Auditing method for personal consumption credit

A credit and consumer-end technology, applied in data processing applications, commerce, instruments, etc., can solve problems such as insufficient security and easy to be stolen by hackers

Inactive Publication Date: 2007-05-23
吴超竑
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the above-mentioned known patented technologies, there are concerns about insufficient security. For example, when the No. 460849 patent and the No. 473681 patent are implemented, relevant information is easily stolen by hackers dur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Auditing method for personal consumption credit
  • Auditing method for personal consumption credit
  • Auditing method for personal consumption credit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Please refer to FIG. 4 for a schematic diagram of the system architecture of the present invention. This is the review and consumption relationship between the authorization end, the consumption end, and the user. The user 40 must first go to the authorization end 44 to perform pre-recording actions (including logging in personal data and personal identity authentication. data), the pre-recorded action user 40 utilizes a camera device at the authorization end 44 to capture dynamic audio-visual data and static pictures and store them in a central server (not shown) of the authorization end 44. When wanting to consume, the consumer terminal 42 can send the identity information provided by the user 40 to the central server through the network to find out the matching user 40 information, and the central server will transmit the dynamic video and audio data stored in advance by the user 40 to the central server. Return to the consumption terminal 42, so that the consumption ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is a personal credit consumption audit method, and the method is used in network consumption field, to solve the stolen use or the fraudulent use of plastic cards in network consumption. The method of the invention stores user information in the central servers, and the central server integrates user information, the pre-set audio-visual materials and user identification authentication information, to process the personal credit consumption audit operation, and thus, effectively eliminate the existing technical flaws.

Description

technical field [0001] The invention relates to the field of network consumption, an audit method in the field of consumption, especially a method for auditing personal credit consumption. Background technique [0002] With the change of the times, consumers' consumption patterns have changed from traditional coin consumption to plastic card consumption, and coincided with the rise of the Internet, consumers have become accustomed to various consumptions on the Internet. Regardless of whether consumers go to the store to make purchases in person or through the Internet, most of them use plastic cards to swipe their cards. However, there are hidden doubts about insufficient security when making purchases on the Internet. Therefore, many software manufacturers are Many studies on encryption or encryption methods on cards have been conducted on the Internet to prevent consumers' information from being stolen or to verify whether the card holder is himself or not. [0003] Many...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00G06Q20/00
Inventor 吴超竑
Owner 吴超竑
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products