CN104933811A - Method and device for controlling cash discharge equipment of automatic teller machine - Google Patents

Method and device for controlling cash discharge equipment of automatic teller machine Download PDF

Info

Publication number
CN104933811A
CN104933811A CN201510242656.9A CN201510242656A CN104933811A CN 104933811 A CN104933811 A CN 104933811A CN 201510242656 A CN201510242656 A CN 201510242656A CN 104933811 A CN104933811 A CN 104933811A
Authority
CN
China
Prior art keywords
operation instruction
signature operation
sender
module
described signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510242656.9A
Other languages
Chinese (zh)
Other versions
CN104933811B (en
Inventor
谢卫平
李海洋
于涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yihua Computer Co Ltd
Shenzhen Yihua Time Technology Co Ltd
Shenzhen Yihua Financial Intelligent Research Institute
Original Assignee
Shenzhen Yihua Computer Co Ltd
Shenzhen Yihua Time Technology Co Ltd
Shenzhen Yihua Financial Intelligent Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yihua Computer Co Ltd, Shenzhen Yihua Time Technology Co Ltd, Shenzhen Yihua Financial Intelligent Research Institute filed Critical Shenzhen Yihua Computer Co Ltd
Priority to CN201510242656.9A priority Critical patent/CN104933811B/en
Publication of CN104933811A publication Critical patent/CN104933811A/en
Application granted granted Critical
Publication of CN104933811B publication Critical patent/CN104933811B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a method and a device for controlling cash discharge equipment of an automatic teller machine. The method includes enabling a legality verification module to receive signature operation instructions initiated by upper business software; enabling the legality verification module to verify identity information of senders of the signature operation instructions; enabling the legality verification module to prohibit the signature operation instructions from being transmitted to a core medium module if identities of the senders of the signature operation instructions are illegal; enabling the legality verification module to transmit the signature operation instructions to the core medium module if the identities of the senders of the signature operation instructions are legal. The signature operation instructions include cash discharge instructions, synchronous secret key instructions, certificate operation instructions or core test instructions. The method and the device have the advantages that the cash discharge legality of the automatic teller machine can be verified, and accordingly the legality of cash discharge behavior of cores can be guaranteed.

Description

Outputting note of ATM apparatus control method and device
Technical field
The embodiment of the present invention relates to outputting note of ATM control technology, particularly relates to a kind of outputting note of ATM apparatus control method and device.
Background technology
Along with the development of infotech, ATM (automatic teller machine) (Automatic Teller Machine based on the multiple technologies such as electronic technology and computer technology, ATM) development rapidly, bank ATM has been applied in each city, the functions such as automatic depositing-withdrawing are provided for client, alleviate the workload of bank clerk.
Along with popularizing of ATM application, its security situation is also faced with increasing challenge, particularly serious example is exactly the security incident that the illegal control of note output equipment causes, brilliant offender has abandoned traditional violence method to movement equipment, but by related software control device, illegal operation is done to movement, make movement perform the operation of illegal note output, thus illegally obtain cash.This criminal offence can not leave obvious hardware vestige on equipment, and be perform valid operation by illegal means, the disguise of behavior is stronger, harmfulness is larger, and from current statistics, this criminal offence proportion in the criminal offence of money transaction equipment is the highest.
Fig. 1 is the process flow diagram of ATM note output in prior art, as shown in Figure 1, in prior art, mainly ATMC (ATM Control when ATM performs note output, ATM control software design) top level control movement medium program carries out note output, lack the checking of the note output legitimacy of behavior, thus cause the abnormal note output of ATM, cause the generation of above-mentioned criminal offence.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of outputting note of ATM apparatus control method and device, to ensure the movement note output legitimacy of behavior.
First aspect, embodiments provide a kind of outputting note of ATM apparatus control method, described method comprises:
Legitimate verification module receives the signature operation instruction that upper-layer service software is initiated, and wherein, described signature operation instruction comprises note output instruction, synchronisation key instruction, certificate operational order or movement test instruction;
The identity information of the sender of signature operation instruction described in legitimate verification module verification;
When the identity of the sender of described signature operation instruction is illegal, described signature operation instruction is sent to movement medium module by legitimate verification module disables;
When the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module by legitimate verification module.
Second aspect, the embodiment of the present invention additionally provides a kind of outputting note of ATM plant control unit, and described device comprises:
Legitimate verification module, for receiving the signature operation instruction that upper-layer service software is initiated, wherein, described signature operation instruction comprises note output instruction, synchronisation key instruction, certificate operational order or movement test instruction; Verify the identity information of the sender of described signature operation instruction; When the identity of the sender of described signature operation instruction is illegal, forbid described signature operation instruction to be sent to movement medium module; When the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module;
Movement medium module, for performing operation corresponding to described signature operation instruction.
The ATM (Automatic Teller Machine) control method that the embodiment of the present invention provides and device, the signature operation instruction of upper-layer service software initiation is received by legitimate verification module, verify the identity information of the sender of described signature operation instruction, only have when the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module, when the identity of the sender of described signature operation instruction is illegal, described signature operation instruction is forbidden to be sent to movement medium module, achieve the legitimate verification of outputting note of ATM, ensure that the movement note output legitimacy of behavior.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of ATM note output in prior art;
Fig. 2 is the process flow diagram of a kind of outputting note of ATM apparatus control method that the embodiment of the present invention one provides;
Fig. 3 is the process flow diagram of a kind of outputting note of ATM apparatus control method that the embodiment of the present invention two provides;
Fig. 4 is the process flow diagram of a kind of outputting note of ATM apparatus control method that the embodiment of the present invention three provides;
Fig. 5 is the structural drawing of mandate USB flash disk in the outputting note of ATM apparatus control method that provides of the embodiment of the present invention or Encryption Keyboard;
Fig. 6 is the schematic diagram of a kind of outputting note of ATM apparatus control method that the embodiment of the present invention four provides;
Fig. 7 is the schematic diagram of a kind of outputting note of ATM plant control unit that the embodiment of the present invention five provides;
Fig. 8 is the structural drawing of the legitimate verification module in the outputting note of ATM plant control unit that provides of the embodiment of the present invention;
Fig. 9 is the structural drawing of the movement security service module in the outputting note of ATM plant control unit that provides of the embodiment of the present invention.
Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.Be understandable that, specific embodiment described herein is only for explaining the present invention, but not limitation of the invention.It also should be noted that, for convenience of description, illustrate only part related to the present invention in accompanying drawing but not full content.
Embodiment one
Fig. 2 is the process flow diagram of a kind of outputting note of ATM apparatus control method that the embodiment of the present invention one provides, and the present embodiment is applicable to and controls outputting note of ATM equipment, and the method can be performed by ATM (Automatic Teller Machine), specifically comprises the steps:
Step 210, legitimate verification module receives the signature operation instruction that upper-layer service software is initiated.
Wherein, described signature operation instruction comprises note output instruction, synchronisation key instruction, certificate operational order or movement test instruction.
When operational order initiated by upper-layer service software, need to sign to operational order, namely send signature operation instruction, to carry out authentication.The signature operation instruction that upper-layer service software is initiated is before sending to movement medium module, first to be verified by the identity information of legitimate verification module to described signature operation instruction, therefore, first legitimate verification module will receive the signature operation instruction that upper-layer service software is initiated.
Wherein, described upper-layer service software comprises: ATMC upper strata, movement security service module or authorize authorization module in USB flash disk or Encryption Keyboard.Note output instruction is initiated by ATMC upper strata; Movement security service module receives synchronisation key instruction or certificate operational order from authorizing USB flash disk or Encryption Keyboard transmission, and described synchronisation key instruction or certificate operational order are sent to legitimate verification module; Movement test instruction is initiated by mandate USB flash disk or Encryption Keyboard.
Step 220, the identity information of the sender of signature operation instruction described in legitimate verification module verification.
Legitimate verification module verifies that according to the signing messages of described signature operation instruction whether the identity information of the sender of described signature operation instruction is legal.
Step 230, when the identity of the sender of described signature operation instruction is illegal, described signature operation instruction is sent to movement medium module by legitimate verification module disables.
Legitimate verification module is verified by the identity information of the sender to described signature operation instruction, when judging that the identity information of the sender of described signature operation instruction is illegal, forbid described signature operation instruction to be sent to movement medium module, to avoid the abnormal note output of movement medium module.
Step 240, when the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module by legitimate verification module.
Legitimate verification module is verified by the identity information of the sender to described signature operation instruction, when judging that the identity information of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module, the operation making movement medium module perform described signature operation instruction to ask, such as note output etc.
The present embodiment receives the signature operation instruction of upper-layer service software initiation by legitimate verification module, verify the identity information of the sender of described signature operation instruction, when the identity of the sender of described signature operation instruction is illegal, described signature operation instruction is forbidden to be sent to movement medium module, when the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module, ensure that the movement note output legitimacy of behavior.
On the basis of technique scheme, also preferably include:
When the identity of the sender of described signature operation instruction is anonymous, described signature operation instruction is sent to movement medium module by legitimate verification module refusal.
Legitimate verification module is legal in order to ensure the identity of the sender of described signature operation instruction, do not allow the anonymous transmit operation instruction of upper-layer service software, if find that the identity of the sender of described signature operation instruction is for anonymous, then refuse described signature operation instruction to be sent to movement medium module.
On the basis of technique scheme, also preferably include:
The execution result of described signature operation instruction is fed back to described legitimate verification module by movement medium module;
The execution result of described signature operation instruction or identity information the result are fed back to described upper-layer service software by legitimate verification module.
The upper-layer service software of initiation signature operation instruction is made to understand execution result or the identity information the result of described signature operation instruction by result feedback.
Embodiment two
Fig. 3 is the process flow diagram of a kind of outputting note of ATM apparatus control method that the embodiment of the present invention two provides, and in the present embodiment, described signature operation instruction is note output instruction, and the method specifically comprises the steps:
Step 310, legitimate verification module receives the signature operation instruction that upper-layer service software is initiated.
Wherein, described signature operation instruction is note output instruction.
When described signature operation instruction is note output instruction, upper-layer service software is ATMC upper strata.
Step 320, legitimate verification module obtains the identity information of the sender of described signature operation instruction from movement security service module.
Wherein, movement security service module is the normal work in order to ensure legitimate verification module, the service relevant to movement safety of registering in an operating system.
Movement security service module obtains the identity information of the sender of described signature operation instruction, namely obtain the identity information of the upper-layer service software sending described signature operation instruction, the identity information of the sender of the described signature operation instruction got is reported to legitimate verification module.
Step 330, the signing messages that the identity information of the sender of described signature operation instruction and described sender send contrasts by legitimate verification module.
The signing messages that legitimate verification module is sent by identity information and the described sender of the sender by described signature operation instruction contrasts, to determine whether the signing messages of sender is forged.
Step 340, when the identity information of the sender of described signature operation instruction is consistent with the signing messages that described sender sends, legitimate verification module determines that the identity of the sender of described signature operation instruction is legal.
When the identity information of the sender of described signature operation instruction is consistent with the signing messages that described sender sends, determine that the identity of the sender of described signature operation instruction is legal, namely the signing messages of sender is not forged.
Step 350, when the signing messages that identity information and the described sender of the sender of described signature operation instruction sends is inconsistent, legitimate verification module determines that the identity of the sender of described signature operation instruction is illegal.
When the signing messages that identity information and the described sender of the sender of described signature operation instruction send is inconsistent, determine that the identity of the sender of described signature operation instruction is illegal, namely the signing messages of sender is forged.
Step 360, when the identity of the sender of described signature operation instruction is illegal, described signature operation instruction is sent to movement medium module by legitimate verification module disables.
When the identity of the sender determining described signature operation instruction is legal, perform following steps:
Step 370, legitimate verification module obtains the certificate information comprised in described signature operation instruction.
Step 380, the certificate information that legitimate verification module is preserved according to self, verifies that whether the certificate information comprised in described signature operation instruction is legal.
Step 390, when the certificate information comprised in described signature operation instruction is legal, is sent to movement medium module by described signature operation instruction.
When the certificate information comprised in described signature operation instruction is legal, described signature operation instruction is sent to movement medium module, performs note output to make movement medium module; When the certificate information comprised in described signature operation instruction is illegal, legitimate verification module notice upper-layer service software upgrading certificate.
The present embodiment obtains the identity information of the upper-layer service software of initiating signature operation instruction by movement security service module, and be reported to legitimate verification module, the signing messages that the identity information of the sender of described signature operation instruction and described sender send contrasts by legitimate verification module, determine that the identity of the sender of described signature operation instruction is legal when contrasting consistent, determine that the identity of the sender of described signature operation instruction is illegal when contrasting inconsistent, when the identity of described signature operation instruction is illegal, described signature operation instruction is forbidden to be sent to movement medium module, thus ensure that the movement note output legitimacy of behavior and require the legitimacy of source program of movement note output, achieve the legitimate verification of outputting note of ATM, make each note output of ATM (Automatic Teller Machine), all be subject to security control, improve the security of ATM (Automatic Teller Machine).
On the basis of technique scheme, also preferably include:
When the identity of the sender of described signature operation instruction is illegal, the inconsistent message of the signing messages that the identity information of the sender of described signature operation instruction and described sender send by legitimate verification module sends to movement security service module;
The process name of the process that the sender that movement security service module obtains described signature operation instruction creates;
Movement security service module terminates the process represented by described process name by force, and deletes the process represented by described process name by force.
The signing messages that the identity information of the sender of described signature operation instruction and described sender send is inconsistent, then illustrate that the signing messages of sender forges, movement security service module obtains the address information of adulterator, obtain the process name of the process that adulterator creates, terminate the process that adulterator creates by force, and by its Force Deletion, thus ensure the legitimacy of the source program of initiating note output instruction, when finding that source program is illegal, Force Deletion is carried out to it.
Embodiment three
Fig. 4 is the process flow diagram of a kind of outputting note of ATM apparatus control method that the embodiment of the present invention three provides, in the present embodiment, described signature operation instruction is synchronisation key instruction, certificate operational order or movement test instruction, and the method specifically comprises the steps:
Step 410, legitimate verification module receives the signature operation instruction that upper-layer service software is initiated.
Wherein, described signature operation instruction is synchronisation key instruction, certificate operational order or movement test instruction.
When described signature operation instruction be synchronisation key instruction, certificate operational order or movement test instruction time, because these behaviors have greater risk mostly, therefore, the initiation program of these behaviors is all placed on authorizes on USB flash disk or Encryption Keyboard, initiates the upper-layer service software of signature operation instruction for authorizing USB flash disk or Encryption Keyboard.And for some user due to use habit, the program copy of authorizing on USB flash disk or Encryption Keyboard may be run in system, even some users may mala fide by risk program copy, for this behavior, the present embodiment does not allow above-mentioned risk program to depart from and authorizes USB flash disk or Encryption Keyboard, adopts following step 420 and step 430 to carry out authentication to the promoter initiating these programs.
Step 420, authorization module inspection authorizes USB flash disk or Encryption Keyboard whether to insert external interface.
Wherein, described authorization module is configured at authorizes in USB flash disk or Encryption Keyboard, namely initiates the promoter of described signature operation instruction.Authorization module inspection authorizes USB flash disk or Encryption Keyboard whether to insert external interface, and the initiation program that namely guarantee authorization module initiates described signature operation instruction does not depart from mandate USB flash disk or Encryption Keyboard.
Whether whether step 430, when described mandate USB flash disk or Encryption Keyboard insert, authorize authorization message on USB flash disk or Encryption Keyboard correct described in legitimate verification module verification, and legal according to the result information that determines one's identity.
Legitimate verification module self can preserve the authorization message of described mandate USB flash disk or Encryption Keyboard, when the authorization message of the described mandate USB flash disk got by movement security service module or Encryption Keyboard is identical with the authorization message that self preserves, the information that determines one's identity is legal; When the authorization message of the described mandate USB flash disk got by movement security service module or Encryption Keyboard is not identical with the authorization message that self preserves, the information that determines one's identity is illegal.
Step 440, when described mandate USB flash disk or Encryption Keyboard do not insert, authorization module deletes self and exits.
When described mandate USB flash disk or Encryption Keyboard do not insert, the initiation program and the authorization module that show to initiate described signature operation instruction have departed from described mandate USB flash disk or Encryption Keyboard, then authorization module can delete self and quit a program.
In order to ensure to initiate synchronisation key instruction, the initiation program of certificate operational order or movement test instruction do not depart from and authorizes USB flash disk or Encryption Keyboard, namely initiate synchronisation key instruction, certificate operational order or movement test instruction initiation program with authorize USB flash disk or Encryption Keyboard to be bind, so just impart and authorize USB flash disk or the great authority of Encryption Keyboard, just because of authorize the authority of USB flash disk or Encryption Keyboard excessive, once authorize USB flash disk to lose or authorize the file on USB flash disk or Encryption Keyboard to reveal, very large risk may be caused.In order to avoid this risk, can control for authorizing USB flash disk or Encryption Keyboard to add access limit.Fig. 5 is the structural drawing of mandate USB flash disk in the outputting note of ATM apparatus control method that provides of the embodiment of the present invention or Encryption Keyboard, as shown in Figure 5, mandate USB flash disk or Encryption Keyboard are divided into 3 subregions: subregion 1 is logon area, logging program is placed at this subregion, if do not logged in, then second subregion is in disabled status, the authority checking information on this mandate USB flash disk or Encryption Keyboard cannot be got, verification is authorized to pass through, risk operations can not be performed, also cannot get the synchronisation key of authorizing on USB flash disk or Encryption Keyboard simultaneously, make certificate, perform the operation of movement test equivalent risk, second subregion is data manipulation district, placed necessary application file at this subregion, comprises the authorization message of authorizing USB flash disk, and in order to synchronisation key, make certificate, movement test procedure etc., this subregion was disabled status before login, was a read states after logging in, 3rd subregion is hidden partition, this partition user cannot be seen, but pass through speciality tool, the content of this subregion can be checked, the use record that this authorizes USB flash disk or Encryption Keyboard is have recorded in this subregion, such as in such a month, and on such a day the some time point uses on an ATM certain year, and what the IP of this atm device is, what hard disk serial number is etc.In this way, prevent from authorizing USB flash disk or Encryption Keyboard illegally to be abused, and usage behavior can be tracked, unless employed the volume production instrument that manufacturer uses, hold again key corresponding to this volume production instrument and password corresponding with it, otherwise the content in this hidden partition cannot be cleared simultaneously.By for authorizing USB flash disk or Encryption Keyboard to carry out different subregions, further ensure the safety of authorizing USB flash disk or Encryption Keyboard.
Step 450, when the identity of the sender of described signature operation instruction is illegal, described signature operation instruction is sent to movement medium module by legitimate verification module disables.
When the identity of the sender of described signature operation instruction is illegal, refusal performs the operation that described signature operation instruction is asked.
Step 460, when the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module by legitimate verification module.
When the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module by legitimate verification module, the operation making movement medium module perform described signature operation instruction to ask.
The present embodiment authorizes USB flash disk or Encryption Keyboard whether to insert external interface by authorization module checking, when authorizing USB flash disk or Encryption Keyboard inserts external interface, authorize the authorization message on USB flash disk or Encryption Keyboard whether correct described in legitimate verification module verification, and it is whether legal according to the result information that determines one's identity, when identity information is legal, described signature operation instruction is sent to movement medium module, when identity information is illegal, described signature operation instruction is forbidden to be sent to movement medium module, ensure that and initiate synchronisation key instruction, the initiation program of certificate operational order or movement test instruction does not depart from authorizing USB flash disk or Encryption Keyboard, namely by authorizing the mode of the hardware such as USB flash disk or Encryption Keyboard to ensure to initiate synchronisation key instruction, the legitimacy of the initiation program of certificate operational order or movement test instruction, avoid the abnormal note output of movement.
Embodiment four
Fig. 6 is the schematic diagram of a kind of outputting note of ATM apparatus control method that the embodiment of the present invention four provides, and as shown in Figure 6, A represents that ATMC upper strata sends instruction to legitimate verification module, requires that it performs note output action; B represents that legitimate verification module performs information to upper strata feedback command, as: legitimate verification failure, instruction run succeeded; C represents that legitimate verification module requires that movement medium module performs particular command, as synchronisation key, performs note output action etc.; D represents movement medium module feedback command execution result, as success or because certain reason unsuccessfully returns error code etc.; After E represents that movement medium module receives note output instruction, perform note output action; F represents that movement security service module obtains the information on the upper strata sending instruction; G represents that movement security service module carries out deletion action by force to the upper strata of camouflage after receiving the checking invalid message of legitimate verification module; H represents that movement security service module obtains the authorization message of authorizing USB flash disk, or accepts from operation applications such as the making certificate of authorizing USB flash disk to send or synchronisation key; I represent movement security service module send the upper layer information that gets to legitimate verification module, require that legitimate verification module sends synchronisation key order, or by the message notice that Generates Certificate to legitimate verification module; J represents that legitimate verification module sends message that identity information that upper strata signing messages and movement security service module get is not inconsistent to movement security service module, or replys the result of synchronisation key that movement security service module sends or the execution of certificate relevant information; K, L then represent and authorize test procedure on USB flash disk or Encryption Keyboard by legitimate verification module operation movement, perform test operation, send instruction and also receive feedback.
Embodiment five
Fig. 7 is the schematic diagram of a kind of outputting note of ATM plant control unit that the embodiment of the present invention five provides, and as shown in Figure 7, the outputting note of ATM plant control unit that the present embodiment provides comprises:
The signature operation instruction that legitimate verification module 710 is initiated for receiving upper-layer service software, wherein, described signature operation instruction comprises note output instruction, synchronisation key instruction, certificate operational order or movement test instruction; Verify the identity information of the sender of described signature operation instruction; When the identity of the sender of described signature operation instruction is illegal, forbid described signature operation instruction to be sent to movement medium module; When the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module;
Movement medium module 720 is for performing operation corresponding to described signature operation instruction.
Wherein, described upper-layer service software comprises: ATM (Automatic Teller Machine) control software design ATMC, movement security service module or authorize authorization module in USB flash disk or Encryption Keyboard.
Preferably, described legitimate verification module also for:
When the identity of the sender of described signature operation instruction is anonymous, refuse described signature operation instruction to be sent to movement medium module.
Preferably, described signature operation instruction is note output instruction;
Described device also comprises:
Movement security service module, for obtaining the identity information of the sender of described signature operation instruction;
Described legitimate verification module comprises:
Identity information acquiring unit, for obtaining the identity information of the sender of described signature operation instruction from movement security service module;
Identity information contrast unit, the signing messages that identity information and described sender for the sender by described signature operation instruction send contrasts;
Identity determination unit, when the identity information for the sender when described signature operation instruction is consistent with the signing messages that described sender sends, determines that the identity of the sender of described signature operation instruction is legal; When the signing messages that identity information and the described sender of the sender of described signature operation instruction send is inconsistent, determine that the identity of the sender of described signature operation instruction is illegal;
Legitimate verification module also comprises:
Certificate information acquiring unit, when the identity of the sender of described signature operation instruction is legal, obtains the certificate information comprised in described signature operation instruction;
Certificate information authentication unit, for the certificate information of preserving according to self, verifies that whether the certificate information comprised in described signature operation instruction is legal;
Transmitting element, for when the certificate information comprised in described signature operation instruction is legal, is sent to movement medium module by described signature operation instruction.
Preferably, described movement security service module also for:
When the identity of the sender of described signature operation instruction is illegal, the message that the signing messages that the identity information of the sender of the described signature operation instruction that reception legitimate verification module is sent and described sender send is inconsistent;
The process name of the process that the sender obtaining described signature operation instruction creates;
Terminate the process represented by described process name by force, and delete the process represented by described process name by force.
Preferably, described signature operation instruction is synchronisation key instruction, certificate operational order or movement test instruction;
Described device also comprises:
Authorization module, is configured at and authorizes in USB flash disk or Encryption Keyboard, authorizes USB flash disk or Encryption Keyboard whether to insert external interface for checking;
Legitimate verification module also for:
When described mandate USB flash disk or Encryption Keyboard insert, verify that whether authorization message on described mandate USB flash disk or Encryption Keyboard is correct, and whether legal according to the result information that determines one's identity.
Authorization module also for:
When described mandate USB flash disk or Encryption Keyboard do not insert, delete self and exit.
Preferably, described movement medium module also for:
The execution result of described signature operation instruction is fed back to described legitimate verification module;
Described legitimate verification module also for:
The execution result of described signature operation instruction or identity information the result are fed back to described upper-layer service software.
Fig. 8 is the structural drawing of the legitimate verification module in the outputting note of ATM plant control unit that provides of the embodiment of the present invention, and as shown in Figure 8, legitimate verification module comprises upper procedure interface, algoritic module, certificate storage module and medium program interface.Wherein, upper procedure interface includes legitimate verification module to movement security service module and the calling interface that provides ATMC upper-layer service software; Algoritic module includes certification authentication algorithm and message enciphering and deciphering algorithm; Certificate storage module save in order to authentication certificate legitimacy certificate counterfoil and authorize the authorization information of USB flash disk; Medium program interface then in order to by after legitimate verification, is linked up with movement medium module and obtains the input and output of movement medium module.
Fig. 9 is the structural drawing of the movement security service module in the outputting note of ATM plant control unit that provides of the embodiment of the present invention, and as shown in Figure 9, movement security service module comprises authentication module, Service Processing Module and external interface.Wherein, whether authentication module is mainly used in checking USB flash disk is authorize USB flash disk or Encryption Keyboard, or whether Encryption Keyboard possesses movement authorization of service function, the legitimacy of operation when ensureing to use USB flash disk or Encryption Keyboard to operate; The information that Service Processing Module sends for the treatment of external interface, and determine corresponding processing mode according to these information, the information that signing messages and movement security service module as legitimate verification module discovery upper strata get is inconsistent, then Service Processing Module notice external interface, require its calling system function kill camouflage upper strata and by it deletion; External interface is responsible for receiving the outside data message transmitted, and these information are transmitted to Service Processing Module, and the processing policy simultaneously also will specified according to Service Processing Module calls external function module and processes the module of specifying or data message.
The said goods can perform the method that any embodiment of the present invention provides, and possesses the corresponding functional module of manner of execution and beneficial effect.
Note, above are only preferred embodiment of the present invention and institute's application technology principle.Skilled person in the art will appreciate that and the invention is not restricted to specific embodiment described here, various obvious change can be carried out for a person skilled in the art, readjust and substitute and can not protection scope of the present invention be departed from.Therefore, although be described in further detail invention has been by above embodiment, the present invention is not limited only to above embodiment, when not departing from the present invention's design, can also comprise other Equivalent embodiments more, and scope of the present invention is determined by appended right.

Claims (10)

1. an outputting note of ATM apparatus control method, is characterized in that, described method comprises:
Legitimate verification module receives the signature operation instruction that upper-layer service software is initiated, and wherein, described signature operation instruction comprises note output instruction, synchronisation key instruction, certificate operational order or movement test instruction;
The identity information of the sender of signature operation instruction described in legitimate verification module verification;
When the identity of the sender of described signature operation instruction is illegal, described signature operation instruction is sent to movement medium module by legitimate verification module disables;
When the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module by legitimate verification module.
2. method according to claim 1, is characterized in that, described signature operation instruction is note output instruction;
The identity information of the sender of signature operation instruction described in legitimate verification module verification, comprising:
Legitimate verification module obtains the identity information of the sender of described signature operation instruction from movement security service module;
The signing messages that the identity information of the sender of described signature operation instruction and described sender send contrasts by legitimate verification module;
When the identity information of the sender of described signature operation instruction is consistent with the signing messages that described sender sends, legitimate verification module determines that the identity of the sender of described signature operation instruction is legal;
When the signing messages that identity information and the described sender of the sender of described signature operation instruction send is inconsistent, legitimate verification module determines that the identity of the sender of described signature operation instruction is illegal;
When the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module by legitimate verification module, comprising:
Legitimate verification module obtains the certificate information comprised in described signature operation instruction;
The certificate information that legitimate verification module is preserved according to self, verifies that whether the certificate information comprised in described signature operation instruction is legal;
When the certificate information comprised in described signature operation instruction is legal, described signature operation instruction is sent to movement medium module.
3. method according to claim 2, is characterized in that, also comprises:
When the identity of the sender of described signature operation instruction is illegal, the inconsistent message of the signing messages that the identity information of the sender of described signature operation instruction and described sender send by legitimate verification module sends to movement security service module;
The process name of the process that the sender that movement security service module obtains described signature operation instruction creates;
Movement security service module terminates the process represented by described process name by force, and deletes the process represented by described process name by force.
4. method according to claim 1, is characterized in that, described signature operation instruction is synchronisation key instruction, certificate operational order or movement test instruction;
The identity information of the sender of signature operation instruction described in legitimate verification module verification, comprising:
Authorization module inspection authorizes USB flash disk or Encryption Keyboard whether to insert external interface, and wherein, described authorization module is configured at authorizes in USB flash disk or Encryption Keyboard;
When described mandate USB flash disk or Encryption Keyboard insert, described in legitimate verification module verification, authorize authorization message on USB flash disk or Encryption Keyboard whether correct, and whether legal according to the result information that determines one's identity;
When described mandate USB flash disk or Encryption Keyboard do not insert, authorization module deletes self and exits.
5. method according to claim 1, is characterized in that, also comprises:
The execution result of described signature operation instruction is fed back to described legitimate verification module by movement medium module;
The execution result of described signature operation instruction or identity information the result are fed back to described upper-layer service software by legitimate verification module.
6. according to the arbitrary described method of claim 1-5, it is characterized in that, described upper-layer service software comprises: ATM (Automatic Teller Machine) control software design ATMC, movement security service module or authorize authorization module in USB flash disk or Encryption Keyboard.
7. an outputting note of ATM plant control unit, is characterized in that, described device comprises:
Legitimate verification module, for receiving the signature operation instruction that upper-layer service software is initiated, wherein, described signature operation instruction comprises note output instruction, synchronisation key instruction, certificate operational order or movement test instruction; Verify the identity information of the sender of described signature operation instruction; When the identity of the sender of described signature operation instruction is illegal, forbid described signature operation instruction to be sent to movement medium module; When the identity of the sender of described signature operation instruction is legal, described signature operation instruction is sent to movement medium module;
Movement medium module, for performing operation corresponding to described signature operation instruction.
8. device according to claim 7, is characterized in that, described signature operation instruction is note output instruction;
Described device also comprises:
Movement security service module, for obtaining the identity information of the sender of described signature operation instruction;
Described legitimate verification module comprises:
Identity information acquiring unit, for obtaining the identity information of the sender of described signature operation instruction from movement security service module;
Identity information contrast unit, the signing messages that identity information and described sender for the sender by described signature operation instruction send contrasts;
Identity determination unit, when the identity information for the sender when described signature operation instruction is consistent with the signing messages that described sender sends, determines that the identity of the sender of described signature operation instruction is legal; When the signing messages that identity information and the described sender of the sender of described signature operation instruction send is inconsistent, determine that the identity of the sender of described signature operation instruction is illegal;
Legitimate verification module also comprises:
Certificate information acquiring unit, when the identity of the sender of described signature operation instruction is legal, obtains the certificate information comprised in described signature operation instruction;
Certificate information authentication unit, for the certificate information of preserving according to self, verifies that whether the certificate information comprised in described signature operation instruction is legal;
Transmitting element, for when the certificate information comprised in described signature operation instruction is legal, is sent to movement medium module by described signature operation instruction.
9. device according to claim 8, is characterized in that, described movement security service module also for:
When the identity of the sender of described signature operation instruction is illegal, the message that the signing messages that the identity information of the sender of the described signature operation instruction that reception legitimate verification module is sent and described sender send is inconsistent;
The process name of the process that the sender obtaining described signature operation instruction creates;
Terminate the process represented by described process name by force, and delete the process represented by described process name by force.
10. device according to claim 7, is characterized in that, described signature operation instruction is synchronisation key instruction, certificate operational order or movement test instruction;
Described device also comprises:
Authorization module, is configured at and authorizes in USB flash disk or Encryption Keyboard, authorizes USB flash disk or Encryption Keyboard whether to insert external interface for checking;
Legitimate verification module also for:
When described mandate USB flash disk or Encryption Keyboard insert, verify that whether authorization message on described mandate USB flash disk or Encryption Keyboard is correct, and whether legal according to the result information that determines one's identity;
Authorization module also for:
When described mandate USB flash disk or Encryption Keyboard do not insert, delete self and exit.
CN201510242656.9A 2015-05-13 2015-05-13 Outputting note of ATM apparatus control method and device Expired - Fee Related CN104933811B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510242656.9A CN104933811B (en) 2015-05-13 2015-05-13 Outputting note of ATM apparatus control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510242656.9A CN104933811B (en) 2015-05-13 2015-05-13 Outputting note of ATM apparatus control method and device

Publications (2)

Publication Number Publication Date
CN104933811A true CN104933811A (en) 2015-09-23
CN104933811B CN104933811B (en) 2017-09-29

Family

ID=54120962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510242656.9A Expired - Fee Related CN104933811B (en) 2015-05-13 2015-05-13 Outputting note of ATM apparatus control method and device

Country Status (1)

Country Link
CN (1) CN104933811B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018129658A1 (en) * 2017-01-10 2018-07-19 深圳怡化电脑股份有限公司 Upper-layer application identity verification method, self-service terminal, and application server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588364A (en) * 2009-03-31 2009-11-25 北京飞天诚信科技有限公司 Signature method, device and system thereof
CN102411814A (en) * 2011-08-10 2012-04-11 中国工商银行股份有限公司 Identity authentication method, handheld ATM (automated teller machine) terminal and system
CN102629403A (en) * 2012-03-14 2012-08-08 深圳市紫金支点技术股份有限公司 USB (Universal Serial Bus) flash disk authorization method and system based on ATM (Automatic Teller Machine) equipment
CN103825738A (en) * 2013-12-31 2014-05-28 北京华虹集成电路设计有限责任公司 Registration information authentication method and device
WO2015003728A1 (en) * 2013-07-08 2015-01-15 Keba Ag Automated teller machine
CN104318679A (en) * 2014-10-29 2015-01-28 胡正义 Cash withdrawal control method for ATM (automatic teller machine)

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588364A (en) * 2009-03-31 2009-11-25 北京飞天诚信科技有限公司 Signature method, device and system thereof
CN102411814A (en) * 2011-08-10 2012-04-11 中国工商银行股份有限公司 Identity authentication method, handheld ATM (automated teller machine) terminal and system
CN102629403A (en) * 2012-03-14 2012-08-08 深圳市紫金支点技术股份有限公司 USB (Universal Serial Bus) flash disk authorization method and system based on ATM (Automatic Teller Machine) equipment
WO2015003728A1 (en) * 2013-07-08 2015-01-15 Keba Ag Automated teller machine
CN103825738A (en) * 2013-12-31 2014-05-28 北京华虹集成电路设计有限责任公司 Registration information authentication method and device
CN104318679A (en) * 2014-10-29 2015-01-28 胡正义 Cash withdrawal control method for ATM (automatic teller machine)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018129658A1 (en) * 2017-01-10 2018-07-19 深圳怡化电脑股份有限公司 Upper-layer application identity verification method, self-service terminal, and application server

Also Published As

Publication number Publication date
CN104933811B (en) 2017-09-29

Similar Documents

Publication Publication Date Title
US20190028467A1 (en) System and method of notifying mobile devices to complete transactions
CN102099810B (en) Mobile device assisted secure computer network communications
US8079069B2 (en) Cardspace history validator
CN105608577B (en) Method for realizing non-repudiation, payment management server and user terminal thereof
KR102202547B1 (en) Method and system for verifying an access request
CN106888084B (en) Quantum fort machine system and authentication method thereof
CN109412812B (en) Data security processing system, method, device and storage medium
RU2560810C2 (en) Method and system for protecting information from unauthorised use (versions thereof)
CN111404696B (en) Collaborative signature method, security service middleware, related platform and system
US8631486B1 (en) Adaptive identity classification
CN103929307A (en) Password input method, intelligent secret key device and client device
CN102217277A (en) Method and system for token-based authentication
JP2019517087A (en) Authentication method and system
CN105553926A (en) Authentication method, server, and terminal
CN107979467A (en) Verification method and device
JP7223067B2 (en) Methods, apparatus, electronics, computer readable storage media and computer programs for processing user requests
JP2008269381A (en) Authentication server and on-line service system
KR101206854B1 (en) Authentication system and method based by unique identifier
CN114270386A (en) Authenticator application for consent framework
KR101856530B1 (en) Encryption system providing user cognition-based encryption protocol and method for processing on-line settlement, security apparatus and transaction approval server using thereof
KR20070024100A (en) Network security system by using image key input and its method
CN104933811A (en) Method and device for controlling cash discharge equipment of automatic teller machine
AlZomai et al. Strengthening sms-based authentication through usability
KR101708880B1 (en) Integrated lon-in apparatus and integrated log-in method
KR101195027B1 (en) System and method for service security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170929