CN104574694A - ATM (automatic teller machine) automatic safety device and method for implementing protection measures of ATM automatic safety device - Google Patents

ATM (automatic teller machine) automatic safety device and method for implementing protection measures of ATM automatic safety device Download PDF

Info

Publication number
CN104574694A
CN104574694A CN201510038712.7A CN201510038712A CN104574694A CN 104574694 A CN104574694 A CN 104574694A CN 201510038712 A CN201510038712 A CN 201510038712A CN 104574694 A CN104574694 A CN 104574694A
Authority
CN
China
Prior art keywords
atm
door
involved party
button
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510038712.7A
Other languages
Chinese (zh)
Other versions
CN104574694B (en
Inventor
刘升旭
龚玉霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linyi High Tech Zone Jinlanling Labor Service Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510038712.7A priority Critical patent/CN104574694B/en
Publication of CN104574694A publication Critical patent/CN104574694A/en
Application granted granted Critical
Publication of CN104574694B publication Critical patent/CN104574694B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention provides an ATM (automatic teller machine) automatic safety device and a method for implementing protection measures of the ATM automatic safety device. The ATM automatic safety device comprises an operation room surrounded by a rotating door, a safety door and connecting walls; and an identity recognizer and a visual checking device are arranged in the operation room. The method comprises the following steps of recording videos and checking authorization by using the visual checking device after a doer enters the operation room through the rotating door; leaving information of an identity card, fingerprints or iris of the doer by using the identity recognizer so that initial verification on legality of the doer is finished; judging legality of a card inserting behavior of the doer according to the information of a bank card and the information obtained before the doer enters the ATM room after the doer inserts the bank card in an ATM successfully; and whether an alarming behavior is carried out or not is judged according to a judgment result. By the ATM automatic safety device and the method for implementing the protection measures of the ATM automatic safety device, confirmation on the identities of actual users of bank cards is strengthened effectively, most of criminal behaviors about the bank cards can be actively prevented and stopped, and legal interests of legal holders of the bank cards can be protected. The ATM automatic safety device and the method for implementing the protection measures of the ATM automatic safety device have the advantages of convenience in use, safety, reliability and the like.

Description

The implementation method of a kind of ATM auxiliary safety device and safeguard procedures thereof
Technical field
The invention belongs to ATM auxiliary equipment, particularly a kind of by carrying out identity to the holder to ATM place and investigate on the spot and person isolation etc., initiatively crime prevention, to realize safety feature and the method for protecting bank card legal owner rights and interests.
Background technology
In recent years, China ATM industry development is rapid, about the various crimes of bank card, quantitatively day by day increase, and in form along with high-tech development such as networks, its form of crimes constantly updates especially.ATM is convenient, fast, and card only need be inserted ATM by it, inputs proper password simultaneously.But the computerized control system of ATM is protected only by the safety of setting one password to client's debt, and protection level is low, and safeguard procedures are obviously thin, totally say, conveniently have a surplus but safety obviously deficiency; And, this convenient convenient approach simultaneously also providing the crime of enforcement fiscard to the people illegally obtaining bank card and password thereof.
Current fiscard form of crimes is various, and the first, offender plunders after bank card at scene, inherently forces to obtain the password of victim's bank card by various means; The second, high iq crime, people can be utilized to use Wi-Fi, shopping online, mobile phone-downloaded software etc. chance, slip into Private Financial's information bank, the illegal private bank that obtains blocks various information and password of withdrawing the money, and finally copies this card; 3rd, the relatives of bank card holder in due course, friend and colleague etc., have an opportunity to obtain this bank card and password thereof simultaneously, and likely finally realize bank card crime, and facing this situation, bank card holder in due course is often because of all scrupulous and abandon investigating and reporting to the police; 4th, the criminal offence ATM place may occur: 1. post up a placard, inveigles client; 2. pick up receipt, strip that client arbitrarily abandons, be aided with miscellaneous equipment, make emulation bank card; 3. juggle things in ATM; 4., in the crowd of ATM place queuing, single or many people coordinate, and peep client password or substitute bank card for another surreptitiously; 5. due to the randomness that current ATM is arranged, especially in big city, offender even in street, the place such as the wall turning of community, a false ATM is set, steals bank card information to reach or gain cash by cheating.And current ATM, only recognize bank card and password thereof, as long as insert bank card, input correct password, anyone all can complete various self-financial service at ATM place simultaneously.And this, the main cause that can repeatedly succeed of offender just.
Summary of the invention
The object of the present invention is to provide the implementation method of a kind of ATM auxiliary safety device and safeguard procedures thereof, for in current bank ATM automatic drawing business, computerized control system only arranges one cryptoguard, client is conveniently had a surplus but the obvious not enough problem of safeguard protection, to under the hardware of current ATM in bank prerequisite without any changes, by setting up an auxiliary safety device at bank ATM unit room place, reach and " both can ensure normally carrying out of bank card holder in due course and legal agent thereof the various self-financial service operation at ATM place, can realize again blocking the active of the bank card crime behavior that other unauthorized persons are implemented simultaneously " object, embody promptness and validity that bank safeguards bank card holder in due course legitimate rights and interests, finally realize the enhancing of financial institution to bank card user sense of responsibility.
Technical solution of the present invention is: a kind of ATM auxiliary safety device, comprise and be arranged on the revolving door at ATM chamber inlet place and the safety door of inner side thereof, a closed operation room is surrounded by contact wall between two, be provided with identity recognizer in operation room and visually test for device, the ATM indoor location of safety door opposite side has request help button, the place of receiving a crime report beyond ATM room is mounted with alarm response device, specific as follows:
Described revolving door only arranges 1 logical lattice and its space size can only hold an involved party, and logical lattice top is provided with number recognizer, and logical lattice inwall is provided with start button; Described safety door adopts bottom chute type, and door core front is provided with releases the button, and the back side is installed about driving button, and left and right adopts embedded; Described identity recognizer comprise be connected with working power respectively identity card identifier, Fingerprint Identification Unit or iris recognition device, loudspeaker, working power is connected with external power by power switch, and the data transmission of identity recognizer is unified to be connected with bank computer control system by data line; Described visual testing comprises master controller, communication module, load module, power management module, card management module, external interface module, output module for device, described master controller, i.e. visual signal transferring and receiving apparatus, is made up of CPU+GPU+ROM+RAM+ external memory storage; Described communication module, the signal namely playing radio-frequency enabled sends out receipts terminal, is made up of rf chip and power amplifier; Described load module, is made up of visual camera lens and Mike; Described power management module, managing electrical power switch; Described card management module, management SIM card; Described external interface module, with the data-interface of bank computer control system UNICOM; Described output module, is made up of monitor scope and loudspeaker, and the winding displacement that the visual signal transferring and receiving apparatus of master controller and the monitor scope of output module and loudspeaker are got in touch with is provided with trigging control switch.
An implementation method for ATM auxiliary safety device and safeguard procedures thereof, concrete steps are as follows:
1) revolving door is entered, involved party enters the logical lattice of revolving door, under the monitoring of number recognizer, press the revolving door start button (Tong Genei is more than revolving door start button power-off during 1 people) on logical lattice inwall, involved party rotates together with revolving door (this process ensures that one-man enters revolving door), and treat that involved party comes to operation room place, revolving door completes rotation, stop, locking; Meanwhile, the logical lattice opening of revolving door is at the back door place of revolving door, the Qianmen place of revolving door is now in closed state, and now at revolving door Qianmen place, other people cannot rotate revolving door or enter, operation room is closed, thus ensure that involved party independent, noiseless, safe at operation room place carry out associative operation.
2) make video recording sound, test mandate, if the involved party entering operation room does not have substitute service directly to forward step 3 to); If have, then utilize visual to test for device and under bank computer control system complete monitoring, involved party and clientage carry out asking and authorizing, bank computer control system is assaied according to the bank card information of authorizing and the identity information of clientage the legitimacy of clientage's act of authorization, and whether affirming conduct people is authorized to accordingly; The judgment basis whether information herein stayed reports to the police after entering ATM room as involved party.
3) test the body part, sentence " unification ", finger print information or the iris information of involved party is left by identity recognizer, I.D. effective information, preliminary identification is carried out to " unification " of the involved party for entering ATM room, as preliminary identification result does not judge that " not conforming to " safety door is released the button electric, involved party presses safety door and releases the button, and opens safety door, enters ATM room; As preliminary identification result judges " not conforming to ", safety door is released the button power-off, and involved party is denied access to ATM room.Now involved party (refers to no matter be which kind of situation, as long as be in operation room) can select again to return Tong Ge and press revolving door start button, revolving door unlocks, start, and involved party rotates together with revolving door, after stop, simultaneously locking, go out revolving door.
4) bank card business is completed, after involved party enters ATM room, after bank card is successfully inserted ATM, bank computer control system to obtain from ATM by the information of slotting bank card and to test the full detail that gathers for device and identity recognizer place in addition comprehensive visual, " legitimacy " of carrying out the behavior of involved party's plug-in card judges, when the result judged is as " legal ", then involved party has continued the later related service about this bank card and has operated, the now behavior of involved party belongs to normally, only legal bank card business of finishing, and bank card normally exits; When the result judged is as " illegally ", alarm response device sends alert news.
Further, described step 4) in: after involved party enters ATM room, safety door is closed immediately, now button is driven in safety door pass, revolving door start button is in obtain electricity condition, now in official hour, (30 seconds as limited in embodiment) involved party can also independently walk out ATM room, after bank card is successfully inserted ATM, safety door closes opens button and the power-off of revolving door start button, involved party is in " constrained state ", and involved party artificially cannot independently walk out ATM room; When the result judged is as " legal ", involved party is in " entering constrained state ", while success card taking, bank computer control system instruction secure door pass drives button and revolving door start button recovers electric, and constrained state is removed (to be pressed safety door pass and drive button, safety door is opened, involved party gets back to logical lattice, then presses revolving door start button, rotates with revolving door, go out revolving door, complete the operation of whole bank card); When the result judged is as " illegally ", then involved party is in " being absorbed in constrained state ", and it is removed to only have and to show up solution by responding personnel.Responding personnel open escape door, enter ATM room, if the crime of behavior Genus Homo, naturally have to fold one's hands for capture.
Compared with prior art, the invention has the beneficial effects as follows: 1) active protection, stopped the generation of most bank card crime behavior; 2) eliminate, prevent and legally carry out self-financial service personnel and illegally to be peeped by the people of periphery in input password link and steal; 3) protection duty of bank to bank card legal owner legitimate rights and interests is enhanced; 4) to the ATM of current bank without any changes; 5) essentially eliminate the crime at ATM place for the bank card of bank card holder in due course, protect bank card holder in due course bank card rights and interests to greatest extent; 6) easy to use, safe and reliable, there is decisive raising to the security of current bank ATM automatic drawing service.
Accompanying drawing explanation
Fig. 1 is the floor plan of ATM auxiliary safety device of the present invention;
Fig. 2 is the structural representation of safety door, and wherein: Fig. 2 A face is front view, Fig. 2 B face is the rear view of a core and lower frame, and Fig. 2 C face is the A-A view in Fig. 2 A face;
Fig. 3 (1) is that involved party enters revolving door process flow diagram;
Fig. 3 (2) is that involved party goes out revolving door process flow diagram;
Fig. 4 (1) is the visual external structure schematic diagram tested for device;
Fig. 4 (2) is that visual testing obtains electric process schematic diagram for device;
Fig. 4 (3) visually tests for device workflow diagram;
Fig. 4 (4) visually tests for device Inner Constitution schematic diagram;
Fig. 5 is safety door switch process flow diagram;
Fig. 6 is identity recognizer and visually tests for device associated working process flow diagram;
Fig. 7 is constrained state process flow diagram of the present invention;
Fig. 8 is the contour structures schematic diagram of identity recognizer.
Explanation about Fig. 6: 1) unauthorized person." unauthorized person " in " entering personnel's classification " of directly entering identity recognizer 6, means and allly holds other people bank card and do not test people that obtain the authorization for device 7 place, that directly come identity recognizer 6 by visual.This kind of people comes ATM room place and does not prepare to allow bank card holder in due course know, so be deliberately test for device 7 without visual, because they know---" even if also can not be authorized for device 7 through visual testing, instead my picture harmony will be left "; And (the present invention sets) is for entering safety door 5 and then entering ATM room, must through identity recognizer 6, however, unauthorized person still may entertain " only leaving fingerprint perhaps may not necessarily to be cracked " lucky, when use other people true I.D. and enter ATM room---he do not know or have little understanding " constrained state " of the present invention prerequisite under.2) explanation of " pressing twice safety door pass continuously and driving button 9 ".The reason " twice safety door pass must pressed and drive button 9; safety door 5 just can be opened ": the present invention sets, enter safety door 5, enter the involved party of ATM room, first time presses safety door pass and drives button 9, can realize the emergency cut-off of safety door 5, second time is pressed safety door pass and is driven button 9, just can realize reopening of safety door 5,---because involved party's now not yet plug-in card, Gu Anquanmenguan opens button 9 and revolving door and releases the button and 4 be still in obtain electricity condition.3) agent authorization process full detail.In " the agent authorization information " of the information storage link of bank computer system, be included in " visual test for device 7 " place's bank computer system record " head portrait, sound and the mandate situation corresponding with card " (i.e. procurator whether be authorized to relevant full detail) of procurator and the principal stored.
Explanation about Fig. 7: 1) " successful plug-in card " means that bank card is correctly inserted into position by involved party, and not " empty slotting ", in relevant style of writing, be also referred to as " effective plug-in card "; 2) " legal ", " illegally ", means that involved party is while its successful plug-in card, the result that bank computer control system " validity decision " link to its plug-in card behavior may occur.
Embodiment
The premise calls that the present invention uses and explanation:
1. summarize.ATM auxiliary safety device provided by the invention; significantly enhance bank to be correlated with to bank card holder in due course the protection of rights and interests; therefore require in bank computer control system; except to have about bank card holder in due course ID (identity number) card information and deposit and withdraw except password; also to leave the image of front without a hat in the recent period, iris (eyes) information of bank card holder in due course, refer to (two palm) line information and proxypassword and prevent strong for password; moreover setting and the above-mentioned relevant information thereof of the legal representative of bank card also all will possess.
Neocaine in this way, the disposable collection completing relevant information of palpus; If always block, namely bank card is handled before bank uses the present invention, the above-mentioned information of bank card answers completion, and universal use of the present invention, each bank card holder in due course or legal representative can be facilitated, arrive bank in a short period of time actively or passively and apply for card place by the relevant information completion of its bank card, complete.
For the existing old card user finishing bank card, even if do not leave front image of taking one's hat off in the recent period, iris (eyes) information, refer to (two palm) line information and proxypassword and prevent strong for information such as passwords, its information completion, complete before, visual setting of testing for device 7 and identity recognizer 6 and constrained state of the present invention, also for they leave temporal buffering; Nature, handling of the normal banking of the involved party of the present invention around here on " legal " does not affect substantially, and in bank, security protection of the present invention is consistently.
2. face blocks technology, face recognition technology, fingerprint identification technology, iris recognition technology and I.D. recognition technology, in visual " face blocks technology ", " face recognition technology " two technology tested for device 7 is used, " I.D. recognition technology ", " fingerprint identification technology ", " iris recognition technology " three technology that identity recognizer 6 is used, because belonging to mature technology, therefore do not illustrate.
3. proxypassword, mean that bank card legal keeping artificially prepares through committing others in the future and acts on behalf of oneself " basis " bank card business, when applying for card (at least before through committing others), the speech cipher when clientage stayed at the place of applying for card of bank authorizes to procurator (as, apple), proxypassword and bank card are " one_to_one corresponding ", but for multiple bank cards, proxypassword can exist repetition.
4. anti-strong for password, that one must when doing bank card at the password that bank and ID (identity number) card information, finger print information (or iris information) and bank card password, proxypassword etc. together retain, this password is the same with other password, with bank card one_to_one corresponding, can repeat with other bank card but not advise; For using the bank card finished before the present invention, need the anti-strong for password and out of Memory of perfect " this card " in time; Arrange anti-by force for object and the effect of password, during for preventing that in crime in partnership, " procurator " request is authorized, bank card holder in due course (so-called in the case " principal ") is inherently safe, in order to arrest this, " procurator " in crime, bank card holder in due course say when " being forced to authorize ", in the link must saying proxypassword that this is anti-by force for password (as long as occurring anti-strong for password) in partnership simultaneously.
5. legal representative.So-called " legal representative ", even bank card holder in due course, I for some reason " after " (at least in a short time) substantially without likely in person handling this card banking, and must (or can only) act on behalf of this bank card business by other people, then bank card holder in due course must pass through legal procedure (as just), authorize certain nominator, finally make it become in bank computer control system " legal representative " of this bank card.In legal representative's agent process afterwards, directly ATM room can be entered through identity recognizer 6 through visual testing for device 7, complete substitute service, namely this legal representative is for the act of agency of this card, and bank computer control system has same legal right by regarding it as with bank card holder in due course.
6. the present invention is with " one-in-and-one-out of an involved party " circulating unit that is its practical function in the program of setting.Because the program of practical function of the present invention, for circulating unit with " one-in-and-one-out of an involved party ", so bank computer control system " can be entered " and " going out " according to involved party, minute book is invented " beginning " and " end " of each repetend, and therefore related data can not mix mutually.
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in further details.
A kind of ATM auxiliary safety device, comprise revolving door 1, revolving door 1 only arranges 1 logical lattice, 2,1 number recognizer 3; Safety door 5, identity recognizer 6, visually test for device 7, safety door releases the button 8, safety door closes drives button 9, request help button 10, described identity recognizer 6, visual test to release the button for device 7 and safety door 8 be arranged on the front of a core 55, described safety door closes drives button 9 and the button 10 that requests help is arranged on a core 55 back side; Escape door 12, escape door 12 is inlay in ATM room on the wall of side, bank security room, and alarm response device 13 is placed in the bank security room in the outdoor face of ATM.
Concrete use procedure: 1. enter.Involved party enters the logical lattice 2 of revolving door 1, number recognizer 3 monitor under, realize single come safety door 5 before; 2. identity verification.Involved party obtains authentication and agent authorization through identity recognizer 6 and visual testing for device 7 place; 3. ATM room is entered.The safety door that lawful acts people can press electric is released the button and 8 is entered ATM room; 4. bank card business is completed.The legal people of behavior can complete related service at ATM place, leaves afterwards; The illegal people of behavior will be limited to ATM room.
1 revolving door.As shown in Figure 1, described revolving door 1, original state is for open and to lock, revolving door 1 only arranges 1 logical lattice 2, the space size of logical lattice 2 can only hold next involved party, installs a number recognizer 3 at logical lattice 2 top of revolving door 1, an action that revolving door 1 only has " only rotating 180 ° after starting ", multiple measure ensures can only enter a people at revolving door 1 Qian Menchu, leads to the dynamic of the revolving door start button 4 rotation-controlled door 1 that lattice 2 madial wall is installed and stops.Revolving door 1 opening, namely refers to that revolving door 1 Qianmen that the opening of the logical lattice 2 of revolving door 1 and revolving door 1 both wings sealed wall are formed coincide and open, prepares the involved party that receiving enters.
1) formation of revolving door 1 and size.As shown in Figure 1, revolving door 1 only arranges 1 logical lattice 2, and the size principle of design of logical lattice 2 ensures that it can only hold next involved party, and logical lattice 2 can be designed to square, circular or other form, the optional 0.5 ~ 1.0m of full-size.This case revolving door 1 leads to lattice 2 side of electing as, circle in conjunction with shape, the optional 0.2 ~ 0.5m of the optional 0.5 ~ 1.0m of circular portion diameter C, entrance straight part depth B, the optional 0.4 ~ 0.8m of entrance width A.Defined Qianmen and the back door of revolving door 1 by revolving door 1 both wings sealed wall, opening front door mates with logical lattice 2, only holds a people enters revolving door 1; Back door, just to safety door 5, is being advisable for 1.0 ~ 2.0 times of gate-width degree before A/F E, is being convenient to the normal running of involved party before safety door; Logical lattice 2 are when back door place, and limit, outer is set to 0.5 ~ 1.5m according to the most front teat distance of positions of safety door 5 from D, and setting principle is with involved party in this operation freely; Left and right two sections of optional 1.2 ~ 2.0m of contact wall spacing L;
2) other.The end of logical lattice 2 is optional to be had or nothing, and this case gating lattice 2 be back cover structure, and with revolving door integrally, namely realize revolving door 1 turn, namely people turn, in case Yin Tonggenei space is little cause people in logical lattice 2 interior handicapped; In order to emergent, above revolving door 1, be provided with air hole routinely.
3) involved party passes in and out flow process and the action of revolving door 1.
(1) overall.Involved party enters revolving door 1, and the original state of revolving door 1 is designed to open and moves lock-out state, and namely logical lattice 2 opening is externally open, and now logical lattice 2 opening coincide with " Qianmen formed by revolving door 1 both wings sealed wall ", i.e. the position, Qianmen of revolving door 1;
When involved party is for turnover revolving door 1, by revolving door 1 until ATM room, unmanned state should be in.Under normal circumstances, as operation room and ATM chamber interior have people, the opening of the logical lattice 2 that revolving door 1 is unique should at revolving door 1 back door place, and therefore, revolving door 1 Qianmen place should without there being opening, even if now there is people will enter revolving door 1 also without may, people to be had enters in the logical lattice 2 of revolving door 1, under number recognizer 3 is monitored, press the revolving door start button 4 on logical lattice 2 inwall, the stop locking status releasing of revolving door, this involved party together starts to rotate with revolving door 1 in logical lattice 2, when revolving door 1 back door is come in rotation 180 °, namely before coming safety door 5 time (or operation room), revolving door 1 stops, lock simultaneously, complete " entering revolving door 1 flow process " [seeing Fig. 3 (1)], meanwhile, the Qianmen place of revolving door 1 is now in closed state, and now at revolving door 1 Qianmen place, other people cannot rotate revolving door 1 or enter, operation room is closed, thus ensure that involved party is independent at operation room place, noiseless, safe carries out associative operation.Now revolving door 1 reproduces the unlatching shape of original state at its back door, involved party can select, continue the operation below it, again operation room is returned after completing, turn back to logical lattice 2 to go out revolving door 1, directly select to turn back to logical lattice 2 at operation room (for some reason), press revolving door start button 4, revolving door 1 can repeat last action, remove the stop locking of revolving door 1, recover to rotate, treat that rotation 180 ° is return to position, revolving door 1 Qianmen, revolving door 1 stops, lock simultaneously, involved party goes out revolving door 1, complete " going out revolving door 1 flow process " [seeing Fig. 3 (2)], now, next line is behaved and to be allowed for access revolving door 1.
(2) spinning movement realization mechanism.The revolving door start button 4 of the startup and stop action that can realize revolving door 1 is arranged on logical lattice 2 inwall and is convenient to involved party's operation place, revolving door start button 4 be in all the time electricity condition (bank card in ATM period except, revolving door start button 4 power-off around here); The control of revolving door start button 4 pairs of revolving doors 1 action is by controlling the rotational speed of revolving door 1 and rotational time two parameters realize.Specifically, device controls the motor driving revolving door 1 to rotate by revolving door start button 4, this motor select tape timing, frequency conversion, auto-lock function type, motor coaxially connects with mechanical actuating mechanism, according to the feature of revolving door 1 mechanical actuating mechanism, the timing of the pre-set coaxial motor connected with it, frequency and relevant self-locking program, now by revolving door start button 4 control motor whether electric, can realize the startup to revolving door 1, rotating speed, when turning and the control of locking;
(3) number controls.The whole course of work of revolving door 1 is all under the monitoring of 24 hours of number recognizer 3.Number recognizer 3 is made up of camera and bank computer control system, by being arranged on the camera at logical lattice 2 top, perform number Data Collection in logical lattice 2 and the transfer function completed to bank computer control system, " face recognition system " in bank computer control system processes the interior instant people's logarithmic data of logical lattice 2 that camera inputs, " if 0 ", illustrate in logical lattice 2 unmanned, now revolving door 1 is in waiting status, revolving door start button 4 always electric; " if 1 ", the state of bank computer control system to " revolving door start button 4 always electric " does not make a change, it is effective that the unique involved party now entered in logical lattice 2 presses revolving door start button 4, revolving door 1 can normal rotation, involved party can with revolving door 1 together rotate come safety door 5 just in face of operation room; If be greater than " 1 ", and during as being " 2 " (special circumstances, as special in human body type little; 3 people are several without possibility, because when carrying out the size design of logical lattice 2, consider this point), bank computer control system notice revolving door start button 4 (or directly controlling the motor driving revolving door 1 rotation) power-off, revolving door 1 must not move (namely locking); As from this camera until " face recognition system " on bank computer control system and backstage thereof, whole process has a place malfunctioning, revolving door 1 must not operate equally, the implementation procedure of this function is notify revolving door start button 4 (or directly controlling to drive the motor of revolving door 1 rotation) power-off by bank computer control system equally, realizes revolving door 1 and must not move (namely locking).The object that number recognizer 3 is arranged is that other measure collaborative ensures to enter a people safely through revolving door 1 at every turn;
4) object, the functions and effects of this part design.
The object that revolving door 1 so designs, one is, " revolving door 1 only arranges logical lattice 2 and its space size can only hold an involved party ", object ensures to have 1 people to enter revolving door 1 at first, and involved party can not enter revolving door 1 by other place and approach, at logical lattice 2 top, a number recognizer 3 is installed, for completing the examination to the number entering logical lattice 2, " revolving door start button 4 is set on logical lattice 2 wall, " unlocking of revolving door 1 is controlled for completing, start, rotate 180 ° of stop and lock " action, enter to realize involved party, go out revolving door 1 ", design like this ensure that, and " that the unique involved party only entering logical lattice 2 controls the dynamic of revolving door 1 by revolving door start button 4 and stops, other people all uncontrollable revolving door 1, do not design other action herein simultaneously, in case " very course of action or revolving door 1 position corresponding with action " can be given beyond logical lattice 2, other people make a forcible entry into the chance of revolving door 1,
Overall design effect, one be guarantee through revolving door 1 can and 1 people finally can only be had before an involved party can only be had to come safety door 5 can to enter ATM room, and do not have second people, and then ensure that the lawful acts people that enters ATM room is when it implements the operation such as plug-in card, input password, be impossible someone peep, interference etc.; Two is can guarantee that this unique involved party passes in and out the safety of revolving door 1 overall process simultaneously; Three be involved party when coming operation room revolving door 1 be in stop lock-out state, which ensure that involved party is in the handling safety at operation room place with do not hindered.
2 visually test for device
1) the described visual object tested for device 7 is set.Visually to test for device 7, be a kind of visual, can be used for verifying that involved party acts on behalf of the device of the legitimacy (being also the agent identity true and false) of other people bank card business act of agency at " basis " ATM place.After bank employs the present invention, for the involved party having agency's part (also can be all) in the bank card business handled to ATM place, it handles other people the bank card business legitimacy of behavior at ATM place, or the acquisition saying its attorneyship whether, must first be approved by bank computer control system, otherwise involved party cannot act on behalf of other people bank card business, this is one of this case characteristic feature of an invention, its realization means is, utilize and visually test for device 7, under bank computer control system complete monitoring, involved party is first by video call mode, file a request to bank card holder in due course or legal representative, after both sides confirm mutually, confirmed by bank card holder in due course or legal representative and authorize, if omnidistance program is correct, and close rule zero defect, then bank computer control system accreditation behavior people this handle other people the bank card business legitimacy of behavior at ATM place, or say bank computer control system and determine that it has obtained the attorneyship of the bank card business of this bank card holder in due course.
The visual object tested for device 7 is set, to eliminate exactly except bank's block-regulations to determine except possessor, other people illegal (namely when bank card holder in due course does not know or is forced to) take the debt in this bank card or handle other bank card business so that finally cause this bank card holder in due course to occur about the phenomenon that the legitimate rights and interests of this bank card are impaired, thus strengthen bank saving from damage the relevant rights and interests of the bank card of bank card holder in due course to greatest extent.
These " other people " generally comprise: 1. except bank card holder in due course (or legal representative, as follows) outward, hold the people of this unique, genuine bank card, this can be the relatives, friend, colleague etc. of bank card holder in due course, and they likely implement secretly to hold; Also have robber, this true bank card can be held by force, implement to coerce crime, and they are likely while holding this true bank card, know the password of this bank card.2. the people of bank card copy card is held.This kind of people by network, ATM place before bank uses the present invention or other approach, obtain this bank card comprise the substantially useful key message of password after, this bank card is successfully copied, prepares crime.Current ATM, only recognize bank card and password, therefore these " other people " all can when bank card holder in due course unknown authorize without bank card holder in due course or bank card holder in due course when being coerced, take the debt in bank card holder in due course card away or carry out other bank card crime behavior.
Need to illustrate: one be the legitimacy of involved party's (by the visual agency's bank card business tested the use for device 7 and obtain) by (bank computer control system) accreditation, only for " this ", still need reauthentication next time, two is visual programmings tested for device 7 in this case, require that involved party is without the need to knowing bank card agent password or strong for password, only need there be card and initial password of depositing and withdrawing, know the particular content that " this " is acted on behalf of, and involved party tests in device 7 overall process through visual, without the need to telling the particular content that " this " is acted on behalf of, but confirm involved party and the mutual video of clientage, after involved party sends authorization requests, to be told to bank computer control system in mandate link by clientage that (this link is said that content involved party cannot listen, specifically see Fig. 4 (3)), bank computer control system stays shelves, in order to when involved party handles " being somebody's turn to do " bank card business at ATM place, the contrast of bank computer control system is checked and is used.
2) the visual basic composition tested for device 7.
(1) form.As shown in Fig. 4 (1), visual testing comprises power switch 71, monitor scope 72, visual camera lens 73, loudspeaker 74, Mike 75, visual signal transferring and receiving apparatus 76 and SIM card 77 for device 7, integral installation (or on a heel post, as left side column is slightly wider) on door core 55 front.Visual testing is connected with external power by power switch 71 for device 7 working power, visual data transmission unification of testing for device 7 is connected with bank computer control system with the data-interface of visual signal transferring and receiving apparatus 76 respectively by data line, and the winding displacement that visual signal transferring and receiving apparatus 76 is got in touch with monitor scope 72 and loudspeaker 74 is provided with trigger switch.
(2) the visual similarities and differences tested for device 7 and handset structure.
The close part of A: the composition of mobile phone is cell phone system+CPU+GPU+ROM+RAM+ external memory storage+radio frequency+touch-screen+microphone+camera+mobile phone screen+receiver+gravity sensing+bluetooth+wireless connections (wifi)+battery and switch+SIM card=smart mobile phone; As shown in Fig. 4 (4), be embodied in visual testing on device 7, then comprise master controller z1, communication module z2, load module z3, power management module z4, card management module z5, external interface module z6, output module z7.
1. master controller z1, i.e. visual signal transferring and receiving apparatus 76, be made up of CPU+GPU+ROM+RAM+ external memory storage; 2. communication module z2, the signal namely playing radio-frequency enabled sends out receipts terminal (rf chip and power amplifier are formed); 3. load module z3 is by visual camera lens 73 and Mike 75; 4. output module z7 is by monitor scope 72 and loudspeaker 74; 5. all the other power management modules z4, card management module z5, managing electrical power switch 71, SIM card 77, external interface module z6 show as by data-interface and bank computer control system UNICOM for device 7 visual testing respectively.The two structure visible is roughly the same, and function all belongs to wireless telecommunications.
The different part of B:
1. power module end, power supply mode is different.Mobile phone, once open switch, whole machine all electric; And visually test for device 7, because the singularity of set function and use procedure, it is provided with the process program that each several part walks electric, and after turning on the power switch 71, its each portion obtains electric process and controlled by the bank computer control system be connected with power management module z4.Power supply mode of the present invention also can be the same with mobile phone;
2. the visual master controller z1 tested for device 7 of this case, with mobile phone unlike, it calculates except carrying out, processes and send instruction to implement except controlling function, in bank computer control system aspect, by external interface module z6, visual test for device 7 master controller z1 also bankable bill computerized control system relevant information and data are provided and accept and perform the dependent instruction of bank computer control system;
3. the formation of load module end is different.Mobile phone is made up of keyboard, camera, touch-screen, Mike etc.; And visual the testing of this case is only made up of camera and Mike etc. for device 7, do not design keyboard and touch-screen input function;
4. output module z7, always the winding displacement that the master controller of mobile phone and output module are got in touch with, i.e. flexible circuit board (FPC) be in obtain electricity condition; And the visual master controller z1 tested for device 7 of this case, the winding displacement that itself and output module z7 get in touch with is belt switch, and the person of sending of switch order is bank computer control system.Specifically:
A is normally under state, and always winding displacement is in obtain electricity condition; B when after the principal and procurator confirm mutually and the principal say before preparing to authorize " can " time, the contact winding displacement switch that bank computer control system obtains this message, simultaneously command output module z7 disconnects, the visual output module z7 power-off of testing for device 7 of this case; C is when the principal completes all mandate actions, bank computer control system can send twice instruction simultaneously, one is that the contact winding displacement switch of simultaneously command output module 7 closes a floodgate, the visual output module z7 tested for device 7 of this case recovers electric, and two is make the videophone sounding of loudspeaker 74 and the principal " pass through ";
Specific implementation: when the sound receptacle in bank computer control system receive " can " sound signal time, original design processor in season carries out A/D and is converted to " 0 ", actuator for instruction, completes disconnected swap switch action with " 0 ", realizes the power-off of output module winding displacement; When the sound receptacle in bank computer control system receives clientage after mandate link completes delegable content according to the order of sequence, when sending the sound signal of " authorizing complete ", original design processor in season carries out A/D and is converted to " 1 ", actuator with " 1 " for instruction, close winding displacement switch, realizes output module winding displacement Power resumption again; Illustrate, sound control technique belongs to common technique.
5. about external interface module z6, at mobile phone, its external data interface, is of little use; And this case is visual tests for device 7,24 hours every days are its external data interface always kept in touch with bank computer control system; SIM card is had in the visual card management module z5 tested for device 7 of this case.
(3) illustrate: 1. visually to test for the course of work of device 7 and all components all among the supervision and manipulation of bank computer control system; 2. visual testing realizes voice dial-up function for device 7 by visual signal transferring and receiving apparatus 76; 3. the signal of visual signal transferring and receiving apparatus 76 is sent out and is received the contact that terminal is responsible for the wireless communication terminal of visual signal transferring and receiving apparatus 76 and clientage; 4. in " request is authorized " link, image between agency's behaviour and clientage and the transmission of voice, with in " mandate " link, the image between clientage and bank computer control system and the transmission of voice, realized by visual signal transferring and receiving apparatus 76 for device 7 place visual testing; 5. form visual testing and send out receipts terminal for the switch 71 of device 7, monitor scope 72, visual camera lens 73, loudspeaker 74, Mike 75, visual signal transferring and receiving apparatus 76, SIM card 77 and signal thereof, monomer whose function and mobile phone about the same, but split and combination by simple, in addition with the organic assembling of bank computer control system, complete the function that regular handset can not complete, namely embody " independence " and " associating " property of each individual event function and allomeric function.
3) visual use of testing for device 7.[seeing Fig. 4 (2) and Fig. 4 (3)].
(1) from capture.Involved party comes operation room, opens visually to test for device 7 [seeing Fig. 4 (1)] switch 71, visual test for device 7 electric-opening to " I line ", see Fig. 4 (2).Involved party front aligns the visual visual camera lens 73 tested for device 7, make involved party self front-face and hat-free photos holohedry be substantially full of visual test for device 7 monitor scope 72 from viewed area (namely showing this human head picture region), object, one is be convenient to bank card holder in due course or legal representative's identification, and two is be convenient to the capture of bank computer control system, file; Can be set using " face recognition technology ", to the behavior, people screens herein.
Utilize " face blocks technology " herein.It is concrete: if involved party does not accomplish " making self front-face and hat-free photos holohedry substantially be full of monitor scope 72 ", or face has larger shelter (or artificially pretending), to such an extent as to bank computer control system cannot capture filing, then bank computer control system is considered as abnormal, and namely " involved party is from capture " is unsuccessful;
Before this bank computer control system by control visual test for the Mike 75 of device 7 and visual signal transferring and receiving apparatus 76 wouldn't obtain electric (namely, as involved party does not correctly complete from capture, device to allow involved party to be carried out next step " request is authorized " by Mike 75 and visual signal transferring and receiving apparatus 76), until when involved party's way is correct, bank computer control system instruction loudspeaker 74 sounding " can ", bank computer control system sends instruction simultaneously, the electricity at switch 71 place is delivered to Mike 75 and visual signal transferring and receiving apparatus 76, visual testing obtains electric-opening to " II line " for device 7, see Fig. 4 (2).Involved party can prepare to carry out next step " request is authorized ", i.e. " sounding ' can ' " of loudspeaker 74, indicate the success of the first step " from capture " terminate with second step " request is authorized " while (can) start.
(2) request is authorized.(in agency's behaviour aspect) [see Fig. 4 (3)]." request is authorized " link is omnidistance under the monitoring of bank computer control system." ask to authorize " link in two steps:
One is " request call ", namely when involved party is after monitor scope 72 place " from capture success ", involved party uses the mode of " told by Mike 75, sent ' the videophone number of this clientage ' by visual signal transferring and receiving apparatus 76 ", get through the videophone of the principal, send " request call " to the principal;
Two is " application is authorized ", namely send ' the videophone number of this clientage ' at visual signal transferring and receiving apparatus 76, after getting through the videophone of clientage, involved party and clientage are by visual signal transferring and receiving apparatus 76 relaying, realize looking mutually respectively by monitor scope 72 and videophone separately, locate involved party, it is after " his vision area " of monitor scope 72 is seen and confirmed to entrust artificial "True", involved party is with " multiple telling this clientage successively by Mike 75 are (as only acted on behalf of a bank card business, only say one) the rear four figures of bank card number, be sent on the videophone of the principal by visual signal transferring and receiving apparatus 76, send " authorized application " to the principal, wait for that the principal authorizes, concrete:
The first step, " request is authorized " it " request call ".Treat that involved party's behavior is qualified, the visual loudspeaker 74 tested for device 7 sends " can " after, Mike 75 and visual signal transferring and receiving apparatus 76 electric, visual test for device 7 electric-opening to " II line "; Now involved party can keep former attitude, involved party scene facing to the visual Mike 75 tested for device 7, say the bank card holder in due course of this agency by agreement or mobile phone (video intercom function must the be had) number of legal representative or other kind videophone number, by the mode of " phonetic dialing ", by visual signal transferring and receiving apparatus 76, this sound signal and " from capture " obtains involved party's head portrait signal are issued the principal in the lump above, treat that the principal opens videophone, reply; This sound of meanwhile bank computer control system admission involved party, file is put on record; Before this link, the visual main functionality tested for device 7 is close with current smart mobile phone with use procedure.
Second step, " request is authorized " it " application is authorized ".After closing of the circuit, the principal put telephone lines into operation, visually test for another region in the monitor scope 72 of device 7, (this case is referred to as " his vision area ") normally there will be the principal normal front image, the same with the front image size of involved party and exist on monitor scope 72, now procurator carries out true and false identification to the occurred principal;
A. as true, involved party say that this principal entrusts to oneself successively by Mike 75 multiple (as only acted on behalf of a bank card business, only say one) latter four of the number of bank card, sound sends the principal to by the visual visual signal transferring and receiving apparatus 76 tested for device 7, and wait for that the principal authorizes, so far " application is authorized " release of behavior people, prepares to carry out next step " confirmation ".
B. as false, that namely occur on monitor scope 72 is not bank card holder in due course or legal representative, involved party should select to abandon " request is authorized " to this people, next step point three kinds of situations: 1. as so far completed agent authorization requests whole except this person, and have successfully in the agent authorization request that completes of involved party, then arrive identity recognizer 6 place; If 2. all authorization requests has no resolution, leave operation room (see Fig. 3 (2)) by " going out revolving door 1 flow process "; 3. as also having the mandate of other principals not complete, involved party from " from capture ", must carry out " request is authorized " program for the remaining principal;
It should be noted that, involved party's such as nothing has bank card business, the also non-legal representative of oneself, any agent authorization is not obtained for device 7 place visual testing, but choose identity recognizer 6 place, " continuation " manage to enter ATM room, if when undelegated bank card is inserted ATM in ATM room by procurator, alarm response device 13 sends alert news or simultaneously " being absorbed in constrained state ";
Illustrate: if a involved party is many people agencies, nature must repeatedly be asked, but can not consider order; If b one people, even act on behalf of multiple cards, only need ask once; This this device of link of c utilizes " face blocks technology " and " face recognition technology ", bank computer control system utilizes " face blocks technology " and " face recognition technology ", no matter which side is for involved party and " clientage ", as long as face blocks or incomplete, bank computer control system and interruptible price involved party are in visual operation of testing for device 7 place, until normal, even to have regarded as "True" also not all right for involved party or " clientage ".
(3) confirm, implement to authorize (the principal, being also clientage's aspect), concrete:
The first step, the affirming conduct people true and false.Involved party is in " request is authorized " it " request call " link, be successfully completed " request call " involved party, when putting telephone lines into operation to closing of the circuit, the principal, the videophone display screen of the principal equally also clearly can there is the front image of involved party, now the principal also must align front image and completes from capture, this picture can be sent to monitor scope 72 by principal's visible handset (or other videophone), visual signal transferring and receiving apparatus 76 through just with this videophone UNICOM, verifies the true and false for procurator; Meanwhile, the principal has judged the true and false to procurator.
Second step, behaves to genuine agency and authorizes.As the principal is judged as vacation to procurator, the principal cuts off videophone, terminates to authorize; If true, following a series of mandate work of behaving to genuine agency can be prepared:
1. must make.The principal determines that the agent identity of the involved party sending " request call " is after "True", first, by the videophone of oneself, wait for, accept and affirming conduct people by visual signal transferring and receiving apparatus 76 send to oneself, consignment store behaves and replaces oneself handling latter four (more may just have one) of the number of each bank card of oneself of associated bank card business before oneself; This is primary, condition precedent that the principal starts to carry out a series of mandate work, therefore this link is referred to as " must make ";
2. power-off.The associated bank card number code that the principal have received involved party and transmits, and after checking, the principal is to videophone microphone clearly sounding, this case select the principal say " can ", namely system obtains makes (under the monitoring of bank computer control system) break visual test in device 7 " by the electricity (namely this winding displacement switch disconnects) of visual signal transferring and receiving apparatus 76 to monitor scope 72 and loudspeaker 74 (finally to involved party) circuit, ensure simultaneously visual test in device 7 " by visual signal transferring and receiving apparatus 76 to unimpeded at the positive often-have-electricity of bank computer control system circuit, now visual test for device 7 electric process to " III line " (see Fig. 4 (2)),
3. authorize.Under normal circumstances, the principal says and those several bank cards of oneself entrusted agent (i.e. behavior people) the processes financial business bank card number a few item in end (this case selects 4), proxypassword and content (often open a few item card number in end of bank card, information one_to_one corresponding that proxypassword, image must be retained in advance with the principal) of authorizing one to one mutually, as " 1777; aircraft, get 3000 yuan; 9568, oil tanker, Hunan 9569 (meaning of " bank card in Hunan, card number 9569 ") turns 5000 yuan "; after completing this clientage whole bank card mandate reproduction task; send " authorizing complete " audio communication; represent that the procurator identity of the principal to behavior people is determined, and complete mandate; Next, the agent identity of behavior people is complete by bank computer control system " confirmation ", and bank computer control system assert that the act of agency of behavior people is legal;
Need herein to remind: when the principal authorizes, the tandem (the bank card number a few item in end (this case selects 4), proxypassword and the content of authorizing) of described content can not be wrong; Interval will be had in the middle of on time; Even proxypassword is identical, for each bank card, also all to say once during mandate on time.
4. special circumstances.As the special circumstances of " mandate " link, as being in by stressful environmental when the principal authorizes, namely when forming a partnership crime, can say " anti-strong for password ", to substitute " proxypassword " of this card, whether this time " is authorized " and is judged to be " unauthorized " and record by " prompting " bank computer control system in this link; So, can realize after this illegal procurator enters ATM room, if card is successfully inserted ATM by it, namely send alert news or be absorbed in " constrained state ", arrested.
It should be noted that at this: a should " proxypassword " " anti-strong for password ", when the principal handles this bank card originally, just " necessary " to have stayed in the associated profiles of bank and has been stored in the computerized control system of bank simultaneously; B under normal circumstances, if clientage finds that the videophone of oneself does not receive " before oneself, consignment store behaves and replaces oneself handling the bank card number of associated bank card business ", namely involved party says few, clientage can completion when authorizing, and bank computer control system is only recognized " mandate of clientage "; For the situation of " saying many ", with clientage without dry.C under normal circumstances, principal's microphone sounding say " can " while, visual testing automatically cuts off the voice of procurator and the principal for device 7 and image contacts, but visual testing still is working for device 7, the i.e. after this sounding of the principal and degree of lip-rounding change only corresponding bank computer control system, and not to procurator, in case procurator obtains proxypassword corresponding to bank card or anti-strong for password in this link.
(4) bank computer control system judges that whether mandate is successful.When the principal authorizes, bank computer control system utilizes " face recognition technology " identity information relevant with the principal in database and bank card effective information on backstage, and " calculating " goes out holder in due course or the legal representative whether principal is the bank card that it is being authorized; If so, bank computer control system continues the correctness of supervision principal licensing process on backstage, and to determine that whether this link of this clientage " mandate " result is successful, result is retained; If not no matter whether the licensing process of this clientage is correct, and this clientage can be regarded as " unsuccessful " in bank computer control system in " mandates " behavior of this link, result retention; And " validity decision " link things obtained with identity recognizer 6 place entered in " constrained state ";
As the principal authorizes link running program correct at this, namely bank computer control system judges that behavior people authorizes and passes through, namely bank computer control system sends two instructions simultaneously, one be instruction recover visual test in device 7 " by the electricity (namely this winding displacement switch closes) of visual signal transferring and receiving apparatus 76 to monitor scope 72 and loudspeaker 74 circuit, the visual automatic recovery of testing voice and image for device 7 place procurator and the principal and contacting, two is can " pass through " by sounding on the visual loudspeaker 74 tested for device 7 in face of involved party with on the videophone of the principal simultaneously, shows that " mandate " for this principal successfully terminates, now the principal has worked in visual " mandate " of testing for device 7 place, has also been that involved party brings to a happy ending visual " application is authorized " of testing for device 7 place, as the principal authorizes link running program mistake at this, both when the principal authorizes, described content not according to " bank card number end a few item (this case selects 4), proxypassword and the content of authorizing " tandem carries out, bank computer control system just can not can send the instruction that sounding " passes through " simultaneously on the visual loudspeaker 74 tested for device 7 in face of involved party and on the videophone of the principal, also namely locate clientage, do not hear the echo of " passing through " after it completes mandate at once, then clientage just knows that its licensing process is made mistakes, this clientage starts again to authorize, until hear in its videophone " passing through ".It should be noted that, " passing through " just illustrates and authorizes link program correctly, and is not " mandate " success.See Fig. 4 (2) and Fig. 4 (3).
About again " can implementing " of procuratorial " request is authorized " behavior, this case is set to " in units of people ", namely in units of the principal, after judgement and the record of specifically bank computer control system " monitoring, calculate " the complete principal " ' the mandate success or not ' of whole bank cards of this entrusted agent ", visual testing just recovers once procuratorial " authorization requests " work for device 7, and visual power supply of testing for device 7 is returned to " I line ".See Fig. 4 (2).
(5) leave.As all complete, can select to press the visual switch 71 tested for device 7 and close and visually test for device 7, enter identity recognizer 6.It should be noted that in fact, bank card holder in due course number, is that procurator tests visual the circulating unit number implementing " request is authorized " behavior for device 7 place; And procuratorial attorneyship, be with bank card one to one, but not bank card holder in due course.
4) behavior of bank computer control system around here and effect.Around here, the behavior of bank computer control system is: (1) " procurator " Front facial image and " procurator " speak sound admission, put on record; (2) intercept principal's head portrait and sound, tentatively check the identity of this " principal ", check it simultaneously and whether legally have the bank card that this has " this proxypassword "; (3) by the monitoring to the whole licensing process of the principal, the confirmation of behavior people agent identity legitimacy is completed;
5) needs illustrate:
(1) the present invention does not establish limiting element visual testing for device 7 place, even if that is, " principal " does not have " such card ", also goes " identity recognizer 6 " place's behavior without restriction to this " procurator ".
(2) really completing " the authorizing confirmation " of " card, code one_to_one corresponding ", is in plug-in card link.Only when plug-in card, bank computer control system is just real " meets card number, " proxypassword " corresponding with it " with bank card, completes the overall process of attorneyship " request, mandate, computer system confirm ";---because test visual the link not arranging " use bank card " for device 7 place the present invention, but this link is placed in " constrained state " link after entering ATM room by " having a mind to " dexterously, so both clear up single unit system and reuse the numerous and diverse of bank card, known bank and all bank card user " the irremediable consequence this link is played tricks " be (see " constrained state " and Fig. 7), thus reach the object of " initiatively preventing bank card crime " in advance again.
(3) do not test visual the reason investigating the I.D. of the principal for device 7 place on the spot, its object will prevent principal's I.D. from carrying out more serious, more crime because being grasped by other people exactly.
3 identity recognizers
1) identity recognizer 6 object is set.
One, allow bank computer control system by the judgement of " unification " to " my finger print information inputted at identity recognizer 6 by involved party oneself and an effective ID (identity number) card information ", screen, isolate some illegal acts people, stop the generation of most of bank card crime behavior initiatively, in advance.Its two, at least leave the finger print information (or iris information) of behavior people herein, stand-by to put on record.The setting of described identity recognizer 6, simply ingenious and practical, watchful effect is in advance self-evident.
2) basic composition of described identity recognizer 6.
The identity recognizer 6 of the present invention comprises the identity card identifier 62, Fingerprint Identification Unit 63 (or iris recognition device), the loudspeaker 64 that are connected with working power respectively, working power is connected with external power by power switch 61, and the data transmission of identity recognizer 6 is unified to be connected with bank computer control system by data line.Identity recognizer 6 carries out " unification " judgement, with the device identified the identity of this people to the various information that involved party inputs at identity recognizer 6 place by bank computer control system, bank computer control system be safety door release the button 8, the instruction person of sending of power-off, identity recognizer 6 is arranged on a core 55 front (or on a heel post, as left side column is slightly wider).
3) use (see Fig. 6) of identity recognizer 6.
Under general state, identity recognizer 6 is normally in closed condition.The use procedure of described identity recognizer 6 is: 1. open.Open switch 61, identity recognizer 6 obtains electric starting working; 2. ID (identity number) card information checking.I.D. positive and negative are correctly placed on identity card identifier cog region respectively, and after treating Tip Sound after a while, the present invention selects " dripping " sound, illustrates that I.D. recognizer now completes; 3. finger print information checking., in fingerprint identification area, after treating Tip Sound after a while, the present invention selects " dripping " sound, illustrates that fingerprint recognition program completes palm (can be left and right optional) correctly to be placed (laying method and selected palm are located together with in bank); 4. " unification sex determination "." unification " of ID (identity number) card information and finger print information " whether belonging to same people " judges, is performed by the bank computer control system on backstage.Now the loudspeaker 64 of identity recognizer 6 will send " conjunction ", " indefinite " or " not conforming to " voice; 5. the result of " unification sex determination " and next step direct correlation of " opening safety door 5 action (namely press safety door and release the button 8) ".
See Fig. 6.When the loudspeaker of identity recognizer 6 sends " conjunction " or " indefinite " voice, involved party presses safety door and releases the button 8 actions effectively, and door core 55 is opened; When the loudspeaker of identity recognizer 6 sends " not conforming to " voice, involved party presses safety door and to release the button 8 exercise voids, and door core 55 keeps initial closed state, can not open.
A. for " behavior people has had legal effective, complete ID (identity number) card information and fingerprint, iris information in bank computer control system " situation, if this I.D. is behavior people, its ID (identity number) card information entered in identity recognizer 6 is legal, effective, the simultaneously also correct finger print information demonstrating me, then first bank computer control system result of determination is I.D. is true, and second be ID (identity number) card information and its finger print information " unification " sex determination result is " conjunction "; If I.D. is false, then the result that " unification " judges must be " not conforming to "; If I.D. is genuine, but be not behavior people, the result that " unification " judges also one to be decided to be " not conforming to ";
B. in bank computer control system, legal effective, complete ID (identity number) card information and fingerprint, iris information situation is not had for behavior people, now bank computer control system can only be necessarily " indefinite " to its result of determination, namely cannot be judged to be " not conforming to ";
General, " b " situation can disappear in the short period after the present invention generally uses substantially above, because most people can therefore feel extremely inconvenience and can within the time short as far as possible the relevant information of decorrelation department polishing oneself, so the present invention's " unification sex determination " result herein can only have " conjunction " or " not conforming to " substantially, and substantially there will be no " indefinite ".The present invention's setting of " indefinite " in " unification sex determination " result at identity recognizer 6 place is exactly to improve and meeting the needs of this " short period " section.
6. leave.After involved party completes all " identification ", the switch can selecting to press identity recognizer 6 cuts out identity recognizer 6, press safety door releases the button 8, opens safety door 5, enters ATM room.Or enter revolving door 1 and lead to lattice 2, go out revolving door.
4) behavior of bank computer control system around here and effect.1. original state.When identity recognizer 6 is opened, bank computer control system is naturally in operation; 2. the identification of I.D..When ID (identity number) card information validation verification is complete, bank computer control system carries out preliminary judgement to the true and false of this I.D. herein; 3. " unification " judgement.When finger print information verifies, bank computer control system judges " unification " of this ID (identity number) card information and finger print information " whether belonging to same people " simultaneously, 4. carrying out while " unification " judge, the finger print information of bank computer control system also stores " being somebody's turn to do " true I.D. effective information (false I.D. cannot store) and behavior people, to be checked to put on record, and bring into " constrained state ", 5. carrying out while " unification " judge, bank computer control system also control safety door release the button 8 " whether electric ", namely now press safety door and release the button 8, whether action is effective: a. is when bank computer control system result of determination is " conjunction " or " indefinite ", bank computer control system controls safety door and releases the button 8 " electric ", and it is effective now to press safety door 8 actions of releasing the button, b. when bank computer control system result of determination is not for " conforming to ", bank computer control system controls safety door and releases the button 8 " must not electricity ", now presses safety door and to release the button 8 exercise voids, 6. bank computer control system, the information that the involved party that also will have the right to enter ATM room by being judged as " conjunction " or " indefinite " stays at identity recognizer 6 place, and have the involved party of substitute service to test through visual the information stayed for device 7 place, the related data of the bank card read by ATM when inserting ATM with bank card, three all bring this case in the lump after " involved party's plug-in card behavior validity decision " link in, to judge " legitimacy " of the behavior of involved party's plug-in card, situation (see Fig. 7) in ATM indoor after final decision involved party success plug-in card.
5) explanation.1. treat that the relevant information of oneself is intactly stayed bank by people, be judged as the situation of " indefinite " in identity recognizer 6 link, just would not have occurred.2. need described herein, one is do not obtain full involved party visual testing for device 7 place attorneyship; Two are judged to be " conjunction " at identity recognizer 6 place by bank computer control system but are not the holder in due course of bank card or legal representative and have without the visual people tested for device 7; Three are judged to be " indefinite " by bank computer control system but the real involved party belonging to " not conforming to " at identity recognizer 6 place; Such three-type-person, can test for device 7 place " human factor inevitable " or " leak " in identity recognizer 6 place " unification sex determination " link visual because of the present invention, and " can be allowed to " enters ATM room.Be directed to this, this case adds one " constrained state " in ATM room link, by " improve and remedy " to this " deficiency ", achieve for the illegal act of the unauthorized person entering ATM room in above-mentioned three-type-person timely active and effectively limit, finally make security of the present invention be able to complete.
6) identity recognizer 6 and the visual object tested for device 7 conbined usage.
See Fig. 6.Identity recognizer 6 and the visual conbined usage tested for device 7, particularly visual setting of testing visuality for device 7 and identity recognizer 6 " unification ", can prevent the phenomenon of " just in case involved party tests visual the attorneyship obtained for device 7 place, by partnership crime, coerce bank card holder in due course and obtain and do not leave this procuratorial effective identity information in this case system " from occurring.Concrete:
See Fig. 6 and " 2 3) visual use of testing for device 7 " and the use of identity recognizer 6 " 3 3) " two parts.Visual setting of testing for device 7, makes the bank card crime of all " other people " beyond " coercing crime " type become impossible, and for " coercing crime ", visual setting of testing for device 7 also makes it be only " in partnership, collaborative " crime, just only having theoretic may (be that " someone goes ' agency ' specifically, withdraw the money, someone expects someone's call separately ' coercing ' bank card holder in due course, obtain the authorization to make ' procurator ', ' procurator ' is forced to sacrifice oneself again, and stay ' identity information ' for device 7 and identity recognizer 6 place visual testing, enter ATM room, procurator as one ' legal ' completes the crime to bank card "), and single " coercing crime ", cannot complete, so be equal to robbery.Separately, even if because above-mentioned that property in partnership " coercing crime ", testing after for device 7 through visual, my real finger print information or the iris information (even if it does not use my I.D.) implementing in offender that the image of that so-called " procurator " withdrawn the money and sound and its must stay in identity recognizer 6 place that next step must pass through, capital leaves criminal record (because will withdraw the money successfully, just then through identity identity recognizer 6, just must likely enter ATM room---this is one of main points of arranging of the present invention).
---this can not occur actually, as long as employ with visual the present invention tested for device 7 and identity recognizer 6 (see " identity recognizer 6 " part) because people are aware of " new ATM system " in advance, even " coercing crime " of this " agency " property about bank card, also cannot have no vestige, implement with leaving with a happy ending, even therefore in partnership crime, also nobody is ready point to do " work " that leaves oneself " identity information ".So as noted earlier---that " only has theoretic possibility ".
4 safety doors
1) basic composition of safety door 5.
Safety door 5 adopts without lock, bottom slideway, left and right embedded; In the front of door core 55, the A of meeting Fig. 2, be furnished with identity recognizer 6 above it, visual testing releases the button 8 for device 7 and safety door; The crossbeam 514 of the lower frame 511 of the band supporting skid rail below door core 55, the left column 512 of band door core 55 left and right embedded groove and right column 513, the flat upper embedded groove form of select tape safety door 5 (also can) four parts form the peripheral frame of safety doors 5; In the side (this case choosing left side) of the supporting skid rail of lower frame 511, be furnished with electronic screens gear 52, play lock door core 55; In door core 55 times along arranging active rollers 531 and return idler 532 and being positioned on the supporting skid rail of lower frame 511; The B of meeting Fig. 2, on a left side for door core 55, laterally middle part and the right side are laterally furnished with electronic limit of elasticity gear 541 and 542 in middle part respectively; Safety door closes drives button 9 and the button 10 that requests help is arranged in the back side of a core 55, and the button 10 that requests help also can be arranged on other position (comparatively suitable place is by ATM) of ATM room.
Illustrate:
1. safety door 5 entirety adopts without lock and the embedded form of bottom slideway and left and right, and object has two, and one is that this form has tamper-resistant function down in off position; Two is convenient " Push And Releases " of controlling safety door 5; Safety door 5 also can adopt other form, and as safety door 5 can be made up of two parts, a part is that identity recognizer 6 is housed, visual test to release the button for device 7 and safety door 8 fixing door leaf, another part is the swing leaf that can pass in and out ATM room;
2. " safety door 5 left and right " described in text, be from " the A face of Fig. 2 " visual angle " ";
3. the motor that door core 55 active roller 531 operates is driven, choosing " band rotating, Frequency Adjustable speed governing, band auto-lock function " type; Motor is coaxially connected with active roller 531 by reductor, in concrete action, totally submits to " actual act that this case uses according to safety door 5 need designed by program ";
4. according to the needs of safety door 5 operation control routine, in the control system of safety door 5, with bank computer control system with the use of also have timer; Concrete fit system is: bank computer control system directly control timer, power-off (namely timer starts the moment of timework and out-of-work moment), the action of timer is the organic component of safety door 5 operation control routine;
5. motor and timer are arranged in lower frame 511;
6. the assembling of safety door 5.After safety door 5 one of can to install in lower frame 511 and left column 512 or right column 513, then insert door core 55 and another column, refill crossbeam 514 (also can be installed in advance in peripheral frame) afterwards.Safety door 5 utilizes lower margin setscrew, by to the fixing of the lower frame 511 of safety door 5 and ground with to the crossbeam 514 of safety door 5 and the fixing of ceiling, utilize lower margin setscrew to connect with the wall of revolving door 1 both sides respectively with left column 512 and right column 513 bolt-connection, the other end respectively by two sections of contact wall 11 one end, complete the fixed installation of a whole set of safety door 5.Lower frame 511 does not select embedding below ground mode to fix, and will facilitate the level of whole safety door 5 in each orientation and the adjustment of locus exactly.Safety door 5, two sections of contact walls 11 and Tong Ge 2 together constitute the operation room of involved party before safety door 5.
7. the electronic screens gear 52 of safety door 5, roller 531 and 532 and electronic limit of elasticity gear 541 and 542
The electronic screens gear 52 of a.In the side (this case select the left side---just to safety door 5 front, see Fig. 2) of the supporting skid rail of safety door 5 lower frame 511, be furnished with electronic screens gear 52, play lock door core 55; Electronic screens gear 52 is normally in opening (i.e. " supporting skid rail in outstanding lower frame 511 " state), namely can with the left lower side of door core 55 along contacting on its right side, realize the locking to safety door 5 initial closed state, electronic screens keeps off the determination of 52 positions, should to ensure that the right and left of door core 55 normally embeds left column 512 and each 10cm of right column 513, door core 55 can free operating range 1cm ~ 2cm, this case selection 1cm in this spacing horizontal space simultaneously.
The action (comprising " unlatching " (namely locking), " closedown " (namely unlocking)) of the electronic screens gear 52 of b, with a micromotor, by reductor by gear (or belt) transmission, block is driven to realize the lifting action of " upper and lower " of block.
The electronic limit of elasticity gear 541 and 542 of c.Electronic limit of elasticity gear 541 and 542, be arranged in laterally middle part and the right side laterally middle part, a left side of a core 55, play door core about 55 and run the effect of the range limit, flexible member is selected in its contact, and plays power switch effect.
When door core 55 slides into (door core 55 left side laterally the electronic limit of elasticity at middle part keep off 541 now with bottom the leftmost side of caulking groove in left column 512 contact) when electronic limit of elasticity gear 541 triggers left, the flexible member of electronic limit of elasticity gear 541 is touched pressure, moment recovers again under elastic reaction, be depressed moment at it, its local circuit is connected instantaneously, send electric signal to bank computer control system simultaneously, bank computer control system must make the motor to door core 55 active roller 531 send cut-offing instruction, door core 55 stop; After electronic limit of elasticity gear 541 triggers, door core 55 completes and stops also trigger, time delay to terminate to start a series of instructions such as reversion, make a core 55 complete stopping, stopping and time delay, time delay are complete, timer sends electric signal to bank computer control system, bank computer control system must make the motor to door core 55 active roller 531 send again electric instruction, door core 55 reverses and reverses while time delay is complete, starts closing motion; Until a core 55 to reverse to its right side the electronic limit of elasticity gear 542 at laterally middle part trigger time (door core 55 right side laterally the electronic limit of elasticity at middle part keep off 542 now with bottom the rightmost side of caulking groove in right column 513 contact), electronic limit of elasticity gear 542 can instruction bank computer control system to break the electricity of a core 55 active roller 531 motor, realize the stop (principle the same " principle of work of the electronic limit of elasticity gear 541 when stopping of putting in place opened by door core 55 ") of opposite house core 55, bank computer control system is released the button to safety door simultaneously and 8 is sent cut-offing instruction; Timer sends electric signal to bank computer control system afterwards, bank computer control system must make to electronic screens gear 52 send again electric instruction, electronic screens gear 52 electric reaction is risen, recover common opening, namely electronic screens keeps off 52 and erects; Now door core 55 is also closed no longer to the right because arriving the limit further on the right side, embed caulking groove about 10cm in right column 513, left because cannot opening by left lateral by electronic screens gear 52 stops, integral door core 55 is in safety shut-off state, left and right activity space only 1cm.
2) the concrete action (see Fig. 5) of safety door 5.
(1) formulating rules " controlling safety door 5 working procedure ".
Bank computer control system with " safety door 5 runs the appearance of the key ' state ' presented in overall process " for condition (or reason), timer auxiliary under, by time-of-the-day order safety door 5 critical component electric operation, the final control realized the whole action of safety door 5; That is: bank computer control system controls safety door 5 " concrete action ", " concrete action " causes not only occurring the key ' state ' of safety door 5, crucial ' state ' but also the precondition (or reason) occurred for next " concrete action ".
(2) form of safety door 5 operation.
Basic based on " automatically ".Under normal circumstances, from safety door release the button 8 electric, press safety door and release the button after 8 actions effectively, namely the action of door core 55 starts its self-act travel; Even to stop and between time delay at door core 55, involved party presses safety door when entering ATM room closes and drives button 9 (releasing the button 8 control safety doors 5 with adapter safety door), and the action of door core 55 after " being forced to terminate time delay " is automatic too.
(3) the concrete action (i.e. the action of door core) of safety door 5 is divided into one of four states, five steps: 1. the unlatching of original state, 2. door core 55 (containing the first step, judges, composes electricity; Second step, door core 55 unlocks; 3rd step, door core 55 is opened; 4th step, door core 55 stops, time delay), the closedown (containing the 5th step, door core 555 reverses, locks) of 3. door core 55; 4. special situation.
1. original state.Be in closed condition, left and right two embeds left column 512, right column 513 along equidistant, and insert depth S of the present invention selects 10cm, and now electronic screens gear 52 is normally in opening, namely with the left lower side of door core 55 along contacting, the locking of opposite house core 55 initial closed state can be realized on its right side; Moreover the safety door that enabling gate core 55 is opened is released the button and 8 is normally in off-position.
2. the unlatching (specifically seeing Fig. 5) of door core 55.Want door capable of being opened core 55, first to make safety door release the button 8 electric, and have again involved party effectively to press safety door to release the button 8, i.e. this case so-called " press safety door release the button 8 actions effective ".Concrete:
The first step, judges, composes electricity.Accept the behavior outcome of involved party at identity recognizer 6 place, bank computer control system to involved party when the result that " unification " of identity recognizer 6 judges is as " conjunction " or " indefinite ", namely ' state 1 ' presents, ' state 1 ' is sent ' electric ' notice (signal is generated by bank computer control system self) in point ' 1 ', then bank computer control system instruction secure door release the button 8 electric;
" ' state 1 ' presents ", ' state 1 ' send " notice " to bank computer control system in " 1 " point, mean " bank computer control system (or must) can be generated ' electric ' instruction simultaneously and releases the button 8 to the safety door of next stage---and this is the formulating rules part that this case " control gate core 55 working procedure " is embodied at the first place; namely: " bank computer control system by obtaining electric mode with the condition that appears as of ' state ', instruction associated components, whole process realizes the control of the whole action of opposite house core 55 "; In brief, namely " ' state 1 ' is sent, and ' obtaining electric ' notifies in point ' 1 ' ", as follows.
Second step, door core 55 unlocks.Safety door release the button 8 electric after, if involved party now presses safety door release the button 8, and action is effective, namely ' state 2 ' presents, and rises thus, " Push And Release " of door core 55, if without human intervention, auto state will be entered, until door core 55 is closed, self-locking is complete; ' state 2 ' is sent ' electric ' notice (signal is released the button by safety door and 8 to be sent) in point ' 2 ', then the timer in bank computer control system instruction electronic screens gear 52 and door core 55 control system simultaneously electric;
A electronic screens gear 52 obtains electric decline, and electronic screens gear 52 is down to below the supporting skid rail surface of lower frame 511, completes electronic screens and keeps off 52 closing motions, also namely complete the unblock that electronic screens keeps off 52 opposite house cores 55;
B and " a " start to carry out simultaneously, and timer obtains electric, and its continual Split Time work starts, and " participate in the control of the motor to driving electric screens gear 52 lifting directly " namely thus and start, until door core 55 is closed, locked; In this link, in door core 55 " unblock " actuation time in optional 0 ~ 1 second, this case is being held in 1 second; Now door core 55 must make and enter opening program.
3rd step, door core 55 is opened.With " safety door unblock " that " it is complete that electronic screens keeps off 52 closing motions " is mark, present ' state 3 ', ' state 3 ' is sent ' obtaining electric ' notifies that (signal is sent by timer) is in point ' 3 ', then bank computer control system instruction active roller 531 obtains electric, and the electricity of screens gear 52 is moved in disconnected power down simultaneously; Now roller 531 starts to turn left, drive door core 55 to slide together with roller 532 left, and door core 55 breakdown action starts.When door core 55 slide left the beginning, trigger to electronic limit of elasticity gear 541 time (when the electronic limit of elasticity gear 541 at laterally middle part, door core 55 left side contacts with the embedded trench bottom of left column 512 leftmost side) stop, in this actuation time in optional 2 ~ 5 seconds, this case is being held in 3 seconds.
4th step, door core 55 stops, time delay.Electronic limit of elasticity gear 541 foremost resilient contact is excited by tactile hitting, present ' state 4 ', ' state 4 ' is sent ' obtaining electric ' notifies that (signal keeps off 541 by electronic limit of elasticity and sends) is in point ' 4 ', then bank computer control system instruction active roller 531 cut-offing instruction, active roller 531 stops and time delay, delay time optional 0 ~ 3 second, this case selected for 2 seconds; Now right along side at door core 55, form 60cm opening, enter ATM room for involved party.So far, whole door core 55 breakdown action time this case was selected in for 6 seconds.Specifically the setting principle of door core 55 breakdown action deadline of the present invention, can complete entering of safety door 5 with a normal behaviour people.As involved party knows " cannot enter safety door 5 smoothly within the opening time in 6 seconds of door core 55 " (as disabled person) for some reason in advance, by bank management personnel checking, through savings department of a bank, escape door 12 enters ATM room.
3. the closedown of door core 55.5th step, door core 55 reverses, locks.2nd second Mo of time delay, the time delay of door core 55 terminates, present ' state 5 ', ' state 5 ' is sent ' obtaining electric ' notifies that (signal is sent by timer) is in point ' 5 ', then bank computer control system instruction active roller 531 obtains electric, follow procedure active roller 531 is oppositely turned right, and door core 55 starts reversion and reverses, indicate that the breakdown action of a core 55 terminates, simultaneously the closing motion of door core 55 start;
When a core 55 reverses to its limit on the right-right-hand limit position, the electronic limit of elasticity gear 542 at laterally middle part, its right side triggers because contacting with the embedded trench bottom of right column 513 rightmost side, present ' state 6 ', ' state 6 ' is sent ' obtaining electric ' notifies that (signal keeps off 542 by electronic limit of elasticity and sends) is in point ' 6 ', then bank computer control system instruction active roller 531 power-off, simultaneously safety door is released the button 8 power-off;
When a core 55 stop is stablized, present ' state 7 ', ' state 7 ' is sent ' obtaining electric ' notifies that (signal is sent by timer) is in point ' 7 ', then bank computer control system instruction electronic screens gear 52 again electric, recover normal opening, namely electronic screens gear 52 erects, now door core 55 is closed no longer to the right because arriving the limit further right, embed caulking groove about 10cm in right column 513, left because cannot opening by left lateral by electronic screens gear 52 stops, integral door core 55 is in safety shut-off state, left and right activity space can only 0.5 ~ 2cm, the present invention selectes 1cm,
So far, door core 55 closing motion terminates, door core 55 is returned to original state, present ' state 8 ', ' state 8 ' is sent ' obtaining electric ' notifies that (signal is sent by timer) is in point ' 8 ', then bank computer control system instruction timer and electronic screens gear 52 simultaneously power-off, so far, are terminated by the release the button whole service control program of 8 door capable of being opened cores 55 of safety door.
About the closedown used time of door core 55, reversion is reversed omnidistance 2 ~ 4 seconds, this case is selected reversion and was reversed for 3 seconds, wherein door core 55 turns round and starts to close the pure closing motion deadline of stop being held in for 2 seconds to door core 55, electronic screens gear 52 afterwards obtains electric its opening normally that returns to and, being held in for 1 second, completing whole closing motion and lasted for 3 seconds.
Illustrate: about the setting of a door core 55 open and close time of action.
Door core 55 complete switch entirety need the time be electronic screens gear 52 close (door core 55 unlocks) 1 second+open 3 seconds+to stop and time delay 2 seconds+closed for 3 seconds=9 seconds, namely the door core 55 of the present invention action time is once being held within 10 seconds.
Door the opening of core 55, stop and time delay, the setting of shut-in time, considered and met involved party to complete calmly the action of opening safety door 5, entering ATM room completely.
4. special situation: safety door closes the control (dividing see adding blackboard in the middle of Fig. 5) of opening button 9 pairs of safety doors 5
If there is the situation of " involved party entering ATM room coerced by the personnel of outside this withdraws the money ", safety door pass can be pressed rapidly after involved party enters safety door 5 and drive button 9 (safety door closes and opens the back side safety door 5 Kai Wei edge that button 9 can be arranged in safety door 5), realize turning off rapidly safety door 5, both the involved party that can meet by coercing obtained security context as early as possible, facilitate again involved party to press aloud safely to request help button 10, catch nigh criminal as early as possible, this state this case is called " state T ".Concrete:
Present ' state T ', a. ' state T ' send ' electric ' notifies in point ' T ', then bank computer control system imperative instruction active roller 531 electric, oppositely turn right, to force to terminate " time delay ", start hard closing to door core 55; Press safety door close drive button 9 while, send by " press safety door close drive button 9 " safety door that breaks to release the button the instruction of 8, safety door is released the button 8 power-off, the stroke action of this back door core 55 controls to be closed by safety door to drive button 9 and replace safety door to release the button 8 adapters, but ensures that the stroke action of this back door core 55 is constant; Close active roller 531 when driving button 9 and must establish by cable if involved party presses safety door and begin oppositely to turn right, namely (namely in the diagram time delay terminates, " T " point is under " 5 " point), then this " pressure terminates time delay " does not just exist naturally, but other program all as before; B. the safety door pressed closes drives button 9 " power-off of 8 that safety door is released the button, achieve the involved party's " inside locking " being externally in ATM room.Concrete:
The first, realize closing.Involved party enters safety door 5, come ATM room after, stop and delay state as door core 55 is still in, involved party now presses safety door closes and drives button 9, and door core 55 stops " time delay " at once, beginning " closedown " action.
The second, locking closed condition.The present invention designs, and first must press safety door pass and drive button 9 after involved party enters safety door 5, and as door core 55 has been closed complete, the closed condition of locked secure door 5, realizes involved party oneself at the indoor Push And Release from master control gate core 55 of ATM.
3rd, " constrained state " occurs that the involved party of front ATM indoor closes the use of driving button 9 to safety door.The involved party of ATM indoor, before bank card is inserted ATM by it, can not enter or sink into " constrained state ", now it is to leave ATM room, again presses safety door and closes and drive button 9 and can open safety door 5, get back to operation room.
4th, under " constrained state ", safety door closes the use of driving button 9.Successfully bank card is inserted ATM the involved party of ATM indoor, bank computer control system drives button 9 to safety door pass, revolving door start button 4 sends cut-offing instruction, the locking of escape door 12 in addition, and " constrained state " is formed; " legitimacy " of its plug-in card behavior simultaneously judges carry out and complete: for " legal " person, then involved party normally completes the operation of this bank card business, when pulling up bank card smoothly, bank computer control system drives button 9 to safety door pass, revolving door start button 4 sends to obtain electric instruction, and " constrained state " is removed; Now involved party return body come safety door 5 back side (meeting Fig. 2 B) front time, " even " is pressed safety door and is closed that to open button 9 action effective, and door core 55 is opened, and involved party goes out safety door 5; And to " illegally " person, it is forced to " being absorbed in " " constrained state " of the present invention, having no right (or say " cannot ") use safety door closes and drives button 9---because the safety door in " constrained state " closes and drives button 9 and be in off-position, press safety door and close the exercise void driving button 9.
(4) the whole service control program opening button 9 opening safety door 5 is closed by safety door.
About " being closed the whole service control program opening button 9 opening safety door 5 by safety door ", roughly the same with " the whole service control programs of 8 opening safety doors 5 of being released the button by safety door ", just the button of opening safety door 5 is released the button by safety door and 8 is changed safety door into and close and drive button 9, and open button 9 opening safety door 5 because being closed by safety door, must be enter ATM room involved party second time (strictly speaking, that " even number " is secondary) press safety door close drive button 9, so enter ATM room involved party first time (strictly speaking, that " odd number " is secondary) press safety door close drive button 9 after the safety door that breaks release the button 8 electricity, opening in button 9 opening safety door 5 process with safety door pass, safety door release the button 8 electricity can not recover.
5 constrained state (specifically seeing Fig. 7)
Described constrained state, means the involved party entering ATM room, and rise in the moment that bank card is successfully inserted ATM by it, just " enter constrained state ", mark is: safety door of the present invention closes opens button 9 power-off, the locking of door core 55 closed condition; Revolving door start button 4 power-off, revolving door 1 stop are locked; Now escape door 12 is in the lock state, and constrained state of the present invention is formed.Arrive this, ATM room is in " limited " state.This " limited ", complete successfully all kinds of people's of plug-in card in ATM indoor, no matter you belong to legal or illegal, just at the moment, plug-in card behavior is judged to be to the people of " legal " by the present invention, the operation that (or saying likely) proceeds its remainder can be allowed to, complete in operation, while success card taking, safety door pass drives button 9 and revolving door start button 4 recovers electric simultaneously, constrained state is removed, involved party goes out ATM room, for the people of " legal ", it is in " constrained state " period, this case is referred to as " entering constrained state ", if plug-in card behavior is judged to be the people of " illegally " by the present invention, can simultaneously " being absorbed in constrained state " and cannot continue to operate in ATM, meanwhile, ATM gulps down card, alarm response device 13 ring, bank security personnel open rapidly escape door 12, enter ATM room and deal with problems arising from an accident.
5.1 situation entering involved party after safety door 5.
Enter the involved party of safety door 5 (also namely coming ATM room), after it enters ATM room, point three phases:
1) the free phase.One is by safety door 5 to ATM, belong to the free phase, for the involved party between this " phase ", the limited time, released the button 8 power-cut time by safety door 5 down periods safety door and clock, in 30 seconds, (containing 30 seconds) involved party realizes as failed successfully bank card being inserted ATM, and involved party " is absorbed in constrained state " at once, if (containing 30 seconds) involved party realizes successfully bank card being inserted ATM in 30 seconds, involved party's impunity, enter below by time limit;
2) by time limit.Current period divides two kinds of situations: while success (being also " effectively ") (upper) plug-in card, " plug-in card behavior validity decision " (bottom) terminates, result of determination has two kinds: " legal " and " illegally ", according to this, the current period divides two kinds of situations: 1. " legal ".Under this situation, involved party is allowed to continue the remaining business of bank card; 2. " illegally ".Under this situation, alarm response device 13 sends alert news, and involved party " is absorbed in constrained state " at once, and bank card is gulped down; Involved party oneself cannot go out ATM room, has to treat that bank security personnel show up.
3) time limit is separated.Corresponding above-mentioned 2) " by time limit ", also there are two kinds of situations the current period corresponding dividing: 1. " legal ".Under this situation, in the current period, involved party accepts " by time limit " complete this bank card business after, taking out bank card, as also having next bank card, starting from the very beginning from plug-in card, as without having, then " even " is pressed safety door and is closed and drive button 9, goes out safety door 5; 2. " illegally ".Under this situation, in the current period, bank security personnel receive the signal of alarm response device 13, enter ATM room through escape door 12, and the involved party's point situation for " being absorbed in constrained state " processes, and deals with problems arising from an accident.
5.2 constrained state.
1) " constrained state ".Mean that ATM room part can present at specific period (or under specified conditions) " after door core 55 closes; safety door close open the initial closedown of button 9 and revolving door start button 4 power-off simultaneously, in addition escape door 12, cannot leave away voluntarily in ATM indoor " state, in this case, the involved party of ATM indoor takes action meeting " limited ", therefore is referred to as " constrained state ".
2) the concrete formation of constrained state.Bank card is successfully inserted " moment " of ATM, is namely the start time of " constrained state ".
1. while bank card is successfully inserted ATM, constrained state starts, namely first the present invention closes by the safety door of safety door 5 (being now the in closed condition) back side of breaking (meeting Fig. 2 B) electricity driving button 9, guarantees the locking of opposite house core 55 closed condition;
2. break the electricity of the revolving door start button 4 in the logical lattice 2 of revolving door 1 simultaneously, object is the situation of just in case now occur " closedown of door core 55 locking system or other electrical equipment, mechanical hook-up cannot ensure that because of fault a core 55 is now in closed condition ' ", the power-off of revolving door start button 4 is locked, can be used as the second weight " guarantee ", guarantee " perfectly sound " property of this device " constrained state ".
3. now escape door 12 is in the lock state (escape door 12 is normally in the lock state).
Arrive this, ATM room is in " limited " state.This " limited " completes successfully all kinds of people's of plug-in card in ATM indoor.
3) releasing of constrained state.For the involved party that " validity decision " result is " legal ", with the releasing moment that its effective " card taking " is " constrained state ", now safety door closes and drives button 9 and revolving door start button 4 recovers electric simultaneously, and the bank card business no matter whether it be correlated with after plug-in card operates; But do not leave ATM room in 30 seconds after its " card taking ", behavior people " is absorbed in constrained state " by the present invention at once, this releasing " being absorbed in constrained state ", must bank security personnel to show up realization of dealing with problems arising from an accident.For the involved party that " validity decision " result is " illegally ", with its " be absorbed in constrained state " afterwards bank security personnel show up to deal with problems arising from an accident and terminate as the end time.
4) core link of " constrained state "---" judgement of the plug-in card legitimacy of behavior ".The core link of " constrained state " is bank computer control system to " validity decision " of plug-in card behavior of involved party entering ATM room;
1. the concept of " plug-in card behavior validity decision " (referred to as " validity decision ").It is the behavior that bank computer control system carries out for " ' successfully enter the involved party of ATM room, it inserts certain bank card in ATM, success (namely effective) ' legitimacy of behavior " judging.
A specifically describes: involved party is once effectively complete plug-in card operation, bank computer control system be about to simultaneously " effective information about bank card " that obtain from ATM with from visual test " full detail of agent authorization process, effectively ID (identity number) card information and finger print information etc. " that obtain for device 7 and identity recognizer 6 in addition comprehensive, analyze, and be stuck in " being somebody's turn to do " whole relevant informations that bank stores and compare, confirm, and then judge that behavior people uses " legitimacy " of " this bank card "; For involved party neither this bank card holder in due course or legal representative, also do not test visual the mandate obtaining this bank card holder in due course or legal representative for device 7 place, then namely the plug-in card behavior of behavior people can be judged to be that by bank computer control system " illegally " operates, except this other, then for preliminary judgement is " legal ", this process, is namely referred to as " validity decision " that involved party operates certain bank card plug-in card.
B is when " judgement " result is as " legal ", " tentatively " two reason of word need be added " legal " is front: one is " legal " for plug-in card behavior by preliminary judgement, involved party is when having the right to carry out remaining concrete bank card business operation, if its business tine implemented and clientage visual test authorize for device 7 place time described in content inconsistent, bank computer control system turns at once sentences its behavior for " illegally " and " being absorbed in constrained state ", why above namely this will add " tentatively " two one of reason of word before described " being judged to be ' legal ' ", two is " legal " for plug-in card behavior by preliminary judgement, involved party success plug-in card after over time limit not as or involved party carried out lower mask body bank card business operate after, take card but go out ATM room not in time and over time limit not as, also or involved party simply enter ATM room after bank card to insert and over time limit not as remaining in ATM room, during the present invention can directly be placed on " being absorbed in constrained state " to ATM, three is it is emphasized that, be " legal " for plug-in card behavior by preliminary judgement, involved party is after the bank card business operation having carried out lower mask body, if card taking not in time, naturally its residing " entering constrained state " can continue, and can not remove, if even over time limit, during the present invention can directly be placed on equally " being absorbed in constrained state ".So this " is judged to ' legal ' " frontly must add " tentatively " two word, becomes " preliminary judgement is ' legal ' ".
The simultaneity of c " plug-in card " and " limited ": the involved party entering ATM room, as long as successfully completing the operation of slotting bank card at ATM place, then behavior people incites somebody to action simultaneously and " must enter constrained state " or " being absorbed in constrained state "; Because while occurring with " plug-in card " behavior, bank computer control system judges also start simultaneously and complete to " legitimacy " that it inserts the behavior of " being somebody's turn to do " bank card; In other words, " plug-in card " is positioned at " judgement " and the result of " judgement " is " legal " or " illegally "---because just " one " card that " this " inserts, and " judgement " is only for " this " " plug-in card ", so, the result of " judgement " just can only have one, even " legal " or " illegally "; So, according to setting of the present invention, involved party, while it completes plug-in card behavior, is bound to be in (with " judgement " result---" legal " or " illegally " is corresponding) " entering constrained state " or " being absorbed in constrained state " the two one of them.
2. the concrete course of action of " validity decision ": for " legal " person, involved party can continue normally to complete this bank card related service remaining operations, (or) extract bank card, meanwhile, safety door close open button 9 and revolving door start button 4 electric, " constrained state " remove, " idol " is pressed safety door for several times and closed and open that button 9 action is effective, door core 55 is opened, involved party goes out safety door 5; And to " illegally " person, the success of its plug-in card, namely be equivalently regarded as " illegally " operation, " constrained state " is lasting, real " limited " (namely " being absorbed in constrained state ") for this kind of involved party starts, and is aided with bank computer control system instruction ATM dormancy and two measures of alarm response device 13 ring with timer; So time involved party cannot proceed the remaining operations (more without likely then carry out the operation of other bank card (if having) related service in hand) of this bank card related service, safety door pass is driven button 9 and is continued to be in off-position, press safety door and close that to open the action of button 9 naturally invalid, involved party is forced to continue " sinking into " " constrained state " of the present invention (this is " constrained state continuation " during the present invention " sinks into constrained state ").Said process, is " ' validity decision ' that enter involved party's plug-in card behavior of ATM room ".
3. " plug-in card behavior validity decision " is the core link of " constrained state ".
The first, the judgment basis of " legitimacy ".Come from: whole relevant informations of relevant " being somebody's turn to do " bank card that ATM reads when a is plug-in card; B is involved party's " just now " at identity recognizer 6 place and visually tests the full detail stayed for device 7 (if any substitute service), comprise individual, (if any substitute service) bank card (part) with the relevant information etc. of clientage;
The second, " judgment basis of ' legitimacy ' " can not mix.Because the program of practical function of the present invention, with an artificial circulating unit of behavior, bank computer control system can according to involved party for " entering " of the present invention and " going out ", and minute book invents beginning and the end of each repetend, and therefore related data can not mix mutually;
3rd, the circulating unit that " validity decision " is is repetend with " each bank card "." plug-in card behavior validity decision ", that " plug-in card behavior " is carried out " validity decision ", so, say exactly, with each " validity decision " directly " one_to_one corresponding " effectively inserted the bank card of ATM at every turn, and non-card involved party, also be the repetend of " plug-in card behavior validity decision " be for circulating unit with " each bank card ", and non-card involved party, because the involved party of plug-in card can implement repeatedly plug-in card behavior (if it all " legal ") because there being multiple bank cards, like this, to do if any multiple bank card business, this " repeatedly plug-in card behavior " of behavior people will be subject to " validity decision " of bank computer control system " repeatedly ", one_to_one corresponding, as for " result of judgement ", because when judging, according to the relevant information of suitable involved party, therefore " result of judgement " (i.e. " legal " and " illegally "), naturally the sensing of certain " people " is also just had, the involved party of naturally namely " plug-in card " of final " constrained state " " limit ".
4th, " legal " and " illegally " is only as the result of " plug-in card behavior validity decision " ".Bank computer control system is after having carried out " plug-in card behavior validity decision ", still keep the monitoring to the remaining behavior of " legal " person, if " legal " involved party is in the operation of remainder, there is ' illegally ' behavior (i.e. state 3 of other form that is set according to the present invention's ' constrained state ' link and that specify, 5,6,7,8), the present invention can directly be proceeded to " being absorbed in constrained state "; This result is consistent with " situation " being judged to the involved party of " illegally " in " plug-in card behavior validity decision ".Need clearly, for " legal " involved party in the operation of remainder, " illegally " of " illegally " behavior of appearance be " validity decision " result of the plug-in card behavior of bank computer control system above " in " illegally ".
5) " constrained state " direct object of arranging.Proper constraint and control effectively to be imposed exactly to various " illegally " behavior of the involved party being in ATM room.Specifically, exactly will to the plug-in card involved party being judged as " illegally " in " carrying out validity decision to plug-in card behavior " link, carry out the restriction of the freedom of person in short-term of " indoor in ATM ", to treat that bank security personnel or police show up process, thus realize effectively taking precautions against the final of bank card crime behavior, realize the termination to " bank card crime " behavior; So far, the EOP (end of program) of this case whole " ladder is laddering ", " initiatively blocking bank card crime "; The setting of this " constrained state " situation, ensure that " if plug-in card involved party is offender, " constrained state " is to make it fold one's hands for capture naturally, and the relevant rights and interests of bank card, naturally safe.Specifically see Fig. 7.
6) " constrained state " real purpose of arranging.Be not intended to make " illegally " person " be absorbed in constrained state ", be arrested, but by various method and access, allow people before use the present invention, just clear this case all in advance arranges the direct object of " constrained state ", knows the function of the present invention's " constrained state ", realize to the appearance of the crime of above-mentioned " illegally " class and " error " play an active forewarning, in advance warn and stop, the effect that prevents trouble before it happens---this, be only the real purpose of the present invention's setting " constrained state ".
7) summarize.
" constrained state " of the present invention:
On the one hand, constrained state " initial with terminate time have mark.Namely with involved party's success effectively plug-in card for start time, for the involved party that " validity decision " result is " legal ", with the end time that its successful card taking is " constrained state ", for the involved party that " validity decision " result is " illegally ", with its " be absorbed in constrained state " afterwards bank security personnel show up to deal with problems arising from an accident and terminate as the end time;
Two aspects, " constrained state " point two kinds of situations: " entering constrained state " and " being absorbed in constrained state "." enter constrained state ", namely " legal " involved party can by " constrained state " initiatively voluntarily residing for card taking releasing oneself; " be absorbed in constrained state ", the involved party in namely " being absorbed in constrained state ", after only having bank security personnel to show up to deal with problems arising from an accident and terminating, " being absorbed in constrained state " residing for it could passive releasing.
Three aspects, 8 kinds of states (sorting in chronological order) that the caused involved party that this device is arranged " is absorbed in constrained state ":
1. situation 4 (sequence of situation classification by kind): the involved party entering safety door 5, after it enters ATM room, the limited time, released the button 8 power-cut time by safety door 5 down periods safety door and clock, in 30 seconds, (containing 30 seconds) involved party realizes as failed successfully bank card being inserted ATM, and involved party " is absorbed in constrained state " at once;
2. situation 1: arrived " judgement of the plug-in card legitimacy of behavior " link, bank computer control system analytical behavior people visual test information whole in for device 7 place agent authorization process time, if find that there is " by force for password " to occur, this involved party does not just have the chance being judged as plug-in card behavior " legal ", also namely need not directly judge that it " is absorbed in constrained state " at once, no matter whether also have the card of " legal " in its hand through concrete " validity decision ";
3. situation 2: involved party is once effectively complete the plug-in card operation of unauthorized bank card, (simultaneously) result one of bank computer control system to behavior people " plug-in card behavior validity decision " is decided to be " illegally ", and involved party " is absorbed in constrained state " at once;
4. situation 5: as do not done any operation in 10 ~ 30 seconds after " legal " involved party success plug-in card, ATM can gulp down card, and bank computer control system can by this " legal " involved party automatically " being absorbed in constrained state ", and time this case selects 30 seconds;
5. state 3: if " legal " involved party is when handling bank card remainder business, the concrete business that this bank card is implemented and clientage visual test authorize for device 7 place time described in business tine inconsistent, then bank computer control system can by this " legal " involved party at once automatically " being absorbed in constrained state "; Illustrate, if clientage visual test for device 7 place for during certain bank card mandate for change business tine, should procurator success plug-in card before Advise By Wire he or she;
6. state 6: if " legal " involved party is when having handled bank card remainder business, card taking not in time, then because its not yet card taking, therefore device continues its " constrained state ", is now " entering constrained state ", but not " being absorbed in constrained state "; But now for involved party's the limited time, the non-card taking of finishing service is (this case selects 30 seconds) more than 10 ~ 30 seconds, bank computer control system just instruction ATM can gulp down card, by this " legal " involved party at once automatic " being absorbed in constrained state "; For state 6, current ATM is after involved party completes whole bank card business, involved party's card taking can be reminded in time, if and there is state 6, it should be generally involved party's subject intent, so after the present invention arranges " the constrained state continuation " of time delay " entering constrained state " character of 30 seconds, just transfer to " the constrained state continuation " of " being absorbed in constrained state " character; The true object arranging state 6 is in fact also intended to remind involved party " do not forget card taking and should speed away ";
7. state 7: the involved party of " legal " at " basis " ATM place, after completing last bank card related service, card taking should go out safety door 5, go out revolving door 1, but do not leave ATM room in 30 seconds after its " card taking (now safety door closes and drives button 9 and revolving door start button 4 recovers electric) ", behavior people " is absorbed in constrained state " by the present invention at once simultaneously; Namely the present invention's safety door that again again simultaneously breaks closes and opens the electricity of button 9 and revolving door start button 4, and because this case procedure stipulation, when " being absorbed in constrained state ", ATM is in dormant state, therefore, now the behavior human desires by the method for plug-in card again recover its " releasing of ' constrained state ' " impossible;
8. state 8: this state 8 refers to, the involved party of " legal " is at " basis " ATM place, after completing a bank card related service, because also have other bank card business to do, this bank card must successfully take out by it, transfer successfully to insert next bank card, again " enter constrained state ", transacting business ... but next bank card of unsuccessful insertion in 30 seconds after its " card taking ", also do not leave ATM room (state 7), behavior people " is absorbed in constrained state " by the present invention at once; Namely the present invention's safety door that again again simultaneously breaks closes and opens the electricity of button 9 and revolving door start button 4, and because this case procedure stipulation, when " being absorbed in constrained state ", ATM is in dormant state, therefore, now the behavior human desires by the method for plug-in card again recover its " releasing of ' constrained state ' " impossible;
In fact this case designs this state 8, and when handling next bank card business to behavior people exactly, the time interval is time-out not, if overtime, bank computer control system can be equal to state 7 depending on it.
The object arranging state 8 has two, and one is the service efficiency that will ensure this device; Two is prevent involved party from having a mind to utilize the identity of its " legal " to do some things should not done in ATM indoor, implements crime.Such as: ATM is juggled things.As, ATM is puted up false " emergency notice " or " bulletin ", the pre-installation device that " gulps down card ", pre-shutoff ATM cash dispensing port, to install in ATM somewhere and spy on encryption apparatus, deliberated to beat or destruction etc. in all kinds of secret monitoring device of ATM indoor location, ATM.
Actually, " constrained state ", is intended to early warning, but not person restriction; And because informing in advance before the use of this device, " early warning " function of this device " constrained state ", can eliminate the generation of most ATM bank card crime, guarantees that " legal " involved party normally handles the security of bank card business.
In addition, " constrained state " of the present invention is vicissitudinous.Be judged as " legal " person for plug-in card behavior, it is residing is from start to finish omnidistance " entering constrained state ", and namely " legal " involved party can be removed " constrained state " residing for oneself by card taking voluntarily; But " legal " person has the right to carry out in remaining bank card business operating process at it, occurred state 3, state 5, state 6, state 7 and state 8 (even comprising state 4) one of them, be somebody's turn to do " illegally " behavior that " legal " person offends because of it, at once transferred to " being absorbed in constrained state " by bank computer control system;
8) recovery of the indoor original state of ATM.
The recovery of the indoor original state of ATM, the i.e. artificial releasing of " constrained state ", just refer to and " enter ATM room because of the ring of alarm response device 13 " and after processing dependencies at bank security, the operation that bank aspect must complete for the situation of ATM indoor: 1. by bank computer control system complete " safety door close open button 9 and revolving door start button 4 electric, the releasing of ' constrained state ' "; 2. completed " releasing of ' ATM dormancy ' " by bank computer control system; 3. bank security now returns in savings department of a bank, and again lock escape door 12, full recovery is complete.This work, in bank computer control system, can be achieved with " key recovers " form.
6 escape doors
Escape door 12, inlay on the wall of the side, close bank security room of ATM room, normally under state, escape door 12 is in closed condition, and lock opening is outdoor at bank security, and key is at bank security place.
7 alarm response devices
Alarm response device 13 is placed in the bank security room in the outdoor face of ATM; Carrier state Presentation Function type selected by alarm response device 13; The ring command source of alarm response device 13: one is the button 10 that requests help, presses the button 10 that requests help when generally " being requested help " by ' legal ' personnel entering ATM room, opens ring alarm response device 13; Two is bank computer control system, and when there being people to be absorbed in " constrained state ", bank computer control system opens ring alarm response device 13 simultaneously and reports to the police; Three be enter revolving door 1 logical lattice 2 in find that revolving door 1 breaks down when pressing revolving door start button 4 for starting revolving door 1, or revolving door 1 start after not yet turn to operation room namely midway because of fault stop, the revolving door start button 4 that now involved party presses on logical lattice 2 sidewall for a long time sends alert news to alarm response device 13; Four be safety door on safety door 5 front release the button 8 electric, press safety door and release the button 8, safety door 5 breaks down, and now involved party presses safety door for a long time and releases the button and 8 send alert news to alarm response device 13.
It should be noted that herein, " outdoor " in " alarm response device 13 is placed in the bank security room in the outdoor face of ATM ", not only comprising next door, may be also in the savings department of a bank near " ATM " or on the communication apparatus such as nigh local police station or the police of nearby flowing, intercom in security personnel's hand.Therefore, due to " tolerance " of alarm response device 13 present position, the present invention is applicable equally to the ATM of standing in street corner.
8 is overall
See Fig. 1, in embodiment, revolving door 1, central shaft adopts No. 45 round steel processing and manufacturings that 80mm is thick, and other strong muscle of revolving door 1 adopts 10 bugle steel high-quality section bars to be welded, and framework and ceiling 1.5mm corrosion resistant plate decoration are for square, good looking appearance is generous, both wings sealed wall inlays the colourless bullet proof glass of 12mm, and revolving door 1, logical lattice 2 and other position appearance, decorate with 1.5mm corrosion resistant plate; Safety door 5 housing, door core 55 and contact wall 11 adopt 6mm hot rolled steel plate to be welded, surface all adopts industrial 304 corrosion resistant plates decorations so that each portion (as identity recognizer 6, visual test release the button 8 for device 7, safety door, safety door close drive button 9, request help button 10 etc.) installation and contact (two sections of contact walls 11 and housing); In order to not only attractive in appearance but also durable, whole device must through overall preservative treatment.

Claims (10)

1. an ATM auxiliary safety device, it is characterized in that comprising the safety door (5) of revolving door (1) and the inner side thereof being arranged on ATM chamber inlet place, a closed operation room is surrounded by contact wall (11) between two, be provided with identity recognizer (6) in operation room and visually test for device (7), the ATM indoor location of safety door (5) opposite side has request help button (10), the place of receiving a crime report beyond ATM room is mounted with alarm response device (13), specific as follows:
Described revolving door (1) only arranges 1 logical lattice (2) and its space size can only hold an involved party, logical lattice (2) top is provided with number recognizer (3), logical lattice (2) inwall is provided with start button (4), and described number recognizer (3) is made up of camera and bank computer control system;
Described safety door (5) adopts bottom chute type, and door core (55) front is provided with release the button (8), and the back side is installed about driving button (9), and left and right adopts embedded;
Described identity recognizer (6) comprise be connected with working power respectively identity card identifier (62), Fingerprint Identification Unit or iris recognition device (63), loudspeaker (64), working power is connected with external power by power switch (61), and the data transmission of identity recognizer (6) is unified to be connected with bank computer control system by data line;
Described visual testing comprises master controller (z1), communication module (z2), load module (z3), power management module (z4), card management module (z5), external interface module (z6), output module (z7) for device (7)
Described master controller (z1), namely visual signal transferring and receiving apparatus (76), is made up of CPU+GPU+ROM+RAM+ external memory storage;
Described communication module (z2), the signal namely playing radio-frequency enabled sends out receipts terminal, is made up of rf chip and power amplifier;
Described load module (z3), is made up of visual camera lens (73) and Mike (75);
Described power management module (z4), managing electrical power switch (71);
Described card management module (z5), management SIM card (77);
Described external interface module (z6), with the data-interface of bank computer control system UNICOM;
Described output module (z7), be made up of monitor scope (72) and loudspeaker (74), the winding displacement that the visual signal transferring and receiving apparatus (76) of master controller (z1) is got in touch with the monitor scope (72) of output module (z7) and loudspeaker (74) is provided with trigging control switch.
2. a kind of ATM auxiliary safety device according to claim 1, it is characterized in that under door core (55) along arranging active roller (531) and return idler (532) be positioned on the supporting skid rail of lower frame (511), the left and right of safety door (5) is respectively left column (512) with embedded groove and right column (513), safety door (5) be crossbeam (514) above; A left side for door core (55) is laterally laterally furnished with electronic limit of elasticity gear (541) and (542) respectively with the right side, the side of lower frame (511) supporting skid rail is furnished with electronic screens gear (52); Drive the motor that door core (55) active roller (531) operates, choosing " band rotating, Frequency Adjustable speed governing, band auto-lock function " type, is connected to timer in control loop; Described contact wall (11) is two sections, and one end connects with left column (512) and right column (513) respectively, and the other end connects with the wall of revolving door (1) both sides respectively.
3. a kind of ATM auxiliary safety device according to claim 1, is characterized in that described identity recognizer (6), visual testing is arranged on a core (55) front or a heel post for device (7); The button that requests help (10) of ATM indoor is arranged on the back side of a core (55), the wall of ATM room is inlaid with escape door (12).
4. an implementation method for ATM auxiliary safety device safeguard procedures according to claim 1, it is characterized in that, concrete steps are as follows:
1) revolving door is entered, involved party enters the logical lattice (2) of revolving door, under number recognizer (3) monitoring, press the revolving door start button (4) on logical lattice inwall, involved party rotates together with revolving door (1), and treat that involved party comes to operation room place, revolving door completes rotation, stop, locking;
2) make video recording sound, test mandate, if the involved party entering operation room does not have substitute service directly to forward step 3 to); If have, then utilize visual to test for device (7) and under bank computer control system complete monitoring, involved party and clientage carry out asking and authorizing, bank computer control system is assaied according to the bank card information of authorizing and the identity information of clientage the legitimacy of clientage's act of authorization, and whether affirming conduct people is authorized to accordingly;
3) test the body part, sentence unification, finger print information or the iris information of involved party is left by identity recognizer (6), I.D. effective information, preliminary identification is carried out to " unification " of the involved party for entering ATM room, as preliminary identification result do not judge " not conforming to " safety door release the button (8) electric, involved party presses safety door and releases the button (8), opens safety door (5), enters ATM room; As preliminary identification result judges " not conforming to ", power-off that safety door is released the button (8), involved party is denied access to ATM room;
4) bank card business is completed, after involved party enters ATM room, after bank card is successfully inserted ATM, bank computer control system to obtain from ATM by the information of slotting bank card and to test the full detail that gathers for device (7) and identity recognizer (6) place in addition comprehensive visual, " legitimacy " of carrying out the behavior of involved party's plug-in card judges, when the result judged is as " legal ", then involved party has continued the later related service about this bank card and has operated, the now behavior of involved party belongs to normal, the only legal bank card business finished, bank card normally exits, when the result judged is as " illegally ", alarm response device (13) sends alert news.
5. the implementation method of ATM auxiliary safety device safeguard procedures according to claim 4, it is characterized in that, described step 4) in: after involved party enters ATM room, safety door is closed immediately, now button (9) is driven in safety door pass, revolving door start button (4) is in obtain electricity condition, after bank card is successfully inserted ATM, safety door closes opens button (9) and revolving door start button (4) power-off, and involved party is in " constrained state "; When the result judged is as " legal ", involved party is in " entering constrained state ", while success card taking, bank computer control system instruction secure door pass drives button (9) and revolving door start button (4) recovers electric, and constrained state is removed; When the result judged is as " illegally ", then involved party is in " being absorbed in constrained state ", and it is removed to only have and to show up solution by responding personnel.
6. the implementation method of the ATM auxiliary safety device safeguard procedures according to claim 4 or 5, it is characterized in that, revolving door (1) original state is in opening shape, in this position, the mechanical movement mechanism of revolving door (1) is in the lock state, under this state, revolving door start button (4) always electric; Camera in number recognizer (3) performs the logical interior number Data Collection of lattice (2) and the transmission completed to bank computer control system, " face recognition system " now in bank computer control system processes the interior instant people's logarithmic data of logical lattice (2) that camera inputs: if " 0 ", illustrate in logical lattice (2) unmanned, now revolving door (1) is in initial waiting state; " if 1 ", it is effective that the unique involved party entered in logical lattice (2) presses revolving door start button (4), revolving door (1) unlocks, starts and rotate, involved party together rotates with revolving door (1), the automatic stop of revolving door after rotation 180 °, mechanical caging more simultaneously, involved party comes operation room; If be greater than " 1 ", start button (4) power-off of bank computer control system notice revolving door, revolving door (1) must not move.
7. the implementation method of the ATM auxiliary safety device safeguard procedures according to claim 4 or 5, is characterized in that, described involved party and clientage carry out the process of asking and authorizing:
1. from capture, involved party opens and visually tests for device switch (71), and front aligns visual camera lens (73), completes from capture at monitor scope (72) from viewed area;
2. ask to authorize, told by Mike (75), sent by visual signal transferring and receiving apparatus (76) mode of the videophone number of clientage, get through the videophone of the principal, involved party and clientage realize looking mutually; Locate involved party, it is after " his vision area " of monitor scope (72) is seen and confirmed to entrust artificial "True", told several, the end of the bank card number of this clientage by Mike (75) successively, send " authorized application " to the principal;
3. confirm to authorize, the principal have received image that involved party transmits, associated bank card number code after being verified as "True", the principal sends confirmation signal to videophone microphone, system namely obtain order break visual test in device (7) by visual signal transferring and receiving apparatus (76) to the electricity of monitor scope (72) and loudspeaker (74) circuit, keep simultaneously visual test in device (7) by visual signal transferring and receiving apparatus (76) to unimpeded at the positive often-have-electricity of bank computer control system circuit; The principal says and the bank card of oneself the entrusted agent's processes financial business a few item in bank card end, proxypassword and the content of authorizing one to one mutually to bank computer control system, authorizes and terminates.
8. the implementation method of the ATM auxiliary safety device safeguard procedures according to claim 4 or 5, it is characterized in that, the Push And Release of described safety door (5) respectively by safety door release the button (8) and safety door closes open button (9) whether electric, safety door is released the button (8) and safety door closes the turning to of the drive motor of the active roller (531) opening button (9) opposite house core (55), rotating speed controls;
Release the button (8) and safety door of described safety door closes and opens the service meter that button (9) controls separately safety door (5), and in time, safety door is released the button (8) formerly; In program, safety door close opens button (9) belong to " upper ", press safety door close drive button (9), then safety door release the button (8) must power-off be made;
In described safety door (5) switching process, the limit position that it horizontally slips is limited to the left side being arranged in a core (55) and laterally keeps off (541) and (542) with the right side electronic limit of elasticity laterally; Door core (55) dynamic with only, and locking with unlock, be limited to the electronic screens of arranging in the side of the supporting skid rail of lower frame (511) and keep off (52).
9. the implementation method of the ATM auxiliary safety device safeguard procedures according to claim 4 or 5, is characterized in that, the ring command source of alarm response device (13) also comprises one of following content:
Find that revolving door (1) breaks down when pressing revolving door start button (4) in the logical lattice (2) 1. entering revolving door (1) for starting revolving door (1), or revolving door (1) start after not yet turn to operation room namely midway because of fault stop, the revolving door start button (4) that now involved party presses on logical lattice (2) sidewall for a long time sends alert news to alarm response device (13);
2. the safety door on safety door (5) front release the button (8) electric, press safety door and release the button (8), safety door (5) breaks down, now involved party press for a long time safety door release the button (8) send alert news to alarm response device (13);
3. be in the involved party of ATM room, when outwards asking for help because being in distress difficulty, press the button that requests help (10) and sending to alarm response device (13) news that request help and ask.
10. the implementation method of the ATM auxiliary safety device safeguard procedures according to claim 4 or 5, is characterized in that, the result that " legitimacy " of the behavior of involved party's plug-in card judges as the situation of " illegally ", comprises one of following content:
1. involved party has " by force for password " to occur visual testing in for device (7) place agent authorization process;
2. the bank card that involved party successfully inserts is depending on testing for the undelegated bank card in device (7) place;
Separately, occur because of operating mistake or time-out after involved party enters ATM room to report to the police or/and the situation of " being absorbed in constrained state ", one of following content:
3. " legal " involved party is when handling the remaining business of bank card, the concrete business that this bank card is implemented and clientage visual test authorize for device 7 place time described in business tine inconsistent;
4. after involved party enters ATM room, the limited time, released the button (8) power-cut time by safety door (5) down periods safety door and clock, within 30 seconds, involved party realizes as failed successfully bank card being inserted ATM;
5. any operation is not done in 30 seconds after " legal " involved party success plug-in card;
6. " legal " involved party is when having handled the remaining business of bank card, not in time card taking;
7. " legal " involved party, completes last bank card related service, not to leave ATM room after " card taking " in 30 seconds;
8. " legal " involved party, next bank card of unsuccessful insertion in 30 seconds after " card taking ", does not leave ATM room yet.
CN201510038712.7A 2015-01-26 2015-01-26 ATM (automatic teller machine) automatic safety device and method for implementing protection measures of ATM automatic safety device Expired - Fee Related CN104574694B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510038712.7A CN104574694B (en) 2015-01-26 2015-01-26 ATM (automatic teller machine) automatic safety device and method for implementing protection measures of ATM automatic safety device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510038712.7A CN104574694B (en) 2015-01-26 2015-01-26 ATM (automatic teller machine) automatic safety device and method for implementing protection measures of ATM automatic safety device

Publications (2)

Publication Number Publication Date
CN104574694A true CN104574694A (en) 2015-04-29
CN104574694B CN104574694B (en) 2017-04-12

Family

ID=53090644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510038712.7A Expired - Fee Related CN104574694B (en) 2015-01-26 2015-01-26 ATM (automatic teller machine) automatic safety device and method for implementing protection measures of ATM automatic safety device

Country Status (1)

Country Link
CN (1) CN104574694B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105761382A (en) * 2016-02-15 2016-07-13 东方通信股份有限公司 Self-service machine system and anomaly detection and card-number application method
CN105788101A (en) * 2016-02-15 2016-07-20 东方通信股份有限公司 Automatic teller machine system capable of customizing card number and anomaly detection and card number application method
CN108244858A (en) * 2018-04-01 2018-07-06 上海古鳌电子科技股份有限公司 A kind of integrated control panel and method of work for signature card cabinet
CN108648376A (en) * 2018-04-27 2018-10-12 常州信息职业技术学院 Identity identifying method and device
CN109903443A (en) * 2019-03-19 2019-06-18 刘静怡 A kind of outer automatic teller machine of the bank-user of high safety performance
CN110570602A (en) * 2019-08-26 2019-12-13 钱微 guarantee system for financial transaction and working method thereof
CN111009081A (en) * 2019-12-19 2020-04-14 湖北南楚网络传媒有限公司 Multifunctional internet information display self-service system
CN113157177A (en) * 2021-01-05 2021-07-23 上海凯恺机电科技发展有限公司 Actuator and storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201310210Y (en) * 2008-10-21 2009-09-16 贺文华 Automatic and safe rotating security cabin
CN101794481A (en) * 2009-02-04 2010-08-04 深圳市先进智能技术研究所 ATM (Automatic teller machine) self-service bank monitoring system and method
CN201607792U (en) * 2010-03-05 2010-10-13 成都三泰电子实业股份有限公司 Intelligent defense system for ATM
CN201869274U (en) * 2010-11-12 2011-06-15 福建泉州环宇通电子有限公司 Audio and video mobile emergency appealing system based on 3G (the third generation)
CN102176266A (en) * 2011-01-24 2011-09-07 武汉大学 Visual behavior early warning prompting method and system for automatic teller machine (ATM) bank card
CN202120366U (en) * 2011-06-02 2012-01-18 四川融熠科技有限公司 Foreground preprocessing system for banking
CN202472805U (en) * 2011-12-27 2012-10-03 安科智慧城市技术(中国)有限公司 ATM safety prevention and control device
US8474703B1 (en) * 1998-10-09 2013-07-02 Diebold, Incorporated Automated banking machine and monitoring method
US8496168B1 (en) * 1998-04-17 2013-07-30 Diebold Self-Service Systems Division Of Diebold, Incorporated Banking system controlled responsive to data bearing records
CN203366447U (en) * 2013-07-19 2013-12-25 中国农业银行股份有限公司镇江分行 Intelligent monitoring system of ATM
CN203376814U (en) * 2013-07-23 2014-01-01 杭州智诺英特科技有限公司 Intelligent audio and video protective system of bank self-service equipment protective cabinet
CN203520504U (en) * 2013-10-18 2014-04-02 深圳市怡化电脑有限公司 Guest operating room for outdoor ATM (Automatic Teller Machine)
CN203644106U (en) * 2013-12-31 2014-06-11 重庆市行安电子科技有限公司 Revolving door type safety cabin control system
CN204029066U (en) * 2014-08-26 2014-12-17 周捷 The security system of self-help bank
CN204360477U (en) * 2015-01-26 2015-05-27 刘升旭 A kind of ATM auxiliary safety device

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8496168B1 (en) * 1998-04-17 2013-07-30 Diebold Self-Service Systems Division Of Diebold, Incorporated Banking system controlled responsive to data bearing records
US8474703B1 (en) * 1998-10-09 2013-07-02 Diebold, Incorporated Automated banking machine and monitoring method
CN201310210Y (en) * 2008-10-21 2009-09-16 贺文华 Automatic and safe rotating security cabin
CN101794481A (en) * 2009-02-04 2010-08-04 深圳市先进智能技术研究所 ATM (Automatic teller machine) self-service bank monitoring system and method
CN201607792U (en) * 2010-03-05 2010-10-13 成都三泰电子实业股份有限公司 Intelligent defense system for ATM
CN201869274U (en) * 2010-11-12 2011-06-15 福建泉州环宇通电子有限公司 Audio and video mobile emergency appealing system based on 3G (the third generation)
CN102176266A (en) * 2011-01-24 2011-09-07 武汉大学 Visual behavior early warning prompting method and system for automatic teller machine (ATM) bank card
CN202120366U (en) * 2011-06-02 2012-01-18 四川融熠科技有限公司 Foreground preprocessing system for banking
CN202472805U (en) * 2011-12-27 2012-10-03 安科智慧城市技术(中国)有限公司 ATM safety prevention and control device
CN203366447U (en) * 2013-07-19 2013-12-25 中国农业银行股份有限公司镇江分行 Intelligent monitoring system of ATM
CN203376814U (en) * 2013-07-23 2014-01-01 杭州智诺英特科技有限公司 Intelligent audio and video protective system of bank self-service equipment protective cabinet
CN203520504U (en) * 2013-10-18 2014-04-02 深圳市怡化电脑有限公司 Guest operating room for outdoor ATM (Automatic Teller Machine)
CN203644106U (en) * 2013-12-31 2014-06-11 重庆市行安电子科技有限公司 Revolving door type safety cabin control system
CN204029066U (en) * 2014-08-26 2014-12-17 周捷 The security system of self-help bank
CN204360477U (en) * 2015-01-26 2015-05-27 刘升旭 A kind of ATM auxiliary safety device

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105761382A (en) * 2016-02-15 2016-07-13 东方通信股份有限公司 Self-service machine system and anomaly detection and card-number application method
CN105788101A (en) * 2016-02-15 2016-07-20 东方通信股份有限公司 Automatic teller machine system capable of customizing card number and anomaly detection and card number application method
CN105788101B (en) * 2016-02-15 2018-03-16 东方通信股份有限公司 The self-help teller machine system and abnormality detection and card number application method of card number can be made by oneself
CN105761382B (en) * 2016-02-15 2018-03-16 东方通信股份有限公司 Self-help teller machine system and abnormality detection and card number application method
CN108244858A (en) * 2018-04-01 2018-07-06 上海古鳌电子科技股份有限公司 A kind of integrated control panel and method of work for signature card cabinet
CN108648376A (en) * 2018-04-27 2018-10-12 常州信息职业技术学院 Identity identifying method and device
CN109903443A (en) * 2019-03-19 2019-06-18 刘静怡 A kind of outer automatic teller machine of the bank-user of high safety performance
CN110570602A (en) * 2019-08-26 2019-12-13 钱微 guarantee system for financial transaction and working method thereof
CN110570602B (en) * 2019-08-26 2021-11-09 钱微 Guarantee system for financial transaction and working method thereof
CN111009081A (en) * 2019-12-19 2020-04-14 湖北南楚网络传媒有限公司 Multifunctional internet information display self-service system
CN113157177A (en) * 2021-01-05 2021-07-23 上海凯恺机电科技发展有限公司 Actuator and storage medium
CN113157177B (en) * 2021-01-05 2023-12-01 上海凯恺机电科技发展有限公司 Actuator and storage medium

Also Published As

Publication number Publication date
CN104574694B (en) 2017-04-12

Similar Documents

Publication Publication Date Title
CN104574694B (en) ATM (automatic teller machine) automatic safety device and method for implementing protection measures of ATM automatic safety device
US6794986B2 (en) Access control method and apparatus for members and guests
CN101354798A (en) System for managing hotel finger print and working method thereof
CN204360477U (en) A kind of ATM auxiliary safety device
EP3486876B1 (en) Method, device and system for controlling opening of ab doors
WO2005124655A3 (en) System and method for implementing an automated vault machine
CN209103378U (en) A kind of access control system with speech recognition
CN101702248A (en) Fingerprint gate lock monitored by portable mobile phone and management system thereof
CN110164012A (en) A kind of community's access control system and working method thereof
CN207198943U (en) Finger vein identification access control system based on intelligent management
CN107575137A (en) The intelligent anti-theft door for needing cell phone software checking with fingerprint and iris recognition
CN109147125A (en) Intelligent door lock theft preventing method and anti-theft intelligent door lock
CN107747457A (en) The intelligent anti-theft door for needing identifying code with fingerprint and iris recognition
CN207780878U (en) A kind of access control system based on characteristics of human body's identification
CN103116923A (en) Security and protection method based on images and mobile communication network
CN108734838A (en) It is a kind of that there is the smart lock based on video raw body signature verification device
EP3142079B1 (en) Identity assurance
CN111784889A (en) Access control management system
CN103116924A (en) Electronic lock system based on images and mobile communication network
CN210199842U (en) Intelligent hotel check-in and door lock control system
CN107093236A (en) A kind of double access control systems recognized based on fuzzy video
JP2004208244A (en) Entering/leaving management system using portable information terminal equipment
CN107829659A (en) The intelligent anti-theft door for needing cell phone software to verify contrasted with fingerprint recognition and body weight
CN109243014A (en) Access control system and the double mirror unlocking methods of gate inhibition
CN111986367A (en) Block chain security entrance guard or lock system and business model

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200918

Address after: Room 13, Tongguan Shugu, Tongguan District, Tongling City, Anhui Province, 244000

Patentee after: Tongling Koda Productivity Promotion Center Co.,Ltd.

Address before: 300457 29 Tianjin University of Science and Technology, thirteenth Avenue, Binhai New Area, Tianjin

Patentee before: Liu Shengxu

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221215

Address after: 413, Floor 4, Building B, Innovation Building, Linyi Hi tech Industrial Development Zone, Shandong Province, 276000

Patentee after: Linyi High tech Zone Jinlanling Labor Service Co.,Ltd.

Address before: Room 13 / F, Tongguan Shugu, Tongguan District, Tongling City, Anhui Province 244000

Patentee before: Tongling Koda Productivity Promotion Center Co.,Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170412

CF01 Termination of patent right due to non-payment of annual fee