Security guarding method for automatically calling to inform customer of logining, transferring and paying of internet banking

A technology for online banking and customers, applied in telephone communication, electrical components, instruments, etc., can solve problems such as inability to recover money, money loss of bank customers, etc., and achieve the effect of avoiding losses

Inactive Publication Date: 2010-09-01
黄金富
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the emergence of computer viruses and Trojan horse programs, hackers have invaded computers with viruses and Trojan horse programs by various means. Hackers will steal the information and passwords of online banking accounts through a Trojan horse program, and then use the stolen account information and passwords to transfer the money in the account by pretending to be bank customers without the bank customer's knowledge
In addition, some fake bank websites have appeared recently. Hackers use various means to lure bank customers into logging into the fake bank websites, and steal the login information, including passwords, entered by bank customers when logging into the fake bank websites, and then hackers use the stolen login information. According to the data, without the knowledge of the bank customers, the counterfeit bank customers transfer the money in the account away. When the bank customers find out that the money in the account has been stolen, it is often too late to find out that the hacker has already transferred the money to some so-called " In the "space account", the money is withdrawn through ATM, and these "space accounts" are usually opened by hackers using stolen ID cards or fake ID cards, so it is generally impossible to recover the transferred money. monetary loss to bank customers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security guarding method for automatically calling to inform customer of logining, transferring and paying of internet banking
  • Security guarding method for automatically calling to inform customer of logining, transferring and paying of internet banking
  • Security guarding method for automatically calling to inform customer of logining, transferring and paying of internet banking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The method of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0013] refer to figure 1 , figure 1 It is a schematic explanatory diagram of the steps of the online bank account security method of the present invention, which includes an online bank account system (1), an interactive voice response device (2) connected to the telephone network (4), a customer's mobile phone (3), Connect to the Internet terminal (5) of the online bank account system (1) through the Internet (6), wherein, the online bank account system (1) is provided with each customer's online bank account and records the mobile phone (3) of each customer phone number, and has a monitoring security program for monitoring the account activities of each online bank account. When the monitoring security program finds that the account activity of a certain online banking account is subject to monitoring, the monitoring security program will pas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security guarding method for automatically calling to inform a customer of logining, transferring and paying of internet banking, which is used for ensuring the safety of an internet banking account of the customer. The method comprises the following steps that: an internet banking account system (1) monitors the account activities of each internet banking account; the internet banking account system (1) calls a mobile phone (3) of a customer corresponding to the internet banking account through an interactive voice answer device (2) so as to inform the customer, when the internet banking account system (1) finds that an account activity of one internet banking account is monitored operation; and the customer judges whether the account activity is illegal operation or not and judges whether the account is embezzled or not. If the customer does not log in a server of the internet banking but the mobile phone (3) of the customer receives the call from the internet banking account system (1) informing that the account of the customer is logged in, the internet banking account of the customer may be embezzled and the customer can immediately inform the bank of the embezzled event so that the bank can freeze the stolen capital in time and the loss is avoided.

Description

【Technical field】 [0001] The invention relates to the technical field of financial security, in particular to a security method for automatically calling and notifying customers of online bank login transfer payment. 【Background technique】 [0002] With the popularity of computers and the emergence of online banking services, more and more bank customers use online banking services. Online banking services are characterized by convenience and speed. Customers only need to use a computer that can be connected to the Internet to log in to online banking through an Internet connection. It is very convenient and fast to handle all kinds of bank account affairs by using a dedicated server, which can save the time of queuing up at the bank counter in person. However, with the emergence of computer viruses and Trojan horse programs, hackers have invaded computers with viruses and Trojan horse programs by various means. Hackers will steal the information and password of the online ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/00H04M11/00G06Q40/02
Inventor 黄金富
Owner 黄金富
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products