CN111047437A - Credit card quota method and device - Google Patents

Credit card quota method and device Download PDF

Info

Publication number
CN111047437A
CN111047437A CN202010000587.1A CN202010000587A CN111047437A CN 111047437 A CN111047437 A CN 111047437A CN 202010000587 A CN202010000587 A CN 202010000587A CN 111047437 A CN111047437 A CN 111047437A
Authority
CN
China
Prior art keywords
password
credit card
transaction
data
limit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010000587.1A
Other languages
Chinese (zh)
Inventor
张焕哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202010000587.1A priority Critical patent/CN111047437A/en
Publication of CN111047437A publication Critical patent/CN111047437A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/342Cards defining paid or billed services or quantities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application provides a credit card quota method and a device, and the method comprises the following steps: receiving password data, credit card account data and the consumption amount corresponding to the current transaction request acquired by a transaction terminal, and acquiring a plurality of transaction password data corresponding to the credit card account data according to the credit card account information; judging whether password data collected by the transaction terminal exists in the transaction password data, if so, determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal; if the password type is a limit password type, judging whether the current consumption amount exceeds a preset consumption limit, and if so, sending a prompt message aiming at insufficient balance of the credit card account data to the transaction terminal. The method and the device can improve the safety and reliability of credit card transaction on the basis of realizing credit card quota.

Description

Credit card quota method and device
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a credit card limit method and apparatus.
Background
With the rapid development of economy, people live more and more abundantly, and credit cards bring much convenience to the consumption of people. Under the condition of not carrying RMB, the credit card can be used to instantly complete a large amount of consumption. However, many problems can not be avoided in the using process, the forced consumption of the current genus with the most exposure of the medium exists in places such as beauty parlors, hairdressing shops, KTVs, restaurants and the like, and the forced consumption of different degrees exists in the traveling process.
However, the current credit card does not support the limited consumption, and for the forced consumption, if the card holder refuses to purchase, the mouth corner is caused, the good mood of one day is damaged, even the limb conflict occurs, and the personal injury is more irretrievable; the forced consumption condition easily causes property loss of cardholders.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a credit card limit method and a credit card limit device, which can improve the security and reliability of credit card transactions on the basis of realizing credit card limit.
In order to solve the technical problem, the present application provides the following technical solutions:
in a first aspect, the present application provides a credit card limit method, comprising:
receiving password data, credit card account data and the consumption amount corresponding to the current transaction request acquired by a transaction terminal, and acquiring a plurality of transaction password data corresponding to the credit card account data according to the credit card account information;
judging whether password data collected by the transaction terminal exists in the transaction password data, if so, determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal;
if the password type is a limit password type, judging whether the current consumption amount exceeds a preset consumption limit, and if so, sending a prompt message aiming at insufficient balance of the credit card account data to the transaction terminal.
Further, after determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal, the method further includes: and if the password type is the normal password type, executing a normal transaction process.
Further, after determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal, the method further includes: and if the password type is an abnormal password type, sending prompt information aiming at insufficient balance of the credit card account data to the transaction terminal and sending alarm information to a target alarm system.
Further, after the determining whether there is password data collected by the transaction terminal in the transaction password data, the method further includes: and if the password data collected by the transaction terminal does not exist in the transaction password data obtained through judgment, sending password input prompt information aiming at the credit card account data to the transaction terminal.
In a second aspect, the present application provides a credit card limit apparatus, comprising:
the receiving module is used for receiving password data, credit card account data and the consumption amount of the current time corresponding to the current transaction request collected by the transaction terminal and acquiring a plurality of transaction password data corresponding to the credit card account data according to the credit card account information;
the judging module is used for judging whether password data collected by the transaction terminal exists in the transaction password data or not, and if so, determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal;
and the consumption limiting module is used for judging whether the consumption amount exceeds a preset consumption limit if the password type is a limit password type, and sending insufficient balance prompt information aiming at the credit card account data to the transaction terminal if the consumption amount exceeds the preset consumption limit.
Further, the credit card limit device further comprises: and the normal transaction execution module is used for executing a normal transaction process if the password type is a normal password type.
Further, the credit card limit device further comprises: and the alarm module is used for sending prompt information aiming at insufficient balance of the credit card account data to the transaction terminal and sending alarm information to a target alarm system if the password type is an abnormal password type.
Further, the credit card limit device further comprises: and the prompting module is used for sending input password prompting information aiming at the credit card account data to the transaction terminal if the password data collected by the transaction terminal does not exist in the transaction password data obtained through judgment.
In a third aspect, the present application provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the credit card limit method when executing the program.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon computer instructions which, when executed, implement the steps of the credit card limit method.
According to the above technical solution, the present application provides a credit card limit method and device. Wherein, the method comprises the following steps: receiving password data, credit card account data and the consumption amount corresponding to the current transaction request acquired by a transaction terminal, and acquiring a plurality of transaction password data corresponding to the credit card account data according to the credit card account information; judging whether password data collected by the transaction terminal exists in the transaction password data, if so, determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal; if the password type is a limit password type, judging whether the current consumption amount exceeds a preset consumption limit, and if so, sending a prompt message aiming at insufficient balance of the credit card account data to the transaction terminal. The method and the device can improve the flexibility of data processing in the credit card transaction process, can further improve the reliability and the safety of the transaction process by setting a plurality of transaction password data, and can give an alarm to dangerous conditions in real time.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart illustrating a credit card limit method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart illustrating a credit card limit method according to another embodiment of the present application;
FIG. 3 is a schematic diagram of the structure of a credit card limit device in the embodiment of the present application;
FIG. 4 is a flow chart of a credit card quota method in a specific application example of the present application;
FIG. 5 is a schematic diagram of a credit card quota device in an exemplary embodiment of the present application;
fig. 6 is a schematic block diagram of a system configuration of an electronic device 9600 according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Based on this, in order to improve the security and reliability of credit card transactions on the basis of implementing credit card limits, embodiments of the present application provide a credit card limit apparatus, which may be a client device, where the client device may include a smart phone, a tablet electronic device, a network set-top box, a portable computer, a desktop computer, a Personal Digital Assistant (PDA), a vehicle-mounted device, and an intelligent wearable device. Wherein, intelligence wearing equipment can include intelligent glasses, intelligent wrist-watch and intelligent bracelet etc..
In practice, the credit card limit may be performed in the client device. The selection may be specifically performed according to the processing capability of the client device, the limitation of the user usage scenario, and the like. This is not a limitation of the present application. The client device may further include a processor if all operations are performed in the client device.
The client device may have a communication module (i.e., a communication unit), and may be communicatively connected to a remote server to implement data transmission with the server. The server may include a server on the task scheduling center side, and in other implementation scenarios, the server may also include a server on an intermediate platform, for example, a server on a third-party server platform that is communicatively linked to the task scheduling center server. The server may include a single computer device, or may include a server cluster formed by a plurality of servers, or a server structure of a distributed apparatus.
The server and the client device may communicate using any suitable network protocol, including network protocols not yet developed at the filing date of this application. The network protocol may include, for example, a TCP/IP protocol, a UDP/IP protocol, an HTTP protocol, an HTTPS protocol, or the like. Of course, the network Protocol may also include, for example, an RPC Protocol (Remote Procedure Call Protocol), a REST Protocol (Representational State Transfer Protocol), and the like used above the above Protocol.
The following examples are intended to illustrate the details.
In order to improve the security and reliability of credit card transactions based on the realization of credit card limits, the present embodiment provides a credit card limit method in which the executing entity is a credit card limit device, and the method, with reference to fig. 1, specifically includes the following contents:
step 100: receiving password data, credit card account data and the consumption amount corresponding to the current transaction request collected by the transaction terminal, and acquiring a plurality of transaction password data corresponding to the credit card account data according to the credit card account information.
In particular, the correspondence between credit card account data, transaction password data and password type may be stored in a local database. The transaction terminal may be a POS.
Step 200: and judging whether the password data collected by the transaction terminal exists in the transaction password data, if so, determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal.
Step 300: if the password type is a limit password type, judging whether the current consumption amount exceeds a preset consumption limit, and if so, sending a prompt message aiming at insufficient balance of the credit card account data to the transaction terminal.
Specifically, the front-end display screen outputs and displays the insufficient balance prompt information.
Referring to fig. 2, on the basis of the judgment of the cryptographic data, the normal transaction process of the credit card is ensured, and the reliability of the card quota using method is further improved, in an embodiment of the present application, after step 200, the method further includes:
step 301: and if the password type is the normal password type, executing a normal transaction process.
Referring to fig. 2, in order to implement real-time monitoring and alarming of abnormal transactions and further improve the security and reliability of the credit card transaction process, in an embodiment of the present application, after step 200, the method further includes:
step 302: and if the password type is an abnormal password type, sending prompt information aiming at insufficient balance of the credit card account data to the transaction terminal and sending alarm information to a target alarm system.
Specifically, the target alarm system may be a networking alarm system, and may be connected to a public security alarm system, and the alarm information may include a transaction location, credit card account data, and the like.
In order to improve the security and reliability of credit card transactions based on the credit card limit, in an embodiment of the present application, the determining whether the password data collected by the transaction terminal exists in the transaction password data in step 200 further includes:
step 201: and if the password data collected by the transaction terminal does not exist in the transaction password data obtained through judgment, sending password input prompt information aiming at the credit card account data to the transaction terminal.
Specifically, if the number of times that the password data collected by the transaction terminal does not exist in the transaction password data reaches a preset transaction number upper limit, the credit card transaction process is stopped.
From the software aspect, in order to improve the security and reliability of credit card transactions based on the implementation of credit card limits, the embodiment of the present application provides a credit card limit device for implementing all or part of the contents of the credit card limit method, and referring to fig. 3, the credit card limit device specifically includes the following contents:
the receiving module 10 is configured to receive password data, credit card account data, and the current consumption amount corresponding to the current transaction request collected by the transaction terminal, and acquire a plurality of transaction password data corresponding to the credit card account data according to the credit card account information.
The judging module 20 is configured to judge whether the transaction password data includes the password data acquired by the transaction terminal, and if yes, determine a password type of the corresponding transaction password data according to the password data acquired by the transaction terminal.
And the consumption limiting module 30 is configured to determine whether the current consumption amount exceeds a preset consumption limit if the password type is a limit password type, and send a prompt message indicating that the balance of the credit card account data is insufficient to the transaction terminal if the current consumption amount exceeds the preset consumption limit.
In one embodiment of the present application, the credit card limit device further comprises:
and the normal transaction execution module 40 is used for executing a normal transaction process if the password type is a normal password type.
In one embodiment of the present application, the credit card limit device further comprises:
and the alarm module 50 is used for sending prompt information aiming at insufficient balance of the credit card account data to the transaction terminal and sending alarm information to a target alarm system if the password type is an abnormal password type.
In one embodiment of the present application, the credit card limit device further comprises:
and a prompt module 60, configured to send a password input prompt message for the credit card account data to the transaction terminal if it is determined that the password data collected by the transaction terminal does not exist in the transaction password data.
The embodiment of the credit card limit apparatus provided in this specification may be specifically used for executing the processing flow of the embodiment of the credit card limit method, and the functions thereof are not described herein again, and reference may be made to the detailed description of the embodiment of the credit card limit method.
Referring to fig. 4, in order to further explain the scheme, the present application further provides a specific application example of the credit card quota method, in the specific application example, when consuming, a normal password is input, and consumption is completed according to a normal flow; if some forced consumption occasions are met, a password with a limit can be input, the credit card limit device compares the password with the limit, if the consumption amount is larger than the limit, the balance on the card is enough, and if the consumption amount exceeds the limit, an error is reported to indicate that the balance is insufficient; therefore, forced consumption is avoided, and unnecessary property loss is avoided. The credit card limit method is described in detail as follows.
S1: when a customer applies for a credit card, a normal password is set, a password with consumption quota is set at the same time, and consumption quota parameters are set.
Specifically, the normal password, the password with the consumption limit, and the consumption limit parameter may be set according to an actual situation, which is not limited in the present application.
S2: the normal password, the password with the quota and the quota parameter are all stored in the system.
Specifically, the system, i.e., the credit card limit device, receives credit card account data, a normal password, a password with a limit and a limit parameter corresponding to a target credit card, and stores the credit card account data, the normal password, the password with a limit and the limit parameter in a local database.
S3: the banking system receives a customer consumption request.
S4: the customer is prompted to enter a password.
Specifically, the system prompts the customer to enter a password when receiving a customer consumption request.
S5: after receiving the password input by the client, the system compares the password with the password.
S6: and judging whether the password is a normal password.
If yes, go to step S7; if not, go to step S8.
S7: and executing a normal consumption process.
Specifically, if the customer inputs a normal password, the normal transaction process is carried out, and the consumption request authorization is completed; that is, if the customer input password received by the credit card limit device is of a normal password type, the normal transaction flow is followed, and the consumption request authorization is completed.
S8: and judging whether the password is a password with a quota.
If the password inputted by the client is the password with the quota, the step S9 is executed, otherwise, the step S11 is executed.
S9: and judging whether the quota is exceeded.
Specifically, if the customer inputs a password with a limit, judging whether the input consumption amount exceeds the limit, and if not, completing the consumption request authorization; if the balance exceeds the limit, the transaction is refused, and the balance of the card is prompted to be insufficient; that is, if the client input password received by the credit card limit device is a password type with a limit, whether the received consumption amount exceeds a preset limit or not is judged, and if not, the consumption request authorization is completed; if the amount exceeds the limit, the transaction is refused, and the balance of the card is prompted to be insufficient.
Further, if the customer initiates a balance inquiry transaction with a password having a limit, the balance returned is the set limit.
If the quota is exceeded, go to step S10, otherwise go to step S7.
S10: refusing the transaction and prompting that the balance is insufficient.
S11: and judging whether the error times exceed 3.
If the number of errors exceeds 3, step S12 is executed, otherwise, step S4 is executed.
S12: refusing the transaction, and the password error times are out of limit.
Specifically, if the customer inputs an error password, the number of errors cannot exceed 3, and the transaction is rejected for 3 times; that is, if the client input password corresponding to the credit card account data received by the credit card limit device does not match the normal password and/or the limited password corresponding to the credit card account data in the local database, and the number of mismatching times exceeds 3 times, the credit card transaction process is ended.
Referring to fig. 5, in order to improve the security and reliability of credit card transactions based on the implementation of credit card limit, in combination with the above credit card limit method, the present application further provides a specific application example of a credit card limit device, which specifically includes:
and the storage module 1 is used for storing the normal password, the password with the quota and the quota parameter of the card holder in a database.
And the comparison module 2 is used for comparing the password input by the client with the password in the database.
And the processing module 3 is used for processing according to a normal consumption flow when the input password is a normal password. And when the password with the quota is input, processing according to a quota consumption flow.
A display module 4, configured to display the processing result to the client: the consumer transaction is successful or the limit is exceeded indicating insufficient balance.
From the above description, the credit card limit method and device provided by the application can improve the security and reliability of credit card transactions on the basis of realizing credit card limit; by flexibly setting the password of the credit card, unnecessary property loss can be avoided; and can realize the real-time monitoring and real-time alarming of the abnormal conditions in the credit card transaction process. Specifically, when a cardholder encounters an object of the self-mind apparatus and needs normal transaction, a normal password without limit can be input to complete purchase; if the cardholder encounters forced consumption, the password with the quota can be input, and when the password with the quota is input by the system check, although the balance on the card is enough, the balance is not enough when the balance exceeds the quota, so that forced consumption is avoided, and unnecessary property loss is avoided; if the cardholder encounters danger and is forced to trade, the abnormal password can be input, and an alarm can be given in time.
From a hardware level, in order to improve the security and reliability of credit card transactions based on the implementation of credit card limits, the present application provides an embodiment of an electronic device for implementing all or part of the contents of the credit card limit method, where the electronic device specifically includes the following contents:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the communication interface is used for realizing information transmission between the credit card limit device, the user terminal and other related equipment; the electronic device may be a desktop computer, a tablet computer, a mobile terminal, and the like, but the embodiment is not limited thereto. In this embodiment, the electronic device may be implemented with reference to the embodiments of the method for implementing the credit card limit and the embodiments of the device for implementing the credit card limit, which are incorporated herein, and repeated details are not repeated herein.
Fig. 6 is a schematic block diagram of a system configuration of an electronic device 9600 according to an embodiment of the present application. As shown in fig. 6, the electronic device 9600 can include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. Notably, this FIG. 6 is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one or more embodiments of the present application, the credit card limit functionality may be integrated into the central processor 9100. The central processor 9100 may be configured to control as follows:
step 100: receiving password data, credit card account data and the consumption amount corresponding to the current transaction request collected by the transaction terminal, and acquiring a plurality of transaction password data corresponding to the credit card account data according to the credit card account information.
Step 200: and judging whether the password data collected by the transaction terminal exists in the transaction password data, if so, determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal.
Step 300: if the password type is a limit password type, judging whether the current consumption amount exceeds a preset consumption limit, and if so, sending a prompt message aiming at insufficient balance of the credit card account data to the transaction terminal.
From the above description, it can be seen that the electronic device provided in the embodiments of the present application can improve the security and reliability of credit card transactions on the basis of implementing credit card limits.
In another embodiment, the credit card limit device may be configured separately from the central processor 9100, for example, the credit card limit device may be configured as a chip connected to the central processor 9100, and the credit card limit function may be implemented by the control of the central processor.
As shown in fig. 6, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 also does not necessarily include all of the components shown in fig. 6; further, the electronic device 9600 may further include components not shown in fig. 6, which may be referred to in the art.
As shown in fig. 6, a central processor 9100, sometimes referred to as a controller or operational control, can include a microprocessor or other processor device and/or logic device, which central processor 9100 receives input and controls the operation of the various components of the electronic device 9600.
The memory 9140 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 9100 can execute the program stored in the memory 9140 to realize information storage or processing, or the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. Power supply 9170 is used to provide power to electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, an LCD display, but is not limited thereto.
The memory 9140 can be a solid state memory, e.g., Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 9140 could also be some other type of device. Memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage portion 9142, the application/function storage portion 9142 being used for storing application programs and function programs or for executing a flow of operations of the electronic device 9600 by the central processor 9100.
The memory 9140 can also include a data store 9143, the data store 9143 being used to store data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers for the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, contact book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. The communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and receive audio input from the microphone 9132, thereby implementing ordinary telecommunications functions. The audio processor 9130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100, thereby enabling recording locally through the microphone 9132 and enabling locally stored sounds to be played through the speaker 9131.
The above description shows that the electronic device provided by the embodiment of the application can improve the security and reliability of credit card transactions on the basis of realizing credit card quota.
Embodiments of the present application also provide a computer-readable storage medium capable of implementing all steps in the credit card limit method in the above embodiments, where the computer-readable storage medium stores thereon a computer program, and the computer program when executed by a processor implements all steps of the credit card limit method in the above embodiments, for example, the processor implements the following steps when executing the computer program:
step 100: receiving password data, credit card account data and the consumption amount corresponding to the current transaction request collected by the transaction terminal, and acquiring a plurality of transaction password data corresponding to the credit card account data according to the credit card account information.
Step 200: and judging whether the password data collected by the transaction terminal exists in the transaction password data, if so, determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal.
Step 300: if the password type is a limit password type, judging whether the current consumption amount exceeds a preset consumption limit, and if so, sending a prompt message aiming at insufficient balance of the credit card account data to the transaction terminal.
From the above description, it can be seen that the computer-readable storage medium provided in the embodiments of the present application can improve the security and reliability of credit card transactions on the basis of implementing credit card limits.
In the present application, each embodiment of the method is described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. Reference is made to the description of the method embodiments.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the present application are explained by applying specific embodiments in the present application, and the description of the above embodiments is only used to help understanding the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A credit card limit method, comprising:
receiving password data, credit card account data and the consumption amount corresponding to the current transaction request acquired by a transaction terminal, and acquiring a plurality of transaction password data corresponding to the credit card account data according to the credit card account information;
judging whether password data collected by the transaction terminal exists in the transaction password data, if so, determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal;
if the password type is a limit password type, judging whether the current consumption amount exceeds a preset consumption limit, and if so, sending a prompt message aiming at insufficient balance of the credit card account data to the transaction terminal.
2. The credit card quota method of claim 1, further comprising, after said determining a password type of corresponding transaction password data from password data collected by said transaction terminal:
and if the password type is the normal password type, executing a normal transaction process.
3. The credit card quota method of claim 1, further comprising, after said determining a password type of corresponding transaction password data from password data collected by said transaction terminal:
and if the password type is an abnormal password type, sending prompt information aiming at insufficient balance of the credit card account data to the transaction terminal and sending alarm information to a target alarm system.
4. The credit card limit method of claim 1, further comprising, after the determining whether there is password data collected by the transaction terminal in the plurality of transaction password data:
and if the password data collected by the transaction terminal does not exist in the transaction password data obtained through judgment, sending password input prompt information aiming at the credit card account data to the transaction terminal.
5. A credit card limit device, comprising:
the receiving module is used for receiving password data, credit card account data and the consumption amount of the current time corresponding to the current transaction request collected by the transaction terminal and acquiring a plurality of transaction password data corresponding to the credit card account data according to the credit card account information;
the judging module is used for judging whether password data collected by the transaction terminal exists in the transaction password data or not, and if so, determining the password type of the corresponding transaction password data according to the password data collected by the transaction terminal;
and the consumption limiting module is used for judging whether the consumption amount exceeds a preset consumption limit if the password type is a limit password type, and sending insufficient balance prompt information aiming at the credit card account data to the transaction terminal if the consumption amount exceeds the preset consumption limit.
6. The credit card limit apparatus of claim 5, further comprising:
and the normal transaction execution module is used for executing a normal transaction process if the password type is a normal password type.
7. The credit card limit apparatus of claim 5, further comprising:
and the alarm module is used for sending prompt information aiming at insufficient balance of the credit card account data to the transaction terminal and sending alarm information to a target alarm system if the password type is an abnormal password type.
8. The credit card limit apparatus of claim 5, further comprising:
and the prompting module is used for sending input password prompting information aiming at the credit card account data to the transaction terminal if the password data collected by the transaction terminal does not exist in the transaction password data obtained through judgment.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the credit card limit method of any of claims 1 to 4 are implemented when the program is executed by the processor.
10. A computer readable storage medium having stored thereon computer instructions, wherein the instructions, when executed, implement the steps of the credit card limit method of any of claims 1 to 4.
CN202010000587.1A 2020-01-02 2020-01-02 Credit card quota method and device Pending CN111047437A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010000587.1A CN111047437A (en) 2020-01-02 2020-01-02 Credit card quota method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010000587.1A CN111047437A (en) 2020-01-02 2020-01-02 Credit card quota method and device

Publications (1)

Publication Number Publication Date
CN111047437A true CN111047437A (en) 2020-04-21

Family

ID=70243460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010000587.1A Pending CN111047437A (en) 2020-01-02 2020-01-02 Credit card quota method and device

Country Status (1)

Country Link
CN (1) CN111047437A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160019536A1 (en) * 2012-10-17 2016-01-21 Royal Bank Of Canada Secure processing of data
US20170068960A1 (en) * 2015-09-08 2017-03-09 Sk Planet Co., Ltd. Web based payment service providing apparatus, method, system, and non-transitory computer readable storage medium storing computer program recorded thereon
CN110135984A (en) * 2019-04-04 2019-08-16 深圳壹账通智能科技有限公司 Exchange management method, device, computer equipment and storage medium
CN110335033A (en) * 2019-07-09 2019-10-15 中国工商银行股份有限公司 Limit processing method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160019536A1 (en) * 2012-10-17 2016-01-21 Royal Bank Of Canada Secure processing of data
US20170068960A1 (en) * 2015-09-08 2017-03-09 Sk Planet Co., Ltd. Web based payment service providing apparatus, method, system, and non-transitory computer readable storage medium storing computer program recorded thereon
CN110135984A (en) * 2019-04-04 2019-08-16 深圳壹账通智能科技有限公司 Exchange management method, device, computer equipment and storage medium
CN110335033A (en) * 2019-07-09 2019-10-15 中国工商银行股份有限公司 Limit processing method and system

Similar Documents

Publication Publication Date Title
US10268810B2 (en) Methods, apparatus and systems for securely authenticating a person depending on context
US10515361B2 (en) Smart card secure online checkout
US10530767B2 (en) Methods and user device and authenticator device for authentication of the user device
EP3343488A1 (en) Smart card multi-factor authentication device
CN110619516A (en) Cross-bank payment method and device
MX2014003427A (en) Transaction payment method and system.
CN105989485B (en) Service management method and device
CN105324782A (en) Credit through unstructured supplementary service data
CN108960839B (en) Payment method and device
US11315114B2 (en) Dynamic transaction card protected by multi-factor authentication
US20160092876A1 (en) On-device shared cardholder verification
JP6224289B2 (en) Mobile terminal, control method and program
CN113052605A (en) Transaction authorization method and device and virtual reality equipment
US11151576B2 (en) Authorizing transactions using negative pin messages
CN112988898A (en) Block chain-based merchant fund clearing method and device
GB2519967A (en) Voice authentication in transactions
CN111178893B (en) Anti-theft safety authentication method and device
CN102867376B (en) A kind of interactive voice answering method of payment, terminal and system
CN111047437A (en) Credit card quota method and device
CN112101915A (en) Financial service management and control data processing method and device
CA2877218C (en) Method for securing a transaction performed by bank card
US20170169419A1 (en) Method and electronic device for setting default payment mode adaptively
CN114881643A (en) Loss reporting method, device and system for bank card
CN114139120A (en) Identity authentication method, device, equipment, storage medium and program product
CN112905012A (en) Interaction method, device and system of wearable equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination