub-vouchers for completing the settlement processing on the merchant side.
  • the device further includes: a determining module, adapted to determine the verification method of the secondary card certificate; the verification method includes verification based on the first verification code, or based on the second verification
  • the generation module 903 is further adapted to generate the first verification code corresponding to the primary certificate when the verification method of the secondary card certificate is determined to be based on the first verification code; or, when the secondary card is determined
  • the verification method of the voucher is to generate a second verification code corresponding to at least one sub-voucher when the verification is performed according to the second verification code.
  • the device further includes: a selection module, adapted to find an unverified sub-certificate according to the verification status of at least one sub-certificate; select one of the unverified sub-certificates The sub-voucher is used as the sub-voucher to be verified; the generating module 903 is further adapted to generate a second verification code corresponding to the sub-voucher to be verified.
  • the selection module is further adapted to: after at least one sub-voucher is created or after the verification of the sub-voucher to be written off is completed, search according to the verification status of the at least one sub-voucher A sub-certificate that has not been verified.
  • the selection module is further adapted to: select a sub-voucher as the sub-voucher to be verified according to the voucher identifier of the sub-voucher that has not been verified; or The fund information recorded in the unverified sub-vouchers selects a sub-voucher from the un-verified sub-vouchers as the sub-vouchers to be verified.
  • the device further includes: a sending module, adapted to send the first verification code or the second verification code to the user end, so that the user end provides the first verification code or the second verification code
  • the verification code is given to the merchant for verification of at least one sub-certificate.
  • Fig. 10 shows a functional block diagram of a secondary card credential verification device according to an embodiment of the present disclosure. As shown in Figure 10, the device includes:
  • the parsing module 111 is adapted to analyze the verification code carried in the verification request according to the verification request for at least one sub-certificate of the secondary card; wherein the verification code is the first verification code of the primary certificate corresponding to the secondary card , Or the second verification code of one sub-certificate of at least one sub-certificate corresponding to the secondary card; and, the number of at least one sub-certificate is consistent with the number of times the secondary card can be used; the selection module 121 is suitable for The analysis result selects the sub-certificate to be verified from at least one sub-certificate of the corresponding secondary card; the verification module 131 is adapted to verify the sub-certificate to be verified.
  • the device further includes: a settlement module, adapted to complete settlement processing on the merchant side according to the fund information recorded in the sub-vouchers to be verified.
  • the verification request for at least one sub-certificate of the secondary card is specifically: the verification of at least one sub-certificate of the secondary card initiated by the merchant obtaining the verification code provided by the client request.
  • the analysis module 111 is further adapted to: parse the first verification code, and determine that it corresponds to the first verification code At least one sub-certificate associated with the master certificate of the vouchers; the selection module 121 is further adapted to: find out the sub-vouchers that have not been verified according to the verification status of the at least one sub-voucher; As a sub-certificate to be verified.
  • the selection module 121 is further adapted to: select a sub-certificate as the sub-voucher to be verified according to the voucher identifier of the un-verified sub-voucher; or, According to the fund information recorded in the sub-vouchers that have not been verified, a sub-voucher is selected from the sub-vouchers that have not been verified as the sub-voucher to be verified.
  • the parsing module 111 is further adapted to: parse the second verification Code to determine the sub-voucher corresponding to the second verification code; the selection module 121 is further adapted to select the sub-voucher corresponding to the second verification code as the sub-voucher to be verified.
  • the embodiment of the present disclosure provides a secondary card certificate verification system, the system for creating a secondary card certificate in any of the above-mentioned device embodiments, and the secondary card certificate verification device in any of the above-mentioned device embodiments.
  • the embodiments of the present disclosure provide a non-volatile computer-readable storage medium, the non-volatile computer-readable storage medium stores at least one executable instruction, and the computer-executable instruction can execute any of the foregoing method embodiments How to create a secondary card voucher.
  • the embodiments of the present disclosure provide a non-volatile computer-readable storage medium, the non-volatile computer-readable storage medium stores at least one executable instruction, and the computer-executable instruction can execute any of the foregoing method embodiments How to write off the secondary card voucher.
  • FIG. 11 shows a schematic structural diagram of a computing device according to an embodiment of the present disclosure, and the specific embodiment of the present disclosure does not limit the specific implementation of the computing device.
  • the computing device may include a processor 112, a communications interface 114, a memory 116, and a communication bus 118.
  • the processor 112, the communication interface 114, and the memory 116 communicate with each other through the communication bus 118.
  • the communication interface 114 is used to communicate with other devices such as network elements such as clients or other servers.
  • the processor 112 is configured to execute the program 110, and specifically can execute the relevant steps in the above-mentioned secondary card credential creation method embodiment.
  • the program 110 may include program code, and the program code includes computer operation instructions.
  • the processor 112 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present disclosure.
  • the one or more processors included in the computing device may be processors of the same type, such as one or more CPUs; or processors of different types, such as one or more CPUs and one or more ASICs.
  • the memory 116 is used to store the program 110.
  • the memory 116 may include a high-speed RAM memory, and may also include a non-volatile memory (non-volatile memory), for example, at least one disk memory.
  • the program 110 may specifically be used to make the processor 112 perform the following operations: receiving a request for obtaining the secondary card; creating a primary certificate and at least one sub-certificate corresponding to the secondary card according to the obtaining request; wherein the quantity of the at least one sub-certificate and the secondary card The available times of use are the same; generate a first verification code corresponding to the master certificate, or generate a second verification code corresponding to at least one sub-voucher, for verification of at least one sub-voucher.
  • the program 110 may be further used to make the processor 112 perform the following operations: calculate the fund information allocated to each sub-voucher; record the fund information in the corresponding sub-voucher for completion Merchant settlement processing.
  • the program 110 may be further configured to cause the processor 112 to perform the following operations: determine the verification method of the secondary card certificate; the verification method includes verification according to the first verification code, or, Perform verification based on the second verification code; when it is determined that the verification method of the secondary card certificate is verification based on the first verification code, generate the first verification code corresponding to the primary verification; or, when the secondary card verification is determined
  • the verification method is to generate a second verification code corresponding to at least one sub-voucher when verification is performed according to the second verification code.
  • the program 110 may be further configured to cause the processor 112 to perform the following operations: find out the sub-certificates that have not been verified according to the verification status of at least one sub-certificate; Select a sub-voucher as the sub-voucher to be verified; generate a second verification code corresponding to the sub-voucher to be verified.
  • the program 110 may be further configured to cause the processor 112 to perform the following operations: after at least one sub-voucher is created or each time the sub-vouchers to be written off are verified, according to at least The verification status of a sub-voucher finds the sub-vouchers that have not been verified.
  • the program 110 may be further configured to cause the processor 112 to perform the following operations: select a sub-certificate from the unverified sub-vouchers as the pending A sub-voucher to be verified; or, according to the fund information recorded in the sub-voucher that has not been verified, a sub-voucher is selected as the sub-voucher to be verified.
  • the program 110 may be further used to make the processor 112 perform the following operations: send the first verification code or the second verification code to the user end, so that the user end provides the first core
  • the cancellation code or the second verification code is provided to the merchant for verification of at least one sub-certificate.
  • FIG. 12 shows a schematic structural diagram of another computing device according to an embodiment of the present disclosure, and the specific embodiment of the present disclosure does not limit the specific implementation of the computing device.
  • the computing device may include: a processor 122, a communication interface 124, a memory 126, and a communication bus 128.
  • the processor 122, the communication interface 124, and the memory 126 communicate with each other through the communication bus 128.
  • the communication interface 124 is used to communicate with other devices such as network elements such as clients or other servers.
  • the processor 122 is configured to execute the program 120, and specifically can execute the relevant steps in the foregoing embodiment of the verification method for secondary card credential.
  • the program 120 may include program code, and the program code includes computer operation instructions.
  • the processor 122 may be a central processing unit CPU, or an ASIC (Application Specific Integrated Circuit), or one or more integrated circuits configured to implement the embodiments of the present disclosure.
  • the one or more processors included in the computing device may be processors of the same type, such as one or more CPUs; or processors of different types, such as one or more CPUs and one or more ASICs.
  • the memory 126 is used to store the program 120.
  • the memory 126 may include a high-speed RAM memory, and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
  • the program 120 may specifically be used to make the processor 122 perform the following operations: according to the verification request for at least one sub-certificate of the secondary card, analyze the verification code carried in the verification request; wherein the verification code is the corresponding secondary card The first verification code of the primary certificate, or the second verification code of one of the at least one sub-certificate corresponding to the secondary card; and, the number of at least one sub-certificate is consistent with the number of times the secondary card can be used ; According to the analysis result, select the sub-certificate to be verified from at least one sub-certificate of the corresponding secondary card, and verify the sub-certificate to be verified.
  • the program 120 may be further specifically configured to cause the processor 122 to perform the following operations: complete the settlement process at the merchant side according to the fund information recorded in the sub-vouchers to be verified.
  • the program 120 may be further configured to cause the processor 122 to perform the following operations: a verification request for at least one sub-certificate of the secondary card initiated by the merchant by obtaining the verification code provided by the user. .
  • the program 120 may be further configured to cause the processor 122 to perform the following operations: parse the first verification code, and determine at least one sub-certificate associated with the master credential corresponding to the first verification code ; According to the verification status of at least one sub-voucher, find out the sub-vouchers that have not been verified; select one sub-voucher from the sub-vouchers that have not been verified as the sub-voucher to be verified.
  • the program 120 may be further configured to cause the processor 122 to perform the following operations: select a sub-certificate from the un-verified sub-vouchers as the pending sub-voucher according to the voucher identifier of the un-verified sub-voucher A sub-voucher to be verified; or, according to the fund information recorded in the sub-voucher that has not been verified, a sub-voucher is selected as the sub-voucher to be verified.
  • the program 120 may be further configured to cause the processor 122 to perform the following operations: parse the second verification code, determine the sub-voucher corresponding to the second verification code, and correspond to the second verification code The sub-voucher of is selected as the sub-voucher to be verified.
  • FIG. 13 shows a schematic structural diagram of another computing device according to an embodiment of the present disclosure, and the specific embodiment of the present disclosure does not limit the specific implementation of the computing device.
  • the computing device may include: a processor (processor) 132, a communication interface (Communications Interface) 134, a memory (memory) 136, and a communication bus 138.
  • the processor 132, the communication interface 134, and the memory 136 communicate with each other through the communication bus 138.
  • the communication interface 134 is used to communicate with network elements such as other devices such as clients or other servers.
  • the processor 132 is configured to execute the program 130, and specifically can execute the relevant steps in the above-mentioned embodiment of the verification method for secondary card credential.
  • the program 130 may include program code, and the program code includes computer operation instructions.
  • the processor 132 may be a central processing unit CPU, or an ASIC (Application Specific Integrated Circuit), or one or more integrated circuits configured to implement the embodiments of the present disclosure.
  • the one or more processors included in the computing device may be processors of the same type, such as one or more CPUs; or processors of different types, such as one or more CPUs and one or more ASICs.
  • the memory 136 is used to store the program 130.
  • the memory 136 may include a high-speed RAM memory, and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
  • the program 130 may specifically be used to make the processor 132 perform the following operations: receive a request for obtaining the secondary card, and create a primary certificate and at least one sub-certificate corresponding to the secondary card according to the acquisition request; wherein the quantity of the at least one sub-certificate and the secondary card Can be used the same number of times; according to the verification request for at least one sub-certificate of the secondary card, analyze the verification code carried in the verification request, where the verification code is the first verification code corresponding to the primary certificate, or is The second verification code corresponding to a sub-certificate; the sub-certificate to be verified is selected from at least one sub-certificate of the corresponding secondary card according to the analysis result, and the sub-certificate to be verified is verified.
  • the program 130 may be further used to make the processor 132 perform the following operations: calculate the fund information allocated to each sub-voucher; record the fund information in the corresponding sub-voucher; After the cancelled sub-vouchers are verified and cancelled, the settlement processing on the merchant side is completed according to the fund information.
  • the program 130 may be further configured to cause the processor 132 to perform the following operations: determine the verification method of the secondary card certificate; the verification method includes verification according to the first verification code, or, Perform verification based on the second verification code.
  • the program 130 may be further configured to cause the processor 132 to perform the following operations: generate a first verification code corresponding to the master certificate, and send the first verification code to the user terminal for the user
  • the terminal provides the first verification code to the merchant for verification of at least one sub-certificate; analyzes the first verification code carried in the verification request, and determines at least the primary verification code associated with the first verification code One sub-voucher; find out the sub-vouchers that have not been verified based on the verification status of at least one sub-voucher; select one sub-voucher from the sub-vouchers that have not been verified as the sub-voucher to be verified.
  • the program 130 may be further configured to cause the processor 132 to perform the following operations: after at least one sub-voucher is created or each time the sub-vouchers to be written off are verified, according to at least The verification status of a sub-voucher finds out the sub-vouchers that have not been verified; select a sub-voucher from the un-verified sub-vouchers; generate a second verification code corresponding to a sub-voucher, and set the second verification code Send to the user end for the user end to provide the second verification code to the merchant for verification of at least one sub-certificate; analyze the second verification code to determine the sub-certificate corresponding to the second verification code; The sub-voucher corresponding to the second verification code is selected as the sub-voucher to be verified.
  • modules or units or components in the embodiments can be combined into one module or unit or component, and in addition, they can be divided into multiple sub-modules or sub-units or sub-components. Except that at least some of such features and/or processes or units are mutually exclusive, any combination can be used to compare all features disclosed in this specification (including the accompanying claims, abstract and drawings) and any method or methods disclosed in this manner or All the processes or units of the equipment are combined. Unless expressly stated otherwise, each feature disclosed in this specification (including the accompanying claims, abstract and drawings) may be replaced by an alternative feature providing the same, equivalent or similar purpose.
  • the various component embodiments of the present disclosure may be implemented by hardware, or by software modules running on one or more processors, or by a combination of them.
  • a microprocessor or digital signal processor can be used in practice to implement some or all of the functions of some or all of the components in the secondary card credential verification device according to the embodiments of the present disclosure.
  • DSP digital signal processor
  • the present disclosure can also be implemented as a device or device program (for example, a computer program and a computer program product) for executing part or all of the methods described herein.
  • Such a program for realizing the present disclosure may be stored on a computer-readable medium, or may have the form of one or more signals. Such signals can be downloaded from Internet websites, or provided on carrier signals, or provided in any other form.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Credit Cards Or The Like (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一种次卡凭证的创建方法和装置,以及核销方法和装置,其中,方法包括:接收次卡的获取请求(S101);根据获取请求创建对应次卡的主凭证和至少一张子凭证;其中,至少一张子凭证的数量与次卡的可使用次数一致(S102);生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码,以用于对至少一张子凭证进行核销(S103)。

Description

次卡凭证的创建方法和装置,以及核销方法和装置
相关申请的交叉参考
本申请要求于2019年4月22日提交中国专利局、申请号为2019103252967、名称为“次卡凭证的创建方法和装置,以及核销方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本公开涉及互联网技术领域,具体涉及一种次卡凭证的创建方法和装置,以及核销方法和装置。
背景技术
随着互联网技术的发展,在线上进行商品或服务的销售已经成为一种普遍趋势。其中,次卡作为一种以次数为单位进行消费的凭证,其可以提前锁定消费的目的,并且可以提高用户的使用率,相应地,对次卡进行销售显得尤为重要。
现有技术中,在用户通过线上平台购买了次卡后,会生成对应该次卡的唯一一张电子凭证,该电子凭证记录有次卡次数;并且,每当用户消费一次,则会针对该电子凭证进行一次核销,并更新一次剩余次数。
然而,现有技术中的这种创建电子凭证的方式,只能生成一张电子凭证,相应地,核销时则只能对该唯一的电子凭证进行核销,容易造成核销错误,影响核销结果的准确性,用户体验差。
发明内容
鉴于上述问题,提出了本公开以便提供一种克服上述问题或者至少部分地解决上述问题的次卡凭证的创建方法和装置,以及核销方法和装置。
根据本公开的一个方面,提供了一种次卡凭证的创建方法,包括:
接收次卡的获取请求;根据获取请求创建对应次卡的主凭证和至少一张子凭证;其中,至少一张子凭证的数量与次卡的可使用次数一致;生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码,以用于对至少一张子凭证进行核销。
根据本公开的另一个方面,提供了一种次卡凭证的核销方法,包括:
根据针对次卡的至少一张子凭证的核销请求,解析核销请求中携带的核销码;其中,核销码为对应次卡的主凭证的第一核销码,或者为对应次卡的至少一张子凭证中的一张子凭证的第二核销码;以及,至少一张子凭证的数量与次卡的可使用次数一致;根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证,对待核销的子凭证进行核销。
根据本公开的又一个方面,提供了一种次卡凭证的核销方法,包括:
接收次卡的获取请求,根据获取请求创建对应次卡的主凭证和至少一张子凭证;其中,至少一张子凭证的数量与次卡的可使用次数一致;根据针对次卡的至少一张子凭证的核销请求,解析核销请求中携带的核销码,其中,核销码为对应主凭证的第一核销码,或者为对应一张子凭证的第二核销码;根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证,对待核销的子凭证进行核销。
根据本公开的一个方面,提供了一种次卡凭证的创建装置,包括:
接收模块,适于接收次卡的获取请求;创建模块,适于根据获取请求创建对应次卡的主凭证和至少一张子凭证;其中,至少一张子凭证的数量与次卡的可使用次数一致;生成模块,适于生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码,以用于对至少一张子凭证进行核销。
根据本公开的另一个方面,提供了一种次卡凭证的核销装置,包括:
解析模块,适于根据针对次卡的至少一张子凭证的核销请求,解析核销请求中携带的 核销码;其中,核销码为对应次卡的主凭证的第一核销码,或者为对应次卡的至少一张子凭证中的一张子凭证的第二核销码;以及,至少一张子凭证的数量与次卡的可使用次数一致;选择模块,适于根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证;核销模块,适于对待核销的子凭证进行核销。
根据本公开的又一个方面,提供了一种次卡凭证的核销系统,该系统包括上述任一项所述的次卡凭证的创建装置,以及上述任一项所述的次卡凭证的核销装置。
根据本公开的一方面,提供了一种计算设备,包括:处理器、存储器、通信接口和通信总线,处理器、存储器和通信接口通过通信总线完成相互间的通信;存储器用于存放至少一可执行指令,可执行指令使所述处理器执行上述次卡凭证的创建方法对应的操作。
根据本公开的另一方面,提供了一种计算设备,包括:处理器、存储器、通信接口和通信总线,处理器、存储器和通信接口通过通信总线完成相互间的通信;存储器用于存放至少一可执行指令,所可执行指令使处理器执行上述次卡凭证的核销方法对应的操作。
根据本公开的又一方面,提供了一种非易失性计算机可读存储介质,该非易失性计算机可读存储介质中存储有至少一可执行指令,可执行指令使处理器执行如上述次卡凭证的创建方法对应的操作。
根据本公开的又一方面,提供了一种计算机程序产品,该计算机程序产品包括存储在非易失性计算机存储介质上的计算机程序,计算机程序包括程序指令,当该程序指令被处理器执行时,使处理器执行上述的次卡凭证的创建方法对应的操作。
根据本公开的再一方面,提供了一种非易失性计算机可读存储介质,该非易失性计算机可读存储介质中存储有至少一可执行指令,可执行指令使处理器执行如上述次卡凭证的核销方法对应的操作。
根据本公开的又一方面,提供了一种计算机程序产品,该计算机程序产品包括存储在非易失性计算机存储介质上的计算机程序,计算机程序包括程序指令,当该程序指令被处理器执行时,使处理器执行上述的次卡凭证的核销方法对应的操作。根据本公开的次卡凭证的创建方法和装置,以及核销方法和装置,在接收到次卡的获取请求时,创建对应次卡的主凭证和至少一张子凭证,而不仅仅创建一张唯一的凭证;以及,通过利用生成的对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码,可针对至少一张子凭证进行核销,而不再是对创建的唯一的凭证进行核销。由此可见,本实施例提供了一种全新的次卡凭证的创建方案,在创建对应次卡的至少一张子凭证后,可以使得一张子凭证用于一次核销,核销过程更为稳定有序,提升了核销结果的准确性。
上述说明仅是本公开技术方案的概述,为了能够更清楚了解本公开的技术手段,而可依照说明书的内容予以实施,并且为了让本公开的上述和其它目的、特征和优点能够更明显易懂,以下特举本公开的具体实施方式。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本公开的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了根据本公开一个实施例的次卡凭证的创建方法的流程图;
图2示出了根据本公开一个实施例的次卡凭证的核销方法的流程图;
图3示出了根据本公开又一个实施例的次卡凭证的核销方法的流程图;
图4示出了根据本公开另一个实施例的次卡凭证的核销方法的流程图;
图5示出了一种具体的实施方式中创建次卡凭证的示意图;
图6示出了一种具体的实施方式中选择子凭证进行核销的示意图;
图7示出了根据本公开再一个实施例的次卡凭证的核销方法的流程图;
图8示出了一种具体的实施方式中用户端展示固定码或变码的示意图;
图9示出了根据本公开一个实施例的次卡凭证的创建装置的功能框图
图10示出了根据本公开一个实施例的次卡凭证的核销装置的功能框图;
图11示出了根据本公开实施例的一种计算设备的结构示意图;
图12示出了根据本公开实施例的另一种计算设备的结构示意图;
图13示出了根据本公开实施例的又一种计算设备的结构示意图。
具体实施方式
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
图1示出了根据本公开一个实施例的次卡凭证的创建方法的流程图。如图1,该方法包括:
步骤S101:接收次卡的获取请求。
其中,获取请求可由用户发起,例如,用户购买次卡或领取次卡均会发起获取请求;或者,由线上平台发起,例如,平台赠送次卡给用户而发起获取请求,本公开对此不做具体限定。
步骤S102:根据获取请求创建对应次卡的主凭证和至少一张子凭证;其中,至少一张子凭证的数量与次卡的可使用次数一致。
在本公开中,对应一张次卡,同时创建一张主凭证,和创建与次卡的可使用次数一致的至少一张子凭证。例如,用户购买美容院的次卡a,该次卡a可用于三次美容消费,则对应该次卡a,需创建一张主凭证和三张子凭证。
具体地,接收到次卡的获取请求,根据获取请求中携带的次卡详情信息创建对应次卡的主凭证,其中,次卡详情信息包括店铺信息、商品信息和/或服务信息,该主凭证中记录有次卡的使用次数信息,和/或,与该主凭证关联的同一次卡的至少一张子凭证的凭证信息,其中,使用次数信息进一步包括可使用次数、以及剩余使用次数,凭证信息包括凭证标识、以及核销状态。以及,创建对应次卡的至少一张子凭证,该至少一张子凭证用于每次核销。
步骤S103:生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码,以用于对至少一张子凭证进行核销。
具体地,生成对应主凭证的第一核销码,可基于第一核销码指向的主凭证和至少一张子凭证的对应关系,从至少一张子凭证中选择出待核销的子凭证进行核销,其中,同一次卡的主凭证和子凭证具有对应关系。或者,生成对应至少一张子凭证的第二核销码,可基于第二核销码指向的子凭证,直接从至少一张子凭证中确定待核销的子凭证进行核销。换言之,利用本实施例创建的次卡凭证以及对应次卡凭证的核销码,可在每次核销时,针对一张子凭证进行核销,而不是每次均对同一凭证进行核销。
根据本实施例提供的次卡凭证的创建方法,在接收到次卡的获取请求时,创建对应次卡的主凭证和至少一张子凭证,而不仅仅创建一张唯一的凭证;以及,通过利用生成的对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码,可针对至少一张子凭证进行核销,而不再是对创建的唯一的凭证进行核销。由此可见,本实施例提供了一种全新的次卡凭证的创建方案,在创建对应次卡的至少一张子凭证后,可以使得一张子凭证用于一次核销,核销过程更为稳定有序,提升了核销结果的准确性。
在一些可选的实施方式中,在根据获取请求创建对应次卡的主凭证和至少一张子凭证之后,计算各张子凭证分摊到的资金信息;将资金信息记录在对应的子凭证中,以供完成商家端的结算处理,而无需在每次核销时均基于资金池动态进行结算金额的计算然后进行结算处理。其中,资金信息包括使用子凭证时的商家端实收金额,用户端实付金额,和/或平台端补贴金额。举例来说,用户用10块钱买了可购买3次鸡腿(每次1个)的次卡,通过均值计算,得到每张子凭证的资金信息中用户端实付金额为10/3≈3.3元,将该用户端实付金额记录在三张子凭证中。需要在此说明的是,具体实施时,并不以上述举例中的均值计算方式为限,可选地,也可以按照预设比例将资金分摊到各个子凭证中,例如,上述举例中若按照1:1:3的比例进行分配,则三张子凭证中记录的用户端实付金额分别为2 块钱,2块钱,以及6块钱。
在一些可选的实施方式中,在生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码之前,确定次卡凭证的核销方式;核销方式包括根据第一核销码进行核销,或者,根据第二核销码进行核销。其中,确定次卡凭证的核销方式,可以降低次卡凭证被盗刷的风险。具体地,在确定次卡凭证的核销方式时,主要基于以下考虑:店铺的信誉度、店铺的规模、商品或服务的价值、和/或店铺要求的核销方式。其中,店铺的信誉度越高、或店铺的规模越大,则表明店铺更可信,其盗刷核销码的可能性极低,此时可采用固定码的方式进行核销,即根据第一核销码进行核销;反之,店铺的信誉度越低、或店铺的规模越小,则表明店铺的可信度有待提升,其盗刷核销码的可能性较大,此时可采用变码的方式进行核销,以避免被盗刷。其中,次卡包括的商品或服务的价值较高,则被盗刷给用户带来的损失较大,此时可采用变码的方式进行核销;反之,次卡包括的商品或服务的价值较低,则可采用固定码的方式进行核销。
进一步地,为了适应不同核销方式下的核销需求,当确定次卡凭证的核销方式为根据第一核销码进行核销时,生成对应主凭证的第一核销码,其中,该第一核销码为固定码,可用于多次核销,举例来说,在创建得到一张主凭证和三张子凭证后,生成对应主凭证的第一核销码,该第一核销码可用于三次核销,每次核销掉一张子凭证,在该三次核销过程中,第一核销码始终保持不变。或者,当确定次卡凭证的核销方式为根据第二核销码进行核销时,生成对应至少一张子凭证的第二核销码,其中,用于各次核销的第二核销码是变化的。
下面,针对生成变化的第二核销码的情况进行说明:
具体地,当确定核销方式为根据第二核销码进行核销,根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证;然后,生成对应待核销的子凭证的第二核销码。其中,至少一张子凭证中各张子凭证的核销状态会随着核销的进行而不断更新变化,未核销的子凭证会发生变化,相应的,则选择出的待核销的子凭证以及生成的对应待核销的子凭证的第二核销码也会发生变化。可见,通过生成对应待核销的子凭证的第二核销码,可利于实现变码核销,降低核销码被盗刷的风险。
进一步地,在创建得到至少一张子凭证或每次完成对待核销的子凭证的核销后,根据至少一张子凭证的核销状态查找出未核销的子凭证。换言之,通过这种方式,在创建得到至少一张子凭证或每完成一次核销后,查找出当前未核销的子凭证,进而可依据当前的核销进度生成新的第二核销码,以用于对未进行核销的子凭证进行核销。
更进一步地,若未核销的子凭证有多个,则通过如下方式进行待核销的子凭证的选择,以避免选择出的待核销的子凭证发生重复,或者避免漏选的情况发生。方式一,根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证,可选地,可按凭证标识正序或倒序的顺序进行选择,例如,按照编号由小至大的顺序选择。方式二,根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证,可选地,可按资金信息对促进用户消费的影响大小进行选择,将促进用户消费的影响大的资金信息所属的子凭证后选择,以吸引用户进行剩余次数的使用。举例来说,平台补贴金额越高,其促进用户消费的影响更大,则先选择补贴金额低的子凭证,后选择补贴金额高的子凭证。
在一些可选的实施方式中,在生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码之后,将第一核销码或第二核销码发送至用户端,以供用户端提供第一核销码或第二核销码给商家端以用于对至少一张子凭证进行核销。其中,将第一核销码或第二核销码发送至用户端,在用户端接收到第一核销码或第二核销码后,当用户存在消费次卡中包括的商品或者服务的需求时,将该第一核销码或第二核销码提供给商家端,并在商家端获取到该第一核销码或第二核销码时发起核销请求;以及,商家端指可使用该次卡的店铺中可获取用户端提供的核销码的设备。举例来说,扫码枪扫描用户端上展示的第一核销码可发起核销请求。
图2示出了根据本公开一个实施例的次卡凭证的核销方法的流程图。如图2所示,该方法包括:
步骤S201:根据针对次卡的至少一张子凭证的核销请求,解析核销请求中携带的核销码。其中,核销码为对应次卡的主凭证的第一核销码,或者为对应次卡的至少一张子凭证 中的一张子凭证的第二核销码。
其中,至少一张子凭证的数量与次卡的可使用次数一致。以及,针对次卡的至少一张子凭证的核销请求包括商家端获取用户端提供的核销码发起的针对次卡的至少一张子凭证的核销请求。例如,扫描枪扫描核销码发起核销请求。
在用户端获取到次卡后,通过使用该次卡可换取相应的商品或服务,而每次使用后,需进行核销以更新次卡的剩余使用次数。
在本公开中,每次接收到核销请求,均对一张未被核销的子凭证进行核销,并且,每核销掉一张子凭证,次卡的剩余使用次数则减一。具体地,接收核销请求,其中,核销请求可通过获取核销码发起,例如,录入标识码或扫描二维码等;解析核销请求中携带的核销码,确定核销码指向的主凭证或者子凭证,进而便于准确确定此次核销的唯一的待核销的子凭证。其中,核销请求中携带的核销码可以为对应主凭证的第一核销码,或者为对应至少一张子凭证中的一张子凭证的第二核销码,并且核销请求中携带的核销码的类型(第一核销码或第二核销码)由线上平台的凭证系统确定并生成。
步骤S202:根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证,对待核销的子凭证进行核销。
具体地,在经过解析确定出核销码指向的主凭证后,可基于主凭证和至少一张子凭证的对应关系,选择出待核销的子凭证,其中,同一次卡的主凭证和子凭证具有对应关系。或者,在经过解析确定出核销码指向的子凭证后,可直接基于该子凭证选择出待核销的子凭证。然后,对待核销的子凭证进行核销,即每次核销均核销掉一张子凭证,而不是每次均对同一凭证进行核销。
举例来说,假设核销码为对应主凭证的二维码,当特定设备扫描该二维码时,则发起核销请求,解析该核销请求中携带的二维码,从同一次卡的至少一张子凭证中选择一张子凭证进行核销,核销完成后,未核销的子凭证的数量减一,次卡的剩余使用次数也减一。
根据本实施例提供的次卡凭证的核销方法,在每次接收到核销请求时,则根据核销请求中携带的核销码对至少一张子凭证中的一张子凭证进行核销,而不再是对创建的唯一的凭证进行核销。现有技术中每次均对唯一的凭证进行核销的方式,存在抢占该唯一的凭证的问题,而本实施例方案每次核销均对其中一张子凭证进行核销,使得核销过程更为稳定有序,提升了核销结果的准确性。
在一些可选的实施方式中,在对待核销的子凭证进行核销之后,根据记录在待核销的子凭证中的资金信息完成商家端的结算处理。现有技术中仅生成一张电子凭证,则须在每次核销时基于资金池动态计算,分摊逻辑复杂,不利于调整打款的策略,而在本公开的这些实施例中,每次核销后向商家端打款或退款的资金都是预先分摊完成的,则可以克服现有技术中的上述问题,使资金分摊简单且可控。仍以用户用10块钱买了可购买3次鸡腿(每次1个)的次卡的示例进行说明,假设不存在平台补贴,则商家端实收金额即为用户端实付金额,现有技术中,第一次核销并向商家端付款时,计算商家实收金额为10/3≈3.3元,第二次核销并向商家付款时,需再次计算商家实收金额为(10-3.3)/2≈3.4元,第三次核销并向商家付款时,需再次计算商家实收金额为(10-3.3-3.4)/1=3.3元,而利用本公开方案,则可以预先计算得到每个子凭证的商家实收金额并记录到子凭证中,而在核销时,直接按记录的商家实收金额向商家端进行结算。
在本公开中,核销请求中携带的核销码可以为第一核销码或第二核销码,下面分别针对这两种情况来说明具体的核销过程:
情况一,核销码为对应次卡的主凭证的第一核销码。
针对该种情况,解析第一核销码,确定与第一核销码对应的主凭证关联的至少一张子凭证,其中,与主凭证关联的至少一张子凭证为对应同一次卡的子凭证。根据至少一张子凭证的核销状态查找出未核销的子凭证,其中,至少一张子凭证的核销状态可记录在主凭证中或记录在对应的子凭证中,例如,在主凭证中记录有关联的各张子凭证的核销状态为“已核销”或“可使用”。从未核销的子凭证中选择一张子凭证作为待核销的子凭证,对待核销的子凭证进行核销,通常而言,凡是未核销的子凭证均可用于当前核销,从中选择待核销的子凭证进行核销,则与之前核销时核销的子凭证不同,相应的,即使存在连续或并发的多个核销请求,也不会出现因抢占同一凭证进行核销而导致的抢锁失败的问题,使得核销过程更为稳定有序。进一步的,从未核销的子凭证中选择一张子凭证作为待核销的子凭证具体为:根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为 待核销的子凭证;或者,根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
情况二,核销码为对应次卡的至少一张子凭证中的一张子凭证的第二核销码。
针对这种情况,解析第二核销码,确定第二核销码对应的子凭证;将第二核销码对应的子凭证选择为待核销的子凭证,对待核销的子凭证进行核销。
图3示出了根据本公开又一个实施例的次卡凭证的核销方法的流程图。如图3所示,该方法包括:
步骤S301:接收次卡的获取请求,根据获取请求创建对应次卡的主凭证和至少一张子凭证。
其中,至少一张子凭证的数量与次卡的可使用次数一致。
步骤S302:根据针对次卡的至少一张子凭证的核销请求,解析核销请求中携带的核销码。
在用户端获取到次卡后,通过使用该次卡可换取相应的商品或服务,而每次使用后,需进行核销以更新次卡的剩余使用次数。
在本公开中,每次接收到核销请求,均对一张未被核销的子凭证进行核销,并且,每核销掉一张子凭证,次卡的剩余使用次数则减一。具体地,接收核销请求,其中,核销请求可通过获取核销码发起,例如,录入标识码或扫描二维码等;解析核销请求中携带的核销码,确定核销码指向的主凭证或者子凭证,进而便于准确确定此次核销的唯一的待核销的子凭证。其中,核销请求中携带的核销码可以为对应主凭证的第一核销码,或者为对应至少一张子凭证中的一张子凭证的第二核销码,并且核销请求中携带的核销码的类型(第一核销码或第二核销码)由线上平台的凭证系统确定并生成。
步骤S303:根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证,对待核销的子凭证进行核销。
具体地,在经过解析确定出核销码指向的主凭证后,可基于主凭证和至少一张子凭证的对应关系,选择出待核销的子凭证,其中,同一次卡的主凭证和子凭证具有对应关系。或者,在经过解析确定出核销码指向的子凭证后,可直接基于该子凭证选择出待核销的子凭证。然后,对待核销的子凭证进行核销,即每次核销均核销掉一张子凭证,而不是每次均对同一凭证进行核销。
根据本实施例提供的次卡凭证的核销方法,在接收到次卡的获取请求时,创建对应次卡的主凭证和至少一张子凭证,而不仅仅创建一张唯一的凭证;在每次接收到核销请求时,则根据核销请求中携带的核销码对至少一张子凭证中的一张子凭证进行核销,而不再是对创建的唯一的凭证进行核销。由此可见,本实施例提供了一种全新的核销方案,在创建对应次卡的至少一张子凭证后,可以使得一张子凭证用于一次核销;以及,现有技术中每次均对唯一的凭证进行核销的方式,存在抢占该唯一的凭证的问题,而本公开方案每次核销均对其中一张子凭证进行核销,使得核销过程更为稳定有序,提升了核销结果的准确性。
在实施本公开的下述方法实施例之前,需要在此说明的是,实际中,由于店铺之间的差异、或者商品或服务的差异,对次卡盗刷的风险的要求是不同的,在下述实施例中,则针对不同的次卡确定允许采用的核销方式。例如,对于信誉较好的店铺,商家盗取次卡凭证的核销码进行核销的可能性较低,针对这种店铺,则确定其发放的次卡可通过固定码(对应图4的实施例,即核销码始终为第一核销码)进行核销;相反,对于信誉较差的店铺,为了避免商家盗刷次卡,则确定其发放的次卡须通过变码(对应图7的实施例,即核销码为不同的第二核销码)进行核销,换言之,不同的核销请求中携带的核销码不同。下面分别针对通过固定码核销(即图4对应的根据第一核销码进行核销的情况)或变码核销(即图7对应的根据第二核销码进行核销的情况)两种核销方式来进行说明。
图4示出了根据本公开另一个实施例的次卡凭证的核销方法的流程图。本实施例主要针对根据第一核销码进行核销的方式进行说明。如图4所示,该方法包括:
步骤S401:接收次卡的获取请求,根据获取请求创建对应次卡的主凭证和至少一张子凭证。
在本公开的一种可选的实施方式中,在创建凭证之后,计算各张子凭证分摊到的资金信息;将资金信息记录在对应的子凭证中,以便依据该资金信息直接进行结算处理,而无需在每次核销时均基于资金池动态进行结算金额的计算然后进行结算处理。其中,资金信 息包括使用子凭证时的商家端实收金额,用户端实付金额,和/或平台端补贴金额。
图5示出了一种具体的实施方式中创建次卡凭证的示意图。如图5所示,当用户在用户端下单购买次卡后,线上平台的电子凭证系统创建电子凭证,创建得到对应该次卡的一张主凭证和四张子凭证,则每次核销时,从该四张子凭证中选择子凭证进行核销。
步骤S402:确定次卡凭证的核销方式。
其中,核销方式包括根据第一核销码进行核销,或者,根据第二核销码进行核销。其中,根据第一核销码进行核销,即每次均通过对应主凭证的第一核销码进行核销,在这种核销方式中,核销码为固定码;以及,根据第二核销码进行核销,即每次通过对应不同子凭证的第二核销码进行核销,在这种核销方式中,核销码为变码。
在创建得到对应次卡的凭证后,确定次卡凭证的核销方式,以降低次卡凭证被盗刷的风险。具体地,在确定次卡凭证的核销方式时,主要基于以下考虑:店铺的信誉度、店铺的规模、商品或服务的价值、和/或店铺要求的核销方式。
步骤S403:当确定次卡凭证的核销方式为根据第一核销码进行核销时,生成对应主凭证的第一核销码,将第一核销码发送至用户端,以供用户端提供第一核销码给商家端以用于对至少一张子凭证进行核销。
具体地,当确定次卡凭证的核销方式为根据第一核销码进行核销时,由凭证系统生成对应主凭证的第一核销码,该第一核销码用于提供给商家端以发起核销请求,例如,将第一核销码提供给扫码枪进行扫描进而发起核销请求。在该根据第一核销码进行核销的实施例中,仅需生成一次第二核销码并发送给用户端即可,在此后的多次核销中,均通过该第一核销码发起核销请求。
步骤S404:根据针对次卡的至少一张子凭证核销请求,解析核销请求中携带的第一核销码,根据解析结果对待核销的子凭证进行核销。
在用户端接收到第一核销码后,当用户存在消费次卡中包括的商品或者服务的需求时,将该第一核销码提供给商家端,并在商家端获取到该第一核销码时发起核销请求。其中,商家端指可使用该次卡的店铺中可获取用户端提供的核销码的设备,例如扫码枪。
具体地,接收获取第一核销码发起的核销请求,解析核销请求中携带的第一核销码,确定与第一核销码对应的主凭证关联的至少一张子凭证;其中,解析第一核销码可以得到本次核销针对的次卡,以及,与主凭证关联的至少一张子凭证为对应同一次卡的子凭证。根据至少一张子凭证的核销状态查找出未核销的子凭证,其中,至少一张子凭证的核销状态可记录在主凭证中或记录在对应的子凭证中,例如,在主凭证中记录有关联的各张子凭证的核销状态为“已核销”或“可使用”。从未核销的子凭证中选择一张子凭证作为待核销的子凭证,对待核销的子凭证进行核销。通常而言,凡是未核销的子凭证均可用于当前核销,从中选择待核销的子凭证进行核销,则与之前核销时核销的子凭证不同,相应地,即使存在连续或并发的多个核销请求,也不会出现因抢占同一凭证进行核销而导致的抢锁失败的问题,使得核销过程更为稳定有序。
进一步地,从未核销的子凭证中选择一张子凭证作为待核销的子凭证具体为:根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证,可选地,可按凭证标识正序或倒序的顺序进行选择,例如,按照编号由小至大的顺序选择;或者,根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证,可选地,可按资金信息对促进用户消费的影响大小进行选择,将促进用户消费的影响大的资金信息所属的子凭证后选择,以吸引用户进行剩余次数的使用。举例来说,平台补贴金额越高,其促进用户消费的影响更大,则先选择补贴金额低的子凭证,后选择补贴金额高的子凭证。
另外,在子凭证中记录有资金信息的实施例中,在对待核销的子凭证进行核销后,根据资金信息完成商家端的结算处理。现有技术中仅生成一张电子凭证,则须在每次核销时基于资金池动态计算,分摊逻辑复杂,不利于调整打款的策略,而在本公开的这些实施例中,每次核销后向商家端打款或退款的资金都是预先分摊完成的,则可以克服现有技术中的上述问题,使资金分摊简单且可控。
图6示出了一种具体的实施方式中选择子凭证进行核销的示意图。如图6所示,在根据第一核销码进行核销时,图6中用户端出示的券码为第一核销码,电子凭证系统识别第一核销码,确定存在两张可使用(未核销)的子凭证,然后从该两张子凭证中选择待核销的子凭证进行核销。
根据本实施例提供的次卡凭证的核销方法,在接收到次卡的获取请求时,创建对应次卡的主凭证和至少一张子凭证,而不仅仅创建一张唯一的凭证;确定次卡凭证的核销方式,针对根据第一核销码进行核销的次卡凭证,生成对应主凭证的第一核销码以用于核销;在进行核销时,通过解析核销请求中携带的第一核销码,从与主凭证关联的至少一张子凭证中选择未核销的子凭证进行核销。本实施例方案,通过固定码的方式进行核销,即一码多核;以及,每次核销均是针对一张未核销的子凭证进行,这样可以基于对应的子凭证排他锁,避免因为只生成单个凭证带来的并发场景下,抢锁失败的情况发生,使得核销过程更为稳定有序,提升了核销结果的准确性。并且,在创建了子凭证后,计算并为各张子凭证预先分摊资金,而在核销时依据该资金进行结算,简化了资金分摊逻辑,并且可控制性强,有利于支付策略的调整。
图7示出了根据本公开再一个实施例的次卡凭证的核销方法的流程图。本实施例主要针对根据第二核销码进行核销的方式进行说明。如图7所示,该方法包括:
步骤S701:接收次卡的获取请求,根据获取请求创建对应次卡的主凭证和至少一张子凭证。
其中,至少一张子凭证的数量与次卡的可使用次数一致。
在本公开的一种可选的实施方式中,在创建凭证之后,计算各张子凭证分摊到的资金信息;将资金信息记录在对应的子凭证中,以便依据该资金信息直接进行结算处理,而无需在每次核销后均基于资金池动态计算然后进行支付处理。
步骤S702:确定次卡凭证的核销方式。
其中,核销方式包括根据第一核销码进行核销,或者,根据第二核销码进行核销。
上述步骤S701和步骤S702的实施原理和过程与图4中的步骤S401和步骤S402对应,具体可参见步骤S401和步骤S402的描述,此处不再赘述。
步骤S703:当确定次卡凭证的核销方式为根据第二核销码进行核销时,生成对应待核销的子凭证的第二核销码,将第二核销码发送至用户端,以供用户端提供第二核销码给商家端以用于对至少一张子凭证进行核销。
具体地,在创建得到至少一张子凭证或每次完成对待核销的子凭证的核销后,根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证,其中,该选择的一张子凭证为待核销的子凭证,从未核销的子凭证中选择一张子凭证具体为:根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证;或者,根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证。上述选择一张子凭证的实施原理及过程,与图4对应的实施例中步骤S404的选择过程类似,具体可参见步骤S404中的描述,此处不再赘述。
进一步地,与图4对应的实施例所不同的是,在本实施例中,生成对应该一张子凭证的第二核销码,将第二核销码发送至用户端,以供用户端提供第二核销码给商家端以用于对至少一张子凭证进行核销。换言之,在本实施例中,用户出示核销的核销码为第二核销码,并且,每次核销时出示的第二核销码为对应本次选择出的待核销的子凭证的核销码,即实现了换码核销,避免了商家盗刷次卡凭证的情况出现。
经过该步骤S703,在每次核销完成后或者在创建得到至少一张子凭证后,均选择出一张子凭证并生成对应该一张子凭证的第二核销码,以用于下次核销,提供了换码的能力,解决了不能换码带来的盗刷风险。
步骤S704:根据针对次卡凭证的核销请求,解析第二核销码,确定第二核销码对应的子凭证,将第二核销码对应的子凭证选择为待核销的子凭证,对待核销的子凭证进行核销。
当确定次卡凭证的核销方式为根据第二核销码进行核销时,即需换码核销时,则通过解析核销请求中携带的第二核销码以对相应的子凭证进行核销。其中,第二核销码为上一次核销完成后或者在创建得到至少一张子凭证后,对应选出的一张子凭证的核销码。
具体地,接收获取第二核销码发起的核销请求,解析第二核销码,确定第二核销码对应的待核销的子凭证,对待核销的子凭证进行核销。其中,第二核销码即为对应待核销的子凭证的核销码,则解析该第二核销码可直接确定待核销的子凭证并进行核销。
另外,在子凭证中记录有资金信息的实施例中,在对至少一张子凭证进行核销后,根据资金信息完成商家端的结算处理。该结算处理的具体描述可参见图4对应的实施例中步骤S404相应位置的说明,此处不再赘述。
仍以图6为例,在根据第二核销码进行核销时,图6中用户端出示的券码为对应待核销的子凭证的第二核销码,电子凭证系统识别第二核销码,确定待核销的子凭证(为图6中两张可使用的子凭证中的一张),并进行核销。
根据本实施例提供的次卡凭证的核销方法,在接收到次卡的获取请求时,创建对应次卡的主凭证和至少一张子凭证,而不仅仅创建一张唯一的凭证;确定次卡凭证的核销方式,针对根据第二核销码进行核销的次卡凭证,在每次核销完成后或者在创建得到至少一张子凭证后,选择一张子凭证作为待核销的子凭证,并生成对应该待核销的子凭证的第二核销码以用于核销;在进行核销时,通过解析核销请求中携带的第二核销码,对待核销的子凭证进行核销。本实施例方案,可以提供换码的能力,通过变码的方式进行核销,进而解决不能换码带来的盗刷风险,提升用户使用体验;以及,每次核销、支付均是针对一张未核销的子凭证进行,这样可以基于对应的子凭证排他锁,避免因为只生成单个凭证带来的并发场景下,抢锁失败的情况发生,使得核销过程更为稳定有序,提升了核销结果的准确性。并且,在创建了子凭证后,计算并为各张子凭证预先分摊资金,而在核销时依据该资金进行支付,简化了资金分摊逻辑,并且可控制性强,有利于支付策略的调整。
需要在此说明的是,虽然上文中分别单独针对变码和固定码两种核销方式进行了说明,但在具体实施过程中,针对同一次卡,也可能存在切换核销方式的情况,例如,店铺在业务调整期间,将核销方式由固定码核销切换为编码核销,基于此考虑,在本公开的另一些实施例中,则可以在每次检测到核销方式发生更新时,决策生成第一核销码或第二核销码以用于核销。图8示出了一种具体的实施方式中用户端展示固定码或变码的示意图。如图8所示,电子凭证系统可根据次卡的卡券详情决策核销方式,若无需换码,即根据第一核销码进行核销,则将对应主凭证的第一核销码(固定码)展示在用户端;若需要换码,即根据第二核销码进行核销,则选择待核销的子凭证并将对应该待核销的子凭证的第二核销码(变码)展示在用户端。
图9示出了根据本公开一个实施例的次卡凭证的创建装置的功能框图。如图9所示,该装置包括:
接收模块901,适于接收次卡的获取请求;创建模块902,适于根据获取请求创建对应次卡的主凭证和至少一张子凭证;其中,至少一张子凭证的数量与次卡的可使用次数一致;生成模块903,适于生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码,以用于对至少一张子凭证进行核销。
在一种可选的实施方式中,该装置还包括:记录模块,适于计算各张子凭证分摊到的资金信息;将资金信息记录在对应的子凭证中,以供完成商家端的结算处理。
在一种可选的实施方式中,该装置还包括:确定模块,适于确定次卡凭证的核销方式;核销方式包括根据第一核销码进行核销,或者,根据第二核销码进行核销;生成模块903进一步适于:当确定次卡凭证的核销方式为根据第一核销码进行核销时,生成对应主凭证的第一核销码;或者,当确定次卡凭证的核销方式为根据第二核销码进行核销时,生成对应至少一张子凭证的第二核销码。
在一种可选的实施方式中,该装置还包括:选择模块,适于根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证;生成模块903进一步适于:生成对应待核销的子凭证的第二核销码。
在一种可选的实施方式中,选择模块进一步适于:在创建得到至少一张子凭证或每次完成对待核销的子凭证的核销后,根据至少一张子凭证的核销状态查找出未核销的子凭证。
在一种可选的实施方式中,选择模块进一步适于:根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证;或者,根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
在一种可选的实施方式中,该装置还包括:发送模块,适于将第一核销码或第二核销码发送至用户端,以供用户端提供第一核销码或第二核销码给商家端以用于对至少一张子凭证进行核销。
图10示出了根据本公开一个实施例的次卡凭证的核销装置的功能框图。如图10所示,该装置包括:
解析模块111,适于根据针对次卡的至少一张子凭证的核销请求,解析核销请求中携带的核销码;其中,核销码为对应次卡的主凭证的第一核销码,或者为对应次卡的至少一 张子凭证中的一张子凭证的第二核销码;以及,至少一张子凭证的数量与次卡的可使用次数一致;选择模块121,适于根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证;核销模块131,适于对待核销的子凭证进行核销。
在一种可选的实施方式中,该装置还包括:结算模块,适于根据记录在待核销的子凭证中的资金信息完成商家端的结算处理。
在一种可选的实施方式中,针对次卡的至少一张子凭证的核销请求具体为:商家端获取用户端提供的核销码发起的针对次卡的至少一张子凭证的核销请求。
在一种可选的实施方式中,当核销码为对应次卡的主凭证的第一核销码,解析模块111进一步适于:解析第一核销码,确定与第一核销码对应的主凭证关联的至少一张子凭证;选择模块121进一步适于:根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
在一种可选的实施方式中,选择模块121进一步适于:根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证;或者,根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
在一种可选的实施方式中,当核销码为对应次卡的至少一张子凭证中的一张子凭证的第二核销码时,解析模块111进一步适于:解析第二核销码,确定第二核销码对应的子凭证;选择模块121进一步适于:将第二核销码对应的子凭证选择为待核销的子凭证。
本公开实施例提供了一种次卡凭证的核销系统,该系统上述任意装置实施例中的次卡凭证的创建装置,以及上述任意装置实施例中的次卡凭证的核销装置。
本公开实施例提供了一种非易失性计算机可读存储介质,该非易失性计算机可读存储介质存储有至少一可执行指令,该计算机可执行指令可执行上述任意方法实施例中的次卡凭证的创建方法。
本公开实施例提供了一种非易失性计算机可读存储介质,该非易失性计算机可读存储介质存储有至少一可执行指令,该计算机可执行指令可执行上述任意方法实施例中的次卡凭证的核销方法。
图11示出了根据本公开实施例的一种计算设备的结构示意图,本公开具体实施例并不对计算设备的具体实现做限定。如图11所示,该计算设备可以包括:处理器(processor)112、通信接口(Communications Interface)114、存储器(memory)116、以及通信总线118。其中:处理器112、通信接口114、以及存储器116通过通信总线118完成相互间的通信。通信接口114,用于与其它设备比如客户端或其它服务器等的网元通信。处理器112,用于执行程序110,具体可以执行上述次卡凭证的创建方法实施例中的相关步骤。具体地,程序110可以包括程序代码,该程序代码包括计算机操作指令。处理器112可能是中央处理器CPU,或者是特定集成电路ASIC(Application Specific Integrated Circuit),或者是被配置成实施本公开实施例的一个或多个集成电路。计算设备包括的一个或多个处理器,可以是同一类型的处理器,如一个或多个CPU;也可以是不同类型的处理器,如一个或多个CPU以及一个或多个ASIC。存储器116,用于存放程序110。存储器116可能包含高速RAM存储器,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。
程序110具体可以用于使得处理器112执行以下操作:接收次卡的获取请求;根据获取请求创建对应次卡的主凭证和至少一张子凭证;其中,至少一张子凭证的数量与次卡的可使用次数一致;生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码,以用于对至少一张子凭证进行核销。
在一种可选的实施方式中,程序110具体可以进一步用于使得处理器112执行以下操作:计算各张子凭证分摊到的资金信息;将资金信息记录在对应的子凭证中,以供完成商家端的结算处理。
在一种可选的实施方式中,程序110具体可以进一步用于使得处理器112执行以下操作:确定次卡凭证的核销方式;核销方式包括根据第一核销码进行核销,或者,根据第二核销码进行核销;当确定次卡凭证的核销方式为根据第一核销码进行核销时,生成对应主凭证的第一核销码;或者,当确定次卡凭证的核销方式为根据第二核销码进行核销时,生成对应至少一张子凭证的第二核销码。
在一种可选的实施方式中,程序110具体可以进一步用于使得处理器112执行以下操 作:根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证;生成对应待核销的子凭证的第二核销码。
在一种可选的实施方式中,程序110具体可以进一步用于使得处理器112执行以下操作:在创建得到至少一张子凭证或每次完成对待核销的子凭证的核销后,根据至少一张子凭证的核销状态查找出未核销的子凭证。
在一种可选的实施方式中,程序110具体可以进一步用于使得处理器112执行以下操作:根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证;或者,根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
在一种可选的实施方式中,程序110具体可以进一步用于使得处理器112执行以下操作:将第一核销码或第二核销码发送至用户端,以供用户端提供第一核销码或第二核销码给商家端以用于对至少一张子凭证进行核销。
图12示出了根据本公开实施例的另一种计算设备的结构示意图,本公开具体实施例并不对计算设备的具体实现做限定。如图12所示,该计算设备可以包括:处理器(processor)122、通信接口(Communications Interface)124、存储器(memory)126、以及通信总线128。其中:处理器122、通信接口124、以及存储器126通过通信总线128完成相互间的通信。通信接口124,用于与其它设备比如客户端或其它服务器等的网元通信。处理器122,用于执行程序120,具体可以执行上述次卡凭证的核销方法实施例中的相关步骤。具体地,程序120可以包括程序代码,该程序代码包括计算机操作指令。处理器122可能是中央处理器CPU,或者是特定集成电路ASIC(Application Specific Integrated Circuit),或者是被配置成实施本公开实施例的一个或多个集成电路。计算设备包括的一个或多个处理器,可以是同一类型的处理器,如一个或多个CPU;也可以是不同类型的处理器,如一个或多个CPU以及一个或多个ASIC。存储器126,用于存放程序120。存储器126可能包含高速RAM存储器,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。
程序120具体可以用于使得处理器122执行以下操作:根据针对次卡的至少一张子凭证的核销请求,解析核销请求中携带的核销码;其中,核销码为对应次卡的主凭证的第一核销码,或者为对应次卡的至少一张子凭证中的一张子凭证的第二核销码;以及,至少一张子凭证的数量与次卡的可使用次数一致;根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证,对待核销的子凭证进行核销。
在一种可选的实施方式中,程序120具体可以进一步用于使得处理器122执行以下操作:根据记录在待核销的子凭证中的资金信息完成商家端的结算处理。
在一种可选的实施方式中,程序120具体可以进一步用于使得处理器122执行以下操作:商家端获取用户端提供的核销码发起的针对次卡的至少一张子凭证的核销请求。
在一种可选的实施方式中,程序120具体可以进一步用于使得处理器122执行以下操作:解析第一核销码,确定与第一核销码对应的主凭证关联的至少一张子凭证;根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
在一种可选的实施方式中,程序120具体可以进一步用于使得处理器122执行以下操作:根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证;或者,根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
在一种可选的实施方式中,程序120具体可以进一步用于使得处理器122执行以下操作:解析第二核销码,确定第二核销码对应的子凭证;将第二核销码对应的子凭证选择为待核销的子凭证。
图13示出了根据本公开实施例的又一种计算设备的结构示意图,本公开具体实施例并不对计算设备的具体实现做限定。如图13所示,该计算设备可以包括:处理器(processor)132、通信接口(Communications Interface)134、存储器(memory)136、以及通信总线138。其中:处理器132、通信接口134、以及存储器136通过通信总线138完成相互间的通信。通信接口134,用于与其它设备比如客户端或其它服务器等的网元通信。处理器132,用于执行程序130,具体可以执行上述次卡凭证的核销方法实施例中的相关步骤。具体地,程序130可以包括程序代码,该程序代码包括计算机操作指令。处理器132可能是 中央处理器CPU,或者是特定集成电路ASIC(Application Specific Integrated Circuit),或者是被配置成实施本公开实施例的一个或多个集成电路。计算设备包括的一个或多个处理器,可以是同一类型的处理器,如一个或多个CPU;也可以是不同类型的处理器,如一个或多个CPU以及一个或多个ASIC。存储器136,用于存放程序130。存储器136可能包含高速RAM存储器,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。
程序130具体可以用于使得处理器132执行以下操作:接收次卡的获取请求,根据获取请求创建对应次卡的主凭证和至少一张子凭证;其中,至少一张子凭证的数量与次卡的可使用次数一致;根据针对次卡的至少一张子凭证的核销请求,解析核销请求中携带的核销码,其中,核销码为对应主凭证的第一核销码,或者为对应一张子凭证的第二核销码;根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证,对待核销的子凭证进行核销。
在一种可选的实施方式中,程序130具体可以进一步用于使得处理器132执行以下操作:计算各张子凭证分摊到的资金信息;将资金信息记录在对应的子凭证中;在对待核销的子凭证进行核销后,根据资金信息完成商家端的结算处理。
在一种可选的实施方式中,程序130具体可以进一步用于使得处理器132执行以下操作:确定次卡凭证的核销方式;核销方式包括根据第一核销码进行核销,或者,根据第二核销码进行核销。
在一种可选的实施方式中,程序130具体可以进一步用于使得处理器132执行以下操作:生成对应主凭证的第一核销码,将第一核销码发送至用户端,以供用户端提供第一核销码给商家端以用于对至少一张子凭证进行核销;解析核销请求中携带的第一核销码,确定与第一核销码对应的主凭证关联的至少一张子凭证;根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
在一种可选的实施方式中,程序130具体可以进一步用于使得处理器132执行以下操作:在创建得到至少一张子凭证或每次完成对待核销的子凭证的核销后,根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证;生成对应一张子凭证的第二核销码,将第二核销码发送至用户端,以供用户端提供第二核销码给商家端以用于对至少一张子凭证进行核销;解析第二核销码,确定第二核销码对应的子凭证;将第二核销码对应的子凭证选择为待核销的子凭证。
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本公开也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本公开的内容,并且上面对特定语言所做的描述是为了披露本公开的最佳实施方式。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本公开的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个公开方面中的一个或多个,在上面对本公开的示例性实施例的描述中,本公开的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本公开要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,公开方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本公开的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本公开的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
本公开的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本公开实施例的次卡凭证的核销装置中的一些或者全部部件的一些或者全部功能。本公开还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本公开的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。
应该注意的是上述实施例对本公开进行说明而不是对本公开进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本公开可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。

Claims (41)

  1. 一种次卡凭证的创建方法,包括:
    接收次卡的获取请求;
    根据所述获取请求创建对应所述次卡的主凭证和至少一张子凭证;其中,所述至少一张子凭证的数量与次卡的可使用次数一致;
    生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码,以用于对至少一张子凭证进行核销。
  2. 根据权利要求1所述的方法,其中,在所述根据所述获取请求创建对应所述次卡的主凭证和至少一张子凭证之后,所述方法还包括:
    计算各张子凭证分摊到的资金信息;将所述资金信息记录在对应的子凭证中,以供完成商家端的结算处理。
  3. 根据权利要求1或2所述的方法,其中,在所述生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码之前,所述方法还包括:
    确定所述次卡凭证的核销方式;所述核销方式包括根据第一核销码进行核销,或者,根据第二核销码进行核销;
    所述生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码具体为:当确定所述次卡凭证的核销方式为根据第一核销码进行核销时,生成对应主凭证的第一核销码;或者,当确定所述次卡凭证的核销方式为根据第二核销码进行核销时,生成对应至少一张子凭证的第二核销码。
  4. 根据权利要求3所述的方法,其中,在所述确定所述次卡凭证的核销方式为根据第二核销码进行核销之后,所述方法还包括:
    根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证;
    所述生成对应至少一张子凭证的第二核销码具体为:生成对应所述待核销的子凭证的第二核销码。
  5. 根据权利要求4所述的方法,其中,所述根据至少一张子凭证的核销状态查找出未核销的子凭证具体为:在创建得到至少一张子凭证或每次完成对待核销的子凭证的核销后,根据至少一张子凭证的核销状态查找出未核销的子凭证。
  6. 根据权利要求4所述的方法,其中,所述从未核销的子凭证中选择一张子凭证作为待核销的子凭证具体为:
    根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证;或者,
    根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
  7. 根据权利要求1-6任一项所述的方法,其中,在所述生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码之后,所述方法还包括:
    将所述第一核销码或第二核销码发送至用户端,以供用户端提供所述第一核销码或第二核销码给商家端以用于对至少一张子凭证进行核销。
  8. 一种次卡凭证的核销方法,包括:
    根据针对次卡的至少一张子凭证的核销请求,解析所述核销请求中携带的核销码;其中,所述核销码为对应次卡的主凭证的第一核销码,或者为对应次卡的至少一张子凭证中的一张子凭证的第二核销码;以及,至少一张子凭证的数量与次卡的可使用次数一致;
    根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证,对所述待核销的子凭证进行核销。
  9. 根据权利要求8所述的方法,其中,在所述对所述待核销的子凭证进行核销之后,所述方法还包括:根据记录在待核销的子凭证中的资金信息完成商家端的结算处理。
  10. 根据权利要求8或9所述的方法,其中,所述针对次卡的至少一张子凭证的核销请求具体为:商家端获取用户端提供的核销码发起的针对次卡的至少一张子凭证的核销请求。
  11. 根据权利要求8-10任一项所述的方法,其中,当所述核销码为对应次卡的主凭证的第一核销码时,所述解析所述核销请求中携带的核销码具体为:
    解析所述第一核销码,确定与所述第一核销码对应的主凭证关联的至少一张子凭证;
    所述根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证具体为:根据所述至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
  12. 根据权利要求11所述的方法,其中,所述从未核销的子凭证中选择一张子凭证作为待核销的子凭证具体为:
    根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证;或者,
    根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
  13. 根据权利要求8-10任一项所述的方法,其中,当所述核销码为对应次卡的至少一张子凭证中的一张子凭证的第二核销码时,所述解析所述核销请求中携带的核销码具体为:
    解析所述第二核销码,确定第二核销码对应的子凭证;
    所述根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证具体为:将所述第二核销码对应的子凭证选择为待核销的子凭证。
  14. 一种次卡凭证的核销方法,包括:
    接收次卡的获取请求,根据所述获取请求创建对应所述次卡的主凭证和至少一张子凭证;其中,所述至少一张子凭证的数量与次卡的可使用次数一致;
    根据针对次卡的至少一张子凭证的核销请求,解析所述核销请求中携带的核销码,其中,所述核销码为对应主凭证的第一核销码,或者为对应一张子凭证的第二核销码;
    根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证,对所述待核销的子凭证进行核销。
  15. 根据权利要求14所述的方法,其中,在所述根据次卡获取请求创建对应所述次卡的主凭证和至少一张子凭证之后,所述方法还包括:
    计算各张子凭证分摊到的资金信息;将所述资金信息记录在对应的子凭证中;
    在对所述待核销的子凭证进行核销后,根据资金信息完成商家端的结算处理。
  16. 根据权利要求14或15所述的方法,其中,所述方法还包括:确定所述次卡凭证的核销方式;所述核销方式包括根据第一核销码进行核销,或者,根据第二核销码进行核销。
  17. 根据权利要求16所述的方法,其中,当确定所述次卡凭证的核销方式为根据第一核销码进行核销时,所述方法还包括:
    生成对应所述主凭证的第一核销码,将所述第一核销码发送至用户端,以供用户端提供所述第一核销码给商家端以用于对至少一张子凭证进行核销;
    所述解析所述核销请求中携带的核销码具体为:解析所述核销请求中携带的第一核销码,确定与所述第一核销码对应的主凭证关联的至少一张子凭证;
    所述根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证具体为:根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
  18. 根据权利要求16所述的方法,其中,当确定所述次卡凭证的核销方式为根据第二核销码进行核销时,所述方法还包括:
    在创建得到至少一张子凭证或每次完成对待核销的子凭证的核销后,根据至少一张子凭证的核销状态查找出未核销的子凭证;
    从未核销的子凭证中选择一张子凭证;
    生成对应所述一张子凭证的第二核销码,将所述第二核销码发送至用户端,以供用户端提供所述第二核销码给商家端以用于对至少一张子凭证进行核销;
    所述解析所述核销请求中携带的核销码具体为:解析所述第二核销码,确定第二核销码对应的子凭证;
    所述根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证具体为:将所述第二核销码对应的子凭证选择为待核销的子凭证。
  19. 一种次卡凭证的创建装置,包括:
    接收模块,适于接收次卡的获取请求;
    创建模块,适于根据所述获取请求创建对应所述次卡的主凭证和至少一张子凭证;其中,所述至少一张子凭证的数量与次卡的可使用次数一致;
    生成模块,适于生成对应主凭证的第一核销码,或者生成对应至少一张子凭证的第二核销码,以用于对至少一张子凭证进行核销。
  20. 根据权利要求19所述的装置,其中,所述装置还包括:
    记录模块,适于计算各张子凭证分摊到的资金信息;将所述资金信息记录在对应的子凭证中,以供完成商家端的结算处理。
  21. 根据权利要求19或20所述的装置,其中,所述装置还包括:
    确定模块,适于确定所述次卡凭证的核销方式;所述核销方式包括根据第一核销码进行核销,或者,根据第二核销码进行核销;
    所述生成模块进一步适于:当确定所述次卡凭证的核销方式为根据第一核销码进行核销时,生成对应主凭证的第一核销码;或者,当确定所述次卡凭证的核销方式为根据第二核销码进行核销时,生成对应至少一张子凭证的第二核销码。
  22. 根据权利要求21所述的装置,其中,所述装置还包括:
    选择模块,适于根据至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证;
    所述生成模块进一步适于:生成对应所述待核销的子凭证的第二核销码。
  23. 根据权利要求22所述的装置,其中,所述选择模块进一步适于:在创建得到至少一张子凭证或每次完成对待核销的子凭证的核销后,根据至少一张子凭证的核销状态查找出未核销的子凭证。
  24. 根据权利要求22所述的装置,其中,所述选择模块进一步适于:
    根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证;或者,
    根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
  25. 根据权利要求19-24任一项所述的装置,其中,所述装置还包括:
    发送模块,适于将所述第一核销码或第二核销码发送至用户端,以供用户端提供所述第一核销码或第二核销码给商家端以用于对至少一张子凭证进行核销。
  26. 一种次卡凭证的核销装置,包括:
    解析模块,适于根据针对次卡的至少一张子凭证的核销请求,解析所述核销请求中携带的核销码;其中,所述核销码为对应次卡的主凭证的第一核销码,或者为对应次卡的至少一张子凭证中的一张子凭证的第二核销码;以及,至少一张子凭证的数量与次卡的可使用次数一致;
    选择模块,适于根据解析结果从对应次卡的至少一张子凭证中选择待核销的子凭证;
    核销模块,适于对所述待核销的子凭证进行核销。
  27. 根据权利要求26所述的装置,其中,所述装置还包括:结算模块,适于根据记录在待核销的子凭证中的资金信息完成商家端的结算处理。
  28. 根据权利要求26或27所述的装置,其中,所述针对次卡的至少一张子凭证的核销请求具体为:商家端获取用户端提供的核销码发起的针对次卡的至少一张子凭证的核销请求。
  29. 根据权利要求26-28任一项所述的装置,其中,当核销码为对应次卡的主凭证的第一核销码,所述解析模块进一步适于:解析所述第一核销码,确定与所述第一核销码对应的主凭证关联的至少一张子凭证;
    所述选择模块进一步适于:根据所述至少一张子凭证的核销状态查找出未核销的子凭证;从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
  30. 根据权利要求29所述的装置,其中,所述选择模块进一步适于:
    根据未核销的子凭证的凭证标识从未核销的子凭证中选择一张子凭证作为待核销的子凭证;或者,
    根据未核销的子凭证中记录的资金信息从未核销的子凭证中选择一张子凭证作为待核销的子凭证。
  31. 根据权利要求26-28任一项所述的装置,其中,当所述核销码为对应次卡的至少一张子凭证中的一张子凭证的第二核销码时,所述解析模块进一步适于:
    解析所述第二核销码,确定第二核销码对应的子凭证;
    所述选择模块进一步适于:将所述第二核销码对应的子凭证选择为待核销的子凭证。
  32. 一种次卡凭证的核销系统,所述系统包括权利要求19-25中任一项所述的次卡凭证的创建装置,以及权利要求26-31中任一项所述的次卡凭证的核销装置。
  33. 一种计算设备,包括:处理器、存储器、通信接口和通信总线,所述处理器、所述存储器和所述通信接口通过所述通信总线完成相互间的通信;
    所述存储器用于存放至少一可执行指令,所述可执行指令使所述处理器执行如权利要求1-7中任一项所述的次卡凭证的创建方法对应的操作。
  34. 一种计算设备,包括:处理器、存储器、通信接口和通信总线,所述处理器、所述存储器和所述通信接口通过所述通信总线完成相互间的通信;
    所述存储器用于存放至少一可执行指令,所述可执行指令使所述处理器执行如权利要求8-13中任一项所述的次卡凭证的核销方法对应的操作。
  35. 一种计算设备,包括:处理器、存储器、通信接口和通信总线,所述处理器、所述存储器和所述通信接口通过所述通信总线完成相互间的通信;
    所述存储器用于存放至少一可执行指令,所述可执行指令使所述处理器执行如权利要求14-18中任一项所述的次卡凭证的核销方法对应的操作。
  36. 一种非易失性计算机可读存储介质,所述非易失性计算机可读存储介质中存储有至少一可执行指令,所述可执行指令使处理器执行如权利要求1-7中任一项所述的次卡凭证的创建方法对应的操作。
  37. 一种计算机程序产品,其中,所述计算机程序产品包括存储在非易失性计算机存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被处理器执行时,使所述处理器执行如权利要求1-7中任一项所述的次卡凭证的创建方法对应的操作。
  38. 一种非易失性计算机可读存储介质,所述非易失性计算机可读存储介质中存储有至少一可执行指令,所述可执行指令使处理器执行如权利要求8-13中任一项所述的次卡凭证的核销方法对应的操作。
  39. 一种计算机程序产品,其中,所述计算机程序产品包括存储在非易失性计算机存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被处理器执行时,使所述处理器执行如权利要求8-13中任一项所述的次卡凭证的核销方法对应的操作。
  40. 一种非易失性计算机可读存储介质,所述非易失性计算机可读存储介质中存储有 至少一可执行指令,所述可执行指令使处理器执行如权利要求14-18中任一项所述的次卡凭证的核销方法对应的操作。
  41. 一种计算机程序产品,其中,所述计算机程序产品包括存储在非易失性计算机存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被处理器执行时,使所述处理器执行如权利要求14-18中任一项所述的次卡凭证的核销方法对应的操作。
PCT/CN2020/082507 2019-04-22 2020-03-31 次卡凭证的创建方法和装置,以及核销方法和装置 WO2020216022A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/506,948 US20220068075A1 (en) 2019-04-22 2021-10-21 Methods and apparatuses for creating times card voucher and methods and apparatuses for writing off times card voucher

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910325296.7A CN110147983B (zh) 2019-04-22 2019-04-22 次卡凭证的创建方法和装置,以及核销方法和装置
CN201910325296.7 2019-04-22

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/506,948 Continuation US20220068075A1 (en) 2019-04-22 2021-10-21 Methods and apparatuses for creating times card voucher and methods and apparatuses for writing off times card voucher

Publications (1)

Publication Number Publication Date
WO2020216022A1 true WO2020216022A1 (zh) 2020-10-29

Family

ID=67593825

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/082507 WO2020216022A1 (zh) 2019-04-22 2020-03-31 次卡凭证的创建方法和装置,以及核销方法和装置

Country Status (3)

Country Link
US (1) US20220068075A1 (zh)
CN (2) CN112967024A (zh)
WO (1) WO2020216022A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112967024A (zh) * 2019-04-22 2021-06-15 口碑(上海)信息技术有限公司 次卡凭证的创建方法和装置,以及核销方法和装置
CN112270542B (zh) * 2020-11-03 2023-12-08 支付宝(杭州)信息技术有限公司 交易数据处理方法、装置、设备及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609861A (zh) * 2012-01-21 2012-07-25 北京普罗信科技有限公司 一种基于移动终端的零售计次营销系统和方法
US20140122207A1 (en) * 1995-06-16 2014-05-01 Catalina Marketing Corporation Virtual couponing method and apparatus for use with consumer kiosk
CN105551149A (zh) * 2015-12-23 2016-05-04 立德高科(北京)数码科技有限责任公司 基于二维码在小区饮水机上购水的方法及系统
CN110147983A (zh) * 2019-04-22 2019-08-20 口碑(上海)信息技术有限公司 次卡凭证的创建方法和装置,以及核销方法和装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005084880A (ja) * 2003-09-08 2005-03-31 Japan Research Institute Ltd 決済システムおよび決済プログラム
CN106355425A (zh) * 2015-07-15 2017-01-25 阿里巴巴集团控股有限公司 电子凭证的核销码生成方法、电子凭证的核销方法及装置
US11568380B2 (en) * 2016-03-21 2023-01-31 Mastercard International Incorporated Systems and methods for use in providing payment transaction notifications
CN106570709A (zh) * 2016-10-28 2017-04-19 乐视控股(北京)有限公司 一种交易处理方法、装置及电子设备
CN107026838B (zh) * 2016-11-18 2021-01-05 创新先进技术有限公司 一种电子凭证的发放方法及装置
CN108287828A (zh) * 2017-01-09 2018-07-17 长沙青核桃网络科技有限公司 一种互联网科技的通用型会员管理系统
CN107944920A (zh) * 2017-11-30 2018-04-20 口碑(上海)信息技术有限公司 券包创建方法、装置、券包领取方法及装置
US11288672B2 (en) * 2017-12-28 2022-03-29 Paypal, Inc. Machine learning engine for fraud detection following link selection
CN108520443A (zh) * 2018-04-11 2018-09-11 口碑(上海)信息技术有限公司 智能券的发放方法、装置及利用智能券的核销方法、装置
CN109616182A (zh) * 2018-12-05 2019-04-12 杭州为之科技有限公司 订单预约及核销方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140122207A1 (en) * 1995-06-16 2014-05-01 Catalina Marketing Corporation Virtual couponing method and apparatus for use with consumer kiosk
CN102609861A (zh) * 2012-01-21 2012-07-25 北京普罗信科技有限公司 一种基于移动终端的零售计次营销系统和方法
CN105551149A (zh) * 2015-12-23 2016-05-04 立德高科(北京)数码科技有限责任公司 基于二维码在小区饮水机上购水的方法及系统
CN110147983A (zh) * 2019-04-22 2019-08-20 口碑(上海)信息技术有限公司 次卡凭证的创建方法和装置,以及核销方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LANDFORD: "Store (clerk scan code verification) configuration tutorial", PHPWC.COM, 31 March 2018 (2018-03-31), pages 1 - 2, XP055754859, Retrieved from the Internet <URL:http://www.phpwc.com/thread-2932-1-1.html.> *

Also Published As

Publication number Publication date
CN110147983B (zh) 2021-01-12
CN112967024A (zh) 2021-06-15
CN110147983A (zh) 2019-08-20
US20220068075A1 (en) 2022-03-03

Similar Documents

Publication Publication Date Title
US10108938B1 (en) Cryptocurrency payment network
US20220414750A1 (en) Network site cart user interface having multiple user-specified currency formats
US11645637B2 (en) Systems and methods for payment processing on platforms
WO2019157983A1 (zh) 交易处理方法及平台
US10529016B2 (en) Method and system for pre-transaction installment payment solution and simulation of installment
US10861042B2 (en) Method and system for platform attribution using digitized tokens
US20130173364A1 (en) Credit card rewards program
US11132656B2 (en) System and method for managing transactions in a digital marketplace
US9928498B2 (en) System, apparatus and method for segregating data in transactions via dedicated interface elements for isolated logic and repositories
US20130304620A1 (en) Using a value-ascertainable item to obtain credit at a third-party merchant
WO2020216022A1 (zh) 次卡凭证的创建方法和装置,以及核销方法和装置
JP2012181874A (ja) 汎用還元ビークル
US20220027896A1 (en) Method and system for defining, creating, managing, and transacting multiple classes of digital objects
CN104504561A (zh) 基于电子票据的线下支付兑换系统
WO2020157711A2 (en) Digital asset management systems and methods
CN115456622A (zh) 基于第三方支付渠道b2c电商订单合并支付的处理方法
CN107146075B (zh) 请求处理方法及装置
US20130054441A1 (en) Methods and systems for trading in monetary equivalent instruments
KR20200077937A (ko) 모바일 상품권으로 결제 후 결제 잔액에 해당하는 새로운 모바일 상품권을 발행하는 방법
US9984359B1 (en) Method and system for a network of merchants collecting payments for each other
US11144904B2 (en) Post-purchase credit offer and tender switch
US20070130542A1 (en) Supporting user interaction with a computer system
US20240185210A1 (en) Post-purchase credit offer and tender switch
US20220398666A1 (en) Distributed ledger-based decentralized autonomous organizations and collaborations
US20230043398A1 (en) Virtual Account Use

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20794046

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20794046

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 20794046

Country of ref document: EP

Kind code of ref document: A1