TW201104602A - Transaction control method and system for evaluating network consumption risk, and payment method for network transaction - Google Patents

Transaction control method and system for evaluating network consumption risk, and payment method for network transaction Download PDF

Info

Publication number
TW201104602A
TW201104602A TW98125531A TW98125531A TW201104602A TW 201104602 A TW201104602 A TW 201104602A TW 98125531 A TW98125531 A TW 98125531A TW 98125531 A TW98125531 A TW 98125531A TW 201104602 A TW201104602 A TW 201104602A
Authority
TW
Taiwan
Prior art keywords
transaction
payment
consumption
network
user
Prior art date
Application number
TW98125531A
Other languages
Chinese (zh)
Other versions
TWI521451B (en
Inventor
De-Feng Guo
Original Assignee
Danal Taiwan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Danal Taiwan Co Ltd filed Critical Danal Taiwan Co Ltd
Priority to TW098125531A priority Critical patent/TWI521451B/en
Publication of TW201104602A publication Critical patent/TW201104602A/en
Application granted granted Critical
Publication of TWI521451B publication Critical patent/TWI521451B/en

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

This invention is relates to a transaction control method and system for evaluating network consumption risk, and payment method for network transaction. It is to be operated under the network transaction framework that cooperated with telecommunication system service provider for payment. The network transaction framework includes at least one vendor system, an application system, and transaction control system between the vendor and telecommunication system. The transaction control system executes the following steps (1) analyzing the telephone number information inputted and generated by the client on the vendor system, (b) outputting a verification result to the application system according to a predetermined rules obtained from a consumption risk occurrence model based on the information of telephone number and the history information of the client of the telephone number, so as to check and find out unreasonable or abnormal consumption behavior that departs from consumption habits.

Description

201104602 六、發明說明: 【發明所屬之技術領域】 本發明是有關於-種網路交易管控方法、系統及交易付 費方法’特別是指-種評估網路消費風險的交易管控方法、 系統及網路交易付費方法。 【先前技術】 目前有線上服務網站與電信t者合作,將交易費用列於 電話帳單中收取,如台灣第513651公告號『購物之電子付 費方法』,以提供較安全與方便的付費方式。 參閱圖1’為加強網路交易的可驗證性,如本國發明專 利證書號第309392號或韓國實用新型專利第193499號專利 案公開了-種方法,當使用一電信業者電話號碼的用戶% 瀏覽-商家系統92的網站而欲購買商品/服務時,網站的網 頁會對應要求用戶93輸人行動電話號碼經由通訊網路8 再將此㈣電話號碼傳送—驗㈣統91,驗㈣統91適時 產生一交易認證碼來經網際網路回傳用戶%,並要求用戶 93經公眾電信網路撥打_認證電話,而於該認證電話被接 通並要求用戶93輪入該交易認證碼,以認證該交易認證 碼及撥打該< 電#之電話號碼,並於認證無誤時,則完成 父易’電信系統94再將貨款列至電信帳單並通知商家系統 可送出商。。/服務’如此確實有效的阻擋了駭客行為的發 生’也確實增加了網路交易的可驗證性。 然而,隨著網路交易日趨頻繁,包括商家或消 費者的惡 意父易行為也日漸增加,因而在有些網站即使採取了更嚴格 201104602 :認則’但卻也無法防範蓄意而大規模的網路詐騙行 :、乂疋因為類似與電信系統94業者合作的網路交易機制 並無-套類似信用卡或銀行等金融業者的 程序,因此對於用彳94的消費信用無法在交易 核不但^成呆帳率增加,對於例如誘編他人撥打電話付費 等行為的詐騙行為也無法防範。 【發明内容】 為了解決前述的問題,本發明的第一目的是利用電話號 碼之貧訊評估網路消費風險的交易管控方法。 因此,本發明評估網路消費風險的交易管控方法係在一 與電k系統業者合作付費的網路交易架構下運作,該網路交 易架構包括至少一商家系統及一應用系統,且該方法運用一 介於該商家系統及該電信系統之間的交易管控系統 (Transaction c〇mr〇i加㈣,簡稱代㈧執行包含下述步 驟.U)分析在該商家系統輸入產生的一電話號碼之資訊; 及(b)對該電話號碼之資訊配合該電話號碼用戶的歷史資料 依據—消費風險發生模式得出的預定規則輸出一查驗結果 予该應用系統。 本發明評估網路消費風險的交易管控方法的有益效果 在於:對該電話號碼之資訊配合該電話號碼用戶的歷史資料 依據一消費風險發生模式得出的預定規則進行綜合判斷,藉 此查驗出不合常理(如:跨區)或違反消費習慣(如:平常習 慣為小額消費卻突然改變為大額消費)的異常消費行為。 本發明的第二目的是在現有與電信系統業者合作付費 201104602 的網路父易架構下新增一評估消費風險的交易管控系統。 發月的父易管控系統藉由一通訊網路與一商家系統 及—應用系統彼此連接,該交易管控系統包含:一通訊單 兀刀析在該商家系統輸入產生的一電話號碼之資訊;及一 控制單7G’對該電話號碼之資訊配合該電話號碼用戶的歷史 貝料依據-消費風險發生模式得出的預定規則輸出一查驗 結果予該應用系統。 本發明評估網路消費風險的交易管控方法的有益效果 :於’交易管控系統能夠防止由惡意用戶、惡意' IP、及惡 思商戶與惡意帳號引起的於進行網際網路金融交易產生 欠費。 本發明的第三目的是在現有與電信系統業者合作付費 的網路父易架構下降低消費風險的網路交易付費方法。 本發明的網路交易付費方法係在一與電信系統業者合 作=費的網路交易架構下運作,該網路交易架構包括至少一 商豕系統、-應用^統及—介於該商家系統及該應用系統之 間的交易管控系統。 該網路交易付費方法包含下述步驟:⑷該商家系統接 收該用5終端的—訂單及-電話號碼資料;(b)該商家系統 將,§T早及該電話號碼資料發送到該交易控制系統;及⑷ =父易控制线接收該訂單及電話號碼f料後,分析在該商 家系統輸人產生的-電話號碼之資訊,並對該電話號碼之資 訊配合該電話號碼用戶的歷史資料依據一消費風險發生模 式得出的預錢則輸出—查驗結果予該應用系統。 201104602 本發明網路交易付費方法評估網路消費風險的交易管 控方法的有益效果在於:交易管控线能夠防止由惡意用 戶心思' ip、及惡意商戶與惡意帳號引起的於進行網際網 路金融交易產生的欠費。 【實施方式】 有關本發明之前述及其他技術内容、特點與功效,在以 下配〇參考圖式之較佳實施例的詳細說明中,將可清楚的呈 現。在本發明被詳細描述之前,要注意的是以下所稱「電信 系統業者合作付費的網路交易架構」泛指利用電話帳單支付 網路消費的網路交易架構;另外,本發明是利用交易控制系 統研判用戶的網路消費風險並將查驗結果通知一特定對 象,該特定對象是泛指有此查驗需求的應用系統,可以是但 不限制如本說明書所提的商家系統、付費系統或電信系統。 L交易管控糸銑a方沐 參閱圖2’本發明較佳實施例的評估網路消費風險的交 易管控方法係在一涵蓋與電信系統業者合作付費的網路交 易架構下運作,該網路交易架構包括至少一用戶終端1〇、 —商家系統20、一交易控制系統3〇、一付費系統4〇及一電 信系統50。 參閱圖3,多數個用戶終端10、商家系統2〇、交易控 制系統30、付費系統40及電信系統5〇是藉由一通訊網路 6〇〇彼此傳遞資料,且通訊網路600包括有線通訊線路及無 線通訊線路;另外,商家系統2〇、交易控制系統3〇及付費 系統40可以彼此各自獨立運作,或將任二者整合在同一個 201104602 區域網路(LAN)中或同一個伺服器中,或三者可整合在同一 個區域網路中或在同一個伺服器中,來彼此發送/接收訊 息,由於此為本發明領域的技術人員熟知技術,在此不多作 介紹。 參閱圖2,茲將與電信系統業者合作付費的網路交易付 費方法結合本發明概念的流程步驟說明如下: 用戶終端ίο發送一訂單給商家系統20 (S101),以一種 訊息内容供應商(Content Provider)的商家系統20為例,用 戶終端10訂購商家網站的商品/服務後形成一商品/服務的 訂單,並在商家系統20輸入一電話號碼資料及—身份證號 碼資料,然後商家系統20再將訂單、電話號碼/身份證號碼 資料發送到交易控制系統3〇(S102)。 交易控制系統30接收該訂單及電話號碼/身份證號碼 資料後,分析該電話號碼/身份證號碼之資訊並配合該電話 號碼用戶的歷史資料依據一消費風險發生模式得出的 /預定 規則進行風險分析(原理容後再述)後輸出一查驗結果,且將 訂單及查驗結果整合為一訂購訊息傳輸予付費系統 40(S103)。 ’、’、、 另外,若電信系統50能開放查詢其電信帳款繳交記 錄,則付費系統40依據該訂購訊息提出—查詢請求傳輸给 電信系統50(S104),然後電信系統5〇根據該查詢請求對該 用戶的電尨帳款繳交記錄提交一查詢結果回傳給付費系^ 40(S105),供付費系統40作為準否付費之依據。 ' 假設付費系統40研判查詢結果中該用戶的電信帳> 繳 201104602 交記錄良好,則付費系統40會針對此用戶的訂單發出一福 認同意付費的請求予用戶終端10(s 106);假設付費系統4〇 研判該查詢結果中該用戶的電信帳款繳交記錄不良,則付費 系統40把不接受該訂單的訊息發送給用戶終端1〇 ;另外, 除了 該訂單不被接受”的訊息之外,可以發送其它訊氡 如”欲知準確訂單請上某網址”、”欲知準確訂單請撥打某 電話號碼的語音服務”或”欲知準確訂單請參考某目錄 用戶終端10 4認同意付費後會發出一同意請求予付費 系統40(S107);然後付費系統40發出一付費成功的通知訊 息予用戶終端10 (S108);付費系統40亦會發出一交易成功 的通知訊息予商家系統20(S109),假設是線上提供的商品/ 服務,商家系統20就直接傳送商品/服務予用戶終端1〇 (S110);同時,付費系統4〇也會發出一計費通知訊息給電 信系統50(S111)。 前述網路交易架構的流程藉由步驟Si〇3可達成的有益 效果在於:利用分析用戶提供的電話號碼之資訊配合該電話 號碼用戶的歷史資料,然後依據一消費風險發生模式得出的 預定規則進行綜合判斷,避免不合常理(如:跨區)或違反消 費習慣(如:平常習慣為小額消費卻突然改變為大額消費) 的異常消費行為。 參閱圖3 ’以下分別介紹用戶終端10、商家系統20、 交易控制系統30、付費系統4〇及電信系統5〇的組成元件 及作用原理。 II.用戶终端10 201104602 用戶終端ίο具有一通訊單元110、一輸入單元ι20、一 顯示單元130及一控制單元140,且用戶終端10可以是一 個人電腦、一筆記型電腦、一行動電話,或一具有行動通話 功能的電子裝置(例如:個人數字助理電話或智慧手機)。 其中’控制單元140用以管理並控制通訊單元110、輸 入單元120及顯示單元13〇;通訊單元n〇受控制單元14〇 控制,經由通訊網路600而發射/接收訊息和資料,使得用 戶終端10和商家系統20、付費系統40或交易控制系統30 能經過通訊網路600而彼此通訊。 輸入單元120是供用戶輸入資料給商家系統2〇,使得 用戶能輸入訂單資料來訂購商家系統2〇提供的商品/服 務,顯不單元130能顯示透過該輸入單元12〇輸入的資料以 及從通訊單元110接收的訊息。 ΠΙ.商突系銃2ft 商豕系統20具有一通訊單元21〇、一儲存單元220及 控制單元230 ’其中的通訊單元21 〇經過通訊網路6〇〇通 Λ Λ息,儲存單元220具有一網站(如:購物網站/線上游戲) 資料供用戶透過通訊網路6〇〇訂購商品/服務。 控制單元220控制商家系統20的全部組件,當收到用 戶終端10發出的訂單資料時,控制單元22〇將訂單及電話 號碼資料藉由通訊單元210發送到交易控制系統3〇。 IV..付費系銑40 付費系統40包括一通訊單元410、一控制單元42〇、一 驗證單元430及一交易資料庫44〇。 201104602 通訊單元4ln a201104602 VI. Description of the Invention: [Technical Field of the Invention] The present invention relates to a method and system for controlling network transactions, and a method for managing payment, particularly a transaction management method, system and network for assessing network consumption risk Road transaction payment method. [Prior Art] At present, the wired service website cooperates with the telecommunications company to list the transaction fee in the telephone bill, such as Taiwan's No. 513651 announcement number, "Electronic payment method for shopping", to provide a safer and more convenient payment method. Referring to FIG. 1 'in order to enhance the verifiability of online transactions, such as the National Invention Patent No. 309392 or the Korean Utility Model Patent No. 193499, a method is disclosed, when a user using a telephone number of a carrier is browsed. - When the website of the merchant system 92 is to purchase goods/services, the website's webpage will correspond to the user's 93 input mobile phone number via the communication network 8 and then the (4) telephone number will be transmitted - the test (four) system 91, the test (four) system 91 is timely A transaction authentication code to return the user % via the Internet, and the user 93 is required to make a _authentication call via the public telecommunication network, and the authentication phone is connected and the user 93 is required to enter the transaction authentication code to authenticate the Transaction authentication code and dial the telephone number of the <Electronic #, and when the authentication is correct, complete the parent's telecommunications system 94 and then list the payment to the telecom bill and notify the merchant system to send the merchant. . The fact that the service is so effective in blocking the occurrence of hacking behavior has indeed increased the verifiability of online transactions. However, as online transactions become more frequent, malicious behaviors involving merchants or consumers are increasing. Therefore, even some websites adopt stricter 201104602: but they cannot prevent deliberate and large-scale networks. Fraudulent bank: 乂疋 Because the online trading mechanism similar to the cooperation with the telecommunications system 94 does not have a set of procedures similar to financial institutions such as credit cards or banks, so the consumer credit for the use of 彳94 cannot be used in the transaction nuclear not only bad debts The rate has increased, and fraudulent acts such as tricking others into making calls are not preventable. SUMMARY OF THE INVENTION In order to solve the aforementioned problems, the first object of the present invention is to use a transaction number control method for evaluating network consumption risk by using a telephone number. Therefore, the transaction management method for evaluating the network consumption risk of the present invention operates under a network transaction architecture that cooperates with the electric k system operator, and the network transaction architecture includes at least one merchant system and an application system, and the method uses A transaction control system between the merchant system and the telecommunication system (Transaction c〇mr〇i plus (4), referred to as (8) performs the following steps. U) analyzes the information of a phone number generated in the merchant system input; And (b) the information of the telephone number is matched with the historical data of the user of the telephone number to output a check result to the application system according to a predetermined rule derived from the consumption risk occurrence mode. The beneficial effect of the transaction management method for evaluating the network consumption risk of the present invention is that the information of the telephone number is combined with the historical data of the user of the telephone number to perform comprehensive judgment according to a predetermined rule derived from a consumption risk occurrence mode, thereby detecting the disagreement Common sense (such as: cross-regional) or abnormal consumption behaviors that violate consumer habits (such as: the usual habit is small consumption but suddenly changed to large consumption). A second object of the present invention is to add a transaction management and control system for assessing consumer risk under the existing network parent structure of the existing telecommunications system provider. The parental control system of the monthly connection is connected to a merchant system and an application system by a communication network, and the transaction control system comprises: a communication unit analyzing information of a telephone number generated by the input of the merchant system; and The control unit 7G' outputs the inspection result to the application system according to the information of the telephone number and the predetermined rule obtained by the consumer risk occurrence mode. The beneficial effects of the transaction management method for assessing the risk of network consumption are as follows: The transaction control system can prevent arrears in the internet financial transactions caused by malicious users, malicious 'IPs, and malicious merchants and malicious accounts. A third object of the present invention is a method for paying for online transactions that reduces consumer risk under existing network parental architectures that are co-operating with telecommunications system operators. The online transaction payment method of the present invention operates under a network transaction architecture that cooperates with a telecommunications system provider, including at least one business system, an application system, and the like. A trading control system between the application systems. The online transaction payment method comprises the following steps: (4) the merchant system receives the order-and-phone number data of the 5-terminal; (b) the merchant system sends the §T and the phone number data to the transaction control. System; and (4) = After receiving the order and the phone number f, the parent control line analyzes the information of the phone number generated by the merchant system, and the information of the phone number matches the historical data of the user of the phone number. The pre-money derived from a consumption risk occurrence mode is output-check results to the application system. 201104602 The beneficial effect of the transaction management method for evaluating the network consumption risk of the online transaction payment method of the present invention is that the transaction management control line can prevent the occurrence of internet financial transactions caused by malicious users' minds, malicious merchants and malicious accounts. Arrears. The above and other technical contents, features, and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments of the invention. Before the present invention is described in detail, it is to be noted that the following "the network transaction architecture of the telecommunications system operator cooperative payment" generally refers to the network transaction architecture that uses the telephone bill to pay for network consumption; in addition, the present invention utilizes the transaction. The control system judges the user's network consumption risk and notifies the specific result to the specific object, which is an application system having the inspection requirement, which may be, but is not limited to, the merchant system, the payment system or the telecommunications as mentioned in the specification. system. L transaction control 糸 milling a square Mu 2 see the preferred embodiment of the present invention to evaluate the network consumption risk of the transaction management method is operated in a network transaction architecture covering cooperation with the telecommunications system operators, the network transaction The architecture includes at least one user terminal, a merchant system 20, a transaction control system 3, a payment system 4, and a telecommunications system 50. Referring to FIG. 3, a plurality of user terminals 10, a merchant system 2, a transaction control system 30, a payment system 40, and a telecommunication system 5 are each transmitting data through a communication network, and the communication network 600 includes a wired communication line and Wireless communication line; in addition, the merchant system 2, the transaction control system 3, and the payment system 40 can operate independently of each other, or integrate either one in the same 201104602 local area network (LAN) or in the same server. Or the three can be integrated in the same local area network or in the same server to send/receive messages to each other. Since this is well known to those skilled in the art, it will not be described here. Referring to FIG. 2, the flow of the online transaction payment method in cooperation with the telecommunication system provider is combined with the process steps of the inventive concept as follows: The user terminal ίο sends an order to the merchant system 20 (S101) as a message content provider (Content For example, the merchant system 20 of the Provider) forms an order for a product/service after ordering the goods/services of the merchant website, and inputs a phone number information and an ID card number data in the merchant system 20, and then the merchant system 20 The order, telephone number/ID number data is transmitted to the transaction control system 3 (S102). After receiving the order and the phone number/ID number data, the transaction control system 30 analyzes the information of the phone number/ID number and cooperates with the historical data of the user of the phone number to perform risk according to a consumption risk occurrence pattern/predetermined rule. After the analysis (the principle is described later), a check result is output, and the order and the check result are integrated into a subscription message transmission to the payment system 40 (S103). ', ', In addition, if the telecommunication system 50 can openly query its telecommunication account payment record, the payment system 40 makes a request according to the order message - the inquiry request is transmitted to the telecommunication system 50 (S104), and then the telecommunication system 5 The inquiry request submits a query result to the payment account record of the user and returns it to the payment system 40 (S105), and the payment system 40 serves as a basis for payment. Assuming that the payment system 40 determines that the user's telecom account in the query result is paid 201104602, the payment system 40 will issue a request for payment to the user terminal 10 for the user's order (s 106); The payment system 4 determines that the user's telecommunication account payment record is bad in the inquiry result, and the payment system 40 sends a message that the order is not accepted to the user terminal 1; in addition, the message is not accepted except the order. In addition, you can send other messages such as "Please know the exact order, please go to a certain website", "For a precise order, please call the voice service of a certain phone number" or "For an accurate order, please refer to a directory user terminal 10 4 to agree to pay A consent request is sent to the payment system 40 (S107); then the payment system 40 issues a payment success notification message to the user terminal 10 (S108); the payment system 40 also issues a successful notification message to the merchant system 20 ( S109), assuming that the goods/services are provided online, the merchant system 20 directly transmits the goods/services to the user terminal 1 (S110); meanwhile, the payment system 4 A charging notifications within the telecommunication system 50 (S111). The beneficial effect of the foregoing network transaction architecture process by the step Si〇3 is that the information of the telephone number provided by the user is used to match the historical data of the user of the telephone number, and then the predetermined rule is obtained according to a consumption risk occurrence mode. Conduct comprehensive judgments to avoid unusual consumption behaviors that are unreasonable (eg, cross-regional) or violate consumer habits (eg, the usual habit is small consumption but suddenly changed to large consumption). Referring to Fig. 3', the components and operating principles of the user terminal 10, the merchant system 20, the transaction control system 30, the payment system 4, and the telecommunication system 5 are respectively described below. II. User terminal 10 201104602 User terminal ίο has a communication unit 110, an input unit ι20, a display unit 130 and a control unit 140, and the user terminal 10 can be a personal computer, a notebook computer, a mobile phone, or a An electronic device with a mobile call function (for example, a personal digital assistant phone or a smart phone). The control unit 140 is configured to manage and control the communication unit 110, the input unit 120, and the display unit 13; the communication unit is controlled by the control unit 14 to transmit/receive messages and materials via the communication network 600, so that the user terminal 10 The merchant system 20, the payment system 40, or the transaction control system 30 can communicate with each other via the communication network 600. The input unit 120 is for the user to input data to the merchant system 2, so that the user can input the order data to order the goods/services provided by the merchant system 2, and the display unit 130 can display the data input through the input unit 12 and the communication. The message received by unit 110.商.商商系铳2ft The retail system 20 has a communication unit 21〇, a storage unit 220 and a control unit 230. The communication unit 21 is communicated via the communication network 6. The storage unit 220 has a website. (eg: shopping website/online game) Information for users to order goods/services via the communication network. The control unit 220 controls all components of the merchant system 20. When receiving the order data sent by the user terminal 10, the control unit 22 transmits the order and telephone number data to the transaction control system 3 via the communication unit 210. IV. Payment System 40 The payment system 40 includes a communication unit 410, a control unit 42A, a verification unit 430, and a transaction database 44A. 201104602 Communication unit 4ln a

At .... 八連線公眾電信網路與網際網路的功 筆用:美1抖庫440儲存有用戶之基本資料及交易資料,各 祕 i冑料含有用戶之電話號碼、身分證號碼、生日、 -粗·約'密鳴等等,交易資料具有各用戶之電話帳單細目 ^驗也單70 430是經由通訊單元410接收來自網路網路 3公眾電信網路來進行驗證用戶身分,以狀是魏以列於 電信帳單方式來支付貨款。 用戶的付費資料儲存在交易資料庫440中,而且必要 時該用戶付費資料可儲存在商家系統20的儲存單元22〇 中’亦可儲存交易管控系統3〇對用戶的查驗結果。 父易皆控系統3 0具有一通訊單元3 10 ' —控制單元 32〇、一歷史資料庫330、一分析資料庫340、一規則資料庫 35〇及一查驗結果資料庫370,其中的通訊單元310及控制 單元320的原理是已知的,在此不重複說明。 歷史資料庫330的資料來源取自商家系統20,包括各 用戶在商家系統20輸入產生的電話號碼/身份證號碼/交易 狀况,交易狀況是記錄用戶於同一帳號下的—使用次數、一 使用IP數、一使用電話號碼數、一身份證號數及一消費金 領;同一 IP下的一使用次數、一使用帳號數、一使用電話 號碼數、一消費商家數、一身份證號數及一消費金額;同一 電話號碼下的一使用次數、一使用帳號數、一消費商家數、 —身份證號敷及一消費金額;同一身份證號的一使用次數、 —使用帳號數、一使用電話號瑪數、一消費商豕數、一使用 10 201104602 ip數及一消費金額等資料。 控制單元320是用來分析用戶在商家系統20輸入產生 的電話號碼/身份證號碼/交易狀況,其分析方式是取出電話 號碼/身份證號碼/交易狀況中預定的分析項目,並作格式轉 換’以及分配索引後,將前述資料儲存於分析資料庫340 中。 參閱圖4,分析資料庫340内的資訊依據不同的資訊類 別(項目)區分為一電話號碼資訊、一身份證號碼資訊及一交 易狀況資訊,並且根據可供判斷的資訊再往下細分,說明如 下: 1. 電話號碼資訊:包括一辦門號時所屬電信公司(如 0935開頭是台哥大、0936是遠傳,0937是中華電信等)、一 門號所屬地區(如02-開頭是台北、〇3-3開頭是桃園及〇89_ 開頭疋台東)及·一門说狀態資訊(如正常使用中:〇欠費中:ι 新申請客戶:2優等客戶:3未開通:4)。 2. 身份證號碼資訊:包括一可用來判別出生地區及性別 的英文字母及數字(如A260133813分析後A:台北市2:代表 為女性)。 3 ·交易狀況資訊: a•使用身份資訊:包括一使用者帳號、一使用者門號、 一使用者電話號碼及一使用者Ip位置。 b.使用習慣資訊:包括一平均交易金額、一單筆交易 金額、—累積交易金額、一單位時間内交易金額及次數、一 經丰交易時間及一經常消費商品類別。 201104602 記錄信用記錄資訊:包括一過去缴款狀況及—相關欠費 參閱圖5’分析資料庫34〇自不同資料來源取得的項 目,主要是包括利用電話號碼資訊轉換為一系統狀況(如: 正常使用中:0欠費中:1财請客戶:2㈣客戶:3未開 ,:句、-區域訊息(如:電話是〇2_趣5911則可抽取出〇:· 口北及畫線部分可進一步判定區域為内湖區)及—業者訊息 (如:〇,是台灣大哥大核發門號,0936是遠傳核發門號二 0937疋中華核發門號)、利用身份證號碼資訊轉換為—人口 訊息(包括出生地及性別的研判),及利用其他使用狀況再往 下細分。 規則貝料庫350儲存一或數個依據消費風險發生模式 得出的預定規則’用以提供控制單元32〇棉取分析資料庫 340及歷史資料庫330的不同項目資料代入預定規則中換算 以得到一查驗結果,其預定規則是依據呆帳、詐騙行為或交 易糾紛的發生模式的數種資訊綜合統計或歸納所得出的公 式’例如使用前述使用狀況的統計分析用戶的呆帳機率以作 _ 為每次消費的信用核定基準,並以消費地區判斷其消費合理 性’並藉此判斷其所屬業者之消費者信用狀態。 參閱圖6,說明規則資料庫35〇的預定規則為正常狀態 下的網路消費模式,若超出此範圍則可能為異常的消費模 式’其信用狀況或消費合理性將列為異常。 然後,控制單元320令通訊單元31 〇把查驗結果發送 到付費系統40,讓付費系統40能夠依據該查驗結果決定是 12 201104602 否成立該筆交易,然而,熟知本發明技術領域者當知該查 驗結果亦可發送給商家系統20及/或電信系統5〇,端看系 統系構設計的目的及需求。 YI.結論 综上所述,本發明的評估網路消費風險的交易管控方 法、飼服器及线提供了以電錢單為主的網際網路的金融 交易安全方法’運用先前所得之用戶歷史資料,依據可能的 惡性父易行為模式以數學計算及統計模式歸納消費者的電 • 話號碼、身份證字號與繳款記錄預先建立相關的預定公式, 然後加以分析用戶在每此網路交㈣㈣行為,藉此降低與 預防網路金融交易詐欺事件發生,料實能達成本發明之目、 的。 准以上所述者,僅為本發明之較佳實施例*已當不能 以此限定本發明實施之範圍,即大凡依本發日巧請專利範圍 及發明說_容所作之簡單”效變化與料,皆仍屬本發 明專利涵蓋之範圍内。 • 【圖式簡單說明】 圖1是"系統方塊圖,說明加強網路交易的可驗證性的 網路交易架構; 圖2是-通訊示意圖’說明本發明較佳實施例的評估網 路消費風險的交易管控方法; 圖3是一系統方塊圖’說明用戶終端、商家系統、交易 控制系統、付費系統及電信系統組成元件及作用原理; 圖4是一示意圖’說明分析資料庫的資訊類別之意義; 13 201104602 圖5是一示意圖,說明自不同資料來源取得的項目;及 圖6是一示意圖,說明正常狀態下的網路消費模式。At .... Eight-wire public telecommunications network and the Internet's work: US 1 shake library 440 stores the user's basic information and transaction data, each secret contains the user's phone number, ID card number , birthday, - rough, about 'mild sound, etc., the transaction data has a phone bill detail for each user. The single 70 430 is received via the communication unit 410 from the public network of the network 3 to verify the identity of the user. In the form of Wei, it is listed in the telecom bill to pay for the goods. The user's payment data is stored in the transaction database 440, and the user payment data can be stored in the storage unit 22 of the merchant system 20 as needed. The transaction management system 3 can also store the results of the verification of the user. The parent control system 30 has a communication unit 3 10 ' - a control unit 32 〇, a history database 330, an analysis database 340, a rule database 35 〇, and a check result database 370, wherein the communication unit The principles of 310 and control unit 320 are known and will not be repeated here. The data source of the historical database 330 is taken from the merchant system 20, including the telephone number/ID card number/transaction status generated by each user in the merchant system 20, and the transaction status is recorded under the same account number of users - the number of uses, one use IP number, number of used telephone numbers, number of ID cards and one consumer gold collar; number of usages under the same IP, number of used accounts, number of used telephone numbers, number of used merchants, number of ID cards, and one The amount of consumption; the number of uses under the same phone number, the number of accounts used, the number of merchants, the number of ID cards and the amount of consumption; the number of uses of the same ID number, the number of accounts used, and the number of a phone number used Ma number, a consumer number, a use of 10 201104602 ip number and a consumption amount and other information. The control unit 320 is configured to analyze the telephone number/ID card number/transaction status generated by the user input in the merchant system 20, and the analysis method is to take out the predetermined analysis item in the telephone number/ID card number/transaction status, and perform format conversion. After the index is assigned, the aforementioned data is stored in the analysis database 340. Referring to FIG. 4, the information in the analysis database 340 is divided into a phone number information, an ID number information, and a transaction status information according to different information categories (items), and is further subdivided according to the information available for judgment. The following are as follows: 1. Telephone number information: including the telecommunications company that belongs to the door number (such as 0935 at the beginning is Taigao, 0936 is a long-distance, 0937 is Chunghwa Telecom, etc.), and the area where a number belongs (such as 02- begins with Taipei, 〇3-3 begins with Taoyuan and 〇89_ beginning 疋taidong) and one door says status information (such as normal use: 〇 arrears: ι new application customer: 2 excellent customers: 3 not opened: 4). 2. ID number information: Includes an English letter and number that can be used to identify the birth area and gender (eg A260133813 after analysis: Taipei City 2: Representative for women). 3 · Transaction status information: a • Use identity information: including a user account, a user door number, a user phone number and a user IP location. b. Use habit information: including an average transaction amount, a single transaction amount, a cumulative transaction amount, a transaction amount and number of times per unit time, a transaction time and a category of frequently consumed goods. 201104602 Record credit history information: including a past payment status and related arrears. Refer to Figure 5 'Analysis Database 34' for items obtained from different sources, mainly including the use of phone number information to convert to a system status (eg: normal In use: 0 arrears: 1 customer: 2 (four) customer: 3 is not open,: sentence, - regional message (such as: phone is 〇 2_ fun 5591 can extract 〇: · mouth north and draw line can further The judgment area is Neihu District) and the information of the industry (such as: 〇, is the Taiwanese big brother’s nuclear issue number, 0936 is the far-reaching nuclear issue number 2,0937, the Chinese nuclear issue number), using the ID number information to convert to the population message ( Including the birthplace and gender judgments, and using other usage conditions to further subdivide. The rule shell library 350 stores one or several predetermined rules based on the consumption risk occurrence pattern to provide control unit 32 The different project data of the database 340 and the historical database 330 are substituted into the predetermined rules to obtain a check result, and the predetermined rule is based on bad debts, fraudulent acts or transaction disputes. The statistics of several types of information in the occurrence pattern or the formula derived from the induction 'for example, using the statistical analysis of the aforementioned usage status to analyze the user's bad debt rate as the basis for the credit for each consumption, and judging the rationality of consumption by the consumption area' And use this to judge the consumer credit status of its affiliates. Referring to Figure 6, the predetermined rule of the rule database 35〇 is the network consumption mode under normal conditions, and if it exceeds this range, it may be an abnormal consumption mode 'its credit The status or consumption rationality will be listed as abnormal. Then, the control unit 320 causes the communication unit 31 to send the inspection result to the payment system 40, so that the payment system 40 can determine whether the transaction is established according to the inspection result, 201104602, however, Those skilled in the art of the present invention are aware that the results of the verification can also be sent to the merchant system 20 and/or the telecommunications system 5 to see the purpose and requirements of the system architecture design. YI. Conclusion In summary, the evaluation network of the present invention The transaction control method, the feeding device and the line of the road consumption risk provide the financial transaction security of the Internet based on the electricity bill. The method uses the previously obtained user history data to summarize the consumer's telephone number, ID number and payment record in advance according to the possible malignant father behavior pattern, and then analyzes the consumer's telephone number, ID number and payment record. The user can perform (4) (4) behaviors on each of the networks, thereby reducing and preventing the occurrence of fraudulent incidents in the online financial transactions, and it is expected that the present invention can be achieved. The above is only the preferred embodiment of the present invention* The scope of the present invention has not been limited thereby, that is, the simple and effective changes and materials of the patent scope and inventions are still within the scope of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a "system block diagram illustrating a verifiable network transaction architecture for enhancing network transactions; FIG. 2 is a communication diagram illustrating a transaction for assessing network consumption risk in accordance with a preferred embodiment of the present invention. Control method; Figure 3 is a system block diagram illustrating the components and functions of the user terminal, merchant system, transaction control system, payment system and telecommunication system Figure 4 is a schematic diagram 'Description of the meaning of the information category of the analysis database; 13 201104602 Figure 5 is a schematic diagram showing items obtained from different sources; and Figure 6 is a diagram illustrating network consumption under normal conditions mode.

14 201104602 【主要元件符號說明】 〔習知〕 20···· ••…商家系統 8 ••… ••…通訊網路 220 ·· .....儲存單元 91·.·. •…·驗證系統 30..·· …· ·交易控制系統 92·.·· ……付費系統 330 ·. ••…歷史資料庫 93···· ••…用戶 340 · .....为析^料庫 94··.. .....氣仏糸統 350 ·. ••…規則資料庫 〔本創作〕 370 ·· ……查驗結果資料庫 10.··· ••…用戶終端 40···· ••…付費系統 110、 210 、 310 ' 410 430 ‘‘ …··驗證單元 .....通訊單元 440 ·. 父易寅料庫 120 ·· .....輸入單元 50···· .....电"ίδ糸統 130 ·· .....顯不單元 600 ·· ••…通訊網路 140、 230 、 320 ' 420 S10L· -Sill步驟 控制單元14 201104602 [Explanation of main component symbols] [Practical] 20···· ••...Business System 8 ••... ••...Communication Network 220 ··.....Storage Unit 91·.·.•...·Verification System 30..·····Transaction Control System 92·.··......Payment System 330·.••...Historical Database 93···· ••...User 340 · ..... Library 94··.. ..... 气仏糸350 ·. ••...Rules Database [This Creation] 370 ··......Check Results Database 10.··· ••...User Terminal 40·· ··••...Payment system 110, 210, 310 '410 430 '' ...··Verification unit ..... Communication unit 440 ·. Parental library 120 ··.....Input unit 50·· ···.....Electric" ίδ糸 130 ····. Display unit 600 ·· ••...Communication network 140, 230, 320 ' 420 S10L· -Sill step control unit

1515

Claims (1)

201104602 七、申請專利範圍: 1. 一種評估網路消費風險的交易管財法 業者合作付費的網路交易架 ’、電尨系統 至少-商家夺统、廍用“ 路交易架構包括 李统之Π: 一介於該商家系統及該應用 =之/的父W㈣統’該交易管控系統執行包含下述步 ::⑷分析在該商家系統輸入產生的—電話號碼之資 =及⑻對該電話號碼之資訊配合該電話號碼用戶的歷 史資料依據一消費風險發生模式得出的預定規則輸出一杳 驗結果予該應用系統。 — ^射請專利範圍第丨項所述之評估網路消f風險的交易 官控方法,其中,步驟⑷係將該電話號碼分析轉換為-系 統狀況、一區域訊息及/或—業者訊息。 3 ·依據巾凊專利範圍第1項所述之評估網路消費風險的交易 官控方法,其中,步驟(a)還包括對該該電話號碼用戶的— 身份證號碼分析轉換為一出生地及/或一性別。 4.依據申请專利範圍第1項所述之評估網路消費風險的交易 管控方法,其中,步驟(b)的該歷史資料是包括該用戶於同 一帳號下的一使用次數、一使用IP數、一使用電話號碼數、 一身份證號數及/或一消費金額;同一 Ip下的一使用次數、 使用帳说數 使用電話號碼數、一消費商家數、一身份 證號數、一消費金額;同一電話號碼下的一使用次數、—使 用帳號數、一消費商家數、一身份證號數及/或一消費金額; 及同一身份證號的一使用次數、一使用帳號數、一使用電話 號碼數、一消費商家數、一使用IP數及/或一消費金額。 16 201104602 5. —種交易管控系統,藉由一通訊網路與一商家系統及一應用 系統彼此連接,該交易管控系統包含: 一通訊單元,分析在該商家系統輸入產生的一電話號 碼之資訊;及 一控制單元’對該電話號碼之資訊配合該電話號碼用 戶的歷史資料依據一消費風險發生模式得出的預定規則輸 出一查驗結果予該應用系統。 6. 依據申請專利範圍第5項所述之評估網路消費風險的交易 管控系統,還包括: 一歷史貧料庫,儲存該電話號碼用戶交易的歷史資料; 一分析資料庫’儲存該控制單元將該歷史資料依據不 同的項目類別區分的資料; 一規則資料庫’儲存至少一依據消費風險發生模式得 出的預定規則;及 一查驗結果資料庫’儲存該控制單元對該電話號碼之 資訊配合該電話號碼用戶的歷史資料分析轉換後依據該預 定規則的查驗結果》 7·依據申睛專利範圍第5或6項所述之評估網路消費風險的交 易管控方法’其中’該分析資料庫係儲存該電話號碼經過分 析轉換的一系統狀況、—區域訊息及/或-業者訊息。 8. 依據申清專利範圍第5或6項所述之評估網路消費風險的交 易官控方法’其中’該分析資料庫係儲存該電話號碼用戶的 -身份證號碼經過分析轉換的一出生地及/或一性別。 9. 依據申凊專利範圍第5或6項所述之評估網路消費風險的交 17 201104602 易管控系統’其中’該歷史資料庫係儲存包括該用戶於同一 - 帳號下的一使用次數、一使用IP數、一使用電話號碼數、 - 一身份證號數及/或一消費金額;同一 Ip下的一使用次數、 一使用帳號數、一使用電話號碼數、一消費商家數、一身份 證號數、一消費金額;同一電話號碼下的一使用次數、一使 用帳號數、一消費商家數、一身份證號數及/或一消費金額; 及同一身份證號的一使用次數、一使用帳號數、一使用電話 號碼數、一消費商家數、一使用Ip數及/或一消費金額。 ίο. —種網路交易付費方法,係在一與電信系統業者合作付費鲁 的網路交易架構下運作,該網路交易架構包括至少一商家系 統、一應用系統及一介於該商家系統及該應用系統之間的交 易管控系統’該網路交易付費方法包含下述步驟: (a) 該商家系統接收該用戶終端的一訂單及一電話號 碼資料; (b) 該商家系統將該訂單及該電話號碼資料發送到該 交易控制系統;及 (c) 該交易控制系統接收該訂單及電話號碼資料後分 析在該商家系統輸入產生的一電話號碼之資訊,並對該電® 話號碼之資訊配合該電話號碼用戶的歷史資料依據一消費 風險發生模式得出的預定規則輸出一查驗結果予該應用系 .統° " 依據申請專利範圍第〗〇項所述之網路交易付費方法,其 中,步驟(C)輸出該查驗結果的該應用系統是一付費系統及/ 或一電信系統。 18 201104602 12.依據申岣專利範圍第n ,, 所述之網路交易付費方法,苴 中,還包括步驟(d): 該付費系統係依據該杳驗蛀婁担山 ★ 哕電"站a —驗、,。果&出-查詢請求傳輸給 統,令該電㈣統根據該查詢請求對該用 信帳款繳交記錄提交一杳★旬 電 ㈣結果回傳給該付㈣統作為是 否父易的判斷依據。 依據申明專利範圍第丨2項所述之網路交易付費方法其201104602 VII. The scope of application for patents: 1. A transactional transaction law firm that evaluates the risk of online consumption cooperates with the paid online transaction rack', and the eDonkey system at least-the merchants take over and use the road transaction architecture including Li Tongzhi: one The merchant system and the parent W(4) of the application=the transaction control system performs the following steps: (4) analyzing the information generated by the merchant system input-phone number= and (8) matching the information of the phone number The historical data of the telephone number user outputs a test result to the application system according to a predetermined rule derived from a consumption risk occurrence mode. - The patent transaction control method for evaluating the risk of network elimination as described in the third paragraph of the patent application scope Wherein, step (4) converts the phone number analysis into a system status, a regional message, and/or an operator message. 3. The transaction officer control method for assessing network consumption risk according to item 1 of the patent scope Wherein step (a) further comprises converting the ID card number analysis of the user of the telephone number to a place of birth and/or a gender. The transaction management method for assessing network consumption risk according to Item 1, wherein the historical data of step (b) includes a number of uses of the user under the same account, an use IP number, and a use phone number. Number, one ID number and/or one consumption amount; one usage count under the same Ip, the number of telephone numbers used, the number of consumer merchants, one ID number, one consumption amount; the same telephone number The number of uses, the number of used accounts, the number of merchants, the number of ID cards and/or the amount of consumption; and the number of uses of the same ID number, the number of used accounts, the number of used telephone numbers, and one consumption Number of merchants, one using IP number and/or one spending amount. 16 201104602 5. A transaction management system is connected to a merchant system and an application system by a communication network, the transaction management system comprising: a communication unit, Analyzing the information of a phone number generated in the merchant system input; and a control unit 'the information of the phone number matching the history of the phone number user The data is output to the application system according to a predetermined rule derived from a consumption risk occurrence mode. 6. The transaction management system for assessing network consumption risk according to claim 5 of the patent application scope includes: a library for storing historical data of the user transaction of the telephone number; an analysis database 'storing the data that the control unit distinguishes the historical data according to different item categories; a rule database' storing at least one based on the consumption risk occurrence mode a predetermined rule; and a check result database 'storing the control unit to match the information of the phone number with the historical data of the user of the phone number, and the result of the check according to the predetermined rule. 7· According to the scope of claim 5 or 6 The transaction management method for assessing the risk of network consumption, wherein the analysis database stores a system status, a regional message, and/or an operator information of the telephone number after analysis and conversion. 8. The transaction officer control method for assessing the risk of network consumption according to claim 5 or 6 of the scope of the patent application, wherein the analysis database is a birthplace where the user-ID number of the telephone number is stored and analyzed. And / or a gender. 9. According to the application of the scope of claim 5 or 6 to assess the risk of network consumption, 17 201104602 easy to control system 'where' the historical database storage includes the number of times the user is under the same - account number, one Use IP number, use phone number, - ID card number and / or a spending amount; one usage count under the same IP, one use account number, one use phone number, one consumer merchant number, one ID card Number, one consumption amount; one usage number under the same telephone number, one usage account number, one consumer merchant number, one ID number and/or one consumption amount; and one usage number of the same ID number, one use The number of accounts, the number of used phone numbers, the number of consumers, the number of Ip used, and/or the amount of spending. Ίο. A method of paying for a network transaction, operating under a network transaction architecture in cooperation with a telecommunications system operator, the network transaction architecture comprising at least one merchant system, an application system, and an intervening system and The transaction management system between the application systems includes the following steps: (a) the merchant system receives an order of the user terminal and a phone number data; (b) the merchant system orders the order and the The phone number data is sent to the transaction control system; and (c) the transaction control system receives the order and phone number data, analyzes the information of a phone number generated in the merchant system input, and cooperates with the information of the phone number The historical data of the user of the telephone number outputs a check result to the application system according to a predetermined rule derived from a consumption risk occurrence mode. The internet transaction payment method according to the application scope of the patent application, wherein The application system that outputs the verification result in step (C) is a payment system and/or a telecommunication system. 18 201104602 12. According to the scope of application of the patent scope n, the online transaction payment method, in the middle, also includes the step (d): the payment system is based on the test 蛀娄 ★ ★ ★ ★ ★ ★ 站 站 站—Test,,. If the &out-query request is transmitted to the system, the electricity (4) system submits a record of the payment account payment according to the inquiry request, and the result is returned to the payment (4) as a judgment of whether or not the father is easy. in accordance with. The online transaction payment method according to item 2 of the claimed patent scope 中’該付費系統若研判該查詢結果中該用戶的電信帳款繳^ 記錄不良,則付費系統把不接受該訂單的訊息發送給該用戶 終端;若研判查詢結果中該用戶的電信帳款繳交記錄良好, 則付費系統針對此用戶的訂單發出一確認同意付費的請求 予用戶終端。 3 14·依據申請專利範圍第13項所述之網路交易付費方法,其 中’該付費系統還發出一交易成功的通知訊息予商家系統, 並發出~計費通知訊息給電信系統。If the payment system judges that the user's telecommunication account payment record is poor in the inquiry result, the payment system sends a message that the order is not accepted to the user terminal; if the user's telecommunication account payment is made in the inquiry result If the payment record is good, the payment system issues a request for confirmation of payment to the user terminal for the order of the user. 3 14. According to the online transaction payment method described in claim 13 of the patent application, wherein the payment system also issues a notification message of successful transaction to the merchant system, and issues a notification notification message to the telecommunication system. 1919
TW098125531A 2009-07-29 2009-07-29 To assess the risk of online consumption of trading control methods, systems and online transactions to pay methods TWI521451B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW098125531A TWI521451B (en) 2009-07-29 2009-07-29 To assess the risk of online consumption of trading control methods, systems and online transactions to pay methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW098125531A TWI521451B (en) 2009-07-29 2009-07-29 To assess the risk of online consumption of trading control methods, systems and online transactions to pay methods

Publications (2)

Publication Number Publication Date
TW201104602A true TW201104602A (en) 2011-02-01
TWI521451B TWI521451B (en) 2016-02-11

Family

ID=44813718

Family Applications (1)

Application Number Title Priority Date Filing Date
TW098125531A TWI521451B (en) 2009-07-29 2009-07-29 To assess the risk of online consumption of trading control methods, systems and online transactions to pay methods

Country Status (1)

Country Link
TW (1) TWI521451B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI484430B (en) * 2011-07-07 2015-05-11
CN110084007A (en) * 2014-10-13 2019-08-02 阿里巴巴集团控股有限公司 Construction method, device and the terminal of risk control model
CN110310129A (en) * 2019-06-04 2019-10-08 阿里巴巴集团控股有限公司 Risk Identification Method and its system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108805391A (en) * 2018-04-12 2018-11-13 阿里巴巴集团控股有限公司 Determine the method and device of high risk user
CN109191110B (en) * 2018-07-27 2023-05-23 创新先进技术有限公司 Post-payment transaction data processing method, device, processing equipment and server

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI484430B (en) * 2011-07-07 2015-05-11
CN110084007A (en) * 2014-10-13 2019-08-02 阿里巴巴集团控股有限公司 Construction method, device and the terminal of risk control model
CN110084007B (en) * 2014-10-13 2023-11-28 创新先进技术有限公司 Method, device and terminal for constructing risk control model
CN110310129A (en) * 2019-06-04 2019-10-08 阿里巴巴集团控股有限公司 Risk Identification Method and its system

Also Published As

Publication number Publication date
TWI521451B (en) 2016-02-11

Similar Documents

Publication Publication Date Title
CN102859544B (en) The system and method paid for using mobile device to be traded
US7415431B2 (en) System and method for trusted self-billing and payment for utilities including audit, verification, reconciliation and dispute resolution
US10896477B2 (en) Systems and methods for identity validation and verification
KR100781764B1 (en) Mobile Payment Method
US20180121975A1 (en) Providing security in electronic real-time transactions
US20190318354A1 (en) Secure electronic billing with real-time funds availability
US20190156302A1 (en) System and method for e-receipt platform
TWI521451B (en) To assess the risk of online consumption of trading control methods, systems and online transactions to pay methods
KR20100000080A (en) System for supporting mobile loan service and method thereof
TW200411510A (en) A method and system for transferring funds
CN103489111A (en) Integrated community electronic commerce system
KR20060093575A (en) Method for settling using a portable phone
US20150294379A1 (en) Method and apparatus to introduce billing architecture for different utility events and to grant cross domain promotions
KR20120100283A (en) System and method for electronic payment
CN101673443B (en) Network cash register system and realization method thereof
KR20010044684A (en) Monetary settlement system and method for member shop using credit card and mobile communication
WO2007004794A1 (en) Offer method of total finance service in ubiquitous environment and system for the same
KR101889360B1 (en) Method of paying mobile, terminal performing the same, server performing the same and storage media storing the same
KR100875246B1 (en) Loan Information Provision System
KR20140017240A (en) Sistem a issue card for having made to foreign
KR101993754B1 (en) Apparatus and system for opening an account of financial goods for gift based on message and method thereof
KR20130041974A (en) Mobile device pay method
Tong AN ANALYSIS ON THE MOBILE PAYMENT INDUSTRY IN CHINA AND ITS IMPLICATIONS TO MALAYSIA
WO2006114023A1 (en) System for personal consuming account
TWI303787B (en) A prompt bill system and the method of using it