Method for monitoring counterfeit card risk and transaction processing system implementing the method

A transaction processing and transaction technology, applied in the computer field, can solve problems such as failure

Active Publication Date: 2018-11-27
CHINA UNIONPAY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the counterfeit financial IC card is cloned based on the personalized data in the card, this verification mechanism based on identity information may become invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for monitoring counterfeit card risk and transaction processing system implementing the method
  • Method for monitoring counterfeit card risk and transaction processing system implementing the method
  • Method for monitoring counterfeit card risk and transaction processing system implementing the method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are shown. This invention may, however, be embodied in different forms and should not be construed as limited to only the embodiments set forth herein. The above-mentioned embodiments are given to make the disclosure of this document comprehensive and complete, so as to make the understanding of the protection scope of the present invention more comprehensive and accurate.

[0033] Words such as "comprising" and "comprising" mean that in addition to the units and steps that are directly and explicitly stated in the specification and claims, the technical solution of the present invention does not exclude other elements that are not directly or explicitly stated. Situation of units and steps.

[0034] Terms such as "first" and "second" do not indicate the order of units in terms of time, space, size, etc., but are on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for detecting false card risk comprises the following steps: a receiving step (S201), a transaction processing system receiving from a transaction terminal the data associated with the transaction which a financial IC card requests to process; an abnormity judgment step (S202), the transaction processing system judging whether the transaction processed under the request is abnormal according to the data; a false card risk determination step (S204), the transaction processing system determining that the false card risk exists on the financial IC card if the financial IC card abnormal number is greater than a first threshold or the frequency of the transaction which the financial IC card requests to process is greater than a second threshold. The method can find false card risk timely and improve the probability and efficiency of the identification of a false card. A transaction processing system is also disclosed.

Description

technical field [0001] The invention relates to computer technology, in particular to a method for monitoring the risk of counterfeit cards and a transaction processing system for realizing the method. Background technique [0002] With the popularization of financial IC cards, the cases of stealing cardholder funds by counterfeiting cards are increasing day by day. Such cases not only cause losses to cardholders, but also often lead to legal and economic disputes between card issuers and cardholders. Therefore the importance of how to technically guard against counterfeit financial IC cards becomes more prominent. [0003] At present, there are generally two methods for judging the authenticity of financial IC cards, that is, offline data authentication of the transaction terminal and online authentication of the issuing bank. In the former method, the transaction terminal will locally authenticate the card offline, and if the user's authentication information (such as pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07F7/12G06Q20/34
CPCG06Q20/4016
Inventor 钟国业吴金坛
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products