Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

blacklist processing method and system based on a POS machine

A POS machine and processing method technology, applied in the field of data processing, can solve the problems of poor user experience, inability to remove duplicates, and large traffic, and achieve the effects of reducing time consumption, improving user experience, and solving storage space.

Pending Publication Date: 2019-04-19
四川商通实业有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Downloading the blacklist requires the support of the ISO8583 protocol. There are a large number of headers and unnecessary fields, which will occupy a large amount of unnecessary traffic bandwidth, resulting in a large bandwidth required by the terminal. If the bandwidth is insufficient, the speed will be very slow;
[0006] 2. In addition to the large traffic, the ISO8583 protocol has a maximum limit. One message exchange can only download one batch (up to about 19 blacklist records). To download hundreds of thousands of records, several interactions are required;
[0007] 3. In order to solve the above shortcomings, the traditional POS machine adopts the "incremental update" method, that is, only the updated part is downloaded each time. Although this solves the problem of real-time update efficiency, it cannot solve the speed of new machine update (every time) A new device will take a lot of time to update the blacklist for the first time);
[0008] 4. Because it is incremental, it cannot be sorted, and the downloaded blacklist data is out of order. Every blacklist judgment needs to traverse the entire record, which is very time-consuming and the user experience is also very poor;
[0009] 5. Since it is incremental, it cannot be deduplicated, which may result in several identical data in the blacklist file;
[0010] 6. Unable to solve the storage problem of POS machine after the explosive growth of blacklist

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • blacklist processing method and system based on a POS machine
  • blacklist processing method and system based on a POS machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Such as figure 1 Shown, a kind of blacklist processing method based on POS machine comprises the following steps:

[0053] a. Receive a transaction request, convert the transaction request into a transaction instruction, and send it to the POS machine;

[0054] b. Read the card number and return the card number to the client;

[0055] c. Determine whether the card number exists in the blacklist, if yes, terminate the transaction; if not, send a continuation transaction instruction to the POS machine.

[0056] In this embodiment, the client adopts the mode of PC+POS machine, or PC+password keyboard (SP30 and the like); the logic of directly discriminating the blacklist of the traditional POS machine is modified to the POS machine feedback card number, which is judged by the PC, and then The PC side decides the follow-up transaction steps (blacklist to terminate the transaction or the whitelist to continue the transaction); the blacklist download and judgment mechanism ar...

Embodiment 2

[0058] On the basis of embodiment 1, this embodiment also includes the following steps before said step a:

[0059] S10. Receive a server startup instruction, and start the server;

[0060] S20. Receive the card loss report information, and update the card loss report blacklist in real time;

[0061] S30. Arranging the updated blacklist in ascending order of card numbers;

[0062] S40. Transmit the updated and sorted blacklist information to the client.

[0063] In this embodiment, the client is used to separate the blacklist download part and make it into a separate module, which can be a PC terminal or an independent thread developed by a POS machine; therefore, the problem of storage space is completely solved; abandoning ISO8583, Using a custom simple protocol for downloading saves a lot of traffic and reduces a lot of interaction (the size of each download package can reach several M); at the same time, because there may be tens of thousands of connections (tens of thou...

Embodiment 3

[0065] In this embodiment, on the basis of Embodiment 2, the step S20 also includes the following steps:

[0066] If new loss reporting card information is received, it is judged whether the loss reporting card information already exists in the blacklist, if yes, it is not added into the blacklist; if not, it is added into the blacklist, and arranged according to step S30. Sorting and deduplication by the server can solve the problem that the blacklist data cannot be sorted, the downloaded blacklist data is out of order, and each blacklist judgment needs to traverse the entire record, and it solves the problem that it cannot be deduplicated, which may cause blacklist files to appear Several problems with the same data reduce time-consuming and improve user experience.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blacklist processing method based on a POS machine, and the method comprises the steps: receiving a transaction request, converting the transaction request into a transactioninstruction, and sending the transaction instruction to the POS machine; The POS machine reads the card number and returns the card number to the client; Judging whether the card number exists in a blacklist or not, and if yes, terminating the transaction; And if not, sending a transaction continuing instruction to the POS machine. The invention further discloses a blacklist processing system based on the POS machine. The blacklist processing system comprises a transaction request module, a card number reading module and a card number judging module. The blacklist downloading and judgment mechanism is independently opened, downloading and judgment problems of mass blacklists are solved, the judgment accuracy is improved, and the efficiency is greatly improved by using a dichotomy to search in the ordered sequence.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a POS machine-based blacklist processing method and system thereof. Background technique [0002] As prepaid card issuance has risen exponentially, so has the number of lost cards. After the user's card is lost, he will report the loss to the card issuer, and then the reported card will refuse transactions (enter the blacklist) on all terminals. [0003] Due to the huge number of loss reports and their rapid growth, the storage space of traditional terminal devices (POS machines or PIN pads and other card-swiping devices) is too small to store them; In addition, every time the blacklist is downloaded, several batches are downloaded through the ISO8583 standard protocol, and the speed is very slow. [0004] Disadvantages of traditional POS machine workflow: [0005] 1. Downloading the blacklist requires the support of the ISO8583 protocol. There are a large number of he...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/20G06Q20/40
CPCG06Q20/20G06Q20/407G06Q20/409
Inventor 王柯
Owner 四川商通实业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products