TWI488131B - Fake card analysis systems and methods, and computer program products thereof - Google Patents
Fake card analysis systems and methods, and computer program products thereof Download PDFInfo
- Publication number
- TWI488131B TWI488131B TW097150832A TW97150832A TWI488131B TW I488131 B TWI488131 B TW I488131B TW 097150832 A TW097150832 A TW 097150832A TW 97150832 A TW97150832 A TW 97150832A TW I488131 B TWI488131 B TW I488131B
- Authority
- TW
- Taiwan
- Prior art keywords
- specific
- pseudo
- card
- code
- transaction data
- Prior art date
Links
Description
本發明係有關於一種偽卡(Fake Card)分析系統及方法,且特別有關於一種可以依據既有偽卡分析出可能之偽卡的系統及方法。The present invention relates to a fake card (Fake Card) analysis system and method, and more particularly to a system and method for analyzing a possible pseudo card based on an existing pseudo card.
金融交易已經成為現代人生活中的一部分。無論儲蓄、購物、付款等都屬於金融交易的一部分。隨著信用交易的便利與普及,許多人擁有至少一張信用卡,用以進行相關消費與服務。然而,在目前的社會環境中,信用卡遭到偷竊與偽造的情況層出不窮。偽卡的出現已經造成使用者與收單行,如銀行業者的極大困擾。Financial transactions have become a part of modern life. Whether it is savings, shopping, payment, etc., it is part of a financial transaction. With the convenience and popularity of credit transactions, many people have at least one credit card for related consumption and services. However, in the current social environment, credit card theft and forgery have emerged endlessly. The emergence of pseudo-cards has caused great confusion for users and acquirers, such as bankers.
目前來說,現在對於偽卡的資訊僅能透過使用者的回報得知。舉例來說,當使用者發現信用卡失竊或是帳單中發現未授權的消費時,才通知發卡的銀行,銀行才會將此信用卡列為偽卡,並凍結其交易。由於銀行係被動得知偽卡的資訊,因此,往往都會無可避免地造成一些損失,進而造成使用者、消費商戶、與銀行間的爭議。另外,銀行對於偽卡的外流點,如特定商戶的分析亦無有效且可靠的機制。往往在造成大量損失之後,銀行才會停止特定可疑商戶的收單權限。At present, the information on the fake card can only be known through the user's return. For example, when a user discovers that a credit card has been stolen or an unauthorized purchase is found in the bill, the bank that issued the card is notified, and the bank will list the credit card as a fake card and freeze the transaction. Since the bank is passively aware of the information of the fake card, it often inevitably causes some losses, which in turn leads to disputes between users, consumer merchants, and banks. In addition, banks have no effective and reliable mechanism for the outflow point of pseudo-cards, such as the analysis of specific merchants. Often, after causing a large amount of losses, the bank will stop the acquiring rights of certain suspicious merchants.
有鑑於此,本發明提供偽卡分析系統及方法。In view of this, the present invention provides a pseudo card analysis system and method.
本發明實施例之一種偽卡分析系統包括一儲存單元、一使用者介面、與一處理單元。儲存單元包括複數交易資料。其中,每一交易資料至少包括一卡片號碼與一消費端代碼。使用者介面接收相應至少一偽卡號碼之選擇。處理單元耦接至儲存單元,用以依據此至少一偽卡號碼由交易資料中擷取包括此至少一偽卡號碼之複數第一特定交易資料,且由第一特定交易資料中擷取至少一特定消費端代碼。處理單元依據此至少一特定消費端代碼由交易資料中擷取包括此至少一特定消費端代碼之複數第二特定交易資料,且由第二特定交易資料中擷取至少一特定卡片號碼。之後,處理單元產生一警示訊息,用以提醒此至少一特定卡片號碼可能係一偽卡。A pseudo card analysis system according to an embodiment of the present invention includes a storage unit, a user interface, and a processing unit. The storage unit includes a plurality of transaction materials. Each transaction data includes at least one card number and one consumer code. The user interface receives a selection of at least one pseudo card number. The processing unit is coupled to the storage unit, configured to retrieve, by the at least one pseudo-card number, the first specific transaction data including the at least one pseudo-card number from the transaction data, and extract at least one from the first specific transaction data Specific consumer code. The processing unit retrieves the second specific transaction data including the at least one specific consumer code from the transaction data according to the at least one specific consumer code, and retrieves at least one specific card number from the second specific transaction data. Thereafter, the processing unit generates a warning message to remind that the at least one specific card number may be a pseudo card.
本發明實施例之一種偽卡分析方法。首先,接收相應至少一偽卡號碼之選擇。依據此至少一偽卡號碼由交易資料中擷取包括此至少一偽卡號碼之複數第一特定交易資料,且由第一特定交易資料中擷取至少一特定消費端代碼。其中,每一交易資料至少包括一卡片號碼與一消費端代碼。依據此至少一特定消費端代碼由交易資料中擷取包括此至少一特定消費端代碼之複數第二特定交易資料,且由第二特定交易資料中擷取至少一特定卡片號碼。之後,產生一警示訊息,用以提醒此至少一特定卡片號碼可能係一偽卡。A pseudo card analysis method according to an embodiment of the present invention. First, a selection of at least one pseudo card number is received. And extracting, by the at least one pseudo-card number, the first specific transaction data including the at least one pseudo-card number from the transaction data, and extracting at least one specific consumer code from the first specific transaction data. Each transaction data includes at least one card number and one consumer code. According to the at least one specific consumer code, the second specific transaction data including the at least one specific consumer code is retrieved from the transaction data, and at least one specific card number is extracted from the second specific transaction data. Thereafter, a warning message is generated to remind that the at least one specific card number may be a fake card.
本發明上述方法可以透過程式碼方式存在。當程式碼被機器載入且執行時,機器變成用以實行本發明之裝置。The above method of the present invention can exist in a coded manner. When the code is loaded and executed by the machine, the machine becomes the means for practicing the invention.
為使本發明之上述目的、特徵和優點能更明顯易懂,下文特舉實施例,並配合所附圖示,詳細說明如下。The above described objects, features, and advantages of the invention will be apparent from the description and appended claims appended claims
第1圖顯示依據本發明實施例之偽卡分析系統。Figure 1 shows a pseudo card analysis system in accordance with an embodiment of the present invention.
依據本發明實施例之偽卡分析系統1000包括一儲存單元1100、一使用者介面1200、與一處理單元1300。第2圖顯示依據本發明實施例之儲存單元。如第2圖所示,儲存單元1100包括複數候選偽卡號碼1110與複數交易資料1120。偽卡號碼1110可以是已知或懷疑為偽卡的號碼。交易資料1120可以係透過一網路由複數主機,如收單行或終端機所接收。每一交易資料1120的內容可以至少包括一卡片號碼1121、一消費端代碼1122,如商戶代碼與/或終端機代碼、一收單行代碼1123、一消費時間1124、與一消費內容1125,如第3圖所示。使用者介面1200可以顯示相關資訊且接收相關選擇與輸入。處理單元1300係用以執行本案之偽卡分析方法,其細節將於後進行說明。The pseudo card analysis system 1000 according to the embodiment of the present invention includes a storage unit 1100, a user interface 1200, and a processing unit 1300. Figure 2 shows a storage unit in accordance with an embodiment of the present invention. As shown in FIG. 2, the storage unit 1100 includes a plurality of candidate fake card numbers 1110 and a plurality of transaction materials 1120. The fake card number 1110 may be a number known or suspected to be a fake card. The transaction data 1120 can be routed through a network to a plurality of hosts, such as an acquirer or a terminal. The content of each transaction data 1120 may include at least a card number 1121, a consumer code 1122, such as a merchant code and/or a terminal code, an order line code 1123, a consumption time 1124, and a consumption content 1125, such as Figure 3 shows. The user interface 1200 can display relevant information and receive relevant selections and inputs. The processing unit 1300 is used to perform the pseudo card analysis method of the present case, the details of which will be described later.
第4圖顯示依據本發明實施例之偽卡分析方法。Figure 4 shows a pseudo card analysis method in accordance with an embodiment of the present invention.
如步驟S4100,透過使用者介面1200接收相應至少一偽卡號碼之選擇。值得注意的是,在一些實施例中,使用者介面1200中可以先顯示多個候選偽卡號碼1110。使用者可以透過使用者介面1200選擇一個或多個候選偽卡號碼1110。另外,在一些實施例中,使用者亦可透過使用者介面1200選擇一消費區間。當接收到消費區間時,儲存單元1100中的交易資料將會依據消費區間進行過濾,以將消費時間落於消費區間之外的交易資料排除。如步驟S4200,由交易資料中擷取包括此至少一偽卡號碼之複數第一特定交易資料。注意的是,當多個偽卡號碼被選定時,所有包括這些偽卡號碼中之一者之交易資料都會被擷取為此第一特定交易資料。如步驟S4300,由這些第一特定交易資料中擷取至少一特定消費端代碼。其中,特定消費端代碼可以包括特定之商戶代碼與/或終端機代碼。注意的是,在一些實施例中,擷取出之特定消費端代碼可以依據不同偽卡號碼的出現數目來進行排序。舉例來說,選定之偽卡號碼包括A卡與B卡。若第一特定交易資料中一第一消費端曾出現A卡與B卡,而一第二消費端僅出現A卡,則經過排序後,第一消費端的代碼將會排在第二消費端的代碼之前。在一些實施例中,排序後之特定消費端代碼可以透過使用者介面1200進行顯示。如步驟S4400,由交易資料中擷取包括此至少一特定消費端代碼之複數第二特定交易資料。注意的是,在一些實施例中,特定消費端代碼中之一個或多個可以進行選擇,且所有包括這些特定消費端代碼中之一者之交易資料都會被擷取為此第二特定交易資料。如步驟S4500,由這些第二特定交易資料中擷取至少一特定卡片號碼,且如步驟S4600,產生至少一警示訊息,用以提醒此至少一特定卡片號碼可能係一偽卡。In step S4100, a selection of at least one pseudo card number is received through the user interface 1200. It should be noted that in some embodiments, multiple candidate pseudo-card numbers 1110 may be displayed first in the user interface 1200. The user can select one or more candidate pseudo-card numbers 1110 through the user interface 1200. In addition, in some embodiments, the user can also select a consumption interval through the user interface 1200. When the consumption interval is received, the transaction data in the storage unit 1100 will be filtered according to the consumption interval to exclude the transaction data whose consumption time falls outside the consumption interval. In step S4200, the first specific transaction data including the at least one pseudo card number is retrieved from the transaction data. Note that when multiple pseudo card numbers are selected, all transaction data including one of these pseudo card numbers will be retrieved for this first specific transaction data. In step S4300, at least one specific consumer code is retrieved from the first specific transaction materials. Wherein, the specific consumer code may include a specific merchant code and/or terminal code. It is noted that in some embodiments, the particular consumer code that is retrieved may be ordered according to the number of occurrences of different pseudo card numbers. For example, the selected fake card number includes an A card and a B card. If an A card and a B card appear in a first consumer in the first specific transaction data, and only a card appears in a second consumer, after the sorting, the code of the first consumer will be ranked in the code of the second consumer. prior to. In some embodiments, the sorted specific consumer code can be displayed through the user interface 1200. In step S4400, a plurality of second specific transaction materials including the at least one specific consumer code are retrieved from the transaction data. It is noted that in some embodiments, one or more of the specific consumer code can be selected, and all transaction data including one of the specific consumer codes is retrieved as the second specific transaction data. . In step S4500, at least one specific card number is retrieved from the second specific transaction materials, and in step S4600, at least one alert message is generated to remind the at least one specific card number that a pseudo-card may be attached.
注意的是,在一些實施例中,特定卡片號碼可以依據其各自的消費次數進行排序,且將排序後之特定卡片號碼顯示於使用者介面1200。在一些實施例中,可以依據每一特定卡片號碼的消費次數進行過濾。當消費次數超過一既定次數時,則相應之特定卡片號碼被判定可能係偽卡,且產生警示訊息。另外,在一些實施例中,產生之警示訊息可以透過網路傳送至相應之主機,如收單行與/或終端機中。It is noted that in some embodiments, the particular card numbers may be ordered according to their respective consumption counts, and the sorted specific card numbers are displayed on the user interface 1200. In some embodiments, filtering may be based on the number of consumptions for each particular card number. When the number of consumption exceeds a predetermined number of times, the corresponding specific card number is determined to be a fake card, and a warning message is generated. In addition, in some embodiments, the generated alert message can be transmitted over the network to a corresponding host, such as an acquirer and/or a terminal.
因此,透過本案之偽卡分析系統及方法可以依據既有偽卡分析出可能之偽卡,以提早進行後續管理。舉例來說,對於這些偽卡進行換卡,以避免不必要的損失。Therefore, the pseudo card analysis system and method of the present invention can analyze possible pseudo cards according to the existing pseudo cards, so as to carry out subsequent management early. For example, these fake cards are exchanged to avoid unnecessary losses.
本發明之方法,或特定型態或其部份,可以以程式碼的型態存在。程式碼可以包含於實體媒體,如軟碟、光碟片、硬碟、或是任何其他機器可讀取(如電腦可讀取)儲存媒體,亦或不限於外在形式之電腦程式產品,其中,當程式碼被機器,如電腦載入且執行時,此機器變成用以參與本發明之裝置。程式碼也可以透過一些傳送媒體,如電線或電纜、光纖、或是任何傳輸型態進行傳送,其中,當程式碼被機器,如電腦接收、載入且執行時,此機器變成用以參與本發明之裝置。當在一般用途處理單元實作時,程式碼結合處理單元提供一操作類似於應用特定邏輯電路之獨特裝置。The method of the invention, or a particular type or portion thereof, may exist in the form of a code. The code may be included in a physical medium such as a floppy disk, a CD, a hard disk, or any other machine readable (such as computer readable) storage medium, or is not limited to an external computer program product, wherein When the code is loaded and executed by a machine, such as a computer, the machine becomes a device for participating in the present invention. The code can also be transmitted via some transmission medium, such as a wire or cable, fiber optics, or any transmission type, where the machine becomes part of the program when it is received, loaded, and executed by a machine, such as a computer. Invented device. When implemented in a general purpose processing unit, the code combination processing unit provides a unique means of operation similar to application specific logic.
雖然本發明已以較佳實施例揭露如上,然其並非用以限定本發明,任何熟悉此項技藝者,在不脫離本發明之精神和範圍內,當可做些許更動與潤飾,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。While the present invention has been described in its preferred embodiments, the present invention is not intended to limit the invention, and the present invention may be modified and modified without departing from the spirit and scope of the invention. The scope of protection is subject to the definition of the scope of the patent application.
1000...偽卡分析系統1000. . . Pseudo card analysis system
1100...儲存單元1100. . . Storage unit
1110...候選偽卡號碼1110. . . Candidate pseudo card number
1120...交易資料1120. . . Transaction data
1121...卡片號碼1121. . . Card number
1122...消費端代碼1122. . . Consumer code
1123...收單行代碼1123. . . Acquire line code
1124...消費時間1124. . . Consumption time
1125...消費內容1125. . . Consumer content
1200...使用者介面1200. . . user interface
1300...處理單元1300. . . Processing unit
S4100、S4200、...、S4600...步驟S4100, S4200, ..., S4600. . . step
第1圖為一示意圖係顯示依據本發明實施例之偽卡分析系統。Figure 1 is a schematic diagram showing a pseudo card analysis system in accordance with an embodiment of the present invention.
第2圖為一示意圖係顯示依據本發明實施例之儲存單元。Figure 2 is a schematic diagram showing a storage unit in accordance with an embodiment of the present invention.
第3圖為一示意圖係顯示依據本發明實施例之交易資料。Figure 3 is a schematic diagram showing transactional material in accordance with an embodiment of the present invention.
第4圖為一流程圖係顯示依據本發明實施例之偽卡分析方法。Figure 4 is a flow chart showing a pseudo card analysis method in accordance with an embodiment of the present invention.
S4100、S4200、...、S4600...步驟S4100, S4200, ..., S4600. . . step
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW097150832A TWI488131B (en) | 2008-12-26 | 2008-12-26 | Fake card analysis systems and methods, and computer program products thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW097150832A TWI488131B (en) | 2008-12-26 | 2008-12-26 | Fake card analysis systems and methods, and computer program products thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201025178A TW201025178A (en) | 2010-07-01 |
TWI488131B true TWI488131B (en) | 2015-06-11 |
Family
ID=44852494
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW097150832A TWI488131B (en) | 2008-12-26 | 2008-12-26 | Fake card analysis systems and methods, and computer program products thereof |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI488131B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1403967A (en) * | 2001-08-23 | 2003-03-19 | 广频科技股份有限公司 | Credit card trade safety management system and method |
US20060149674A1 (en) * | 2004-12-30 | 2006-07-06 | Mike Cook | System and method for identity-based fraud detection for transactions using a plurality of historical identity records |
TW200643815A (en) * | 2005-06-15 | 2006-12-16 | qi-qing Chen | Data reading device with multi-authentication function and authentication system thereof |
TW200744005A (en) * | 2006-05-22 | 2007-12-01 | Qware System & Services Corp | Safety mechanism for trading and method of same |
CN101236638A (en) * | 2008-02-20 | 2008-08-06 | 中国工商银行股份有限公司 | Web based bank card risk monitoring method and system |
-
2008
- 2008-12-26 TW TW097150832A patent/TWI488131B/en active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1403967A (en) * | 2001-08-23 | 2003-03-19 | 广频科技股份有限公司 | Credit card trade safety management system and method |
US20060149674A1 (en) * | 2004-12-30 | 2006-07-06 | Mike Cook | System and method for identity-based fraud detection for transactions using a plurality of historical identity records |
TW200643815A (en) * | 2005-06-15 | 2006-12-16 | qi-qing Chen | Data reading device with multi-authentication function and authentication system thereof |
TW200744005A (en) * | 2006-05-22 | 2007-12-01 | Qware System & Services Corp | Safety mechanism for trading and method of same |
CN101236638A (en) * | 2008-02-20 | 2008-08-06 | 中国工商银行股份有限公司 | Web based bank card risk monitoring method and system |
Also Published As
Publication number | Publication date |
---|---|
TW201025178A (en) | 2010-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200258167A1 (en) | Automatic Triggering of Receipt Delivery | |
AU2002244117B2 (en) | System and method for depicting on-line transactions | |
US20190392452A1 (en) | Systems and methods for providing merchant fraud alerts | |
Holt et al. | Exploring stolen data markets online: products and market forces | |
US9123040B2 (en) | Systems and methods for encoded alias based transactions | |
US20140172697A1 (en) | Systems and methods for detecting fraud in retail return transactions | |
US20110251869A1 (en) | System and method for detecting fraudulent affiliate marketing in an online environment | |
AU2002244117A1 (en) | System and method for depicting on-line transactions | |
Akinola | Cashless society, problems and prospects, data mining research potentials | |
CN108230151A (en) | A kind of suspicious transaction detection method, apparatus, equipment and storage medium | |
US20170161745A1 (en) | Payment account fraud detection using social media heat maps | |
WO2019204274A1 (en) | System and method for storing data used by breach detection systems | |
US11354668B2 (en) | Systems and methods for identifying devices used in fraudulent or unauthorized transactions | |
US20200143355A1 (en) | Telephone-based payments using tokens | |
WO2017032056A1 (en) | Point-of-sale-based cash-out determining method and apparatus | |
JP6947185B2 (en) | Anomaly detectors, control methods, and programs | |
KR20150061539A (en) | Providing method and system for preventing fraud trading | |
Reardon et al. | Visualization of ATM usage patterns to detect counterfeit cards usage | |
US20140032370A1 (en) | Automatically Linking Product Serial Numbers | |
TWI488131B (en) | Fake card analysis systems and methods, and computer program products thereof | |
Wang et al. | Conventionalists, pioneers and criminals choosing between a national currency and a global currency | |
Shetty et al. | Investigation of Card Skimming Cases: An Indian Perspective | |
US20150348212A1 (en) | Systems and Methods for Graphically Rendering Account Data | |
JP7265072B1 (en) | Information processing system, information processing method and program | |
CN116882998A (en) | Virtual currency fund analysis method |