Method for enhancing security of no-card payment transaction and credit card

A credit card and security technology, applied in the field of information security, can solve problems such as fraud, and achieve the effect of enhancing security and reducing the possibility of fraud

Active Publication Date: 2018-05-18
FEITIAN TECHNOLOGIES
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, shopping on some overseas websites does not require a password. As long as the buyer provides the account number and credit card security code, the transaction can be completed. There are also merchants in China who sign contracts with banks, and do not need to provide the credit card password. Only the credit card security code can complete the phone transfer. However, the credit card security code is usually a fixed three or four-digit number printed on the credit card, which is easy to be obtained by others to commit fraud, resulting in security risks for card-not-present payment transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing security of no-card payment transaction and credit card
  • Method for enhancing security of no-card payment transaction and credit card
  • Method for enhancing security of no-card payment transaction and credit card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] This embodiment provides a method for enhancing the security of card-not-present payment transactions, the method comprising:

[0050] Step S1, the credit card is powered on, and the system is initialized;

[0051] Step S2, the credit card is dormant, wakes up when a preset interruption is detected, and executes step S3;

[0052] Step S3, the credit card enters the preset interruption processing flow to execute the preset interruption processing, and when the preset interruption processing is completed, exit the preset interruption processing flow and return to step S2;

[0053] Default interrupt handling includes:

[0054] Step a1, obtain the dynamic security code factor, and generate the first data block according to the dynamic security code factor and the card personalization data in the card;

[0055] In this embodiment, the card personalization data includes: main account number, card expiration date and service code sequence;

[0056] Generating the first data...

Embodiment 2

[0061] This embodiment provides a method for enhancing the security of card-not-present payment transactions, the method comprising:

[0062] Step 101, after the credit card is powered on, the system is initialized.

[0063] Step 102, the credit card sleeps, wakes up when an interruption is detected, and executes step 103.

[0064]Step 103 , the credit card enters the interruption processing flow to execute the interruption processing, and when the interruption processing is completed, exit the interruption processing flow and return to step 102 .

[0065] The interruption described in this embodiment specifically includes communication interruption and key interruption:

[0066] When the credit card detects a communication interruption, it is awakened, enters the communication interruption processing flow to execute the communication interruption processing, and exits the communication interruption processing flow when the communication interruption processing is completed; ...

Embodiment 3

[0097] This embodiment provides a method for enhancing the security of card-not-present payment transactions, the method comprising:

[0098] Step 101, after the credit card is powered on, the system is initialized.

[0099] Step 102, the credit card sleeps, wakes up when an interruption is detected, and executes step 103.

[0100] Step 103 , the credit card enters the interruption processing flow to execute the interruption processing, and when the interruption processing is completed, exit the interruption processing flow and return to step 102 .

[0101] The interruption described in this embodiment specifically includes communication interruption, RTC interruption and key interruption:

[0102]When the credit card detects a communication interruption, it is awakened, enters the communication interruption processing flow to execute the communication interruption processing, and exits the communication interruption processing flow when the communication interruption process...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for enhancing security of no-card payment transaction and a credit card. The method includes the steps that 1, the credit card is powered on, and system initializationis conducted; 2, the credit card is dormant, the credit card is awakened when a preset interrupt is detected, and step 3 is conducted; 3, the credit card enters the preset interrupt treatment processto conduct the preset interrupt processing; when the preset interrupt treatment is completed, the credit card exits from the preset interrupt processing process and returns to the step 2. The creditcard comprises an electrifying module, an initialization module, a first dormancy module, a first detection module, a first awakening module and a first interrupt processing module. The method and thecredit card have the advantages of reducing the possibility of fraud by interception and storage of credit card security codes and enhancing the security of no-card payment transaction.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for enhancing the security of non-card payment transactions and a credit card. Background technique [0002] Credit card is one of the fastest growing financial services today, and it is an electronic currency that can replace traditional cash circulation within a certain range. Credit card security code is a security code of a credit card when conducting network or telephone transactions. It is usually used to verify that the payer owns the credit card at the time of transaction, thereby preventing credit card fraud. However, shopping on some overseas websites does not require a password. As long as the buyer provides the account number and credit card security code, the transaction can be completed. There are also merchants in China who sign contracts with banks, and do not need to provide the credit card password. Only the credit card security code can complete the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/34G06Q20/40
CPCG06Q20/356G06Q20/3823G06Q20/401
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products