identify
The credit card has at least the following information on its surface:
Front: name and logo of the issuing bank, credit card type (organization logo) and holographic anti-counterfeiting logo, card number, English or pinyin name, activation date (generally calculated to month) and effective date (generally calculated to month). The chip is attached to the front of the newly issued card, and the chip account and the card magnetic stripe account are two relatively independent accounts.
Back: the magnetic stripe of the card, the cardholder's signature column (which must be signed after activation), the service hotline, the four or all digits after the card number (to prevent fraudulent use), and the credit card security code (the three digits immediately after the signature column on the back of the credit card are used for credit card activation, password management, TV, telephone and online transactions, etc. ).
approve
The merchant and the bank confirm that the credit card is valid and contact the bank for authorization according to the contract signed with the issuing bank. Authorization is the amount that can be used to further prove the identity of the cardholder. Authorization is generally carried out when the usage specified in the contract is exceeded.
After receiving the authorization notice, the issuing bank will issue an authorization instruction according to the balance of the cardholder's deposit account and the agreement that the bank allows overdraft, and reply whether to agree to the transaction.
Extended data:
The security problems of credit cards are mainly divided into the following five aspects:
Credit card: criminals or criminal groups use forged or invalid cards (expired/lost/invalid/damaged tapes, etc.). ) pretending to be a real card, directly deceiving merchants or card issuers.
Cardholder: improper card storage/handling (expired/tape-invalid credit cards are not destroyed, or they are not immediately invalid after being lost, etc. ), and personal identity information is inadvertently stolen or defrauded. In order to avoid such problems, citizens should not easily provide personal identification information, and it is best not to entrust others to handle credit cards.
Consumer merchants: the service personnel swindle the cardholder in the process of consumption, or steal his credit card information to other merchants for consumption. This situation can happen whether it is a physical business or a network virtual business.
Issuer: The computer system has been maliciously invaded, stealing the basic/transaction information of customers. There are also some unscrupulous cases in which employees in the organization are in the house, stealing from themselves or working in the house.
Trading system and mechanism: as long as it is formulated or handled by human beings, human errors and omissions will inevitably occur; No matter how rigorous the trading mechanism is, with the world-class trading system from confirmation to settlement, it is still possible to be invaded, and the so-called "invasion" is actually divided into levels.
Baidu encyclopedia-credit card