CN107833033A - A kind of method that registration card transaction illegal activities are docked with Skynet system - Google Patents

A kind of method that registration card transaction illegal activities are docked with Skynet system Download PDF

Info

Publication number
CN107833033A
CN107833033A CN201711059354.3A CN201711059354A CN107833033A CN 107833033 A CN107833033 A CN 107833033A CN 201711059354 A CN201711059354 A CN 201711059354A CN 107833033 A CN107833033 A CN 107833033A
Authority
CN
China
Prior art keywords
card
bank
skynet
docked
suspect
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711059354.3A
Other languages
Chinese (zh)
Inventor
桂文强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Weizhiwang Technology Co Ltd
Original Assignee
Shenzhen Weizhiwang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Weizhiwang Technology Co Ltd filed Critical Shenzhen Weizhiwang Technology Co Ltd
Priority to CN201711059354.3A priority Critical patent/CN107833033A/en
Publication of CN107833033A publication Critical patent/CN107833033A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of method that registration card transaction illegal activities are docked with Skynet system, methods described comprises at least following steps:The geographical location information of payment terminal is obtained, and location matches are carried out with particular geographic location where the Mobile phone card of bank card binding;Judge whether the two belongs to the same area;Judge whether continuous several times input password by mistake to user;Crowd's progress artificial intelligence identification is pursued and captured an escaped prisoner and paid close attention on the net to automatic suspect's photo of swiping the card of capturing with public security organ;Recognition result is inconsistent, then prompts swiping card failure;Recognition result is consistent, then prompts swiping card failure and alarmed from trend public security organ;Ministry of Public Security's Skynet system transfers day net camera and shoots photo of escaping, and is compared with suspect's photo;Consistent, alignment system positioning is compared, identification of geographic location simultaneously describes path of escaping.The present invention can not only improve relation between the police and the people, effectively ensure the fund security of holder, and help to safeguard that social harmony is stable.

Description

A kind of method that registration card transaction illegal activities are docked with Skynet system
Technical field
The present invention relates to consumption and payment technical field, more particularly to one kind docks registration card friendship with Skynet system The method of easy illegal activities.
Background technology
With the popularity more and more higher of bank card, bank card means of payment are also increasing, paid using bank card It is not only simple to operate, and the trouble of small change is eliminated, but bank card can also attach while being brought convenience to holder Many risks.In fact, with the raising of bank card popularization degree, the stolen brush of relevant bank card has increasing nothing with the legal dispute replicated Subtract.
Typical bank card is stolen brush case at present, is generally realized by duplication bank card magnetic strip information, stealing passwords Steal-replicate-steal brush-arbitrage.Replicating the exemplary means of magnetic strip information includes bank card loss or is stolen, and then by not Method molecule replicates magnetic strip information, or card device is stolen in installation on the card inserting mouth of ATM.Suspect utilizes these information Bank card is cloned to steal the wealth on their bank cards, or steals user terminal data, obtains virtual electronic bank card data, Realize that bank card information obtains, so as to implement illegal activities by network finance platform.Simultaneously because bank card payment terminal Authentication mode is single, and proving program does not strictly also provide condition to criminal.
In addition, when holder knows the stolen brush of bank card, even if alarming, rushing to bank in time, suspect also early escapes Die young, fund is transferred already in card, can not be recovered, and not only brings loss of assets, but also has a strong impact on relation between the police and the people.
Therefore, how a kind of method for the bank card business dealing illegal activities that can effectively solve above-mentioned technical problem is provided, The problem of being those skilled in the art's urgent need to resolve.
The content of the invention
In view of this, the invention provides a kind of method that registration card transaction illegal activities are docked with Skynet system, prevent In the case of unwitting, fund is transferred holder, not only improves relation between the police and the people, effectively ensures the fund peace of holder Entirely, and help to safeguard that social harmony is stable.
To achieve these goals, the present invention adopts the following technical scheme that:
A kind of method that registration card transaction illegal activities are docked with Skynet system, it is characterised in that methods described mainly relates to And bank card transaction system, bank card system database, common carrier Location Service Platform, bank's card management platform, information Service system, cryptographic service system, artificial intelligence identifying system and Police Video Supervision System and Ministry of Public Security's Skynet system, determine Position system;Methods described mainly comprises the following steps:
Step 1:When bank's cardholder carries out bankcard consumption by payment terminal, by being arranged on the payment terminal On alignment system it is positioned, determine region A, and location information is uploaded to bank's card management platform;
Step 2:Bank card transaction system obtains Transaction Information, identifies bank card account number, and pass through bank card system data Read the reserved phone number and other related informations of bank card account number binding in storehouse;
Step 3:Common carrier Location Service Platform positions to the reserved phone number read in step 2, it is determined that Region B, bank's card management platform obtain location information;
Step 4:Judge whether region A and region B belongs to the same area, when region A and region B belongs to the same area, Then swipe the card success, 5 are gone to step when region A and region B is not belonging to the same area;
Step 5:By bank's card management platform recalls information service system, edit and send prompt message to the hand of user Machine, inform that its bank card of user may be stolen brush;The form of prompt message includes but is not limited to short message, intelligent sound is reminded, app Pop-up is reminded, and the diversity of prompting form can be achieved.
Step 6:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its The stolen brush of bank card, can under the guide of bank's card management platform, by key command deciding whether to allow to swipe the card or Realize alarm by sending warning message to the online alarm center of public security system or freeze to swipe the card;When user allows, its Bank card is swiped the card success, and 7 are gone to step when user does not allow;Warning message can also pass through connection by short message sending The APP for having public security warning system uploads warning message, can also directly dial that 110 alarms etc. are all multi-form to be alarmed.
Step 7:Payment terminal captures the photo of suspect by camera automatically, by being arranged in the payment terminal The core controller in portion reads the graph text information of suspect and upload is stored to artificial intelligence identifying system, online with public security organ Pursue and capture an escaped prisoner and pay close attention to crowd and carry out artificial intelligence identification;Recognition result is consistent, then prompts swiping card unsuccessfully and public from trend The alarm of peace office, goes to step 8;Recognition result is inconsistent, then prompts swiping card failure;
Step 8:By the teletext transmission of suspect to Police Video Supervision System, Police Video Supervision System interconnection In Ministry of Public Security's Skynet system, to transfer day net camera, the leaving of suspect, photo of escaping are shot;
Step 9:The Police Video Supervision System passes through the photo that photographs the day net camera and suspect Photo is compared, and when the two is not belonging to same people, continues to seek suspect, 10 are gone to step when the two belongs to same people;
Step 10:Police Video Supervision System is by calling Ministry of Public Security's Skynet system, according to the identification knot of day net camera Fruit, automatic control alarm system are reminded and send data to closest policeman's terminal, arrange responding;
Step 11:The particular geographic location of the day net camera of Police Video Supervision System identification alarm, and depict suspicion The leaving of people, path of escaping are doubted, real-time storage and display are carried out, to assist the police to be accurate to rapidly up to the site of the accident.
Specifically, the leaving of suspect, path of escaping can be with real-time displays on the mobile phone of the police, or it is stored in the Ministry of Public Security Skynet system, realization have access to tracking in real time.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, step 1 to step 4 can also be substituted with following steps:When bank's cardholder carries out bankcard consumption by payment terminal, pass through cryptographic service system System judges whether bank card password and input password are consistent, when bank card password is identical with input password, then success of swiping the card, when When inputting password continuous several times with bank card password difference, then 5 are gone to step.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, the password clothes Business system is used for the Password Input for receiving the payment terminal, and judges whether Password Input errors number is more than and preset Value, will determine that result is back to bank's card management platform;Wherein described preset value is the judgement for continuously inputing password by mistake Number.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, the people in step 7 Work Intelligent Recognition includes recognition of face, pursues and captures an escaped prisoner and pay close attention on the net that crowd's face information is consistent then automatic sends with public security organ Warning message is to the online alarm center of local public security system.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, at the core Reason device also includes image processing module, and described image processing module receives the swiping card user picture of the camera shooting, Intercept face-image and send to the artificial intelligence identifying system.
Preferably, it is described to pay eventually in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system End comprises at least:Intelligent mobile terminal, self-help drawing money machine, POS, get tickets and ticketing machine.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, the holder It is the identifying code in receipt short message to authorize the mode transferred accounts.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, do not laying The region of its net monitoring, sound, the collection of video location information data are carried out by the intelligent terminal of alarm people, still can be played The effect of pre-control is monitored, covers a variety of situations such as indoor positioning, remote mountain areas positioning, the monitoring in day net monitoring system can be made up Dead angle.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, the bank card Including but not limited to entity bank card or virtual electronic bank card.Entity bank card is the credit branch of bank and other financial mechanism distribution Card is paid, virtual electronic bank card is the virtual bank's card account being bundled on mobile phone.
Preferably, it is affiliated to pay eventually in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system End can be bank card self-aided terminal, for identifying entity bank card;It can also be the smart mobile phone with payment function, be used for Binding virtual electronic bank account simultaneously realizes mobile-phone payment.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, the positioning system System can directly obtain the inherent address information of payment terminal, can also by LBS, GPS, dipper system, Galileo or A kind of real time position of positioning payment terminal in GLONASS.
Understood via above-mentioned technical scheme, compared with prior art, the present disclosure provides a kind of and Skynet system The method for docking registration card transaction illegal activities, can largely prevent bank card from stealing brush by other people, to the full extent The interests and property safety of user are protected, has prevented the phenomenon generation that bank card steals brush, has favorably ensured social financial order Ground is normally carried out.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 accompanying drawings are a kind of flow chart that registration card transaction illegal activities method is docked with Skynet system of the present invention.
Fig. 2 accompanying drawings are another flow chart that registration card transaction illegal activities method is docked with Skynet system of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of method for docking with Skynet system registration card transaction illegal activities, by using The mode of multi-party verification swiping card user identity, is seriously mismatched to swiping card customer location and card swiping terminal position, or The continuous swiping card for inputing password by mistake, it is automatic to capture swiping card user picture;
And pursue and capture an escaped prisoner and pay close attention on the net demographic data storehouse with public security organ using artificial intelligence identification technology and matched, Alarmed automatically to location public security organ for suspicion personnel;
Day net camera is transferred by Ministry of Public Security's Skynet system and shoots escape photo and alignment system positioning, can be real-time Accurate geographic position information is shown, path of escaping is depicted, to assist the police to be accurate to rapidly up to the site of the accident.
The invention provides a kind of method that registration card transaction illegal activities are docked with Skynet system, methods described mainly relates to And bank card transaction system, bank card system database, common carrier Location Service Platform, bank's card management platform, information Service system, cryptographic service system, artificial intelligence identifying system and Police Video Supervision System and Ministry of Public Security's Skynet system, determine Position system;Methods described mainly comprises the following steps:
Step 1:When bank's cardholder carries out bankcard consumption by payment terminal, by being arranged on the payment terminal On alignment system it is positioned, determine region A, and location information is uploaded to bank's card management platform;
Step 2:Bank card transaction system obtains Transaction Information, identifies bank card account number, and pass through bank card system data Read the reserved phone number and other related informations of bank card account number binding in storehouse;
Step 3:Common carrier Location Service Platform positions to the reserved phone number read in step 2, it is determined that Region B, bank's card management platform obtain location information;
Step 4:Judge whether region A and region B belongs to the same area, when region A and region B belongs to the same area, Then swipe the card success, 5 are gone to step when region A and region B is not belonging to the same area;
Step 5:By bank's card management platform recalls information service system, edit and send the SMS to the mobile phone of user, Inform that its bank card of user may be stolen brush;
Step 6:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its The stolen brush of bank card, can under the guide of bank's card management platform, by key command deciding whether to allow to swipe the card or Short message is specified to the online alarm center of public security system to realize alarm or freeze to swipe the card by sending;When user allows, its Bank card is swiped the card success, and 7 are gone to step when user does not allow;
Step 7:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its The stolen brush of bank card, can under the guide of bank's card management platform, by key command deciding whether to allow to swipe the card or Realize alarm by sending warning message to the online alarm center of public security system or freeze to swipe the card;When user allows, its Bank card is swiped the card success, and 7 are gone to step when user does not allow;
Step 8:By the teletext transmission of suspect to Police Video Supervision System, Police Video Supervision System interconnection In Ministry of Public Security's Skynet system, to transfer day net camera, the leaving of suspect, photo of escaping are shot;
Step 9:The Police Video Supervision System passes through the photo that photographs the day net camera and suspect Photo is compared, and when the two is not belonging to same people, continues to seek suspect, 10 are gone to step when the two belongs to same people;
Step 10:Police Video Supervision System is by calling Ministry of Public Security's Skynet system, according to the identification knot of day net camera Fruit, automatic control alarm system are reminded and send data to closest policeman's terminal, arrange responding;
Step 11:The particular geographic location of the day net camera of Police Video Supervision System identification alarm, and depict suspicion The leaving of people, path of escaping are doubted, real-time storage and display are carried out, to assist the police to be accurate to rapidly up to the site of the accident.
In order to further optimize above-mentioned technical proposal, step 1 to step 4 can also be substituted with following steps:Work as bank card When holder carries out bankcard consumption by payment terminal, judge bank card password with whether inputting password by cryptographic service system Unanimously, when bank card password is identical with input password, then success of swiping the card, when input password continuous several times and bank card password not Meanwhile then go to step 5.
In order to further optimize above-mentioned technical proposal, the cryptographic service system is used for the password for receiving the payment terminal Input, and judge whether Password Input errors number is more than preset value, it will determine that result is back to the bank card management Platform;Wherein described preset value is the judgement number for continuously inputing password by mistake.
In order to further optimize above-mentioned technical proposal, the artificial intelligence identification in step 7 includes recognition of face, with public security machine Close it is online pursue and capture an escaped prisoner consistent with crowd's face information is paid close attention to, automatic transmission warning message to local public security system is alarmed on the net Center.
In order to further optimize above-mentioned technical proposal, the core processor also includes image processing module, described image Processing module receives the swiping card user picture of the camera shooting, intercepts face-image and sends to the artificial intelligence Identifying system.
In order to further optimize above-mentioned technical proposal, the payment terminal comprises at least:Intelligent mobile terminal, self-help drawing money Machine, POS, get tickets and ticketing machine.
In order to further optimize above-mentioned technical proposal, it is the checking in receipt short message that the holder, which authorizes the mode transferred accounts, Code.
In order to further optimize above-mentioned technical proposal, the alignment system can directly obtain the inherent address of payment terminal Information, a kind of real-time position of positioning payment terminal in LBS, GPS, dipper system, Galileo or GLONASS can also be passed through Put.
Illustrate that a kind of specific workflow of the present invention is as follows with reference to accompanying drawing 1:
Embodiment 1
Step 1:User performs bankcard consumption in payment terminal;
Step 2:Bank card transaction system obtains Transaction Information, identifies bank card account number, and pass through bank card system data Read the reserved phone number and other related informations of bank card account number binding in storehouse;
Step 3:Common carrier Location Service Platform positions to the reserved phone number read in step 2, obtains Region B;And the request for obtaining card swiping terminal geographical location information (region A) is sent to alignment system;
Step 4:Bank's card management platform judges whether region A and region B belongs to the same area, if region A and region B Belong to the same area, then payment terminal prompting swiping card success, and complete swiping card;If region A is not belonging to region B The same area, then by bank's card management platform recalls information service system, edit and send the SMS to the mobile phone of user, inform Its bank card of user may be stolen brush;
Step 5:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its The stolen brush of bank card, can under the guide of bank's card management platform, by key command deciding whether to allow to swipe the card or Short message is specified to the online alarm center of public security system to realize alarm or freeze to swipe the card by sending;If user allows, its Bank card is swiped the card success.
Embodiment 2
A kind of method that registration card transaction illegal activities are docked with Skynet system as described in Example 1, in steps of 5, If user does not allow to swipe the card, payment terminal captures the photo of suspect by camera automatically, by being arranged on the branch The graph text information and upload for paying the core controller reading suspect of terminal inner are stored to artificial intelligence identifying system, with public security It is machine-operated to pursue and capture an escaped prisoner and pay close attention on the net crowd's progress artificial intelligence identification;If recognition result is consistent, payment terminal is then prompted to brush Card operation failure is simultaneously alarmed from trend public security organ;
Step 6:By the teletext transmission of suspect to Police Video Supervision System, Police Video Supervision System interconnection In Ministry of Public Security's Skynet system, to transfer day net camera, the leaving of suspect, photo of escaping are shot;
Step 7:The Police Video Supervision System passes through the photo that photographs the day net camera and suspect Photo is compared, if the two is not belonging to same people, continues to seek suspect.
Embodiment 3
A kind of registration card that docked with Skynet system is merchandised the methods of illegal activities as described in Example 2, if by public security Machine-operated to pursue and capture an escaped prisoner and pay close attention on the net crowd and the progress artificial intelligence identification of suspect's photo, recognition result is inconsistent, then pays Terminal notifying swiping card fails.
Embodiment 4
A kind of method that registration card transaction illegal activities are docked with Skynet system as described in Example 2, in step 7, The Police Video Supervision System is compared by the photo for photographing the day net camera with the photo of suspect, such as Both fruits belong to same people, then go to step 8;
Step 8:Police Video Supervision System is by calling Ministry of Public Security's Skynet system, according to the identification knot of day net camera Fruit, automatic control alarm system are reminded and send data to closest policeman's terminal, arrange responding;
Step 9:The particular geographic location of the day net camera of Police Video Supervision System identification alarm, and depict suspicion The leaving of people, path of escaping, real-time display is on the mobile phone of the police, to assist the police to be accurate to rapidly up to the site of the accident.
Illustrate that another specific workflow of the present invention is as follows with reference to accompanying drawing 2:
Embodiment 5
Step 1:User performs bankcard consumption in payment terminal;
Step 2:Judge whether bank card password and input password are consistent by cryptographic service system, if bank card password When identical with input password, then payment terminal prompting swiping card success, and complete swiping card;If it is continuously more to input password During secondary and bank card password difference, and judge that continuously inputing password number by mistake is more than preset value by bank's card management platform, then By bank's card management platform recalls information service system, edit and send the SMS to the mobile phone of user, inform its bank of user Card may be stolen brush;
Step 3:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its The stolen brush of bank card, can under the guide of bank's card management platform, by key command deciding whether to allow to swipe the card or Realize alarm by sending warning message to the online alarm center of public security system or freeze to swipe the card;If user allows, its Bank card is swiped the card success.
Embodiment 6
A kind of method that registration card transaction illegal activities are docked with Skynet system as described in Example 5, in step 2, If input password continuous several times with bank card password difference, and password is continuously inputed by mistake by bank's card management platform judgement Number is less than preset value, then bank card is swiped the card success.
Embodiment 7
A kind of method that registration card transaction illegal activities are docked with Skynet system as described in Example 5, in step 3, If user does not allow to swipe the card, payment terminal captures the photo of suspect by camera automatically, by being arranged on the branch The graph text information and upload for paying the core controller reading suspect of terminal inner are stored to artificial intelligence identifying system, with public security It is machine-operated to pursue and capture an escaped prisoner and pay close attention on the net crowd's progress artificial intelligence identification;If recognition result is consistent, payment terminal is then prompted to brush Card operation failure is simultaneously alarmed from trend public security organ;
Step 4:By the teletext transmission of suspect to Police Video Supervision System, Police Video Supervision System interconnection In Ministry of Public Security's Skynet system, to transfer day net camera, the leaving of suspect, photo of escaping are shot;
Step 5:The Police Video Supervision System passes through the photo that photographs the day net camera and suspect Photo is compared, if the two is not belonging to same people, continues to seek suspect.
Embodiment 8
A kind of registration card that docked with Skynet system is merchandised the methods of illegal activities as described in Example 7, if by public security Machine-operated to pursue and capture an escaped prisoner and pay close attention on the net crowd and the progress artificial intelligence identification of suspect's photo, recognition result is inconsistent, then pays Terminal notifying swiping card fails.
Embodiment 9
A kind of method that registration card transaction illegal activities are docked with Skynet system as described in Example 7, in steps of 5, The Police Video Supervision System is compared by the photo for photographing the day net camera with the photo of suspect, such as Both fruits belong to same people, then go to step 6;
Step 6:Police Video Supervision System is by calling Ministry of Public Security's Skynet system, according to the identification knot of day net camera Fruit, automatic control alarm system are reminded and send data to closest policeman's terminal, arrange responding;
Step 7:The particular geographic location of the day net camera of Police Video Supervision System identification alarm, and depict suspicion The leaving of people, path of escaping, real-time display is on the mobile phone of the police, to assist the police to be accurate to rapidly up to the site of the accident.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other The difference of embodiment, between each embodiment identical similar portion mutually referring to.For device disclosed in embodiment For, because it is corresponded to the method disclosed in Example, so description is fairly simple, related part is said referring to method part It is bright.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (9)

  1. A kind of 1. method that registration card transaction illegal activities are docked with Skynet system, it is characterised in that methods described relates generally to Bank card transaction system, bank card system database, common carrier Location Service Platform, bank's card management platform, information clothes Business system, cryptographic service system, artificial intelligence identifying system and Police Video Supervision System and Ministry of Public Security's Skynet system, positioning System;Methods described mainly comprises the following steps:
    Step 1:When bank's cardholder carries out bankcard consumption by payment terminal, by being arranged in the payment terminal Alignment system positions to it, determines region A, and location information is uploaded into bank's card management platform;
    Step 2:Bank card transaction system obtains Transaction Information, identifies bank card account number, and read by bank card system database The reserved phone number and other related informations for taking bank card account number to bind;
    Step 3:Common carrier Location Service Platform positions to the reserved phone number read in step 2, determines region B, bank's card management platform obtain location information;
    Step 4:Judge whether region A and region B belongs to the same area, when region A and region B belongs to the same area, then brush Block successfully, 5 are gone to step when region A and region B is not belonging to the same area;
    Step 5:By bank's card management platform recalls information service system, edit and send prompt message to the mobile phone of user, Inform that its bank card of user may be stolen brush;
    Step 6:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its bank The stolen brush of card, can be swiped the card or passed through to decide whether to allow by key command under the guide of bank's card management platform Warning message is sent to alarm to realize to the online alarm center of public security system or freeze to swipe the card;When user allows, its silver Row card is swiped the card success, and 7 are gone to step when user does not allow;
    Step 7:Payment terminal captures the photo of suspect by camera automatically, by being arranged on inside the payment terminal Core controller reads the graph text information of suspect and upload is stored to artificial intelligence identifying system, is pursued and captured an escaped prisoner on the net with public security organ Artificial intelligence identification is carried out with the crowd that pays close attention to;Recognition result is consistent, then prompts swiping card failure and from trend public security machine Alarm is closed, goes to step 8;Recognition result is inconsistent, then prompts swiping card failure;
    Step 8:By the teletext transmission of suspect to Police Video Supervision System, the Police Video Supervision System is mutually coupled to public affairs Peace portion Skynet system, to transfer day net camera, shoot the leaving of suspect, photo of escaping;
    Step 9:The Police Video Supervision System passes through the photo for photographing the day net camera and the photo of suspect It is compared, when the two is not belonging to same people, continues to seek suspect, 10 are gone to step when the two belongs to same people;
    Step 10:Police Video Supervision System is by calling Ministry of Public Security's Skynet system, according to the recognition result of day net camera, from Dynamic control warning system is reminded and sends data to closest policeman's terminal, arranges responding;
    Step 11:The particular geographic location of the day net camera of Police Video Supervision System identification alarm, according to the ground of camera Position is managed, depicts the leaving of suspect, path of escaping, real-time storage and display is carried out, is reached with assisting the police to be accurate to rapidly The site of the accident.
  2. 2. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In step 1 to step 4 can also be substituted with following steps:When bank's cardholder carries out bankcard consumption by payment terminal, Judge whether bank card password and input password are consistent by cryptographic service system, when bank card password is identical with input password When, then success of swiping the card, when inputting password continuous several times with bank card password difference, then go to step 5.
  3. 3. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 2, its feature exist In the cryptographic service system is used for the Password Input for receiving the payment terminal, and whether judges Password Input errors number More than preset value, it will determine that result is back to bank's card management platform;Wherein described preset value is continuous defeated The judgement number of wrong password.
  4. 4. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In the artificial intelligence identification in step 7 includes recognition of face, pursues and captures an escaped prisoner and pay close attention on the net crowd's face information with public security organ The consistent then automatic warning message that sends is to the online alarm center of local public security system.
  5. 5. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In the core processor also includes image processing module, and described image processing module receives swiping the card for the camera shooting User picture is operated, face-image is intercepted and sends to the artificial intelligence identifying system.
  6. 6. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In the payment terminal comprises at least:Intelligent mobile terminal, self-help drawing money machine, POS, get tickets and ticketing machine.
  7. 7. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In it is the identifying code in receipt short message that the holder, which authorizes the mode transferred accounts,.
  8. 8. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In, the alignment system can directly obtain the inherent address information of payment terminal, can also by LBS, GPS, dipper system, The real time position of Galileo or a kind of positioning payment terminal in GLONASS.
  9. 9. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In the bank card includes but is not limited to entity bank card, virtual electronic bank card.
CN201711059354.3A 2017-11-01 2017-11-01 A kind of method that registration card transaction illegal activities are docked with Skynet system Pending CN107833033A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711059354.3A CN107833033A (en) 2017-11-01 2017-11-01 A kind of method that registration card transaction illegal activities are docked with Skynet system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711059354.3A CN107833033A (en) 2017-11-01 2017-11-01 A kind of method that registration card transaction illegal activities are docked with Skynet system

Publications (1)

Publication Number Publication Date
CN107833033A true CN107833033A (en) 2018-03-23

Family

ID=61650370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711059354.3A Pending CN107833033A (en) 2017-11-01 2017-11-01 A kind of method that registration card transaction illegal activities are docked with Skynet system

Country Status (1)

Country Link
CN (1) CN107833033A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109783822A (en) * 2019-01-24 2019-05-21 中国—东盟信息港股份有限公司 A kind of data sample identifying system and its method based on identifying code
CN111047896A (en) * 2019-12-24 2020-04-21 新疆联海创智信息科技有限公司 Comprehensive management system for police station
TWI693570B (en) * 2018-03-29 2020-05-11 兆豐國際商業銀行股份有限公司 System and method of transaction using credit card
CN111582868A (en) * 2020-05-26 2020-08-25 支付宝(杭州)信息技术有限公司 Transaction request processing method, device and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588577A (en) * 2008-05-19 2009-11-25 罗邵波 Safe system and method for bank transaction system
CN103246869A (en) * 2013-04-19 2013-08-14 福建亿榕信息技术有限公司 Crime monitoring method based on face recognition technology and behavior and sound recognition
CN103903207A (en) * 2012-12-27 2014-07-02 重庆凯泽科技有限公司 Dynamic portrait real-time networking monitoring recognition system
CN205016014U (en) * 2015-09-23 2016-02-03 北京天河地塬安防技术服务有限公司 Safety monitoring alarm system of bank
US20160042346A1 (en) * 2014-08-11 2016-02-11 Mastercard International Incorporated Systems and methods for performing payment card transactions using a wearable computing device
CN106157033A (en) * 2015-03-25 2016-11-23 深圳位置网科技有限公司 A kind of bank card (credit card and debit card) illegal method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588577A (en) * 2008-05-19 2009-11-25 罗邵波 Safe system and method for bank transaction system
CN103903207A (en) * 2012-12-27 2014-07-02 重庆凯泽科技有限公司 Dynamic portrait real-time networking monitoring recognition system
CN103246869A (en) * 2013-04-19 2013-08-14 福建亿榕信息技术有限公司 Crime monitoring method based on face recognition technology and behavior and sound recognition
US20160042346A1 (en) * 2014-08-11 2016-02-11 Mastercard International Incorporated Systems and methods for performing payment card transactions using a wearable computing device
CN106157033A (en) * 2015-03-25 2016-11-23 深圳位置网科技有限公司 A kind of bank card (credit card and debit card) illegal method and system
CN205016014U (en) * 2015-09-23 2016-02-03 北京天河地塬安防技术服务有限公司 Safety monitoring alarm system of bank

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郎江涛: ""公安***天网工程瓶颈及未来展望"", 《科技与创新》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI693570B (en) * 2018-03-29 2020-05-11 兆豐國際商業銀行股份有限公司 System and method of transaction using credit card
CN109783822A (en) * 2019-01-24 2019-05-21 中国—东盟信息港股份有限公司 A kind of data sample identifying system and its method based on identifying code
CN109783822B (en) * 2019-01-24 2023-04-18 中国—东盟信息港股份有限公司 Data sample identification system and method based on verification code
CN111047896A (en) * 2019-12-24 2020-04-21 新疆联海创智信息科技有限公司 Comprehensive management system for police station
CN111582868A (en) * 2020-05-26 2020-08-25 支付宝(杭州)信息技术有限公司 Transaction request processing method, device and equipment

Similar Documents

Publication Publication Date Title
US10861012B2 (en) System and method for secure transactions at a mobile device
US8285648B2 (en) System and method for verifying a user's identity in electronic transactions
TWI508007B (en) Secure electronic payment system and process
CN107833033A (en) A kind of method that registration card transaction illegal activities are docked with Skynet system
CN103530772A (en) Mobile interaction payment risk control method and system
CN104574052B (en) The method of payment and system of authentication are carried out based on 3D line holographic projections
JP5865550B1 (en) Card verification system, card unauthorized use detection method, and card unauthorized use detection program
US20140188639A1 (en) Security Swipe System
CN106504086A (en) A kind of method and bank account system for protecting bank account safety
JP2005122266A (en) System and method for card-usage transaction processing, and program for card-usage transaction processing
CN106651347A (en) Telecommunication fraud and theft preventive financial trading system and the trading method thereof
JP2010072989A (en) Integrated management system of electronic journal and video
CN107862601B (en) Cash withdrawal method and system with automatic positioning alarm function
CN206312231U (en) A kind of bank account system
CN114945167A (en) Method for realizing offline interaction between mobile phone and SIM card data and remote supervision control method
EP3879478A1 (en) A method, computer program and apparatus
JP5010305B2 (en) Unauthorized transaction prevention system with counterfeit card, facility terminal monitoring server, ATM monitoring server, ATM monitoring method, program
CN105118191B (en) Withdrawal method with the automatic teller machine of encryption function and the automatic teller machine
KR100877014B1 (en) Automatic teller machine
JP2019106003A (en) Terminal device, automatic teller machine, transfer processing method, and program
TWI793494B (en) Automatic teller machine warning system with photography function
Stempien ATM Skimming in the Era of the EMV Chip Card
JP2005157707A (en) Automated teller machine
TWM646194U (en) Real-time image capturing notification system of automatic teller machine
RU2022116949A (en) SYSTEM AND METHOD FOR PROTECTION AGAINST FUNDS THEFT WHEN CONTACT AND CONTACTLESS PAYMENT FROM A BANK CARD

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180323