CN107833033A - A kind of method that registration card transaction illegal activities are docked with Skynet system - Google Patents
A kind of method that registration card transaction illegal activities are docked with Skynet system Download PDFInfo
- Publication number
- CN107833033A CN107833033A CN201711059354.3A CN201711059354A CN107833033A CN 107833033 A CN107833033 A CN 107833033A CN 201711059354 A CN201711059354 A CN 201711059354A CN 107833033 A CN107833033 A CN 107833033A
- Authority
- CN
- China
- Prior art keywords
- card
- bank
- skynet
- docked
- suspect
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of method that registration card transaction illegal activities are docked with Skynet system, methods described comprises at least following steps:The geographical location information of payment terminal is obtained, and location matches are carried out with particular geographic location where the Mobile phone card of bank card binding;Judge whether the two belongs to the same area;Judge whether continuous several times input password by mistake to user;Crowd's progress artificial intelligence identification is pursued and captured an escaped prisoner and paid close attention on the net to automatic suspect's photo of swiping the card of capturing with public security organ;Recognition result is inconsistent, then prompts swiping card failure;Recognition result is consistent, then prompts swiping card failure and alarmed from trend public security organ;Ministry of Public Security's Skynet system transfers day net camera and shoots photo of escaping, and is compared with suspect's photo;Consistent, alignment system positioning is compared, identification of geographic location simultaneously describes path of escaping.The present invention can not only improve relation between the police and the people, effectively ensure the fund security of holder, and help to safeguard that social harmony is stable.
Description
Technical field
The present invention relates to consumption and payment technical field, more particularly to one kind docks registration card friendship with Skynet system
The method of easy illegal activities.
Background technology
With the popularity more and more higher of bank card, bank card means of payment are also increasing, paid using bank card
It is not only simple to operate, and the trouble of small change is eliminated, but bank card can also attach while being brought convenience to holder
Many risks.In fact, with the raising of bank card popularization degree, the stolen brush of relevant bank card has increasing nothing with the legal dispute replicated
Subtract.
Typical bank card is stolen brush case at present, is generally realized by duplication bank card magnetic strip information, stealing passwords
Steal-replicate-steal brush-arbitrage.Replicating the exemplary means of magnetic strip information includes bank card loss or is stolen, and then by not
Method molecule replicates magnetic strip information, or card device is stolen in installation on the card inserting mouth of ATM.Suspect utilizes these information
Bank card is cloned to steal the wealth on their bank cards, or steals user terminal data, obtains virtual electronic bank card data,
Realize that bank card information obtains, so as to implement illegal activities by network finance platform.Simultaneously because bank card payment terminal
Authentication mode is single, and proving program does not strictly also provide condition to criminal.
In addition, when holder knows the stolen brush of bank card, even if alarming, rushing to bank in time, suspect also early escapes
Die young, fund is transferred already in card, can not be recovered, and not only brings loss of assets, but also has a strong impact on relation between the police and the people.
Therefore, how a kind of method for the bank card business dealing illegal activities that can effectively solve above-mentioned technical problem is provided,
The problem of being those skilled in the art's urgent need to resolve.
The content of the invention
In view of this, the invention provides a kind of method that registration card transaction illegal activities are docked with Skynet system, prevent
In the case of unwitting, fund is transferred holder, not only improves relation between the police and the people, effectively ensures the fund peace of holder
Entirely, and help to safeguard that social harmony is stable.
To achieve these goals, the present invention adopts the following technical scheme that:
A kind of method that registration card transaction illegal activities are docked with Skynet system, it is characterised in that methods described mainly relates to
And bank card transaction system, bank card system database, common carrier Location Service Platform, bank's card management platform, information
Service system, cryptographic service system, artificial intelligence identifying system and Police Video Supervision System and Ministry of Public Security's Skynet system, determine
Position system;Methods described mainly comprises the following steps:
Step 1:When bank's cardholder carries out bankcard consumption by payment terminal, by being arranged on the payment terminal
On alignment system it is positioned, determine region A, and location information is uploaded to bank's card management platform;
Step 2:Bank card transaction system obtains Transaction Information, identifies bank card account number, and pass through bank card system data
Read the reserved phone number and other related informations of bank card account number binding in storehouse;
Step 3:Common carrier Location Service Platform positions to the reserved phone number read in step 2, it is determined that
Region B, bank's card management platform obtain location information;
Step 4:Judge whether region A and region B belongs to the same area, when region A and region B belongs to the same area,
Then swipe the card success, 5 are gone to step when region A and region B is not belonging to the same area;
Step 5:By bank's card management platform recalls information service system, edit and send prompt message to the hand of user
Machine, inform that its bank card of user may be stolen brush;The form of prompt message includes but is not limited to short message, intelligent sound is reminded, app
Pop-up is reminded, and the diversity of prompting form can be achieved.
Step 6:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its
The stolen brush of bank card, can under the guide of bank's card management platform, by key command deciding whether to allow to swipe the card or
Realize alarm by sending warning message to the online alarm center of public security system or freeze to swipe the card;When user allows, its
Bank card is swiped the card success, and 7 are gone to step when user does not allow;Warning message can also pass through connection by short message sending
The APP for having public security warning system uploads warning message, can also directly dial that 110 alarms etc. are all multi-form to be alarmed.
Step 7:Payment terminal captures the photo of suspect by camera automatically, by being arranged in the payment terminal
The core controller in portion reads the graph text information of suspect and upload is stored to artificial intelligence identifying system, online with public security organ
Pursue and capture an escaped prisoner and pay close attention to crowd and carry out artificial intelligence identification;Recognition result is consistent, then prompts swiping card unsuccessfully and public from trend
The alarm of peace office, goes to step 8;Recognition result is inconsistent, then prompts swiping card failure;
Step 8:By the teletext transmission of suspect to Police Video Supervision System, Police Video Supervision System interconnection
In Ministry of Public Security's Skynet system, to transfer day net camera, the leaving of suspect, photo of escaping are shot;
Step 9:The Police Video Supervision System passes through the photo that photographs the day net camera and suspect
Photo is compared, and when the two is not belonging to same people, continues to seek suspect, 10 are gone to step when the two belongs to same people;
Step 10:Police Video Supervision System is by calling Ministry of Public Security's Skynet system, according to the identification knot of day net camera
Fruit, automatic control alarm system are reminded and send data to closest policeman's terminal, arrange responding;
Step 11:The particular geographic location of the day net camera of Police Video Supervision System identification alarm, and depict suspicion
The leaving of people, path of escaping are doubted, real-time storage and display are carried out, to assist the police to be accurate to rapidly up to the site of the accident.
Specifically, the leaving of suspect, path of escaping can be with real-time displays on the mobile phone of the police, or it is stored in the Ministry of Public Security
Skynet system, realization have access to tracking in real time.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, step 1 to step
4 can also be substituted with following steps:When bank's cardholder carries out bankcard consumption by payment terminal, pass through cryptographic service system
System judges whether bank card password and input password are consistent, when bank card password is identical with input password, then success of swiping the card, when
When inputting password continuous several times with bank card password difference, then 5 are gone to step.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, the password clothes
Business system is used for the Password Input for receiving the payment terminal, and judges whether Password Input errors number is more than and preset
Value, will determine that result is back to bank's card management platform;Wherein described preset value is the judgement for continuously inputing password by mistake
Number.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, the people in step 7
Work Intelligent Recognition includes recognition of face, pursues and captures an escaped prisoner and pay close attention on the net that crowd's face information is consistent then automatic sends with public security organ
Warning message is to the online alarm center of local public security system.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, at the core
Reason device also includes image processing module, and described image processing module receives the swiping card user picture of the camera shooting,
Intercept face-image and send to the artificial intelligence identifying system.
Preferably, it is described to pay eventually in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system
End comprises at least:Intelligent mobile terminal, self-help drawing money machine, POS, get tickets and ticketing machine.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, the holder
It is the identifying code in receipt short message to authorize the mode transferred accounts.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, do not laying
The region of its net monitoring, sound, the collection of video location information data are carried out by the intelligent terminal of alarm people, still can be played
The effect of pre-control is monitored, covers a variety of situations such as indoor positioning, remote mountain areas positioning, the monitoring in day net monitoring system can be made up
Dead angle.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, the bank card
Including but not limited to entity bank card or virtual electronic bank card.Entity bank card is the credit branch of bank and other financial mechanism distribution
Card is paid, virtual electronic bank card is the virtual bank's card account being bundled on mobile phone.
Preferably, it is affiliated to pay eventually in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system
End can be bank card self-aided terminal, for identifying entity bank card;It can also be the smart mobile phone with payment function, be used for
Binding virtual electronic bank account simultaneously realizes mobile-phone payment.
Preferably, in a kind of above-mentioned method that registration card transaction illegal activities are docked with Skynet system, the positioning system
System can directly obtain the inherent address information of payment terminal, can also by LBS, GPS, dipper system, Galileo or
A kind of real time position of positioning payment terminal in GLONASS.
Understood via above-mentioned technical scheme, compared with prior art, the present disclosure provides a kind of and Skynet system
The method for docking registration card transaction illegal activities, can largely prevent bank card from stealing brush by other people, to the full extent
The interests and property safety of user are protected, has prevented the phenomenon generation that bank card steals brush, has favorably ensured social financial order
Ground is normally carried out.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 accompanying drawings are a kind of flow chart that registration card transaction illegal activities method is docked with Skynet system of the present invention.
Fig. 2 accompanying drawings are another flow chart that registration card transaction illegal activities method is docked with Skynet system of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of method for docking with Skynet system registration card transaction illegal activities, by using
The mode of multi-party verification swiping card user identity, is seriously mismatched to swiping card customer location and card swiping terminal position, or
The continuous swiping card for inputing password by mistake, it is automatic to capture swiping card user picture;
And pursue and capture an escaped prisoner and pay close attention on the net demographic data storehouse with public security organ using artificial intelligence identification technology and matched,
Alarmed automatically to location public security organ for suspicion personnel;
Day net camera is transferred by Ministry of Public Security's Skynet system and shoots escape photo and alignment system positioning, can be real-time
Accurate geographic position information is shown, path of escaping is depicted, to assist the police to be accurate to rapidly up to the site of the accident.
The invention provides a kind of method that registration card transaction illegal activities are docked with Skynet system, methods described mainly relates to
And bank card transaction system, bank card system database, common carrier Location Service Platform, bank's card management platform, information
Service system, cryptographic service system, artificial intelligence identifying system and Police Video Supervision System and Ministry of Public Security's Skynet system, determine
Position system;Methods described mainly comprises the following steps:
Step 1:When bank's cardholder carries out bankcard consumption by payment terminal, by being arranged on the payment terminal
On alignment system it is positioned, determine region A, and location information is uploaded to bank's card management platform;
Step 2:Bank card transaction system obtains Transaction Information, identifies bank card account number, and pass through bank card system data
Read the reserved phone number and other related informations of bank card account number binding in storehouse;
Step 3:Common carrier Location Service Platform positions to the reserved phone number read in step 2, it is determined that
Region B, bank's card management platform obtain location information;
Step 4:Judge whether region A and region B belongs to the same area, when region A and region B belongs to the same area,
Then swipe the card success, 5 are gone to step when region A and region B is not belonging to the same area;
Step 5:By bank's card management platform recalls information service system, edit and send the SMS to the mobile phone of user,
Inform that its bank card of user may be stolen brush;
Step 6:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its
The stolen brush of bank card, can under the guide of bank's card management platform, by key command deciding whether to allow to swipe the card or
Short message is specified to the online alarm center of public security system to realize alarm or freeze to swipe the card by sending;When user allows, its
Bank card is swiped the card success, and 7 are gone to step when user does not allow;
Step 7:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its
The stolen brush of bank card, can under the guide of bank's card management platform, by key command deciding whether to allow to swipe the card or
Realize alarm by sending warning message to the online alarm center of public security system or freeze to swipe the card;When user allows, its
Bank card is swiped the card success, and 7 are gone to step when user does not allow;
Step 8:By the teletext transmission of suspect to Police Video Supervision System, Police Video Supervision System interconnection
In Ministry of Public Security's Skynet system, to transfer day net camera, the leaving of suspect, photo of escaping are shot;
Step 9:The Police Video Supervision System passes through the photo that photographs the day net camera and suspect
Photo is compared, and when the two is not belonging to same people, continues to seek suspect, 10 are gone to step when the two belongs to same people;
Step 10:Police Video Supervision System is by calling Ministry of Public Security's Skynet system, according to the identification knot of day net camera
Fruit, automatic control alarm system are reminded and send data to closest policeman's terminal, arrange responding;
Step 11:The particular geographic location of the day net camera of Police Video Supervision System identification alarm, and depict suspicion
The leaving of people, path of escaping are doubted, real-time storage and display are carried out, to assist the police to be accurate to rapidly up to the site of the accident.
In order to further optimize above-mentioned technical proposal, step 1 to step 4 can also be substituted with following steps:Work as bank card
When holder carries out bankcard consumption by payment terminal, judge bank card password with whether inputting password by cryptographic service system
Unanimously, when bank card password is identical with input password, then success of swiping the card, when input password continuous several times and bank card password not
Meanwhile then go to step 5.
In order to further optimize above-mentioned technical proposal, the cryptographic service system is used for the password for receiving the payment terminal
Input, and judge whether Password Input errors number is more than preset value, it will determine that result is back to the bank card management
Platform;Wherein described preset value is the judgement number for continuously inputing password by mistake.
In order to further optimize above-mentioned technical proposal, the artificial intelligence identification in step 7 includes recognition of face, with public security machine
Close it is online pursue and capture an escaped prisoner consistent with crowd's face information is paid close attention to, automatic transmission warning message to local public security system is alarmed on the net
Center.
In order to further optimize above-mentioned technical proposal, the core processor also includes image processing module, described image
Processing module receives the swiping card user picture of the camera shooting, intercepts face-image and sends to the artificial intelligence
Identifying system.
In order to further optimize above-mentioned technical proposal, the payment terminal comprises at least:Intelligent mobile terminal, self-help drawing money
Machine, POS, get tickets and ticketing machine.
In order to further optimize above-mentioned technical proposal, it is the checking in receipt short message that the holder, which authorizes the mode transferred accounts,
Code.
In order to further optimize above-mentioned technical proposal, the alignment system can directly obtain the inherent address of payment terminal
Information, a kind of real-time position of positioning payment terminal in LBS, GPS, dipper system, Galileo or GLONASS can also be passed through
Put.
Illustrate that a kind of specific workflow of the present invention is as follows with reference to accompanying drawing 1:
Embodiment 1
Step 1:User performs bankcard consumption in payment terminal;
Step 2:Bank card transaction system obtains Transaction Information, identifies bank card account number, and pass through bank card system data
Read the reserved phone number and other related informations of bank card account number binding in storehouse;
Step 3:Common carrier Location Service Platform positions to the reserved phone number read in step 2, obtains
Region B;And the request for obtaining card swiping terminal geographical location information (region A) is sent to alignment system;
Step 4:Bank's card management platform judges whether region A and region B belongs to the same area, if region A and region B
Belong to the same area, then payment terminal prompting swiping card success, and complete swiping card;If region A is not belonging to region B
The same area, then by bank's card management platform recalls information service system, edit and send the SMS to the mobile phone of user, inform
Its bank card of user may be stolen brush;
Step 5:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its
The stolen brush of bank card, can under the guide of bank's card management platform, by key command deciding whether to allow to swipe the card or
Short message is specified to the online alarm center of public security system to realize alarm or freeze to swipe the card by sending;If user allows, its
Bank card is swiped the card success.
Embodiment 2
A kind of method that registration card transaction illegal activities are docked with Skynet system as described in Example 1, in steps of 5,
If user does not allow to swipe the card, payment terminal captures the photo of suspect by camera automatically, by being arranged on the branch
The graph text information and upload for paying the core controller reading suspect of terminal inner are stored to artificial intelligence identifying system, with public security
It is machine-operated to pursue and capture an escaped prisoner and pay close attention on the net crowd's progress artificial intelligence identification;If recognition result is consistent, payment terminal is then prompted to brush
Card operation failure is simultaneously alarmed from trend public security organ;
Step 6:By the teletext transmission of suspect to Police Video Supervision System, Police Video Supervision System interconnection
In Ministry of Public Security's Skynet system, to transfer day net camera, the leaving of suspect, photo of escaping are shot;
Step 7:The Police Video Supervision System passes through the photo that photographs the day net camera and suspect
Photo is compared, if the two is not belonging to same people, continues to seek suspect.
Embodiment 3
A kind of registration card that docked with Skynet system is merchandised the methods of illegal activities as described in Example 2, if by public security
Machine-operated to pursue and capture an escaped prisoner and pay close attention on the net crowd and the progress artificial intelligence identification of suspect's photo, recognition result is inconsistent, then pays
Terminal notifying swiping card fails.
Embodiment 4
A kind of method that registration card transaction illegal activities are docked with Skynet system as described in Example 2, in step 7,
The Police Video Supervision System is compared by the photo for photographing the day net camera with the photo of suspect, such as
Both fruits belong to same people, then go to step 8;
Step 8:Police Video Supervision System is by calling Ministry of Public Security's Skynet system, according to the identification knot of day net camera
Fruit, automatic control alarm system are reminded and send data to closest policeman's terminal, arrange responding;
Step 9:The particular geographic location of the day net camera of Police Video Supervision System identification alarm, and depict suspicion
The leaving of people, path of escaping, real-time display is on the mobile phone of the police, to assist the police to be accurate to rapidly up to the site of the accident.
Illustrate that another specific workflow of the present invention is as follows with reference to accompanying drawing 2:
Embodiment 5
Step 1:User performs bankcard consumption in payment terminal;
Step 2:Judge whether bank card password and input password are consistent by cryptographic service system, if bank card password
When identical with input password, then payment terminal prompting swiping card success, and complete swiping card;If it is continuously more to input password
During secondary and bank card password difference, and judge that continuously inputing password number by mistake is more than preset value by bank's card management platform, then
By bank's card management platform recalls information service system, edit and send the SMS to the mobile phone of user, inform its bank of user
Card may be stolen brush;
Step 3:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its
The stolen brush of bank card, can under the guide of bank's card management platform, by key command deciding whether to allow to swipe the card or
Realize alarm by sending warning message to the online alarm center of public security system or freeze to swipe the card;If user allows, its
Bank card is swiped the card success.
Embodiment 6
A kind of method that registration card transaction illegal activities are docked with Skynet system as described in Example 5, in step 2,
If input password continuous several times with bank card password difference, and password is continuously inputed by mistake by bank's card management platform judgement
Number is less than preset value, then bank card is swiped the card success.
Embodiment 7
A kind of method that registration card transaction illegal activities are docked with Skynet system as described in Example 5, in step 3,
If user does not allow to swipe the card, payment terminal captures the photo of suspect by camera automatically, by being arranged on the branch
The graph text information and upload for paying the core controller reading suspect of terminal inner are stored to artificial intelligence identifying system, with public security
It is machine-operated to pursue and capture an escaped prisoner and pay close attention on the net crowd's progress artificial intelligence identification;If recognition result is consistent, payment terminal is then prompted to brush
Card operation failure is simultaneously alarmed from trend public security organ;
Step 4:By the teletext transmission of suspect to Police Video Supervision System, Police Video Supervision System interconnection
In Ministry of Public Security's Skynet system, to transfer day net camera, the leaving of suspect, photo of escaping are shot;
Step 5:The Police Video Supervision System passes through the photo that photographs the day net camera and suspect
Photo is compared, if the two is not belonging to same people, continues to seek suspect.
Embodiment 8
A kind of registration card that docked with Skynet system is merchandised the methods of illegal activities as described in Example 7, if by public security
Machine-operated to pursue and capture an escaped prisoner and pay close attention on the net crowd and the progress artificial intelligence identification of suspect's photo, recognition result is inconsistent, then pays
Terminal notifying swiping card fails.
Embodiment 9
A kind of method that registration card transaction illegal activities are docked with Skynet system as described in Example 7, in steps of 5,
The Police Video Supervision System is compared by the photo for photographing the day net camera with the photo of suspect, such as
Both fruits belong to same people, then go to step 6;
Step 6:Police Video Supervision System is by calling Ministry of Public Security's Skynet system, according to the identification knot of day net camera
Fruit, automatic control alarm system are reminded and send data to closest policeman's terminal, arrange responding;
Step 7:The particular geographic location of the day net camera of Police Video Supervision System identification alarm, and depict suspicion
The leaving of people, path of escaping, real-time display is on the mobile phone of the police, to assist the police to be accurate to rapidly up to the site of the accident.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other
The difference of embodiment, between each embodiment identical similar portion mutually referring to.For device disclosed in embodiment
For, because it is corresponded to the method disclosed in Example, so description is fairly simple, related part is said referring to method part
It is bright.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention.
A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The most wide scope caused.
Claims (9)
- A kind of 1. method that registration card transaction illegal activities are docked with Skynet system, it is characterised in that methods described relates generally to Bank card transaction system, bank card system database, common carrier Location Service Platform, bank's card management platform, information clothes Business system, cryptographic service system, artificial intelligence identifying system and Police Video Supervision System and Ministry of Public Security's Skynet system, positioning System;Methods described mainly comprises the following steps:Step 1:When bank's cardholder carries out bankcard consumption by payment terminal, by being arranged in the payment terminal Alignment system positions to it, determines region A, and location information is uploaded into bank's card management platform;Step 2:Bank card transaction system obtains Transaction Information, identifies bank card account number, and read by bank card system database The reserved phone number and other related informations for taking bank card account number to bind;Step 3:Common carrier Location Service Platform positions to the reserved phone number read in step 2, determines region B, bank's card management platform obtain location information;Step 4:Judge whether region A and region B belongs to the same area, when region A and region B belongs to the same area, then brush Block successfully, 5 are gone to step when region A and region B is not belonging to the same area;Step 5:By bank's card management platform recalls information service system, edit and send prompt message to the mobile phone of user, Inform that its bank card of user may be stolen brush;Step 6:User is authorized by sending the short message specified to bank's card management platform with realizing, if the user find that its bank The stolen brush of card, can be swiped the card or passed through to decide whether to allow by key command under the guide of bank's card management platform Warning message is sent to alarm to realize to the online alarm center of public security system or freeze to swipe the card;When user allows, its silver Row card is swiped the card success, and 7 are gone to step when user does not allow;Step 7:Payment terminal captures the photo of suspect by camera automatically, by being arranged on inside the payment terminal Core controller reads the graph text information of suspect and upload is stored to artificial intelligence identifying system, is pursued and captured an escaped prisoner on the net with public security organ Artificial intelligence identification is carried out with the crowd that pays close attention to;Recognition result is consistent, then prompts swiping card failure and from trend public security machine Alarm is closed, goes to step 8;Recognition result is inconsistent, then prompts swiping card failure;Step 8:By the teletext transmission of suspect to Police Video Supervision System, the Police Video Supervision System is mutually coupled to public affairs Peace portion Skynet system, to transfer day net camera, shoot the leaving of suspect, photo of escaping;Step 9:The Police Video Supervision System passes through the photo for photographing the day net camera and the photo of suspect It is compared, when the two is not belonging to same people, continues to seek suspect, 10 are gone to step when the two belongs to same people;Step 10:Police Video Supervision System is by calling Ministry of Public Security's Skynet system, according to the recognition result of day net camera, from Dynamic control warning system is reminded and sends data to closest policeman's terminal, arranges responding;Step 11:The particular geographic location of the day net camera of Police Video Supervision System identification alarm, according to the ground of camera Position is managed, depicts the leaving of suspect, path of escaping, real-time storage and display is carried out, is reached with assisting the police to be accurate to rapidly The site of the accident.
- 2. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In step 1 to step 4 can also be substituted with following steps:When bank's cardholder carries out bankcard consumption by payment terminal, Judge whether bank card password and input password are consistent by cryptographic service system, when bank card password is identical with input password When, then success of swiping the card, when inputting password continuous several times with bank card password difference, then go to step 5.
- 3. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 2, its feature exist In the cryptographic service system is used for the Password Input for receiving the payment terminal, and whether judges Password Input errors number More than preset value, it will determine that result is back to bank's card management platform;Wherein described preset value is continuous defeated The judgement number of wrong password.
- 4. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In the artificial intelligence identification in step 7 includes recognition of face, pursues and captures an escaped prisoner and pay close attention on the net crowd's face information with public security organ The consistent then automatic warning message that sends is to the online alarm center of local public security system.
- 5. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In the core processor also includes image processing module, and described image processing module receives swiping the card for the camera shooting User picture is operated, face-image is intercepted and sends to the artificial intelligence identifying system.
- 6. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In the payment terminal comprises at least:Intelligent mobile terminal, self-help drawing money machine, POS, get tickets and ticketing machine.
- 7. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In it is the identifying code in receipt short message that the holder, which authorizes the mode transferred accounts,.
- 8. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In, the alignment system can directly obtain the inherent address information of payment terminal, can also by LBS, GPS, dipper system, The real time position of Galileo or a kind of positioning payment terminal in GLONASS.
- 9. a kind of method that registration card transaction illegal activities are docked with Skynet system according to claim 1, its feature exist In the bank card includes but is not limited to entity bank card, virtual electronic bank card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711059354.3A CN107833033A (en) | 2017-11-01 | 2017-11-01 | A kind of method that registration card transaction illegal activities are docked with Skynet system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711059354.3A CN107833033A (en) | 2017-11-01 | 2017-11-01 | A kind of method that registration card transaction illegal activities are docked with Skynet system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107833033A true CN107833033A (en) | 2018-03-23 |
Family
ID=61650370
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711059354.3A Pending CN107833033A (en) | 2017-11-01 | 2017-11-01 | A kind of method that registration card transaction illegal activities are docked with Skynet system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107833033A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109783822A (en) * | 2019-01-24 | 2019-05-21 | 中国—东盟信息港股份有限公司 | A kind of data sample identifying system and its method based on identifying code |
CN111047896A (en) * | 2019-12-24 | 2020-04-21 | 新疆联海创智信息科技有限公司 | Comprehensive management system for police station |
TWI693570B (en) * | 2018-03-29 | 2020-05-11 | 兆豐國際商業銀行股份有限公司 | System and method of transaction using credit card |
CN111582868A (en) * | 2020-05-26 | 2020-08-25 | 支付宝(杭州)信息技术有限公司 | Transaction request processing method, device and equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101588577A (en) * | 2008-05-19 | 2009-11-25 | 罗邵波 | Safe system and method for bank transaction system |
CN103246869A (en) * | 2013-04-19 | 2013-08-14 | 福建亿榕信息技术有限公司 | Crime monitoring method based on face recognition technology and behavior and sound recognition |
CN103903207A (en) * | 2012-12-27 | 2014-07-02 | 重庆凯泽科技有限公司 | Dynamic portrait real-time networking monitoring recognition system |
CN205016014U (en) * | 2015-09-23 | 2016-02-03 | 北京天河地塬安防技术服务有限公司 | Safety monitoring alarm system of bank |
US20160042346A1 (en) * | 2014-08-11 | 2016-02-11 | Mastercard International Incorporated | Systems and methods for performing payment card transactions using a wearable computing device |
CN106157033A (en) * | 2015-03-25 | 2016-11-23 | 深圳位置网科技有限公司 | A kind of bank card (credit card and debit card) illegal method and system |
-
2017
- 2017-11-01 CN CN201711059354.3A patent/CN107833033A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101588577A (en) * | 2008-05-19 | 2009-11-25 | 罗邵波 | Safe system and method for bank transaction system |
CN103903207A (en) * | 2012-12-27 | 2014-07-02 | 重庆凯泽科技有限公司 | Dynamic portrait real-time networking monitoring recognition system |
CN103246869A (en) * | 2013-04-19 | 2013-08-14 | 福建亿榕信息技术有限公司 | Crime monitoring method based on face recognition technology and behavior and sound recognition |
US20160042346A1 (en) * | 2014-08-11 | 2016-02-11 | Mastercard International Incorporated | Systems and methods for performing payment card transactions using a wearable computing device |
CN106157033A (en) * | 2015-03-25 | 2016-11-23 | 深圳位置网科技有限公司 | A kind of bank card (credit card and debit card) illegal method and system |
CN205016014U (en) * | 2015-09-23 | 2016-02-03 | 北京天河地塬安防技术服务有限公司 | Safety monitoring alarm system of bank |
Non-Patent Citations (1)
Title |
---|
郎江涛: ""公安***天网工程瓶颈及未来展望"", 《科技与创新》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI693570B (en) * | 2018-03-29 | 2020-05-11 | 兆豐國際商業銀行股份有限公司 | System and method of transaction using credit card |
CN109783822A (en) * | 2019-01-24 | 2019-05-21 | 中国—东盟信息港股份有限公司 | A kind of data sample identifying system and its method based on identifying code |
CN109783822B (en) * | 2019-01-24 | 2023-04-18 | 中国—东盟信息港股份有限公司 | Data sample identification system and method based on verification code |
CN111047896A (en) * | 2019-12-24 | 2020-04-21 | 新疆联海创智信息科技有限公司 | Comprehensive management system for police station |
CN111582868A (en) * | 2020-05-26 | 2020-08-25 | 支付宝(杭州)信息技术有限公司 | Transaction request processing method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10861012B2 (en) | System and method for secure transactions at a mobile device | |
US8285648B2 (en) | System and method for verifying a user's identity in electronic transactions | |
TWI508007B (en) | Secure electronic payment system and process | |
CN107833033A (en) | A kind of method that registration card transaction illegal activities are docked with Skynet system | |
CN103530772A (en) | Mobile interaction payment risk control method and system | |
CN104574052B (en) | The method of payment and system of authentication are carried out based on 3D line holographic projections | |
JP5865550B1 (en) | Card verification system, card unauthorized use detection method, and card unauthorized use detection program | |
US20140188639A1 (en) | Security Swipe System | |
CN106504086A (en) | A kind of method and bank account system for protecting bank account safety | |
JP2005122266A (en) | System and method for card-usage transaction processing, and program for card-usage transaction processing | |
CN106651347A (en) | Telecommunication fraud and theft preventive financial trading system and the trading method thereof | |
JP2010072989A (en) | Integrated management system of electronic journal and video | |
CN107862601B (en) | Cash withdrawal method and system with automatic positioning alarm function | |
CN206312231U (en) | A kind of bank account system | |
CN114945167A (en) | Method for realizing offline interaction between mobile phone and SIM card data and remote supervision control method | |
EP3879478A1 (en) | A method, computer program and apparatus | |
JP5010305B2 (en) | Unauthorized transaction prevention system with counterfeit card, facility terminal monitoring server, ATM monitoring server, ATM monitoring method, program | |
CN105118191B (en) | Withdrawal method with the automatic teller machine of encryption function and the automatic teller machine | |
KR100877014B1 (en) | Automatic teller machine | |
JP2019106003A (en) | Terminal device, automatic teller machine, transfer processing method, and program | |
TWI793494B (en) | Automatic teller machine warning system with photography function | |
Stempien | ATM Skimming in the Era of the EMV Chip Card | |
JP2005157707A (en) | Automated teller machine | |
TWM646194U (en) | Real-time image capturing notification system of automatic teller machine | |
RU2022116949A (en) | SYSTEM AND METHOD FOR PROTECTION AGAINST FUNDS THEFT WHEN CONTACT AND CONTACTLESS PAYMENT FROM A BANK CARD |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180323 |