WO2019165669A1 - 防止银行卡盗刷的方法、装置、计算机设备及存储介质 - Google Patents

防止银行卡盗刷的方法、装置、计算机设备及存储介质 Download PDF

Info

Publication number
WO2019165669A1
WO2019165669A1 PCT/CN2018/081508 CN2018081508W WO2019165669A1 WO 2019165669 A1 WO2019165669 A1 WO 2019165669A1 CN 2018081508 W CN2018081508 W CN 2018081508W WO 2019165669 A1 WO2019165669 A1 WO 2019165669A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
target
information
current
user
Prior art date
Application number
PCT/CN2018/081508
Other languages
English (en)
French (fr)
Inventor
石宇
李云利
张小敏
张文君
李辉
朱小冬
邓轶楠
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019165669A1 publication Critical patent/WO2019165669A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3224Transactions dependent on location of M-devices

Definitions

  • the present application relates to the field of bank card security, and in particular, to a method, device, computer device and storage medium for preventing bank card theft.
  • the anti-theft brush measures mainly set rules such as rule engine, black and white list and transaction frequency on the big data platform. The setting of these rules is insufficient for the increasingly mature stealing brush technology, and the user's bank card still exists. Pirates risk, assets are not safe enough.
  • the application provides a method, a device, a computer device and a storage medium for preventing bank card theft, so as to solve the problem of preventing the bank card from being stolen and causing capital loss.
  • the present application provides a method for preventing bank card theft, including:
  • Obtaining a transaction request including a user ID and current transaction information, the current transaction information including current transaction location information and current transaction time;
  • target transaction information that is closest to the current transaction time based on the user ID, the target transaction information including target transaction location information and target transaction time;
  • the user account corresponding to the user ID is frozen.
  • the present application provides an apparatus for preventing bank card theft, including:
  • a transaction request obtaining module configured to acquire a transaction request, where the transaction request includes a user ID and current transaction information, where the current transaction information includes current transaction location information and current transaction time;
  • a target transaction information obtaining module configured to acquire target transaction information that is closest to a current transaction time based on a user ID, where the target transaction information includes target transaction location information and a target transaction time;
  • a distance and time parameter obtaining module configured to acquire at least one driving path distance based on the current transaction location information and the target transaction location information, and obtain a transaction time difference based on the current transaction time and the target transaction time;
  • a target speed value obtaining module configured to acquire a target speed value based on at least one of the travel path distance and the transaction time difference
  • a security operation module configured to freeze the user account corresponding to the user ID if the target speed value exceeds a preset speed threshold.
  • the present application provides a computer device comprising a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, the processor executing the computer readable instructions The following steps are implemented:
  • Obtaining a transaction request including a user ID and current transaction information, the current transaction information including current transaction location information and current transaction time;
  • target transaction information that is closest to the current transaction time based on the user ID, the target transaction information including target transaction location information and target transaction time;
  • the user account corresponding to the user ID is frozen.
  • the embodiment of the present application provides one or more non-volatile readable storage media storing computer readable instructions, when the computer readable instructions are executed by one or more processors, such that the one or Multiple processors implement the following steps:
  • Obtaining a transaction request including a user ID and current transaction information, the current transaction information including current transaction location information and current transaction time;
  • target transaction information that is closest to the current transaction time based on the user ID, the target transaction information including target transaction location information and target transaction time;
  • the user account corresponding to the user ID is frozen.
  • Embodiment 1 is a flow chart of a method for preventing bank card theft in Embodiment 1;
  • Embodiment 2 is another flow chart of a method for preventing bank card theft in Embodiment 1;
  • FIG. 3 is a specific schematic view of step S20 of Figure 1;
  • FIG. 4 is a specific schematic view of step S30 of Figure 1;
  • Embodiment 5 is another flow chart of a method for preventing bank card theft in Embodiment 1;
  • FIG. 6 is a schematic block diagram of an apparatus for preventing bank card theft in Embodiment 2;
  • Figure 7 is a schematic diagram of a computer device in Embodiment 4.
  • FIG. 1 is a flow chart showing a method of preventing bank card theft in this embodiment.
  • the method for preventing bank card theft is applied when the user uses the bank card to conduct a transaction, and calculates whether the current transaction information belongs to the credit card security range by using the current transaction information and the historical transaction information closest to the current transaction, if not the credit card security scope. , the bank card account is frozen to protect the security of the user's bank card.
  • the method for preventing bank card theft includes the following steps:
  • S10 Acquire a transaction request, the transaction request includes a user ID and current transaction information, and the current transaction information includes current transaction location information and current transaction time.
  • the server acquires a transaction request sent by the transaction terminal, that is, the user sends a transaction request to the server through the transaction terminal, so that the server performs processing based on the transaction request to determine whether to conduct the transaction.
  • Trading terminals include, but are not limited to, POS machines, ATM machines, bank counter card swiping devices, and online banking operating terminals that support bank card swiping transactions.
  • a transaction request is a request for a transaction to be received by a transaction terminal and sent to a server when the user conducts a transaction.
  • the transaction request includes the user ID and current transaction information.
  • the user ID is an identifier for identifying the user, including but not limited to the user's bank card number, and the current transaction information is transaction information requesting the current transaction to occur.
  • Current transaction information includes current trading location information and current trading hours.
  • the current transaction location information refers to the location information of the transaction terminal corresponding to the transaction when the user uses the bank card to perform the card transaction at the transaction terminal.
  • the current trading time refers to the trading time corresponding to the transaction when the user uses the bank card to conduct a credit card transaction at the trading terminal.
  • the location information of the transaction terminal may determine the location of the corresponding transaction terminal by acquiring the terminal identifier of the transaction terminal.
  • the terminal identifier includes, but is not limited to, a number of the transaction terminal and an IP address of the transaction terminal. If the transaction terminal is a POS machine, the transaction terminal identifier further includes a merchant number.
  • S20 Obtain target transaction information that is closest to the current transaction time based on the user ID, and the target transaction information includes target transaction location information and target transaction time.
  • the target transaction information refers to the transaction information corresponding to a transaction that is closest to the current transaction time when the user uses the same bank card for the card transaction.
  • a transaction that is closest to the current trading time is referred to as a target transaction.
  • the target transaction information includes the target trading location information and the target trading time.
  • the target transaction location information refers to the location information of the transaction terminal that performs the target transaction.
  • the target trading time is the trading time corresponding to the target trading.
  • the server connected to the transaction terminal After obtaining the transaction request, acquires the target transaction information closest to the current transaction time based on the user ID and the current transaction time, thereby obtaining the target transaction location and the target transaction time.
  • the target transaction time and the target transaction location information in the target transaction information are obtained, so as to determine whether the current transaction information of the user is reasonable based on the target transaction time and the target transaction location information, thereby calculating that the user uses the bank card to perform the card swipe operation. Whether it is safe and whether it is safe to determine whether to respond to the transaction request.
  • S30 Acquire at least one driving path distance based on current transaction location information and target transaction location information, and obtain a transaction time difference based on the current transaction time and the target transaction time.
  • the travel path distance refers to the distance length corresponding to the travel path.
  • the driving route refers to a path corresponding to different traffic modes between the current trading position information and the target trading position information.
  • the travel path distance is the distance corresponding to the travel path.
  • Each travel route includes a travel mode from the location where the current transaction location information is located to the location where the target transaction location information is located, and a corresponding travel route distance, and different travel modes correspond to different travel path distances, and therefore, based on current transaction location information and
  • the target trading position information can acquire at least one driving path distance.
  • the location from the location where the current transaction location information is located to the target transaction location information includes at least one driving route, and each driving path corresponds to a driving path distance.
  • the current trading time and the target trading time are used to obtain the trading time difference, and the trading time difference can reflect the time interval between the current trading time and the target trading time.
  • S40 Acquire a target speed value based on at least one driving path distance and a trading time difference.
  • Speed calculation formula based on at least one travel path distance and transaction time difference 3 Certainly to calculate the value corresponding to at least one speed, wherein, V 0 is the use of speed calculation formula to calculate the velocity value, S n refers to at least one travel path distance, t 0 is the current transaction time, t 1 Refers to the target trading time.
  • the target speed value refers to the speed value V 0 calculated by the at least one travel path distance corresponding to the travel mode with the fastest travel speed and the transaction time difference, and the maximum speed value of the speed value V 0 is the target speed value.
  • the maximum speed value is selected as the target speed value, and step S50 is executed to reduce the number of speed values and the preset speed threshold value, thereby improving the processing efficiency of the judging process.
  • a user account is an account associated with a bank card that the user fills in when the bank card is opened.
  • the preset speed threshold refers to a preset speed threshold, which includes the maximum speed value of the passenger airliner, the maximum speed value of the high-speed rail, the maximum speed value of the motor vehicle, and the maximum speed value of the automobile.
  • the maximum speed value of the passenger airliner is 1000 km/h
  • the maximum speed value of the high-speed rail is 350 km/h
  • the maximum speed value of the motor train is 220 km/h
  • the maximum speed of the automobile is 120 km/h.
  • each speed threshold corresponds to a mode of travel, and when determining the current transaction location information and the target transaction location information, the corresponding direct and fastest mode of travel between the two places can be determined. In order to determine a corresponding preset speed threshold based on the direct and fastest way of travel.
  • the corresponding traffic travel mode is obtained based on the target speed value, and the preset speed threshold corresponding to the traffic travel mode is selected. If the target speed value is greater than the preset speed threshold, the current transaction is proved to be abnormal. Since the target speed value is the largest one of the speed values of the location where the target transaction location information is located and the location where the current transaction location information is located, the case where the target velocity value is greater than the preset velocity threshold does not exist, thereby determining the There is an abnormality in the current transaction.
  • the server When the server calculates that the target speed value exceeds the preset speed threshold, the operation of the user account corresponding to the user ID is frozen, so that the user account cannot perform the current transaction. At the same time, the server will issue an exception handling request to the bank staff in time, so that the bank staff can make a telephone return visit to the mobile phone number reserved by the user at the bank. At the same time, the server also sends an abnormal reminder notification information to the client terminal corresponding to the user ID (the client terminal includes but is not limited to the mobile phone corresponding to the mobile phone number reserved by the user at the bank), and the abnormal reminder notification information refers to reminding the user User accounts have security risks and need to be processed in a timely manner. The user can perform corresponding operations based on the information content in the abnormal reminder notification information. For example, the abnormal reminder notification information prompts the user to perform a freeze operation according to a specific verification code in the information content, and when the current transaction is terminated, the user can The verification code is sent to the corresponding server to secure the funds in the bank card.
  • the state of the user account corresponding to the user ID is changed from a normal state to a frozen state in the server, so that the user account cannot be re-sold when it is in a frozen state.
  • the frozen state can be released to restore the normal state to ensure the security of the user account.
  • the method for preventing bank card theft is obtained by acquiring the current transaction location information and the target transaction location information of the user, acquiring at least one driving path distance between the two location information, and obtaining the transaction time difference by acquiring the current transaction time and the target transaction time.
  • the speed calculation formula is used to obtain the target speed value, and the target speed value is compared with the preset speed threshold. If the target speed value exceeds the preset speed threshold, it indicates that the target speed value is abnormal, so that the current transaction is unsafe. At this time, the user account corresponding to the user ID is frozen to ensure the security of the user's bank card.
  • the method for preventing bank card theft before the step of acquiring the target transaction information closest to the current transaction time based on the user ID, the method for preventing bank card theft further includes the following steps:
  • S201 Determine whether the user account corresponding to the user ID is in a frozen state, and if not in the frozen state, perform the step of acquiring target transaction information that is closest to the current transaction time based on the user ID.
  • the server connected to the transaction terminal checks the status of the user account corresponding to the user ID based on the user ID in the transaction request, and determines whether it is in a frozen state or a normal state, if not in a frozen state ( That is, the normal state, it means that the user account corresponding to the user ID is normal, and the transaction can be performed. At this time, the server connected to the transaction terminal performs step S20.
  • S202 If it is in a frozen state, prompting to enter the identity verification process, collecting the face image of the user, and using the face recognition method to compare and verify the face image and the pre-stored ID card image, if the verification is passed, execute The step of acquiring the target transaction information closest to the current transaction time based on the user ID.
  • the authentication process refers to a verification process for verifying the identity of the user.
  • the authentication process obtains the face image of the user through the camera carried by the transaction terminal itself, and uses the face recognition method pre-stored in the server to obtain the face image and the pre-stored image.
  • the ID image of the ID card is compared and verified, and the matching probability is obtained. If the matching probability is greater than the preset probability, the verification is considered to pass; if the matching probability is not greater than the preset probability, the verification is considered to be unsuccessful. If the verification is passed, the user is proved to be the account holder of the bank card, and step S20 is performed.
  • the ID image of the pre-stored ID card refers to the ID image of the ID card collected by the user when the bank account is opened, and the ID image of the ID card is stored in the server.
  • the user account corresponding to the user ID is in a frozen state, and if not in the frozen state, the user account corresponding to the user ID can be traded. If it is in a frozen state, the user needs to enter the authentication process. After the authentication is passed, the user account corresponding to the user ID can be traded. The user can authenticate directly at the transaction terminal, prove that he is the account holder of the user account, and enable the server to release the frozen state of the user account, so that the user can complete the current operation process.
  • step S20 the target transaction information that is closest to the current transaction time is obtained based on the user ID, and specifically includes the following steps:
  • S21 Acquire corresponding historical transaction information based on the user ID, and the historical transaction information includes historical transaction time.
  • the historical transaction information refers to the transaction information of the user account corresponding to the user ID that has been completed (ie, the historical transaction) before the current transaction.
  • the historical transaction information includes historical trading time, and the historical trading time refers to the trading time corresponding to each historical transaction, and the server records the trading time of the transaction every time the user completes a transaction.
  • the historical transaction time corresponding to each historical transaction before the current transaction time is obtained based on the user ID, so that the target transaction information with the smallest time difference between the current transaction time and the current transaction time is obtained based on the historical transaction time in step S22.
  • S22 Calculate the time difference between each historical transaction time and the current transaction time based on the current transaction time and the historical transaction time, and select the historical transaction information with the smallest time difference as the target transaction information.
  • the time difference between each historical trading time and the current trading time is calculated, and the transaction information corresponding to the historical trading time with the smallest time difference is obtained as the target trading information.
  • the target transaction information is transaction information of a historical transaction that is closest to the current trading time, and the historical transaction that is closest to the current time transaction is the target transaction.
  • the transaction request is sent to the server through the transaction terminal, so as to determine the target transaction based on the transaction request, thereby determining whether the credit card transaction is abnormal by using the target transaction, because the target transaction information is provided more Accurate information makes it easier to judge whether the current transaction is safe.
  • the historical transaction information whose historical transaction time is closest to the current transaction time is selected as the target transaction information from the historical transaction information corresponding to the user account, so that the user account corresponding to the user ID is conveniently determined by the target transaction time and the current transaction time. Whether there is a stolen brush in the two most recent transactions.
  • step S30 acquiring at least one driving path distance based on current transaction location information and target transaction location information, specifically including the following steps:
  • S31 Convert the current transaction location information and the target transaction location information into a current transaction latitude and longitude value and a target transaction latitude and longitude value, respectively.
  • the current transaction location information includes current transaction IP address information
  • the target transaction location information includes target transaction IP address information.
  • the current transaction latitude and longitude value refers to the latitude and longitude coordinates corresponding to the current transaction position
  • the target transaction latitude and longitude value refers to the latitude and longitude coordinates corresponding to the target transaction position.
  • Step S31 the current transaction location information and the target transaction location information are respectively converted into the current transaction latitude and longitude value and the target transaction latitude and longitude value, specifically including the following steps: converting the current transaction IP address information and the target transaction IP address information based on the IP address latitude and longitude database The corresponding current latitude and longitude value and the target trading latitude and longitude value.
  • the IP address latitude and longitude database refers to the geoip database, which is data for storing the mapping relationship between the IP address information and the location mapped to the corresponding country, province, city, or even the street.
  • the location is a specific location of the IP address information in terms of latitude and longitude values. Based on the current transaction IP address information in the current transaction location information and the target transaction IP address information in the target transaction location information, the current transaction latitude and longitude value and the target transaction latitude and longitude value obtained by the mapping relationship in the geoip database are obtained.
  • S32 Position the current transaction latitude and longitude value and the target transaction latitude and longitude value on the digital map, and use the digital map to obtain at least one driving path of the current transaction latitude and longitude value and the target transaction latitude and longitude value, and obtain the corresponding driving path distance.
  • a digital map is a digital representation of a paper map. It is discrete data of ground elements and phenomena with defined coordinates and attributes within a certain coordinate system. It is a generalized, ordered collection on a computer-recognizable storage medium. Digital maps include, but are not limited to, Baidu maps, Gaud maps, and Google maps.
  • the digital map locates at least one of the current transaction latitude and longitude value and the target transaction latitude and longitude value according to the current transaction latitude and longitude value and the target transaction latitude and longitude value.
  • Driving path After determining at least one driving route based on the digital map, the digital map will give the distance corresponding to the driving path for each driving route.
  • the distance facilitates the step S40 to acquire the target speed value by the acquired at least one travel path distance and the transaction time difference.
  • step S40 the target speed value is obtained based on the at least one travel path distance and the transaction time difference, and specifically includes the following steps: acquiring the travel speed value corresponding to each travel route based on the at least one travel route distance and the transaction time difference, Select the maximum travel speed value as the target speed value.
  • the server calculates a driving speed value corresponding to each driving path by using a speed calculation formula based on each obtained driving path distance and a trading time difference, and one driving path corresponds to one driving speed value.
  • the aircraft From the location of the current trading location information to the location of the target trading location information, there is at least one mode of transportation, including airplanes, high-speed rail, motor trains, and automobiles.
  • the aircraft has multiple flight routes, including direct routes and transit routes.
  • the voyages of the direct flight routes and the transit routes are different.
  • the routes of the high-speed rail and the moving trains are also different, including direct routes and transit routes. Since the distance between the direct route and the transit route of the aircraft and the high-speed railway is different, the travel speed value calculated from the difference in the transaction time is also different. In order to facilitate the calculation, regardless of the travel route distance corresponding to the transit route appearing in the mode of travel, only the travel route distance corresponding to the direct route is selected as the distance of at least one travel route calculated from the time difference.
  • At least one type of traffic travel mode including the location of the current transaction location information to the location of the target transaction location information
  • the speed calculation formula is used to determine the corresponding speed value, and the maximum speed value is selected as the target speed value.
  • the location A of the current trading location information to the location B of the target trading location information there are three modes of transportation, including airplanes, high-speed rails, and automobiles. Selecting the travel speed of the at least one direct route corresponding to the fastest travel mode of the aircraft to calculate the difference between the travel time and the transaction time, obtaining at least one corresponding travel speed value, comparing the obtained travel speed values, and selecting the largest one. The travel speed value is taken as the target speed value.
  • the method for preventing bank card theft further includes:
  • the client terminal corresponding to the user ID refers to a client terminal associated with the user ID
  • the client terminal may be a smartphone corresponding to the mobile phone number corresponding to the user ID. If the user does not use the bank card for the card transaction for a long period of time, the conclusion that the judgment result is that the target speed value does not exceed the preset speed threshold to determine that the user's current transaction is safe is not accurate enough.
  • the server also needs to send a dynamic verification code to the client terminal corresponding to the user ID, so as to perform user identity verification based on the dynamic verification code.
  • the server sends a dynamic verification code to the client terminal corresponding to the user ID. After receiving the information of the dynamic verification code, the client terminal inputs the dynamic verification code to the display interface of the transaction terminal, and the transaction terminal sends the dynamic verification code to the corresponding terminal. The server performs verification. User authentication based on the dynamic verification code can further ensure that the current transaction behavior of the user in the card swipe operation is safe.
  • the preset verification time is a time when the preset server receives the dynamic verification code sent by the client terminal. Specifically, when the server sends the dynamic verification code to the client terminal corresponding to the user ID, a verification time for receiving the dynamic verification code is set. If the server obtains the dynamic verification code returned by the client terminal within the preset verification time, it indicates that the dynamic verification code verification is successful, and the transaction request is approved, so that the user completes the current transaction corresponding to the transaction request.
  • the dynamic verification code returned by the client terminal is not obtained within the preset verification time, it indicates that the dynamic verification code verification sent by the server to the client terminal corresponding to the user ID fails, and the server rejects the current transaction corresponding to the transaction request.
  • Setting a preset verification time for the dynamic verification code returned by the server receiving the client terminal can ensure that the transaction request is securely verified within the preset verification time, and the security of the identity verification based on the dynamic verification code is ensured, thereby ensuring the normal operation of the transaction terminal. transaction.
  • the method for preventing bank card theft is obtained by converting the obtained current transaction location information and the target transaction location information, and then converting the current transaction latitude and longitude value and the target transaction latitude and longitude value based on the IP address latitude and longitude database, and then using the digital map to obtain the current transaction.
  • the travel path distance corresponding to at least one travel path of the latitude and longitude value and the target transaction latitude and longitude value.
  • Calculate the trading time difference by the current trading time and the target trading time calculate the driving path distance and the trading time difference based on the speed calculation formula to obtain at least one speed value, select the maximum speed value as the target speed value, and set the target speed value and the preset.
  • the critical speed values are compared to reduce the amount of calculations, making the comparison results more accurate.
  • the target speed value When the target speed value is greater than the preset critical speed value, it indicates that the current transaction is abnormal, and the user account corresponding to the user ID needs to be frozen, thereby ensuring the security of the user's bank card.
  • the target speed value is less than the preset critical speed value, when the user conducts the current transaction, the verification of the dynamic verification code is required to further determine the security of the user's bank card, thereby effectively preventing the user's bank card from being swiped, the bank The card was stolen and the situation occurred.
  • FIG. 6 is a schematic block diagram showing an apparatus for preventing bank card theft in accordance with the method for preventing bank card theft in the first embodiment.
  • the device for preventing bank card theft includes a transaction request acquisition module 10, a target transaction information acquisition module 20, a distance and time parameter acquisition module 30, a target speed value acquisition module 40, and a security operation module 50.
  • the implementation functions of the transaction request acquisition module 10, the target transaction information acquisition module 20, the distance and time parameter acquisition module 30, the target speed value acquisition module 40, and the security operation module 50 correspond to the method for preventing bank card theft in the embodiment.
  • the steps are one-to-one correspondence, and the details are not described in detail in order to avoid redundancy.
  • the transaction request obtaining module 10 is configured to obtain a transaction request, where the transaction request includes a user ID and current transaction information, and the current transaction information includes current transaction location information and current transaction time.
  • the target transaction information obtaining module 20 is configured to acquire target transaction information that is closest to the current transaction time based on the user ID, and the target transaction information includes the target transaction location information and the target transaction time.
  • the distance and time parameter obtaining module 30 is configured to acquire at least one driving path distance based on the current transaction location information and the target transaction location information, and obtain a transaction time difference based on the current transaction time and the target transaction time.
  • the target speed value obtaining module 40 is configured to acquire the target speed value based on the at least one travel path distance and the transaction time difference.
  • the security operation module 50 is configured to freeze the user account corresponding to the user ID if the target speed value exceeds the preset speed threshold.
  • the device for preventing bank card theft further comprises a dynamic verification code sending module 61, a first verification module 62 and a second verification module 63.
  • the dynamic verification code sending module 61 is configured to send the dynamic verification code to the client terminal corresponding to the user ID if the target speed value does not exceed the preset speed threshold.
  • the first verification module 62 is configured to approve the transaction request if the dynamic verification code returned by the client terminal is obtained within the preset verification time.
  • the second verification module 63 is configured to reject the transaction request if the dynamic verification code returned by the client terminal is not obtained within the preset verification time.
  • the device for preventing bank card theft further comprises a first processing unit 201 and a second processing unit 202.
  • the first processing unit 201 is configured to determine whether the user account corresponding to the user ID is in a frozen state, and if not in the frozen state, perform the step of acquiring target transaction information that is closest to the current transaction time based on the user ID.
  • the second processing unit 202 is configured to prompt to enter the identity verification process, collect the face image of the user, and use the face recognition method to compare and verify the face image and the pre-stored ID image of the ID card. If the verification is passed, the step of acquiring the target transaction information closest to the current transaction time based on the user ID is performed.
  • the target transaction information acquisition module 20 includes a historical transaction information acquisition unit 21 and a target transaction information acquisition unit 22.
  • the historical transaction information obtaining unit 21 is configured to acquire corresponding historical transaction information based on the user ID, and the historical transaction information includes a historical transaction time.
  • the target transaction information obtaining unit 22 is configured to calculate a time difference between each historical transaction time and the current transaction time based on the current transaction time and the historical transaction time, and select historical transaction information with the smallest time difference as the target transaction information.
  • the distance and time parameter acquisition module 30 includes a transaction latitude and longitude value acquisition unit 31 and a travel path distance acquisition unit 32.
  • the transaction latitude and longitude value obtaining unit 31 is configured to convert the current transaction location information and the target transaction location information into a current transaction latitude and longitude value and a target transaction latitude and longitude value, respectively.
  • the driving path distance obtaining unit 32 is configured to locate the current transaction latitude and longitude value and the target transaction latitude and longitude value on the digital map, and use the digital map to obtain at least one driving path of the current transaction latitude and longitude value and the target transaction latitude and longitude value, and obtain corresponding driving Path distance.
  • the transaction latitude and longitude value obtaining unit 31 is configured to convert the current transaction IP address information and the target transaction IP address information into corresponding current transaction latitude and longitude values and target transaction latitude and longitude values based on the IP address latitude and longitude database.
  • the target speed value obtaining module 40 is configured to acquire a travel speed value corresponding to each travel route based on the at least one travel route distance and the transaction time difference, and select a maximum travel speed value as the target speed value.
  • This embodiment provides one or more non-volatile readable storage media having computer readable instructions stored thereon.
  • the one or more non-readable readable storage media storing computer readable instructions, when executed by one or more processors, causing one or more processors to perform bank protection in embodiment 1
  • the method of card piracy, in order to avoid duplication, will not be described here.
  • the computer readable instructions when executed by the processor, the functions of the modules/units in the apparatus for preventing bank card theft in Embodiment 2 are implemented. To avoid repetition, details are not described herein again.
  • non-volatile readable storage media storing computer readable instructions may comprise: any entity or device capable of carrying the computer readable instruction code, a recording medium, a USB flash drive, a mobile hard drive, Disk, optical disk, computer memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier signals, and telecommunications signals.
  • FIG. 7 is a schematic diagram of a computer device according to an embodiment of the present application.
  • computer device 70 of this embodiment includes a processor 71, a memory 72, and computer readable instructions 73 stored in memory 72 and executable on processor 71.
  • the processor 71 executes the steps of the method for preventing bank card theft in Embodiment 1 when the computer readable instructions 73 are executed, such as steps S10 to S50 shown in FIG.
  • the processor 71 executes the computer readable instructions 73
  • the functions of the modules/units of the apparatus for preventing bank card theft in the above-mentioned Embodiment 1 are implemented, for example, the transaction request acquisition module 10 and the target transaction information acquisition module 20 shown in FIG.
  • the functions of the distance and time parameter acquisition module 30, the target speed value acquisition module 40, and the security operation module 50 are implemented, for example, the transaction request acquisition module 10 and the target transaction information acquisition module 20 shown in FIG.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一种防止银行卡盗刷的方法、装置、计算机设备及存储介质。方法包括:获取交易请求,交易请求包括用户ID和当前交易信息,当前交易信息包括当前交易位置信息和当前交易时间(S10);基于用户ID获取与当前交易时间最接近的目标交易信息,目标交易信息包括目标交易位置信息和目标交易时间(S20);基于当前交易位置信息和目标交易位置信息获取至少一条行驶路径距离,基于当前交易时间和目标交易时间获取交易时间差(S30);基于至少一条行驶路径距离和交易时间差获取目标速度值(S40);若目标速度值超过预设速度临界值,则冻结用户ID对应的用户帐户(S50)。本方案在判断当前交易属于银行卡被盗刷的情况时,冻结对应的用户帐户,保障了用户的银行卡刷卡安全。

Description

防止银行卡盗刷的方法、装置、计算机设备及存储介质
本申请以2018年2月27日提交的申请号为201810163988.1,名称为“防止银行卡盗刷的方法、装置、计算机设备及存储介质”的中国发明专利申请为基础,并要求其优先权。
技术领域
本申请涉及银行卡安全领域,尤其涉及一种防止银行卡盗刷的方法、装置、计算机设备及存储介质。
背景技术
随着银行卡业务的发展,刷卡消费已经被更多的人接受。银行卡盗刷案例也是屡见不鲜。尤其是在数据时代,用户的各类信息都是存储在大数据平台中,用户信息可能因为中网络木马、网络钓鱼或者复制卡等原因导致账户密码或银行卡信息被不法分子获取,发生非本人意愿的交易行为,给用户造成资金损失。目前的防盗刷措施主要通过在大数据平台上设置规则引擎,黑白名单和交易频次等规则,这些规则的设置对现在越来越成熟的盗刷技术的制约性不足,用户的银行卡任然存在盗刷风险,资产不够安全。
发明内容
本申请提供一种防止银行卡盗刷的方法、装置、计算机设备及存储介质,以解决防止银行卡被盗刷而造成资金损失的问题。
第一方面,本申请提供一种防止银行卡盗刷的方法,包括:
获取交易请求,所述交易请求包括用户ID和当前交易信息,所述当前交易信息包括当前交易位置信息和当前交易时间;
基于用户ID获取与当前交易时间最接近的目标交易信息,所述目标交易信息包括目标交易位置信息和目标交易时间;
基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,基于所述当前交易时间和所述目标交易时间获取交易时间差;
基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值;
若所述目标速度值超过预设速度临界值,则冻结所述用户ID对应的用户帐户。
第二方面,本申请提供一种防止银行卡盗刷的装置,包括:
交易请求获取模块,用于获取交易请求,所述交易请求包括用户ID和当前交易信息, 所述当前交易信息包括当前交易位置信息和当前交易时间;
目标交易信息获取模块,用于基于用户ID获取与当前交易时间最接近的目标交易信息,所述目标交易信息包括目标交易位置信息和目标交易时间;
距离和时间参数获取模块,用于基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,基于所述当前交易时间和所述目标交易时间获取交易时间差;
目标速度值获取模块,用于基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值;
安全操作模块,用于若所述目标速度值超过预设速度临界值,则冻结所述用户ID对应的用户帐户。
第三方面,本申请提供一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
获取交易请求,所述交易请求包括用户ID和当前交易信息,所述当前交易信息包括当前交易位置信息和当前交易时间;
基于用户ID获取与当前交易时间最接近的目标交易信息,所述目标交易信息包括目标交易位置信息和目标交易时间;
基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,基于所述当前交易时间和所述目标交易时间获取交易时间差;
基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值;
若所述目标速度值超过预设速度临界值,则冻结所述用户ID对应的用户帐户。
第四方面,本申请实施例提供一个或多个存储有计算机可读指令的非易失性可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器实现如下步骤:
获取交易请求,所述交易请求包括用户ID和当前交易信息,所述当前交易信息包括当前交易位置信息和当前交易时间;
基于用户ID获取与当前交易时间最接近的目标交易信息,所述目标交易信息包括目标交易位置信息和目标交易时间;
基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,基于所述当前交易时间和所述目标交易时间获取交易时间差;
基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值;
若所述目标速度值超过预设速度临界值,则冻结所述用户ID对应的用户帐户。
本申请的一个或多个实施例的细节在下面的附图及描述中提出。本申请的其他特征和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请的技术方案,下面将对本申请的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是实施例1中防止银行卡盗刷的方法的一流程图;
图2是实施例1中防止银行卡盗刷的方法的另一流程图;
图3是图1中步骤S20的一具体示意图;
图4是图1中步骤S30的一具体示意图;
图5是实施例1中防止银行卡盗刷的方法的另一流程图;
图6是实施例2中防止银行卡盗刷的装置的一原理框图;
图7是实施例4中计算机设备的一示意图。
具体实施方式
下面将结合本申请中的附图,对本申请中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
实施例1
图1示出本实施例中防止银行卡盗刷的方法的流程图。该防止银行卡盗刷的方法应用在用户使用银行卡进行交易时,通过对当前交易信息和最接近当前交易的历史交易信息,计算当前交易信息是不是属于刷卡安全范围,若不属于刷卡安全范围,则冻结该银行卡账户,保护用户银行卡的刷卡安全。如图1所示,该防止银行卡盗刷的方法包括如下步骤:
S10:获取交易请求,交易请求包括用户ID和当前交易信息,当前交易信息包括当前交易位置信息和当前交易时间。
具体地,服务器获取交易终端发送的交易请求,即用户通过交易终端向服务器发送交易请求,以使服务器基于该交易请求进行处理,以确定是否进行交易。交易终端包括但不限于支持银行卡刷卡交易的POS机、ATM机、银行柜台刷卡设备和网银操作终端。交易请 求是指用户进行交易行为时,交易终端接收的并发送给服务器的用于进行交易的请求。该交易请求包括用户ID和当前交易信息。用户ID是用于识别用户的标识,包括但不限于用户的银行卡号,当前交易信息是请求发生本次交易的交易信息。当前交易信息包括当前交易位置信息和当前交易时间。当前交易位置信息是指用户使用银行卡在交易终端进行刷卡交易时,发生该笔交易对应的交易终端的位置信息。当前交易时间是指用户使用银行卡在交易终端进行刷卡交易时,发生该笔交易对应的交易时间。
交易终端的位置信息,可以通过获取交易终端的终端标识确定对应的交易终端所在的位置。该终端标识包括但不限于交易终端的编号和交易终端的IP地址,若该交易终端是POS机,交易终端标识还包括商户编号。
S20:基于用户ID获取与当前交易时间最接近的目标交易信息,目标交易信息包括目标交易位置信息和目标交易时间。
目标交易信息是指基于用户使用同一张银行卡进行刷卡交易时,选取与当前交易时间最接近的一笔交易对应的交易信息。本实施例中,将与当前交易时间最接近的一笔交易称为目标交易。目标交易信息包括目标交易位置信息和目标交易时间。其中,目标交易位置信息是指进行目标交易的交易终端的位置信息。目标交易时间是指进行目标交易时对应的交易时间。
与交易终端相连接的服务器在获取交易请求后,会基于用户ID和当前交易时间获取与当前交易时间最接近的目标交易信息,从而获取目标交易位置和目标交易时间。通过获取目标交易信息中的目标交易时间和目标交易位置信息,以便基于该目标交易时间和目标交易位置信息,判断用户的当前交易信息是否合理,从而计算出该用户使用该银行卡在进行刷卡操作时是否安全,并根据是否安全确定是否响应该交易请求。
S30:基于当前交易位置信息和目标交易位置信息获取至少一条行驶路径距离,基于当前交易时间和目标交易时间获取交易时间差。
行驶路径距离是指行驶路径对应的距离长度。行驶路径是指当前交易位置信息和目标交易位置信息之间不同交通出行方式对应的路径。行驶路径距离是行驶路径对应的距离。每一条行驶路径包括从当前交易位置信息所在位置到目标交易位置信息所在位置的交通出行方式和对应的行驶路径距离,不同的交通出行方式对应的行驶路径距离不同,因此,基于当前交易位置信息和目标交易位置信息可以获取至少一条行驶路径距离。
本实施例中,在确定当前交易位置信息和目标交易位置信息后,从当前交易位置信息所在位置到达目标交易位置信息所在位置包括至少一条行驶路径,每一条行驶路径对应一 个行驶路径距离。利用当前交易时间和目标交易时间获取交易时间差,该交易时间差可以反映出当前交易时间和目标交易时间之间的时间间隔。
S40:基于至少一条行驶路径距离和交易时间差获取目标速度值。
基于至少一个行驶路径距离和交易时间差,利用速度计算公式
Figure PCTCN2018081508-appb-000001
3...)计算出对应的至少一个速度值,其中,V 0是指利用速度计算公式计算出的速度值,S n是指至少一个行驶路径距离,t 0是指当前交易时间,t 1是指目标交易时间。其中,目标速度值是指在出行速度最快的交通出行方式对应的至少一个行驶路径距离与交易时间差计算得出的速度值V 0后,速度值V 0中最大的速度值为目标速度值。选取最大的速度值作为目标速度值,执行步骤S50,减少了速度值和预设速度临界值判断的数量,提高了判断过程的处理效率。
S50:若目标速度值超过预设速度临界值,则冻结用户ID对应的用户帐户。
用户账户是指用户在开通银行卡时填写的与银行卡关联的账户。预设速度临界值是指预先设置的速度临界值,该速度临界值包括民航客机的最大速度值、高铁的最大速度值、动车的最大速度值和汽车的最大速度值。本实施例中,民航客机的最大速度值为1000公里/小时,高铁的最大速度值为350公里/小时,动车的最大速度值为220公里/小时,汽车的最大速度为120公里/小时。本实施例中,每一速度临界值对应一种交通出行方式,在确定当前交易位置信息和目标交易位置信息时,可确定两地之间存在的相应的可直达且最快的交通出行方式,以便基于该可直达且最快的交通出行方式确定对应的预设速度临界值。
基于目标速度值获取对应的交通出行方式,选取该交通出行方式对应的预设速度临界值,若目标速度值大于预设速度临界值,则证明该笔当前交易存在异常。由于目标速度值是选取目标交易位置信息所在位置和当前交易位置信息所在位置的速度值中最大的一个速度值,因此,目标速度值大于预设速度临界值的情况是不存在的,从而确定该当前交易存在异常。
在服务器计算出目标速度值超过预设速度临界值时,通过冻结该用户ID对应的用户账户的操作,以使该用户账户不能进行当前交易。同时,服务器会及时向银行工作人员发出异常处理请求,使得银行工作人员对该用户在银行预留的手机号进行电话回访。同时,服务器也会发送异常提醒通知信息给该用户ID对应的客户终端(该客户终端包括但不限 于该用户在银行预留的手机号对应的手机),该异常提醒通知信息是指提醒用户自己的用户账户存在安全风险,需要及时进行处理的信息。用户可以基于异常提醒通知信息中的信息内容进行相应的操作,如异常提醒通知信息提示用户可以根据信息内容中特定的验证码先进行冻结操作,以及时终止当前交易时,用户可以将该特定的验证码发送给对应的服务器,从而保障银行卡中的资金安全。
可以理解地,在冻结用户ID对应的用户账户之后,会在服务器中将该用户ID对应的用户账户的状态从正常状态修改为冻结状态,以使该用户账户在处于冻结状态时不能再进行交易,需用户临柜或通过网络进行安全验证后,才可解除冻结状态,以恢复正常状态,以保证用户账户的安全。
该防止银行卡盗刷的方法通过获取该用户的当前交易位置信息和目标交易位置信息,获取两个位置信息之间的至少一条行驶路径距离,通过获取当前交易时间和目标交易时间获取交易时间差。利用速度计算公式获取目标速度值,将目标速度值与预设速度临界值进行比较,若目标速度值超过预设速度临界值,则表示该目标速度值存在异常,从而可以确定当前交易不安全,此时,冻结用户ID对应的用户帐户,保障用户的银行卡刷卡安全。
在一具体实施方式中,如图2所示,在步骤S20,基于用户ID获取与当前交易时间最接近的目标交易信息的步骤之前,该防止银行卡盗刷的方法还包括如下步骤:
S201:判断用户ID对应的用户账户是否处于冻结状态,若不处于冻结状态,则执行基于用户ID获取与当前交易时间最接近的目标交易信息的步骤。
具体地,与交易终端相连的服务器在获取到交易请求后,会基于交易请求中的用户ID查看该用户ID对应的用户账户的状态,确定其处于冻结状态还是正常状态,若不处于冻结状态(即正常状态),则表示用户ID对应的用户账户正常,可以进行交易,此时,与该交易终端相连的服务器会执行步骤S20。
S202:若处于冻结状态,则提示进入身份验证流程,采集用户的人脸图像,利用人脸识别方法对人脸图像和预先存储的身份证的证件图像进行比对验证,若验证通过,则执行基于用户ID获取与当前交易时间最接近的目标交易信息的步骤。
身份验证流程是指验证用户身份的验证流程,该身份验证流程通过交易终端自身携带的摄像头获取用户的人脸图像,利用服务器中预先存储的人脸识别方法对获取的人脸图像和预先存储的身份证的证件图像进行比对验证,获取匹配概率,若该匹配概率大于预设概率,则认为验证通过;若匹配概率不大于预设概率,则认为验证不通过。若验证通过,则证明该用户为该银行卡的开户人,执行步骤S20。其中,预先存储的身份证的证件图像是 指用户在银行办理银行卡开户时采集的身份证的证件图像,该身份证的证件图像存储在服务器中。
预先判断用户ID对应的用户账户是否处于冻结状态,若不处于冻结状态,则表示用户ID对应的用户账户可以进行交易。若处于冻结状态,则需要用户进入身份验证流程,在身份验证通过后,则表示用户ID对应的用户账户可以进行交易。用户可以直接在交易终端进行身份验证,证明自己是该用户账户的开户人,使得服务器解除该用户账户的冻结状态,便于用户完成当前操作流程。
在一具体实施方式中,如图3所示,步骤S20,基于用户ID获取与当前交易时间最接近的目标交易信息,具体包括如下步骤:
S21:基于用户ID获取对应的历史交易信息,历史交易信息包括历史交易时间。
历史交易信息是指在当前交易之前该用户ID对应的用户账户已完成(即历史交易)的交易信息。该历史交易信息包括历史交易时间,历史交易时间是指每一个历史交易对应的交易时间,在用户每完成一笔交易时,服务器都会记录该笔交易的交易时间。基于用户ID获取当前交易时间之前的每一笔历史交易对应的历史交易时间,便于步骤S22基于历史交易时间获取和当前交易时间的时间差最小的目标交易信息。
S22:基于当前交易时间和历史交易时间计算出每一历史交易时间和当前交易时间的时间差,选取时间差最小的历史交易信息为目标交易信息。
基于当前交易时间和获取的每一历史交易时间,计算出每一历史交易时间和当前交易时间的时间差,获取时间差最小的历史交易时间对应的交易信息,作为目标交易信息。该目标交易信息是与当前交易时间最为接近的历史交易的交易信息,该与当前时间交易最为接近的历史交易即为目标交易。本实施例中,用户在进行刷卡交易时,会通过交易终端向服务器发送交易请求,以便基于交易请求确定目标交易,从而利用目标交易确定这次刷卡交易是否存在异常,由于目标交易信息提供了更加准确的信息,使得判断当前交易是否安全更加准确。
基于用户ID从该用户账户对应的历史交易信息中选取历史交易时间与当前交易时间最接近的历史交易信息作为目标交易信息,方便通过目标交易时间和当前交易时间判断该用户ID对应的用户账户在最接近的两笔交易中是否存在盗刷情况。
在一具体实施方式中,如图4所示,步骤S30,基于当前交易位置信息和目标交易位置信息获取至少一条行驶路径距离,具体包括如下步骤:
S31:将当前交易位置信息和目标交易位置信息分别转化为当前交易经纬度值和目标 交易经纬度值。
具体地,当前交易位置信息包括当前交易IP地址信息,目标交易位置信息包括目标交易IP地址信息。其中,当前交易经纬度值是指当前交易位置对应的经纬度坐标,目标交易经纬度值是指目标交易位置对应的经纬度坐标。
步骤S31,将当前交易位置信息和目标交易位置信息分别转化为当前交易经纬度值和目标交易经纬度值,具体包括如下步骤:基于IP地址经纬度数据库,将当前交易IP地址信息和目标交易IP地址信息转化为对应的当前交易经纬度值和目标交易经纬度值。
IP地址经纬度数据库是指geoip数据库,geoip数据库是用于存储IP地址信息和映射到对应的国家、省市甚至街道的位置之间的映射关系的数据。该位置是以经纬度值来反映该IP地址信息具体的位置。基于当前交易位置信息中的当前交易IP地址信息和目标交易位置信息中的目标交易IP地址信息,通过geoip数据库中的映射关系,将得到的当前交易经纬度值和目标交易经纬度值。
S32:将当前交易经纬度值和目标交易经纬度值在数字地图上进行定位,采用数字地图获取当前交易经纬度值和目标交易经纬度值的至少一条行驶路径,并获取对应的行驶路径距离。
数字地图是纸制的地图的数字存在,是在一定坐标系统内具有确定的坐标和属性的地面要素和现象的离散数据,是在计算机可识别的存储介质上概括的、有序的集合。数字地图包括但不限于百度地图、高德地图和谷歌地图。
具体地,在将当前交易经纬度值和目标交易经纬度值在数字地图上进行定位后,数字地图会根据当前交易经纬度值和目标交易经纬度值定位获取当前交易经纬度值和目标交易经纬度值对应的至少一条行驶路径。在根据数字地图确定至少一条行驶路径后,数字地图会给出每一条行驶路径对应行驶路径距离。
将当前交易位置信息和目标交易位置信息分别转化为当前交易经纬度值和目标交易经纬度值,并将当前交易经纬度值和目标交易经纬度值在数字地图上进行定位,获取至少一行驶路径对应的行驶路径距离,便于步骤S40通过获取的至少一条行驶路径距离和交易时间差获取目标速度值。
在一具体实施方式中,步骤S40,基于至少一条行驶路径距离和交易时间差获取目标速度值,具体包括如下步骤:基于至少一条行驶路径距离和交易时间差,获取每一行驶路径对应的行驶速度值,选取最大的行驶速度值作为目标速度值。
具体地,服务器基于获取的每一条行驶路径距离和交易时间差,利用速度计算公式计 算出每一条行驶路径对应的行驶速度值,一条行驶路径对应一个行驶速度值。
从当前交易位置信息所在位置到目标交易位置信息所在位置,存在至少一种交通出行方式,包括飞机、高铁、动车和汽车。其中飞机有多条飞行路线,包括直达路线和中转路线,直飞路线的航程和中转路线的航程不同;高铁和动车的行驶路线也不同,其中也包括直达路线和中转路线。由于飞机和高铁对应的直达路线和中转路线行驶路径距离不同,其与交易时间差计算出的行驶速度值也不同。为了方便计算,不考虑交通出行方式中出现的中转路线对应的行驶路径距离,只选择直达路线对应的行驶路径距离作为与时间差进行速度计算的至少一条行驶路径距离。
进一步地,从当前交易位置信息所在位置到目标交易位置信息所在位置包括的至少一种交通出行方式中,选取出行速度最快的交通出行方式对应的至少一条行驶路径距离作为需要的至少一条行驶路径距离。基于获取的至少一条行驶距离和交易时间,采用速度计算公式求出对应的速度值,选取最大的速度值作为目标速度值。确定目标速度值,只需要将目标速度值与预设速度临界值进行比较就可以判断当前交易是否安全,减少计算量,使得比较结果更加准确。
如从当前交易位置信息所在位置A到目标交易位置信息所在位置B,存在三种交通出行方式,包括飞机、高铁和汽车。选取出行速度最快的交通出行方式飞机对应的至少一条直达路线的行驶路径距离与交易时间差进行计算,获取至少一个对应的行驶速度值,对获取的至少一个的行驶速度值进行比较,选取最大的行驶速度值作为为目标速度值。
在一具体实施方式中,如图5所示,在步骤S40之后,该防止银行卡盗刷的方法还包括:
S61:若目标速度值没有超过预设速度临界值,则发送动态验证码给用户ID对应的客户终端。
具体地,用户ID对应的客户终端是指与用户ID关联的客户终端,该客户终端可以是与用户ID相对应的手机号对应的智能手机。若用户在很长一段时间没有使用银行卡进行刷卡交易,仅凭判断目标速度值没有超过预设速度临界值确定用户的当前交易是安全的这一种判断方法得出的结论还不够准确,因此,在目标速度值没有超过预设速度临界值时,服务器还需要发送动态验证码给用户ID对应的客户终端,以便基于该动态验证码进行用户身份验证。
服务器会发送动态验证码给用户ID对应的客户终端,客户终端在接收到动态验证码的信息后,用户将该动态验证码输入到交易终端的显示界面,交易终端将动态验证码发送 给对应的服务器进行验证。基于动态验证码进行用户身份验证可进一步确保用户在进行刷卡操作的当前交易行为是安全的。
S62:若在预设验证时间内获取到客户终端返回的动态验证码,则同意交易请求。
其中,预设验证时间是预先设置好的服务器接收到客户终端发送的动态验证码的时间。具体地,服务器在将动态验证码发送给用户ID对应的客户终端时,会设置一个接收动态验证码的验证时间。若服务器在预设验证时间内获取到客户终端返回的动态验证码,则表示动态验证码验证成功,同意交易请求,使得用户完成交易请求对应的当前交易。
S63:若在预设验证时间内没有获取到客户终端返回的动态验证码,则拒绝交易请求。
具体地,若在预设验证时间内没有获取到客户终端返回的动态验证码,则表示服务器发送给用户ID对应的客户终端的动态验证码验证失败,服务器拒绝该交易请求对应的当前交易。
对服务器接收客户终端返回的动态验证码设置预设验证时间可以保证在预设验证时间内对交易请求是否安全进行验证,保证基于动态验证码进行身份验证的安全性,从而保证了交易终端的正常交易。
该防止银行卡盗刷的方法,通过将获取的当前交易位置信息和目标交易位置信息,然后基于IP地址经纬度数据库转化为对应的当前交易经纬度值和目标交易经纬度值,再采用数字地图获取当前交易经纬度值和目标交易经纬度值的至少一条行驶路径对应的行驶路径距离。通过当前交易时间和目标交易时间求出交易时间差,基于速度计算公式将行驶路径距离和交易时间差进行计算求出至少一个速度值,选取最大的速度值作为目标速度值,将目标速度值和预设临界速度值进行比较,减少计算量,使得比较结果更加准确。当目标速度值大于预设临界速度值时,则表示当前交易存在异常,需要冻结该用户ID对应的用户账户,从而保证用户银行卡的刷卡安全。对于目标速度值小于预设临界速度值,在用户进行当前交易时,需要进行动态验证码的验证,以进一步确定用户的银行卡刷卡安全,有效防止了用户的银行卡在进行刷卡操作时,银行卡被盗刷的情况发生。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请的实施过程构成任何限定。
实施例2
图6示出与实施例1中防止银行卡盗刷的方法一一对应的防止银行卡盗刷的装置的原理框图。如图6所示,该防止银行卡盗刷的装置包括交易请求获取模块10、目标交易信息获取模块20、距离和时间参数获取模块30、目标速度值获取模块40和安全操作模块50。 其中,交易请求获取模块10、目标交易信息获取模块20、距离和时间参数获取模块30、目标速度值获取模块40和安全操作模块50的实现功能与实施例中防止银行卡盗刷的方法对应的步骤一一对应,为避免赘述,本实施例不一一详述。
交易请求获取模块10,用于获取交易请求,交易请求包括用户ID和当前交易信息,当前交易信息包括当前交易位置信息和当前交易时间。
目标交易信息获取模块20,用于基于用户ID获取与当前交易时间最接近的目标交易信息,目标交易信息包括目标交易位置信息和目标交易时间。
距离和时间参数获取模块30,用于基于当前交易位置信息和目标交易位置信息获取至少一条行驶路径距离,基于当前交易时间和目标交易时间获取交易时间差。
目标速度值获取模块40,用于基于至少一条行驶路径距离和交易时间差获取目标速度值。
安全操作模块50,用于若目标速度值超过预设速度临界值,则冻结用户ID对应的用户帐户。
优选地,该防止银行卡盗刷的装置还包括动态验证码发送模块61、第一验证模块62和第二验证模块63。
动态验证码发送模块61,用于若目标速度值没有超过预设速度临界值,则发送动态验证码给用户ID对应的客户终端。
第一验证模块62,用于若在预设验证时间内获取到客户终端返回的动态验证码,则同意交易请求。
第二验证模块63,用于若在预设验证时间内没有获取到客户终端返回的动态验证码,则拒绝交易请求。
优选地,在目标交易信息获取模块20之前,该防止银行卡盗刷的装置还包括第一处理单元201和第二处理单元202。
第一处理单元201,用于判断用户ID对应的用户账户是否处于冻结状态,若不处于冻结状态,则执行基于用户ID获取与当前交易时间最接近的目标交易信息的步骤。
第二处理单元202,用于若处于冻结状态,则提示进入身份验证流程,采集用户的人脸图像,利用人脸识别方法对人脸图像和预先存储的身份证的证件图像进行比对验证,若验证通过,则执行基于用户ID获取与当前交易时间最接近的目标交易信息的步骤。
优选地,目标交易信息获取模块20包括历史交易信息获取单元21和目标交易信息获取单元22。
历史交易信息获取单元21,用于基于用户ID获取对应的历史交易信息,历史交易信息包括历史交易时间。
目标交易信息获取单元22,用于基于当前交易时间和历史交易时间计算出每一历史交易时间和当前交易时间的时间差,选取时间差最小的历史交易信息为目标交易信息。
优选地,距离和时间参数获取模块30包括交易经纬度值获取单元31和行驶路径距离获取单元32。
交易经纬度值获取单元31,用于将当前交易位置信息和目标交易位置信息分别转化为当前交易经纬度值和目标交易经纬度值。
行驶路径距离获取单元32,用于将当前交易经纬度值和目标交易经纬度值在数字地图上进行定位,采用数字地图获取当前交易经纬度值和目标交易经纬度值的至少一条行驶路径,并获取对应的行驶路径距离。
具体地,交易经纬度值获取单元31,用于基于IP地址经纬度数据库,将当前交易IP地址信息和目标交易IP地址信息转化为对应的当前交易经纬度值和目标交易经纬度值。
具体地,目标速度值获取模块40,用于基于至少一条行驶路径距离和交易时间差,获取每一行驶路径对应的行驶速度值,选取最大的行驶速度值作为目标速度值。
实施例3
本实施例提供一个或多个存储有计算机可读指令的非易失性可读存储介质。该一个或多个存储有计算机可读指令的非易失性可读存储介质中,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行实施例1中防止银行卡盗刷的方法,为避免重复,这里不再赘述。或者,该计算机可读指令被处理器执行时实现实施例2中防止银行卡盗刷的装置中各模块/单元的功能,为避免重复,这里不再赘述。
可以理解地,一个或多个存储有计算机可读指令的非易失性可读存储介质可以包括:能够携带所述计算机可读指令代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号和电信信号等。
实施例4
图7是本申请一实施例提供的计算机设备的示意图。如图7所示,该实施例的计算机设备70包括:处理器71、存储器72以及存储在存储器72中并可在处理器71上运行的计算机可读指令73。处理器71执行计算机可读指令73时实现上述实施例1中防止银行卡盗刷的方法的步骤,例如图1所示的步骤S10至S50。或者,处理器71执行计算机可读指令 73时实现上述实施例1中防止银行卡盗刷的装置的各模块/单元的功能,例如图6所示交易请求获取模块10、目标交易信息获取模块20、距离和时间参数获取模块30、目标速度值获取模块40和安全操作模块50的功能。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。
以上所述实施例仅用以说明本申请的技术方案,而非对其限制。尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。

Claims (20)

  1. 一种防止银行卡盗刷的方法,其特征在于,包括:
    获取交易请求,所述交易请求包括用户ID和当前交易信息,所述当前交易信息包括当前交易位置信息和当前交易时间;
    基于用户ID获取与当前交易时间最接近的目标交易信息,所述目标交易信息包括目标交易位置信息和目标交易时间;
    基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,基于所述当前交易时间和所述目标交易时间获取交易时间差;
    基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值;
    若所述目标速度值超过预设速度临界值,则冻结所述用户ID对应的用户帐户。
  2. 如权利要求1所述的防止银行卡盗刷的方法,其特征在于,所述防止银行卡盗刷的方法,还包括:
    若所述目标速度值没有超过预设速度临界值,则发送动态验证码给所述用户ID对应的客户终端;
    若在预设验证时间内获取到所述客户终端返回的动态验证码,则同意所述交易请求;
    若在预设验证时间内没有获取到所述客户终端返回的动态验证码,则拒绝所述交易请求。
  3. 如权利要求1所述的防止银行卡盗刷的方法,其特征在于,在所述基于用户ID获取与当前交易时间最接近的目标交易信息的步骤之前,所述防止银行卡盗刷的方法还包括:
    判断所述用户ID对应的用户账户是否处于冻结状态,若不处于冻结状态,则执行所述基于用户ID获取与当前交易时间最接近的目标交易信息的步骤;
    若处于冻结状态,则提示进入身份验证流程,采集用户的人脸图像,利用人脸识别方法对所述人脸图像和预先存储的身份证的证件图像进行比对验证,若验证通过,则执行所述基于用户ID获取与当前交易时间最接近的目标交易信息的步骤。
  4. 如权利要求1所述的防止银行卡盗刷的方法,其特征在于,所述基于用户ID获取与当前交易时间最接近的目标交易信息,包括:
    基于用户ID获取对应的历史交易信息,所述历史交易信息包括历史交易时间;
    基于当前交易时间和历史交易时间计算出每一所述历史交易时间和当前交易时间的 时间差,选取时间差最小的历史交易信息为所述目标交易信息。
  5. 如权利要求1所述的防止银行卡盗刷的方法,其特征在于,所述基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,包括:
    将所述当前交易位置信息和所述目标交易位置信息分别转化为当前交易经纬度值和目标交易经纬度值;
    将所述当前交易经纬度值和所述目标交易经纬度值在数字地图上进行定位,采用所述数字地图获取所述当前交易经纬度值和所述目标交易经纬度值的至少一条行驶路径,并获取对应的行驶路径距离。
  6. 如权利要求5所述的防止银行卡盗刷的方法,其特征在于,所述当前交易位置信息包括当前交易IP地址信息,所述目标交易位置信息包括目标交易IP地址信息;
    所述将所述当前交易位置信息和所述目标交易位置信息分别转化为当前交易经纬度值和目标交易经纬度值,包括:
    基于IP地址经纬度数据库,将所述当前交易IP地址信息和所述目标交易IP地址信息转化为对应的所述当前交易经纬度值和所述目标交易经纬度值。
  7. 如权利要求1所述的防止银行卡盗刷的方法,其特征在于,所述基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值,包括:
    基于至少一条所述行驶路径距离和所述交易时间差,获取每一所述行驶路径对应的行驶速度值,选取最大的行驶速度值作为所述目标速度值。
  8. 一种防止银行卡盗刷的装置,其特征在于,包括:
    交易请求获取模块,用于获取交易请求,所述交易请求包括用户ID和当前交易信息,所述当前交易信息包括当前交易位置信息和当前交易时间;
    目标交易信息获取模块,用于基于用户ID获取与当前交易时间最接近的目标交易信息,所述目标交易信息包括目标交易位置信息和目标交易时间;
    距离和时间参数获取模块,用于基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,基于所述当前交易时间和所述目标交易时间获取交易时间差;
    目标速度值获取模块,用于基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值;
    安全操作模块,用于若所述目标速度值超过预设速度临界值,则冻结所述用户ID对应的用户帐户。
  9. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:
    获取交易请求,所述交易请求包括用户ID和当前交易信息,所述当前交易信息包括当前交易位置信息和当前交易时间;
    基于用户ID获取与当前交易时间最接近的目标交易信息,所述目标交易信息包括目标交易位置信息和目标交易时间;
    基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,基于所述当前交易时间和所述目标交易时间获取交易时间差;
    基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值;
    若所述目标速度值超过预设速度临界值,则冻结所述用户ID对应的用户帐户。
  10. 如权利要求9所述的计算机设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:
    若所述目标速度值没有超过预设速度临界值,则发送动态验证码给所述用户ID对应的客户终端;
    若在预设验证时间内获取到所述客户终端返回的动态验证码,则同意所述交易请求;
    若在预设验证时间内没有获取到所述客户终端返回的动态验证码,则拒绝所述交易请求。
  11. 如权利要求9所述的计算机设备,其特征在于,在所述基于用户ID获取与当前交易时间最接近的目标交易信息的步骤之前,所述处理器执行所述计算机可读指令时还实现如下步骤:
    判断所述用户ID对应的用户账户是否处于冻结状态,若不处于冻结状态,则执行所述基于用户ID获取与当前交易时间最接近的目标交易信息的步骤;
    若处于冻结状态,则提示进入身份验证流程,采集用户的人脸图像,利用人脸识别方法对所述人脸图像和预先存储的身份证的证件图像进行比对验证,若验证通过,则执行所述基于用户ID获取与当前交易时间最接近的目标交易信息的步骤。
  12. 如权利要求9所述的计算机设备,其特征在于,所述基于用户ID获取与当前交易时间最接近的目标交易信息,包括:
    基于用户ID获取对应的历史交易信息,所述历史交易信息包括历史交易时间;
    基于当前交易时间和历史交易时间计算出每一所述历史交易时间和当前交易时间的 时间差,选取时间差最小的历史交易信息为所述目标交易信息。
  13. 如权利要求9所述的计算机设备,其特征在于,所述基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,包括:
    将所述当前交易位置信息和所述目标交易位置信息分别转化为当前交易经纬度值和目标交易经纬度值;
    将所述当前交易经纬度值和所述目标交易经纬度值在数字地图上进行定位,采用所述数字地图获取所述当前交易经纬度值和所述目标交易经纬度值的至少一条行驶路径,并获取对应的行驶路径距离。
  14. 如权利要求13所述的计算机设备,其特征在于,所述当前交易位置信息包括当前交易IP地址信息,所述目标交易位置信息包括目标交易IP地址信息;
    所述将所述当前交易位置信息和所述目标交易位置信息分别转化为当前交易经纬度值和目标交易经纬度值,包括:
    基于IP地址经纬度数据库,将所述当前交易IP地址信息和所述目标交易IP地址信息转化为对应的所述当前交易经纬度值和所述目标交易经纬度值;
    所述基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值,包括:
    基于至少一条所述行驶路径距离和所述交易时间差,获取每一所述行驶路径对应的行驶速度值,选取最大的行驶速度值作为所述目标速度值。
  15. 一个或多个存储有计算机可读指令的非易失性可读存储介质,其特征在于,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器实现如下步骤:
    获取交易请求,所述交易请求包括用户ID和当前交易信息,所述当前交易信息包括当前交易位置信息和当前交易时间;
    基于用户ID获取与当前交易时间最接近的目标交易信息,所述目标交易信息包括目标交易位置信息和目标交易时间;
    基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,基于所述当前交易时间和所述目标交易时间获取交易时间差;
    基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值;
    若所述目标速度值超过预设速度临界值,则冻结所述用户ID对应的用户帐户。
  16. 如权利要求15所述的计算机可读存储介质,其特征在于,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器还实现如下步骤:
    若所述目标速度值没有超过预设速度临界值,则发送动态验证码给所述用户ID对应 的客户终端;
    若在预设验证时间内获取到所述客户终端返回的动态验证码,则同意所述交易请求;
    若在预设验证时间内没有获取到所述客户终端返回的动态验证码,则拒绝所述交易请求。
  17. 如权利要求15所述的非易失性可读存储介质,其特征在于,在所述基于用户ID获取与当前交易时间最接近的目标交易信息的步骤之前,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器还实现如下步骤:
    判断所述用户ID对应的用户账户是否处于冻结状态,若不处于冻结状态,则执行所述基于用户ID获取与当前交易时间最接近的目标交易信息的步骤;
    若处于冻结状态,则提示进入身份验证流程,采集用户的人脸图像,利用人脸识别方法对所述人脸图像和预先存储的身份证的证件图像进行比对验证,若验证通过,则执行所述基于用户ID获取与当前交易时间最接近的目标交易信息的步骤。
  18. 如权利要求15所述的非易失性可读存储介质,其特征在于,所述基于用户ID获取与当前交易时间最接近的目标交易信息,包括:
    基于用户ID获取对应的历史交易信息,所述历史交易信息包括历史交易时间;
    基于当前交易时间和历史交易时间计算出每一所述历史交易时间和当前交易时间的时间差,选取时间差最小的历史交易信息为所述目标交易信息。
  19. 如权利要求15所述的非易失性可读存储介质,其特征在于,所述基于所述当前交易位置信息和所述目标交易位置信息获取至少一条行驶路径距离,包括:
    将所述当前交易位置信息和所述目标交易位置信息分别转化为当前交易经纬度值和目标交易经纬度值;
    将所述当前交易经纬度值和所述目标交易经纬度值在数字地图上进行定位,采用所述数字地图获取所述当前交易经纬度值和所述目标交易经纬度值的至少一条行驶路径,并获取对应的行驶路径距离。
  20. 如权利要求19所述的非易失性可读存储介质,其特征在于,所述当前交易位置信息包括当前交易IP地址信息,所述目标交易位置信息包括目标交易IP地址信息;
    所述将所述当前交易位置信息和所述目标交易位置信息分别转化为当前交易经纬度值和目标交易经纬度值,包括:
    基于IP地址经纬度数据库,将所述当前交易IP地址信息和所述目标交易IP地址信息转化为对应的所述当前交易经纬度值和所述目标交易经纬度值;
    所述基于至少一条所述行驶路径距离和所述交易时间差获取目标速度值,包括:
    基于至少一条所述行驶路径距离和所述交易时间差,获取每一所述行驶路径对应的行驶速度值,选取最大的行驶速度值作为所述目标速度值。
PCT/CN2018/081508 2018-02-27 2018-04-02 防止银行卡盗刷的方法、装置、计算机设备及存储介质 WO2019165669A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810163988.1A CN108389052B (zh) 2018-02-27 2018-02-27 防止银行卡盗刷的方法、装置、计算机设备及存储介质
CN201810163988.1 2018-02-27

Publications (1)

Publication Number Publication Date
WO2019165669A1 true WO2019165669A1 (zh) 2019-09-06

Family

ID=63070085

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/081508 WO2019165669A1 (zh) 2018-02-27 2018-04-02 防止银行卡盗刷的方法、装置、计算机设备及存储介质

Country Status (2)

Country Link
CN (1) CN108389052B (zh)
WO (1) WO2019165669A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109274725B (zh) * 2018-08-31 2020-05-26 阿里巴巴集团控股有限公司 互联网交易定位方法、装置及服务器
CN109472608A (zh) * 2018-10-16 2019-03-15 深圳壹账通智能科技有限公司 基于情绪识别的交易认证方法及终端设备
CN111815327A (zh) * 2019-04-11 2020-10-23 中国移动通信集团福建有限公司 数据验真方法、装置及电子设备
CN110264215A (zh) * 2019-06-20 2019-09-20 徐州独角兽信息科技有限公司 一种用于村务卡监管平台系统
CN110428258A (zh) * 2019-07-30 2019-11-08 中国工商银行股份有限公司 交易风险监控方法及装置
CN111062560B (zh) * 2019-11-04 2023-08-11 深圳追一科技有限公司 资源调拨方法、系统、装置、设备和存储介质
CN112003958A (zh) * 2020-07-03 2020-11-27 拉卡拉支付股份有限公司 一种定位交易地址的系统及方法
CN113256913A (zh) * 2021-04-21 2021-08-13 深圳市怡化时代科技有限公司 金融终端业务处理方法、装置、计算机存储介质及设备
CN116468441A (zh) * 2023-03-28 2023-07-21 中国船舶集团有限公司综合技术经济研究院 一种船上交易方法、装置、计算机设备以及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012067640A1 (en) * 2010-11-17 2012-05-24 Villa-Real Antony-Euclid C Methods and systems for secured global applications using customer-controlled instant-response anti-fraud/anti-identity theft devices with or without nfc component
CN103035078A (zh) * 2012-11-30 2013-04-10 深圳天源迪科信息技术股份有限公司 基于位置的支付安全监控方法
CN105550873A (zh) * 2015-12-02 2016-05-04 努比亚技术有限公司 银行卡交易行为控制装置和方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9483765B2 (en) * 2013-12-09 2016-11-01 Mastercard International Incorporated Systems and methods for monitoring payment transactions for fraud using social media
CN106611316A (zh) * 2015-10-16 2017-05-03 阿里巴巴集团控股有限公司 异常交易的提供方法和装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012067640A1 (en) * 2010-11-17 2012-05-24 Villa-Real Antony-Euclid C Methods and systems for secured global applications using customer-controlled instant-response anti-fraud/anti-identity theft devices with or without nfc component
CN103035078A (zh) * 2012-11-30 2013-04-10 深圳天源迪科信息技术股份有限公司 基于位置的支付安全监控方法
CN105550873A (zh) * 2015-12-02 2016-05-04 努比亚技术有限公司 银行卡交易行为控制装置和方法

Also Published As

Publication number Publication date
CN108389052B (zh) 2020-07-10
CN108389052A (zh) 2018-08-10

Similar Documents

Publication Publication Date Title
WO2019165669A1 (zh) 防止银行卡盗刷的方法、装置、计算机设备及存储介质
RU2625050C1 (ru) Система и способ признания транзакций доверенными
US10600054B2 (en) Systems and methods for monitoring payment transactions for fraud using social media
EP3777093A2 (en) Blockchain-based service rental method, apparatus, and system, and electronic device
CN105678546B (zh) 基于分布式共享总账的数字资产处理方法
US20090234764A1 (en) Systems and methods for biometric authentication of monetary fund transfer
EP3933624A1 (en) Blockchain-based identity verification method and related hardware
CN107231234A (zh) 一种身份注册方法及装置
CN107220830A (zh) 支付方法、装置、存储介质和计算机设备
US20200126069A1 (en) Data processing method, apparatus and device
CN105608579A (zh) 一种预防信用卡盗刷的方法和系统
CN110570188A (zh) 用于处理交易请求的方法和系统
CN105631662A (zh) Nfc支付方法、nfc支付系统和移动终端
CN110796578A (zh) 一种分级救援的判断方法及装置、计算机设备和存储介质
CN109903401A (zh) 车辆支付管理方法、车载终端及电子设备
CN109657763A (zh) 一种电子车票及电子车票的使用方法
CN110473102A (zh) 交易处理方法、装置及区块链节点
CN110689424B (zh) 资金供需匹配方法和系统
CN111539869B (zh) 一种车票请求方法和装置及计算机可读存储介质
CN113592625A (zh) 征信报告的生成方法、装置及电子设备
CN112686666A (zh) 一种针对铁路业务系统的电子钱包交易方法及装置
US11523276B2 (en) Utilizing a high generation cellular network to authorize an event
EP2254093A1 (en) Method and system for confirming the identity of a user background of the invention
CN113379465B (zh) 基于区块链的网点选址方法、装置、设备和存储介质
CN112037056B (zh) 一种交易的处理方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18907607

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 02/12/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18907607

Country of ref document: EP

Kind code of ref document: A1