Payment card binding method, trust evaluation method, device and electronic equipment

A payment card and payment request technology, applied in payment systems, payment architecture, data processing applications, etc., can solve the problems of cumbersome verification methods and high drop rate of users, to simplify the binding process and simplify the new card binding process. , the effect of reducing payment risk

Active Publication Date: 2020-09-04
ADVANCED NEW TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the verification methods of these two verification methods are relatively cumbersome, and the user's order loss rate (probability of giving up card binding and payment) is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Payment card binding method, trust evaluation method, device and electronic equipment
  • Payment card binding method, trust evaluation method, device and electronic equipment
  • Payment card binding method, trust evaluation method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Embodiments of the present application provide a payment card binding method, a trust evaluation method, a device, and an electronic device.

[0053] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0054] figure 1 It is a flowchart of a payment card binding method in an embodiment of the present application. figure 1 The method can be applied to the payment server, such as electronic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A payment card binding method, a trust evaluation method, an apparatus, and an electronic device are provided. The payment card binding method includes: receiving a payment card binding request; sending a payment request to a payment system; in response to the payment request being successfully processed by the payment system, determining (1) an account trust level, (2) a device trust level, and (3) an environment trust level; inputting the account trust level, the device trust level, and the environment trust level into a trained classifier to determine a new card trust level (NCTL); determining a payment limit restriction for the digital wallet account using the payment card on the computing device; and binding, based on the NCTL and the payment limit restriction, the digital wallet account with the payment card for the digital wallet account to use the payment card for future payments.

Description

technical field [0001] The present application relates to the technical field of computer software, in particular to a payment card binding method, trust evaluation method, device and electronic equipment. Background technique [0002] When users use digital wallets to pay, they often need to bind more than one payment card. [0003] When a user binds a new payment card to a digital wallet, most of the verification methods currently used are 3-D Secure and Micro Charge. [0004] 3-D Secure: An authentication process based on a three-domain model, which includes an acquirer domain (AcquirerDomain), an issuer domain (Issuer Domain) and an interoperability domain (Interoperability Domain). [0005] Micro Charge: The digital wallet makes a random micropayment to the user's credit card, check that the user knows the amount used for authentication. [0006] However, the verification methods of these two verification methods are relatively cumbersome, and the user's order loss ra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/36G06Q20/10G06Q20/40
CPCG06Q20/105G06Q20/367G06Q20/409G06Q20/3224G06Q20/34G06Q20/4016G06Q20/405
Inventor 朱金标
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products