Method used for connecting skynet system and recoding card transaction illegal behavior

A record card and skynet technology, applied in the payment system, payment system structure, agreement authorization, etc., can solve the problems of asset loss, unscrupulous verification procedures, and affecting the relationship between the police and the public, so as to prevent fraud and protect interests and property Safety and guarantee the effect of normal operation

Inactive Publication Date: 2018-03-23
SHENZHEN WEIZHIWANG TECH CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, due to the single identity verification method of the bank card payment terminal, the verification procedure is not strict and provides conditions for criminals
[0004] In addition, when the cardholder learns that the bank card has been stolen, even

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method used for connecting skynet system and recoding card transaction illegal behavior
  • Method used for connecting skynet system and recoding card transaction illegal behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Step 1: The user performs consumption by swiping the card at the payment terminal;

[0061] Step 2: The bank card transaction system obtains the transaction information, identifies the bank card account number, and reads the reserved mobile phone number bound to the bank card account number and other related information through the bank card system database;

[0062] Step 3: The location service platform of the communication operator locates the reserved mobile phone number read in step 2, and obtains area B; and sends a request to the positioning system to obtain the geographic location information of the card swiping terminal (area A);

[0063] Step 4: The bank card management platform judges whether area A and area B belong to the same area, if area A and area B belong to the same area, the payment terminal prompts that the card swiping operation is successful, and completes the card swiping operation; if area A and area B do not belong to the same area area, call th...

Embodiment 2

[0066] As described in Embodiment 1, a method for docking with the Skynet system to record card transaction violations, in step 5, if the user does not allow the card to be swiped, the payment terminal automatically captures the suspect’s photo through the camera, and by setting it in the The core controller inside the payment terminal reads the suspect’s graphic information and uploads and stores it to the artificial intelligence identification system, and conducts artificial intelligence identification with the public security agency’s online pursuit and key focus groups; if the identification results are consistent, the payment terminal prompts for card swiping operation If it fails, it will automatically report to the public security organ;

[0067] Step 6: Transmit the suspect’s graphic information to the public security video surveillance system, which is connected to the Skynet system of the Ministry of Public Security to mobilize the Skynet camera to take photos of the ...

Embodiment 3

[0070] As described in Example 2, a method for docking with the Skynet system to record card transaction violations, if the public security organ’s online pursuit and key focus groups are identified by artificial intelligence with the suspect’s photos, and the identification results are inconsistent, the payment terminal prompts Swipe operation failed.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method used for connecting a skynet system and recoding a card transaction illegal behavior. The method at least comprises the following steps of acquiring geographical position information of a payment terminal and carrying out position matching with a specific geographical position where a mobile phone card bound with a bank card is located; determining whether the twoare located in a same area; determining whether a user continuously input wrong passwords for several times; automatically snapshoting a card swiping suspect photograph and carrying out artificial intelligence identification with a public security organization online pursuit group and a group which is focused on; if an identification result is inconsistent, prompting that card swiping operation isfailed; if the identification result is consistent, prompting that the card swiping operation is failed and automatically calling the police; mobilizing a skynet camera to shoot an escape photographby the skynet system of the Ministry of Public Security, and comparing with a suspect photograph; and if comparison is consistent, carrying out positioning by a positioning system, identifying a geographical position and describing an escape path. In the invention, a relationship between the police and the public can be improved, fund safety of a card holder is effectively guaranteed and the method is good for maintaining social harmony and stability.

Description

technical field [0001] The invention relates to the technical field of consumer payment, and more specifically relates to a method for docking with the Skynet system to record card transaction violations. Background technique [0002] With the increasing popularity of bank cards, bank card payment methods are also increasing. Using bank cards to pay is not only easy to operate, but also eliminates the trouble of making change. However, bank cards bring convenience to cardholders at the same time. , also comes with many risks. In fact, with the increase in the popularity of bank cards, legal disputes about bank card theft and copying continue unabated. [0003] At present, typical bank card fraud cases usually rely on copying bank card magnetic stripe information and stealing passwords to achieve theft-copy-stealing-cash out. The typical means of copying the magnetic stripe information include losing or stealing the bank card, and then the magnetic stripe information is cop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/10G06Q20/38G06Q20/40
CPCG06Q20/10G06Q20/382G06Q20/4014
Inventor 桂文强
Owner SHENZHEN WEIZHIWANG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products