CN105405219B - A kind of method and device for obtaining self-service terminal problem - Google Patents

A kind of method and device for obtaining self-service terminal problem Download PDF

Info

Publication number
CN105405219B
CN105405219B CN201510701221.6A CN201510701221A CN105405219B CN 105405219 B CN105405219 B CN 105405219B CN 201510701221 A CN201510701221 A CN 201510701221A CN 105405219 B CN105405219 B CN 105405219B
Authority
CN
China
Prior art keywords
suspicious item
self
sorted
divided
atm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510701221.6A
Other languages
Chinese (zh)
Other versions
CN105405219A (en
Inventor
谢卫平
陈盘中
崔士友
李海洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Yihua Information Technology Co., Ltd.
Original Assignee
Shenzhen Yihua Computer Co Ltd
Shenzhen Yihua Time Technology Co Ltd
Shenzhen Yihua Financial Intelligent Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yihua Computer Co Ltd, Shenzhen Yihua Time Technology Co Ltd, Shenzhen Yihua Financial Intelligent Research Institute filed Critical Shenzhen Yihua Computer Co Ltd
Priority to CN201510701221.6A priority Critical patent/CN105405219B/en
Publication of CN105405219A publication Critical patent/CN105405219A/en
Application granted granted Critical
Publication of CN105405219B publication Critical patent/CN105405219B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/206Software aspects at ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/209Monitoring, auditing or diagnose of functioning of ATMs

Abstract

The embodiment of the invention discloses a kind of method and device for obtaining self-service terminal problem, by being layered to self-service terminal system according to running environment;Every layer of resource of the self-service terminal system is classified according to business demand;Sorted the problem of being existed per class resource according to the self-aided terminal, is divided into suspicious item and non-suspicious item;Excluded according to the degression type pre-set and/or incrementally investigation obtains the problem of self-aided terminal is present, the degression type is excluded for obtaining the problem of self-aided terminal is present according to the exclusion order pre-set, it is described incrementally to investigate for investigating the problem of self-aided terminal is present according to the investigation order pre-set, so as to which self-service terminal system be modeled, this model is decomposed, successively refine, and formulate a set of analysis process, degression type exclusion is carried out with reference to flow and is incrementally investigated, so it is more convenient for systematicness, procedure analyzes self-service terminal system problem, improve precision of analysis.

Description

A kind of method and device for obtaining self-service terminal problem
Technical field
The present embodiments relate to the technical field of finance self-help terminal, more particularly to a kind of obtain self-service terminal problem Method and device.
Background technology
With the fast development of bank in recent years, bank service site, self-service terminal are all being continuously increased, various industry Also for fast integration on self-aided terminal, under this trend, self-service terminal system is also more and more huger, is naturally for business system Unite more unstable, once there is the problems such as similar blue screen, crash still according to being guessed at this stage by experience and unsystematic, just It is more difficult to investigate.Certainly, if can be decomposed self-service terminal system according to corresponding manner, analyzed with reference to related procedure, That analyst is easier to find out reason.
But in current techniques and business, the system of a self-aided terminal includes hardware resource, self-aided terminal business Software resource, third party's resource (similar anti-virus software resource) etc., the stabilization of the fusions of various resources to self-service terminal system Property brings very big impact and uncertain risk, such as the difficult and complicated cases such as blue screen, deadlock, blank screen, it is most of at this stage still It is by experience and being guessed without sequence, only pure by self-service terminal system daily record is inadequate without analysis of strategies, and thus having can Analysis difficulty can be increased, is not easy whole analysis process sharpening.
The content of the invention
The purpose of the embodiment of the present invention is to propose a kind of method and device for obtaining self-service terminal problem, it is intended to solves such as The problem of self-service terminal system is modeled and improved the accuracy for analyzing self-aided terminal problem by what.
To use following technical scheme up to this purpose, the embodiment of the present invention:
In a first aspect, a kind of method for obtaining self-service terminal problem, methods described include:
Self-service terminal system is layered according to running environment, the running environment after layering includes application layer, system layer And hardware layer;
Every layer of resource of the self-service terminal system is classified according to business demand;
Sorted the problem of being existed per class resource according to the self-aided terminal, is divided into suspicious item and non-suspicious item;
Excluded according to the degression type pre-set and/or incrementally investigation obtains the problem of self-aided terminal is present, institute Degression type is stated to exclude for obtaining the problem of self-aided terminal is present according to the exclusion order pre-set, it is described incrementally to arrange Look into for investigating the problem of self-aided terminal is present according to the investigation order pre-set.
Preferably, every layer of resource to the self-service terminal system is classified according to business demand, including:
The resource of the application layer is categorized as ATM service class system and non-ATM service class system according to business demand;
The resource of the hardware layer is categorized as atm module class and industrial computer module class according to business demand;
The resource of the system layer is categorized as the main kernel file of system, group policy, system correlation according to business demand Component, system mend, the system other configurations for servicing, paying close attention to and the registration table paid close attention to.
Preferably, it is described by it is sorted per class resource existed according to the self-aided terminal the problem of be divided into suspicious item and Non- suspicious item, including:
Sorted ATM service class system is divided into suspicious item ATMC softwares, ATM middlewares and SP softwares;
Sorted ATM service class system is divided into non-suspicious item ATM remote distributions software, ATM monitoring softwares, ATM Log analysis tool and ATM testing tools;
Sorted non-ATM service class system is divided into suspicious item Anti-Virus, security control software and desktop pipe Control software;
Sorted non-ATM service class system is divided into non-suspicious item encryption software, compressed software and ftp software;
It is described that sorted the problem of being existed per class resource according to the self-aided terminal is divided into suspicious item and non-suspicious , including:
Sorted atm module class is divided into suspicious item movement and its driving, card reader and its driving and flowing water printing Machine and its driving;
Sorted atm module class is divided into non-suspicious item strip printer and its driving and touch-screen and its driving;
By sorted industrial computer module class be divided into suspicious item mainboard and its driving, internal memory and its driving, hard disk and its Driving, video card and its driving and CPU and its driving;
Sorted industrial computer module class is divided into non-suspicious item network interface card and its driving and sound card and its driving;
It is described that sorted the problem of being existed per class resource according to the self-aided terminal is divided into suspicious item and non-suspicious , including:
Sorted system associated component is divided into suspicious item IE components, activex control and Flash controls;
Sorted system associated component is divided into non-suspicious item system font component and system language pack assembly;
Sorted system mend is divided into suspicious item system component renewal patch;
Sorted system mend is divided into non-suspicious item system security update patch;
The sorted system other configurations paid close attention to are divided into suspicious item hyperthread and multi-core technology, Direct3D Acceleration technique, USB power source aspect and power supply option;
By the sorted registration table paid close attention to be divided into HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet, HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows NT and HKEY_ CURRENT_USER\Control Panel。
Preferably, the degression type that the basis is pre-set excludes to obtain the problem of self-aided terminal is present, including:
The order of the priority of the suspicious item of every layer of every class resource or non-suspicious item from high to low is excluded into institute one by one State the problem of self-aided terminal is present;Or
In the case where integrally excluding every layer of at least one suspicious item of every class resource or at least one non-suspicious item, If detecting, self-aided terminal operation is problematic, at least one suspicious item for currently integrally excluding or it is described extremely A few non-suspicious item is excluded one by one according to the order of priority from high to low.
Preferably, the incrementally investigation that the basis is pre-set obtains the problem of self-aided terminal is present, including:
On the basis of presently described self-aided terminal normal operation, by the suspicious item or non-suspicious of every layer of every class resource Priority order from high to low increase one by one after continue to detect the self-aided terminal operation it is whether problematic;
If detecting, the self-aided terminal operation is problematic, and the increased suspicious item or the non-suspicious item are institute State the problem of self-aided terminal is present.
Preferably, the degression type that the basis is pre-set is excluded and incrementally investigation is obtained existing for the self-aided terminal Problem, including:
On the basis of presently described self-aided terminal normal operation, by least one suspicious item of every layer of every class resource or Whether problematic continue to detect the self-aided terminal operation after at least one non-suspicious item increase of person;
If detecting, the self-aided terminal operation is problematic, at least one suspicious item or described at least one Non- suspicious item is excluded one by one according to the order of priority from high to low.
Second aspect, a kind of device for obtaining self-service terminal problem, described device include:
Hierarchical block, for being layered to self-service terminal system according to running environment, the running environment after layering includes Application layer, system layer and hardware layer;
Sort module, for being classified to every layer of resource of the self-service terminal system according to business demand;
Division module, for being divided into suspicious item and non-suspicious item according to problematic phenomenon per class resource by sorted;
Acquisition module, the self-aided terminal is obtained for excluding according to the degression type pre-set and/or incrementally investigating The problem of existing, the degression type are excluded for excluding to ask existing for the self-aided terminal according to the exclusion order pre-set Topic, described the problem of incrementally investigating for being existed according to the investigation self-aided terminal pre-set.
Preferably, the sort module, including:
First taxon, for by the resource of the application layer according to business demand be categorized as ATM service class system and Non- ATM service class system;
Second taxon, for the resource of the hardware layer to be categorized as into atm module class and industry control according to business demand Machine module class;
3rd taxon, for the resource of the system layer to be categorized as into the main kernel text of system according to business demand Part, group policy, system associated component, system mend, the system other configurations for servicing, paying close attention to and the registration paid close attention to Table.
Preferably, the division module, including:
First division unit, for sorted ATM service class system to be divided into suspicious item ATMC softwares, among ATM Part and SP softwares;
Second division unit, it is soft for sorted ATM service class system to be divided into non-suspicious item ATM remote distributions Part, ATM monitoring softwares, ATM log analysis tools and ATM testing tools;
3rd division unit, for sorted non-ATM service class system to be divided into suspicious item Anti-Virus, safety Control software and desktop management and control software;
4th division unit, for sorted non-ATM service class system to be divided into non-suspicious item encryption software, compression Software and ftp software;
5th division unit, for by sorted atm module class be divided into suspicious item movement and its driving, card reader and It drives and flowing water printer and its driving;
6th division unit, for sorted atm module class to be divided into non-suspicious item strip printer and its driving With touch-screen and its driving;
7th division unit, for sorted industrial computer module class to be divided into suspicious item mainboard and its driving, internal memory And its driving, hard disk and its driving, video card and its driving and CPU and its driving;
8th division unit, for sorted industrial computer module class to be divided into non-suspicious item network interface card and its driving harmony Card and its driving;
9th division unit, for sorted system associated component to be divided into suspicious item IE components, activex control With Flash controls;
Tenth division unit, for sorted system associated component to be divided into non-suspicious item system font component and is System language pack assembly;
11st division unit, update patch for sorted system mend to be divided into suspicious item system component;
12nd division unit, for sorted system mend to be divided into non-suspicious item system security update patch;
13rd division unit, for the sorted system other configurations paid close attention to be divided into suspicious item hyperthread And multi-core technology, Direct3D acceleration techniques, USB power source aspect and power supply option;
14th division unit, for the sorted registration table paid close attention to be divided into HKEY_LOCAL_MACH INE\SYSTEM\CurrentControlSet、HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Win dows NT and HKEY_CURRENT_USER Control Panel.
Preferably, the acquisition module, including:
First rejected unit, for by the priority of the suspicious item of every layer of every class resource or non-suspicious item from high to low Order exclude the problem of self-aided terminal is present one by one;Or
Second rejected unit, at least one suspicious item or at least one in the every class resource for integrally excluding every layer In the case of non-suspicious item, if detecting, self-aided terminal operation is problematic, to described in currently integrally excluding at least one Individual suspicious item or at least one non-suspicious item are excluded one by one according to the order of priority from high to low.
Preferably, the acquisition module, including:
First detection unit, on the basis of presently described self-aided terminal normal operation, by every layer of every class resource Suspicious item or non-suspicious item priority order from high to low increase one by one after continue to detect the self-aided terminal operation It is whether problematic;
Determining unit, if for detecting that self-aided terminal operation is problematic, it is determined that the increased suspicious item or Non- suspicious item described in person is the problem of self-aided terminal is present.
Preferably, the acquisition module, including:
Second detection unit, on the basis of presently described self-aided terminal normal operation, by every layer of every class resource At least one suspicious item or at least one non-suspicious item increase after whether continue to detect the self-aided terminal operation problematic;
3rd rejected unit, if for detecting that the self-aided terminal operation is problematic, to described at least one suspicious Item or at least one non-suspicious item are excluded one by one according to the order of priority from high to low.
The embodiment of the present invention to self-service terminal system according to running environment by being layered, the running environment bag after layering Include application layer, system layer and hardware layer;Every layer of resource of the self-service terminal system is classified according to business demand;It will divide The problem of every class resource after class exists according to the self-aided terminal is divided into suspicious item and non-suspicious item;According to what is pre-set Degression type excludes and/or incrementally investigation obtains the problem of self-aided terminal is present, and the degression type excludes to be used for according to pre- The exclusion order first set obtains the problem of self-aided terminal is present, described incrementally to investigate for according to the row pre-set Look into order and investigate the problem of self-aided terminal is present, so as to which self-service terminal system be modeled, this model is decomposed, by Layer refinement, and a set of analysis process is formulated, carry out degression type exclusion with reference to flow and incrementally investigate, system of being so more convenient for Property, procedure analysis self-service terminal system problem, improve precision of analysis.
Brief description of the drawings
Fig. 1 is the schematic flow sheet for the method first embodiment that the embodiment of the present invention obtains self-service terminal problem;
Fig. 2 is the high-level schematic functional block diagram for the device that the embodiment of the present invention obtains self-service terminal problem;
Fig. 3 is the high-level schematic functional block diagram of sort module of the embodiment of the present invention;
Fig. 4 is the high-level schematic functional block diagram of division module of the embodiment of the present invention;
Fig. 5 is the high-level schematic functional block diagram of acquisition module of the embodiment of the present invention;
Fig. 6 is another high-level schematic functional block diagram of acquisition module of the embodiment of the present invention;
Fig. 7 is another high-level schematic functional block diagram of acquisition module of the embodiment of the present invention.
Embodiment
The embodiment of the present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this The specific embodiment of place description is used only for explaining the embodiment of the present invention, rather than the restriction to the embodiment of the present invention.In addition also It should be noted that for the ease of describing, the part related to the embodiment of the present invention rather than entire infrastructure are illustrate only in accompanying drawing.
Embodiment one
With reference to figure 1, Fig. 1 is the flow signal for the method first embodiment that the embodiment of the present invention obtains self-service terminal problem Figure.
In embodiment one, the method for obtaining self-service terminal problem includes:
Step 101, self-service terminal system is layered according to running environment, the running environment after layering includes application Layer, system layer and hardware layer;
Specifically, when similar deadlock, blue screen, blank screen phenomenon occur for self-service terminal system, first using self-service terminal system as One entirety, divide self-service terminal system to three layers, i.e. application layer, system layer, hardware layer according still further to running environment.
Step 102, every layer of resource of the self-service terminal system is classified according to business demand;
Preferably, every layer of resource to the self-service terminal system is classified according to business demand, including:
The resource of the application layer is categorized as ATM service class system and non-ATM service class system according to business demand;
The resource of the hardware layer is categorized as atm module class and industrial computer module class according to business demand;
The resource of the system layer is categorized as the main kernel file of system, group policy, system correlation according to business demand Component, system mend, the system other configurations for servicing, paying close attention to and the registration table paid close attention to.
Specifically, further, the application layer, system layer, hardware layer of self-service terminal system division are finely divided by business:
Application layer is divided into ATM operation systems and third party's operation system by business, and ATM operation systems be divided into ATMC, The systems such as SP, middleware, monitoring, distribution, third party system be divided into Anti-Virus, security control software, desktop management and control software, Other non-ATM classes operation systems such as setting instrument;
Hardware layer is divided into ATM business modules and industrial computer module, and ATM business modules are primarily upon strip, flowing water, touch The modules such as screen, movement, card reader and its associated drives, and industrial computer module be primarily upon mainboard, hard disk, internal memory, video card, CPU, The equipment such as sound card, network interface card and its associated drives;
System layer is primarily upon group policy, service, registration table, Windows associated components, kernel-driven file etc..
Step 103, sorted the problem of existing per class resource according to the self-aided terminal, is divided into suspicious item and non- Suspicious item;
Preferably, it is described by it is sorted per class resource existed according to the self-aided terminal the problem of be divided into suspicious item and Non- suspicious item, including:
Sorted ATM service class system is divided into suspicious item ATMC softwares, ATM middlewares and SP softwares;
Sorted ATM service class system is divided into non-suspicious item ATM remote distributions software, ATM monitoring softwares, ATM Log analysis tool and ATM testing tools;
Sorted non-ATM service class system is divided into suspicious item Anti-Virus, security control software and desktop pipe Control software;
Sorted non-ATM service class system is divided into non-suspicious item encryption software, compressed software and ftp software;
It is described that sorted the problem of being existed per class resource according to the self-aided terminal is divided into suspicious item and non-suspicious , including:
Sorted atm module class is divided into suspicious item movement and its driving, card reader and its driving and flowing water printing Machine and its driving;
Sorted atm module class is divided into non-suspicious item strip printer and its driving and touch-screen and its driving;
By sorted industrial computer module class be divided into suspicious item mainboard and its driving, internal memory and its driving, hard disk and its Driving, video card and its driving and CPU and its driving;
Sorted industrial computer module class is divided into non-suspicious item network interface card and its driving and sound card and its driving;
It is described that sorted the problem of being existed per class resource according to the self-aided terminal is divided into suspicious item and non-suspicious , including:
Sorted system associated component is divided into suspicious item IE components, activex control and Flash controls;
Sorted system associated component is divided into non-suspicious item system font component and system language pack assembly;
Sorted system mend is divided into suspicious item system component renewal patch;
Sorted system mend is divided into non-suspicious item system security update patch;
The sorted system other configurations paid close attention to are divided into suspicious item hyperthread and multi-core technology, Direct3D Acceleration technique, USB power source aspect and power supply option;
By the sorted registration table paid close attention to be divided into HKEY_LOCAL_MACHINE SYSTEM CurrentC OntrolSet, HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows NT and HKEY_CU RRENT_ USER\Control Panel。
Specifically, according to self-service terminal system problematic phenomenon, it is preliminary to judge that subclass provides in every layer of resource of self-service terminal system Source may be relevant with problem, and which subitem is the suspicious items of suspicious Xiang Yufei in every layer of resource of summarizing, and just fixed by suspicious item By ranking score, (following standard is required to be remodified according to particular problem phenomenon and drafted, with deadlock, blue screen, blank screen from high to low Phenomena such as account for):
Application layer:ATMC, SP of ATM operation systems, middleware tentatively judgement are classified as suspicious item from high in the end, and monitor, Distribution is temporarily classified as non-suspicious item;Third party system tentatively judges Anti-Virus, fail-safe software, desktop management and control software from height Suspicious item is classified as to low, and other non-ATM classes operation systems such as setting instrument are temporarily classified as non-suspicious item;
Hardware layer:In ATM business modules movement, card reader, flowing water module and its associated drives can tentatively judge from height to It is low to be classified as suspicious item, and the module such as strip, touch-screen and its associated drives are temporarily classified as non-suspicious item, and it is mainboard in industrial computer, hard Disk, internal memory, video card module and its associated drives tentatively judge to be classified as suspicious item from high to low, and CPU, network interface card, sound card are temporarily classified as Non- suspicious item;
System layer:The tentatively judgement such as kernel-driven file, group policy, service and its registration table is classified as suspicious from high to low , Windows associated components and its registration table etc. are temporarily classified as non-suspicious item.
Step 104, excluded according to the degression type pre-set and/or incrementally investigation is obtained existing for the self-aided terminal Problem, the degression type is excluded for obtaining the problem of self-aided terminal is present according to the exclusion order pre-set, described Incrementally investigate for investigating the problem of self-aided terminal is present according to the investigation order pre-set.
Preferably, the degression type that the basis is pre-set excludes to obtain the problem of self-aided terminal is present, including:
The order of the priority of the suspicious item of every layer of every class resource or non-suspicious item from high to low is excluded into institute one by one State the problem of self-aided terminal is present;Or
In the case where integrally excluding every layer of at least one suspicious item of every class resource or at least one non-suspicious item, If detecting, self-aided terminal operation is problematic, at least one suspicious item for currently integrally excluding or it is described extremely A few non-suspicious item is excluded one by one according to the order of priority from high to low.
Specifically, in self-aided terminal problem system, in every layer of resource since high suspicious item is to low suspicious item one by one Exclude, such as carry out automatic test on this basis and no longer go wrong, then exclusion process terminates, and can confirm which subitem is Real suspicious item;Still gone wrong as carried out automatic test on this basis, continue to exclude other non-suspicious items, successively Misarrangement is peeled off, constantly reduces analyst coverage, untill automatic test no longer goes wrong after confirming some subitem of rejecting, this When can confirm to cause problem really suspicious item, misarrangement process completes that (procedure below is required to enter according to particular problem phenomenon Row replacing order is investigated, and is accounted for phenomena such as deadlock, blue screen, blank screen):
For application layer, first emphasis excludes the suspicious item of ATM operation systems from high to low, then excludes ATM operation systems Non- suspicious item, exclude the suspicious item of the non-ATM operation systems of third party afterwards, finally exclude third party non-ATM operation systems Non- suspicious item:I) the suspicious item such as ATMC, SP since ATM operation systems, middleware one by one, such as remove wherein some subitem and enter Row automatic test no longer goes wrong, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then excludes to terminate; As still gone wrong, continue to confirm the non-suspicious items such as monitoring, the distribution of ATM operation system initial decisions, such as remove wherein some Subitem carries out automatic test and no longer gone wrong, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then arranges Except end;II) as still gone wrong, continue to investigate Anti-Virus, fail-safe software, the desktop of the non-ATM operation systems of third party The suspicious item such as management and control software, such as remove wherein some subitem progress automatic test and no longer go wrong, you can illustrate that some can Doubtful item is the real suspicious item for causing problem, then excludes to terminate;As still gone wrong, continue to investigate the non-ATM business system of third party The non-suspicious item such as the setting instrument of system, such as remove wherein some subitem progress automatic test and no longer go wrong, you can explanation Some suspicious item is the real suspicious item for causing problem, then excludes to terminate, such as still go wrong, then illustrate that this layer is substantially arranged Remove, next layer of investigation can be carried out;
For hardware layer, first emphasis excludes the suspicious item of atm module from high to low, then excludes the non-suspicious of atm module Item, the suspicious item of industrial computer module, the non-suspicious item of last industrial computer module are excluded afterwards:I) movement from atm module, Card Reader The suspicious items such as device, flowing water module and its associated drives start one by one, such as remove wherein some subitem and carry out automatic test no longer Go wrong, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then excludes to terminate;As still gone wrong, after The non-suspicious items such as module and its associated drives such as the continuous strip for confirming ATM operation system initial decisions, touch-screen, such as remove wherein Some subitem carries out automatic test and no longer gone wrong, you can and it is the real suspicious item for causing problem to illustrate some suspicious item, Then exclude to terminate;II) as still gone wrong, continue to investigate mainboard in third party's industrial computer, hard disk, internal memory, video card module and its The suspicious item such as associated drives, such as remove wherein some subitem progress automatic test and no longer go wrong, you can illustrate that some can Doubtful item is the real suspicious item for causing problem, then excludes to terminate;As still gone wrong, it is non-to continue investigation CPU, network interface card, sound card etc. Suspicious item, such as remove wherein some subitem progress automatic test and no longer go wrong, you can illustrate some suspicious item to cause The real suspicious item of problem, then exclude to terminate, such as still go wrong, then illustrate that this layer substantially excludes, next layer can be carried out Investigation;
For system layer, first emphasis exclusion kernel-driven file, group policy, service and its registration table etc. are suspicious from high to low , such as no longer go wrong, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then refine into next Individual circulation excludes, and is finished until minimizing exclusion, confirms which minimum subitem is relevant with problem, now excludes to terminate;As still gone out Existing problem, continue to investigate the non-suspicious item such as Windows associated components and its registration table, such as no longer go wrong, you can illustrate certain Individual suspicious item is the real suspicious item for causing problem, then carries out refinement and enter next circulation exclusion, has been excluded until minimizing Finish.
Preferably, the incrementally investigation that the basis is pre-set obtains the problem of self-aided terminal is present, including:
On the basis of presently described self-aided terminal normal operation, by the suspicious item or non-suspicious of every layer of every class resource Priority order from high to low increase one by one after continue to detect the self-aided terminal operation it is whether problematic;
If detecting, the self-aided terminal operation is problematic, and the increased suspicious item or the non-suspicious item are institute State the problem of self-aided terminal is present.
Specifically, in self-aided terminal initial system, according to self-aided terminal business, first driven from hardware layer to system layer, Application layer is arrived again, will one by one be increased since high suspicious item is to low suspicious item in every layer of resource, is such as carried out on this basis automatic Change test to go wrong, then additive process terminates, and can confirm which subitem is to cause problem really suspicious item;Such as in this base Automatic test is carried out on plinth and still occurs without problem, continues to add other non-suspicious items, is successively superimposed misarrangement, constantly reduces and divides Scope is analysed, untill automatic test goes wrong after confirming some subitem of addition, can now confirm to cause problem real Suspicious item, misarrangement process complete (procedure below be required to according to particular problem phenomenon carry out replacing order investigate, with crash, Phenomena such as blue screen, blank screen, accounts for):
For hardware layer, according to self-aided terminal final system environmental requirement, first emphasis adds industrial computer module from high to low Suspicious item, then add industrial computer module non-suspicious item, afterwards add atm module suspicious item, finally add atm module Non- suspicious item investigated item by item:I) mainboard, hard disk, internal memory, video card module and its associated drives from third party's industrial computer Etc. suspicious item, such as addition wherein some subitem carries out automatic test and gone wrong, you can illustrates some suspicious item to cause to ask The real suspicious item of topic, then exclude to terminate;Problem is such as occurred without, continues to investigate the non-suspicious items such as CPU, network interface card, sound card, such as adds Wherein some subitem progress automatic test goes wrong, you can and it is the real suspicious item for causing problem to illustrate some suspicious item, Then exclude to terminate;II problem) is such as occurred without, continues the movement from atm module, card reader, flowing water module and its associated drives etc. Suspicious item starts one by one, and such as addition wherein some subitem carries out automatic test and gone wrong, you can illustrates that some suspicious item is Cause the real suspicious item of problem, then exclude to terminate;Such as occur without problem, continue confirm ATM operation system initial decisions with The non-suspicious item such as the modules such as bar, touch-screen and its associated drives, such as addition wherein some subitem carry out automatic test and asked Topic, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then excludes to terminate;Problem is such as occurred without, then illustrates this Layer substantially excludes, and can carry out next layer of investigation;
For system layer, according to self-aided terminal final system environmental requirement, first its relevant kernel drive of emphasis addition from high to low The suspicious items such as dynamic file, group policy, service and its registration table, such as go wrong, you can illustrate some suspicious item to cause problem Real suspicious item, then carry out refinement and enter next circulation excluding, exclude to finish until adding minimum subitem, which confirms most Small subitem is relevant with problem, now excludes to terminate;Problem is such as occurred without, continues to add Windows associated components and its registration table Etc. non-suspicious item, such as go wrong, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then carries out refinement entrance Next circulation excludes, and excludes to finish until adding minimum subitem, such as still occurs without problem, then illustrate that this layer substantially excludes, Next layer of investigation can be carried out;
For application layer, according to self-aided terminal final system environmental requirement, first emphasis adds ATM operation systems from high to low Suspicious item, then add ATM operation systems non-suspicious item, afterwards add the non-ATM operation systems of third party suspicious item, most The non-suspicious item for adding the non-ATM operation systems of third party afterwards is investigated item by item:I) ATMC, SP from ATM operation systems, centre The suspicious item such as part starts one by one, and such as addition wherein some subitem carries out automatic test and gone wrong, you can illustrates some subitem To cause the real suspicious item of problem, then exclude to terminate;Problem is such as occurred without, continues to be superimposed ATM operation system initial decisions The non-suspicious items such as monitoring, distribution, such as addition wherein some subitem carry out automatic test and gone wrong, you can illustrate some subitem To cause the real suspicious item of problem, then exclude to terminate;II problem) is such as occurred without, continues to add the non-ATM operation systems of third party Anti-Virus, fail-safe software, the suspicious item such as desktop management and control software, such as addition wherein some subitem carries out automatic test and goes out Existing problem, you can it is the real suspicious item for causing problem to illustrate some subitem, then excludes to terminate;Problem is such as occurred without, continues to add Add the non-suspicious items such as the setting instrument of the non-ATM operation systems of third party, such as addition wherein some subitem carries out automatic test and gone out Existing problem, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then excludes to terminate.
Preferably, the degression type that the basis is pre-set is excluded and incrementally investigation is obtained existing for the self-aided terminal Problem, including:
On the basis of presently described self-aided terminal normal operation, by least one suspicious item of every layer of every class resource or Whether problematic continue to detect the self-aided terminal operation after at least one non-suspicious item increase of person;
If detecting, the self-aided terminal operation is problematic, at least one suspicious item or described at least one Non- suspicious item is excluded one by one according to the order of priority from high to low.
Specifically, composite decline formula and incrementally investigate, some subitem of positive de-authentication be the problem that most likely results in can Item is doubted, now then completes self-service terminal system detection process.
The embodiment of the present invention to self-service terminal system according to running environment by being layered, the running environment bag after layering Include application layer, system layer and hardware layer;Every layer of resource of the self-service terminal system is classified according to business demand;It will divide The problem of every class resource after class exists according to the self-aided terminal is divided into suspicious item and non-suspicious item;According to what is pre-set Degression type excludes and/or incrementally investigation obtains the problem of self-aided terminal is present, and the degression type excludes to be used for according to pre- The exclusion order first set obtains the problem of self-aided terminal is present, described incrementally to investigate for according to the row pre-set Look into order and investigate the problem of self-aided terminal is present, so as to which self-service terminal system be modeled, this model is decomposed, by Layer refinement, and a set of analysis process is formulated, carry out degression type exclusion with reference to flow and incrementally investigate, system of being so more convenient for Property, procedure analysis self-service terminal system problem, improve precision of analysis.
Embodiment two
With reference to figure 2, Fig. 2 is the high-level schematic functional block diagram for the device that the embodiment of the present invention obtains self-service terminal problem.
In embodiment two, the device for obtaining self-service terminal problem includes:
Hierarchical block 201, for being layered to self-service terminal system according to running environment, the running environment bag after layering Include application layer, system layer and hardware layer;
Specifically, when similar deadlock, blue screen, blank screen phenomenon occur for self-service terminal system, first using self-service terminal system as One entirety, divide self-service terminal system to three layers, i.e. application layer, system layer, hardware layer according still further to running environment.
Sort module 202, for being classified to every layer of resource of the self-service terminal system according to business demand;
Preferably, with reference to figure 3, Fig. 3 is the high-level schematic functional block diagram of sort module of the embodiment of the present invention.
The sort module 202, including:
First taxon 301, for the resource of the application layer to be categorized as into ATM service class systems according to business demand With non-ATM service class system;
Second taxon 302, for the resource of the hardware layer to be categorized as into atm module class and work according to business demand Control machine module class;
3rd taxon 303, for the resource of the system layer to be categorized as into the main kernel of system according to business demand File, group policy, system associated component, system mend, the system other configurations for servicing, paying close attention to and the registration paid close attention to Table.
Specifically, further, the application layer, system layer, hardware layer of self-service terminal system division are finely divided by business:
Application layer is divided into ATM operation systems and third party's operation system by business, and ATM operation systems be divided into ATMC, The systems such as SP, middleware, monitoring, distribution, third party system be divided into Anti-Virus, security control software, desktop management and control software, Other non-ATM classes operation systems such as setting instrument;
Hardware layer is divided into ATM business modules and industrial computer module, and ATM business modules are primarily upon strip, flowing water, touch The modules such as screen, movement, card reader and its associated drives, and industrial computer module be primarily upon mainboard, hard disk, internal memory, video card, CPU, The equipment such as sound card, network interface card and its associated drives;
System layer is primarily upon group policy, service, registration table, Windows associated components, kernel-driven file etc..
Division module 203, for being divided into suspicious item and non-suspicious item according to problematic phenomenon per class resource by sorted;
Preferably, with reference to figure 4, Fig. 4 is the high-level schematic functional block diagram of division module of the embodiment of the present invention.
The division module 203, including:
First division unit 401, for sorted ATM service class system to be divided into suspicious item ATMC softwares, ATM Between part and SP softwares;
Second division unit 402, for sorted ATM service class system to be divided into non-suspicious item ATM remote distributions Software, ATM monitoring softwares, ATM log analysis tools and ATM testing tools;
3rd division unit 403, for by sorted non-ATM service class system be divided into suspicious item Anti-Virus, Security control software and desktop management and control software;
4th division unit 404, for by sorted non-ATM service class system be divided into non-suspicious item encryption software, Compressed software and ftp software;
5th division unit 405, for sorted atm module class to be divided into suspicious item movement and its driving, Card Reader Device and its driving and flowing water printer and its driving;
6th division unit 406, for sorted atm module class to be divided into non-suspicious item strip printer and its drive Dynamic and touch-screen and its driving;
7th division unit 407, for sorted industrial computer module class to be divided into suspicious item mainboard and its driving, interior Deposit and its drive, hard disk and its driving, video card and its driving and CPU and its driving;
8th division unit 408, for sorted industrial computer module class to be divided into non-suspicious item network interface card and its driving With sound card and its driving;
9th division unit 409, for sorted system associated component to be divided into suspicious item IE components, Activex Control and Flash controls;
Tenth division unit 410, for sorted system associated component to be divided into non-suspicious item system font component With system language pack assembly;
11st division unit 411, update patch for sorted system mend to be divided into suspicious item system component;
12nd division unit 412, mended for sorted system mend to be divided into non-suspicious item system security update Fourth;
13rd division unit 413, for the sorted system other configurations paid close attention to be divided into suspicious Xiang Chao Thread and multi-core technology, Direct3D acceleration techniques, USB power source aspect and power supply option;
14th division unit 414, for the sorted registration table paid close attention to be divided into HKEY_LOCAL_MA CHINE\SYSTEM\CurrentControlSet、HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT and HKEY_CURRENT_USER Control Panel.
Specifically, according to self-service terminal system problematic phenomenon, it is preliminary to judge that subclass provides in every layer of resource of self-service terminal system Source may be relevant with problem, and which subitem is the suspicious items of suspicious Xiang Yufei in every layer of resource of summarizing, and just fixed by suspicious item By ranking score, (following standard is required to be remodified according to particular problem phenomenon and drafted, with deadlock, blue screen, blank screen from high to low Phenomena such as account for):
Application layer:ATMC, SP of ATM operation systems, middleware tentatively judgement are classified as suspicious item from high in the end, and monitor, Distribution is temporarily classified as non-suspicious item;Third party system tentatively judges Anti-Virus, fail-safe software, desktop management and control software from height Suspicious item is classified as to low, and other non-ATM classes operation systems such as setting instrument are temporarily classified as non-suspicious item;
Hardware layer:In ATM business modules movement, card reader, flowing water module and its associated drives can tentatively judge from height to It is low to be classified as suspicious item, and the module such as strip, touch-screen and its associated drives are temporarily classified as non-suspicious item, and it is mainboard in industrial computer, hard Disk, internal memory, video card module and its associated drives tentatively judge to be classified as suspicious item from high to low, and CPU, network interface card, sound card are temporarily classified as Non- suspicious item;
System layer:The tentatively judgement such as kernel-driven file, group policy, service and its registration table is classified as suspicious from high to low , Windows associated components and its registration table etc. are temporarily classified as non-suspicious item.
Acquisition module 204, the self-service end is obtained for excluding according to the degression type pre-set and/or incrementally investigating The problem of end is present, the degression type are excluded for excluding to ask existing for the self-aided terminal according to the exclusion order pre-set Topic, described the problem of incrementally investigating for being existed according to the investigation self-aided terminal pre-set.
Preferably, with reference to figure 5, Fig. 5 is the high-level schematic functional block diagram of acquisition module of the embodiment of the present invention.
The acquisition module 204, including:
First rejected unit 501, for by the priority of the suspicious item of every layer of every class resource or non-suspicious item from height The problem of self-aided terminal is present is excluded one by one to low order;Or
Second rejected unit 502, in integrally at least one suspicious item of every class resource of every layer of exclusion or at least In the case of one non-suspicious item, if detecting, self-aided terminal operation is problematic, to described in currently integrally excluding extremely A few suspicious item or at least one non-suspicious item are excluded one by one according to the order of priority from high to low.
Specifically, in self-aided terminal problem system, in every layer of resource since high suspicious item is to low suspicious item one by one Exclude, such as carry out automatic test on this basis and no longer go wrong, then exclusion process terminates, and can confirm which subitem is Real suspicious item;Still gone wrong as carried out automatic test on this basis, continue to exclude other non-suspicious items, successively Misarrangement is peeled off, constantly reduces analyst coverage, untill automatic test no longer goes wrong after confirming some subitem of rejecting, this When can confirm to cause problem really suspicious item, misarrangement process completes that (procedure below is required to enter according to particular problem phenomenon Row replacing order is investigated, and is accounted for phenomena such as deadlock, blue screen, blank screen):
For application layer, first emphasis excludes the suspicious item of ATM operation systems from high to low, then excludes ATM operation systems Non- suspicious item, exclude the suspicious item of the non-ATM operation systems of third party afterwards, finally exclude third party non-ATM operation systems Non- suspicious item:I) the suspicious item such as ATMC, SP since ATM operation systems, middleware one by one, such as remove wherein some subitem and enter Row automatic test no longer goes wrong, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then excludes to terminate; As still gone wrong, continue to confirm the non-suspicious items such as monitoring, the distribution of ATM operation system initial decisions, such as remove wherein some Subitem carries out automatic test and no longer gone wrong, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then arranges Except end;II) as still gone wrong, continue to investigate Anti-Virus, fail-safe software, the desktop of the non-ATM operation systems of third party The suspicious item such as management and control software, such as remove wherein some subitem progress automatic test and no longer go wrong, you can illustrate that some can Doubtful item is the real suspicious item for causing problem, then excludes to terminate;As still gone wrong, continue to investigate the non-ATM business system of third party The non-suspicious item such as the setting instrument of system, such as remove wherein some subitem progress automatic test and no longer go wrong, you can explanation Some suspicious item is the real suspicious item for causing problem, then excludes to terminate, such as still go wrong, then illustrate that this layer is substantially arranged Remove, next layer of investigation can be carried out;
For hardware layer, first emphasis excludes the suspicious item of atm module from high to low, then excludes the non-suspicious of atm module Item, the suspicious item of industrial computer module, the non-suspicious item of last industrial computer module are excluded afterwards:I) movement from atm module, Card Reader The suspicious items such as device, flowing water module and its associated drives start one by one, such as remove wherein some subitem and carry out automatic test no longer Go wrong, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then excludes to terminate;As still gone wrong, after The non-suspicious items such as module and its associated drives such as the continuous strip for confirming ATM operation system initial decisions, touch-screen, such as remove wherein Some subitem carries out automatic test and no longer gone wrong, you can and it is the real suspicious item for causing problem to illustrate some suspicious item, Then exclude to terminate;II) as still gone wrong, continue to investigate mainboard in third party's industrial computer, hard disk, internal memory, video card module and its The suspicious item such as associated drives, such as remove wherein some subitem progress automatic test and no longer go wrong, you can illustrate that some can Doubtful item is the real suspicious item for causing problem, then excludes to terminate;As still gone wrong, it is non-to continue investigation CPU, network interface card, sound card etc. Suspicious item, such as remove wherein some subitem progress automatic test and no longer go wrong, you can illustrate some suspicious item to cause The real suspicious item of problem, then exclude to terminate, such as still go wrong, then illustrate that this layer substantially excludes, next layer can be carried out Investigation;
For system layer, first emphasis exclusion kernel-driven file, group policy, service and its registration table etc. are suspicious from high to low , such as no longer go wrong, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then refine into next Individual circulation excludes, and is finished until minimizing exclusion, confirms which minimum subitem is relevant with problem, now excludes to terminate;As still gone out Existing problem, continue to investigate the non-suspicious item such as Windows associated components and its registration table, such as no longer go wrong, you can illustrate certain Individual suspicious item is the real suspicious item for causing problem, then carries out refinement and enter next circulation exclusion, has been excluded until minimizing Finish.
Preferably, with reference to figure 6, Fig. 6 is another high-level schematic functional block diagram of acquisition module of the embodiment of the present invention.The acquisition Module 204, including:
First detection unit 601, on the basis of presently described self-aided terminal normal operation, every layer of every class to be provided The order of the priority of the suspicious item in source or non-suspicious item from high to low continues to detect the self-aided terminal fortune after one by one increasing Whether row is problematic;
Determining unit 602, if for detecting that the self-aided terminal operation is problematic, it is determined that the increased suspicious item Or the non-suspicious item is the problem of self-aided terminal is present.
Specifically, in self-aided terminal initial system, according to self-aided terminal business, first driven from hardware layer to system layer, Application layer is arrived again, will one by one be increased since high suspicious item is to low suspicious item in every layer of resource, is such as carried out on this basis automatic Change test to go wrong, then additive process terminates, and can confirm which subitem is to cause problem really suspicious item;Such as in this base Automatic test is carried out on plinth and still occurs without problem, continues to add other non-suspicious items, is successively superimposed misarrangement, constantly reduces and divides Scope is analysed, untill automatic test goes wrong after confirming some subitem of addition, can now confirm to cause problem real Suspicious item, misarrangement process complete (procedure below be required to according to particular problem phenomenon carry out replacing order investigate, with crash, Phenomena such as blue screen, blank screen, accounts for):
For hardware layer, according to self-aided terminal final system environmental requirement, first emphasis adds industrial computer module from high to low Suspicious item, then add industrial computer module non-suspicious item, afterwards add atm module suspicious item, finally add atm module Non- suspicious item investigated item by item:I) mainboard, hard disk, internal memory, video card module and its associated drives from third party's industrial computer Etc. suspicious item, such as addition wherein some subitem carries out automatic test and gone wrong, you can illustrates some suspicious item to cause to ask The real suspicious item of topic, then exclude to terminate;Problem is such as occurred without, continues to investigate the non-suspicious items such as CPU, network interface card, sound card, such as adds Wherein some subitem progress automatic test goes wrong, you can and it is the real suspicious item for causing problem to illustrate some suspicious item, Then exclude to terminate;II problem) is such as occurred without, continues the movement from atm module, card reader, flowing water module and its associated drives etc. Suspicious item starts one by one, and such as addition wherein some subitem carries out automatic test and gone wrong, you can illustrates that some suspicious item is Cause the real suspicious item of problem, then exclude to terminate;Such as occur without problem, continue confirm ATM operation system initial decisions with The non-suspicious item such as the modules such as bar, touch-screen and its associated drives, such as addition wherein some subitem carry out automatic test and asked Topic, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then excludes to terminate;Problem is such as occurred without, then illustrates this Layer substantially excludes, and can carry out next layer of investigation;
For system layer, according to self-aided terminal final system environmental requirement, first its relevant kernel drive of emphasis addition from high to low The suspicious items such as dynamic file, group policy, service and its registration table, such as go wrong, you can illustrate some suspicious item to cause problem Real suspicious item, then carry out refinement and enter next circulation excluding, exclude to finish until adding minimum subitem, which confirms most Small subitem is relevant with problem, now excludes to terminate;Problem is such as occurred without, continues to add Windows associated components and its registration table Etc. non-suspicious item, such as go wrong, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then carries out refinement entrance Next circulation excludes, and excludes to finish until adding minimum subitem, such as still occurs without problem, then illustrate that this layer substantially excludes, Next layer of investigation can be carried out;
For application layer, according to self-aided terminal final system environmental requirement, first emphasis adds ATM operation systems from high to low Suspicious item, then add ATM operation systems non-suspicious item, afterwards add the non-ATM operation systems of third party suspicious item, most The non-suspicious item for adding the non-ATM operation systems of third party afterwards is investigated item by item:I) ATMC, SP from ATM operation systems, centre The suspicious item such as part starts one by one, and such as addition wherein some subitem carries out automatic test and gone wrong, you can illustrates some subitem To cause the real suspicious item of problem, then exclude to terminate;Problem is such as occurred without, continues to be superimposed ATM operation system initial decisions The non-suspicious items such as monitoring, distribution, such as addition wherein some subitem carry out automatic test and gone wrong, you can illustrate some subitem To cause the real suspicious item of problem, then exclude to terminate;II problem) is such as occurred without, continues to add the non-ATM operation systems of third party Anti-Virus, fail-safe software, the suspicious item such as desktop management and control software, such as addition wherein some subitem carries out automatic test and goes out Existing problem, you can it is the real suspicious item for causing problem to illustrate some subitem, then excludes to terminate;Problem is such as occurred without, continues to add Add the non-suspicious items such as the setting instrument of the non-ATM operation systems of third party, such as addition wherein some subitem carries out automatic test and gone out Existing problem, you can it is the real suspicious item for causing problem to illustrate some suspicious item, then excludes to terminate.
Preferably, with reference to figure 7, Fig. 7 is another high-level schematic functional block diagram of acquisition module of the embodiment of the present invention.The acquisition Module 204, including:
Second detection unit 701, on the basis of presently described self-aided terminal normal operation, every layer of every class to be provided Continue to detect whether the self-aided terminal operation asks after at least one suspicious item in source or at least one non-suspicious item increase Topic;
3rd rejected unit 702, if for detecting that self-aided terminal operation is problematic, to it is described it is at least one can Doubt item or at least one non-suspicious item is excluded one by one according to the order of priority from high to low.
Specifically, composite decline formula and incrementally investigate, some subitem of positive de-authentication be the problem that most likely results in can Item is doubted, now then completes self-service terminal system detection process.
The embodiment of the present invention to self-service terminal system according to running environment by being layered, the running environment bag after layering Include application layer, system layer and hardware layer;Every layer of resource of the self-service terminal system is classified according to business demand;It will divide The problem of every class resource after class exists according to the self-aided terminal is divided into suspicious item and non-suspicious item;According to what is pre-set Degression type excludes and/or incrementally investigation obtains the problem of self-aided terminal is present, and the degression type excludes to be used for according to pre- The exclusion order first set obtains the problem of self-aided terminal is present, described incrementally to investigate for according to the row pre-set Look into order and investigate the problem of self-aided terminal is present, so as to which self-service terminal system be modeled, this model is decomposed, by Layer refinement, and a set of analysis process is formulated, carry out degression type exclusion with reference to flow and incrementally investigate, system of being so more convenient for Property, procedure analysis self-service terminal system problem, improve precision of analysis.
The technical principle of the embodiment of the present invention is described above in association with specific embodiment.These descriptions are intended merely to explain this The principle of inventive embodiments, and the limitation to protection domain of the embodiment of the present invention can not be construed in any way.Based on herein Explanation, those skilled in the art, which would not require any inventive effort, can associate the other specific of the embodiment of the present invention Embodiment, these modes are fallen within the protection domain of the embodiment of the present invention.

Claims (10)

  1. A kind of 1. method for obtaining self-service terminal problem, it is characterised in that methods described includes:
    Self-service terminal system is layered according to running environment, the running environment after layering includes application layer, system layer and hard Part layer;
    Every layer of resource of the self-service terminal system is classified according to business demand;
    Sorted the problem of being existed per class resource according to the self-aided terminal, is divided into suspicious item and non-suspicious item;
    Excluded according to the degression type pre-set and/or incrementally investigation obtains the problem of self-aided terminal is present, it is described to pass Subtract formula to exclude for obtaining the problem of self-aided terminal is present according to the exclusion order pre-set, wherein, it is every by every layer The order of the priority of the suspicious item of class resource or non-suspicious item from high to low excludes to ask existing for the self-aided terminal one by one Topic;Or
    In the case where integrally excluding every layer of at least one suspicious item of every class resource or at least one non-suspicious item, if inspection It is problematic to measure the self-aided terminal operation, then at least one suspicious item currently integrally excluded or described at least one Individual non-suspicious item is excluded one by one according to the order of priority from high to low, and described incrementally investigate pre-sets for basis Investigation order investigate the problem of self-aided terminal is present.
  2. 2. according to the method for claim 1, it is characterised in that every layer of resource to the self-service terminal system according to Business demand is classified, including:
    The resource of the application layer is categorized as ATM service class system and non-ATM service class system according to business demand;
    The resource of the hardware layer is categorized as atm module class and industrial computer module class according to business demand;
    By the resource of the system layer according to business demand be categorized as the main kernel file of system, group policy, system associated component, System mend, the system other configurations for servicing, paying close attention to and the registration table paid close attention to.
  3. 3. according to the method for claim 2, it is characterised in that it is described will it is sorted often class resource according to the self-service end The problem of end is present is divided into suspicious item and non-suspicious item, including:
    Sorted ATM service class system is divided into suspicious item ATMC softwares, ATM middlewares and SP softwares;
    Sorted ATM service class system is divided into non-suspicious item ATM remote distributions software, ATM monitoring softwares, ATM daily records Analysis tool and ATM testing tools;
    It is soft that sorted non-ATM service class system is divided into suspicious item Anti-Virus, security control software and desktop management and control Part;
    Sorted non-ATM service class system is divided into non-suspicious item encryption software, compressed software and ftp software;
    It is described that sorted the problem of being existed per class resource according to the self-aided terminal is divided into suspicious item and non-suspicious item, wrap Include:
    By sorted atm module class be divided into suspicious item movement and its driving, card reader and its driving and flowing water printer and It drives;
    Sorted atm module class is divided into non-suspicious item strip printer and its driving and touch-screen and its driving;
    By sorted industrial computer module class be divided into suspicious item mainboard and its driving, internal memory and its driving, hard disk and its driving, Video card and its driving and CPU and its driving;
    Sorted industrial computer module class is divided into non-suspicious item network interface card and its driving and sound card and its driving;
    It is described that sorted the problem of being existed per class resource according to the self-aided terminal is divided into suspicious item and non-suspicious item, wrap Include:
    Sorted system associated component is divided into suspicious item IE components, activex control and Flash controls;
    Sorted system associated component is divided into non-suspicious item system font component and system language pack assembly;
    Sorted system mend is divided into suspicious item system component renewal patch;
    Sorted system mend is divided into non-suspicious item system security update patch;
    The sorted system other configurations paid close attention to are divided into suspicious item hyperthread and multi-core technology, Direct3D accelerate Technology, USB power source aspect and power supply option;
    By the sorted registration table paid close attention to be divided into HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet, HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows NT and HKEY_ CURRENT_USER\Control Panel。
  4. 4. according to the method for claim 1, it is characterised in that described in the incrementally investigation that the basis is pre-set obtains The problem of self-aided terminal is present, including:
    On the basis of presently described self-aided terminal normal operation, by the suspicious item of every layer of every class resource or non-suspicious item Whether the order of priority from high to low continues to detect the self-aided terminal operation after one by one increasing problematic;
    If detecting, self-aided terminal operation is problematic, the increased suspicious item or the non-suspicious item for it is described from The problem of helping terminal to exist.
  5. 5. according to the method for claim 1, it is characterised in that degression type that the basis is pre-set excludes and incrementally Investigation obtains the problem of self-aided terminal is present, including:
    On the basis of presently described self-aided terminal normal operation, by least one suspicious item of every layer of every class resource or extremely Whether problematic continue to detect the self-aided terminal operation after a few non-suspicious item increase;
    If detecting, self-aided terminal operation is problematic, at least one suspicious item or it is described it is at least one it is non-can Item is doubted to be excluded one by one according to the order of priority from high to low.
  6. 6. a kind of device for obtaining self-service terminal problem, it is characterised in that described device includes:
    Hierarchical block, for being layered to self-service terminal system according to running environment, the running environment after layering includes application Layer, system layer and hardware layer;
    Sort module, for being classified to every layer of resource of the self-service terminal system according to business demand;
    Division module, for being divided into suspicious item and non-suspicious item according to problematic phenomenon per class resource by sorted;
    Acquisition module, the self-aided terminal presence is obtained for excluding according to the degression type pre-set and/or incrementally investigating The problem of, the degression type is excluded for excluding the problem of self-aided terminal is present according to the exclusion order pre-set, its In, acquisition module includes:
    First rejected unit, for by the priority of the suspicious item of every layer of every class resource or non-suspicious item from high to low suitable Sequence excludes the problem of self-aided terminal is present one by one;Or
    Second rejected unit, for integrally exclude every layer every class resource at least one suspicious item or it is at least one it is non-can In the case of doubting item, if detecting, self-aided terminal operation is problematic, to currently integrally exclude it is described it is at least one can Doubt item or at least one non-suspicious item is excluded one by one according to the order of priority from high to low;
    Described the problem of incrementally investigating for being existed according to the investigation self-aided terminal pre-set.
  7. 7. device according to claim 6, it is characterised in that the sort module, including:
    First taxon, for the resource of the application layer to be categorized as into ATM service class system and non-ATM according to business demand Service class system;
    Second taxon, for the resource of the hardware layer to be categorized as into atm module class and industrial computer mould according to business demand Block class;
    3rd taxon, for the resource of the system layer to be categorized as into the main kernel file of system, group according to business demand Strategy, system associated component, system mend, the system other configurations for servicing, paying close attention to and the registration table paid close attention to.
  8. 8. device according to claim 6, it is characterised in that the division module, including:
    First division unit, for by sorted ATM service class system be divided into suspicious item ATMC softwares, ATM middlewares and SP softwares;
    Second division unit, for sorted ATM service class system to be divided into non-suspicious item ATM remote distributions software, ATM Monitoring software, ATM log analysis tools and ATM testing tools;
    3rd division unit, for sorted non-ATM service class system to be divided into suspicious item Anti-Virus, security control Software and desktop management and control software;
    4th division unit, for sorted non-ATM service class system to be divided into non-suspicious item encryption software, compressed software And ftp software;
    5th division unit, for sorted atm module class to be divided into suspicious item movement and its driving, card reader and its drive Dynamic and flowing water printer and its driving;
    6th division unit, for sorted atm module class to be divided into non-suspicious item strip printer and its driving and touched Touch screen and its driving;
    7th division unit, for by sorted industrial computer module class be divided into suspicious item mainboard and its driving, internal memory and its Driving, hard disk and its driving, video card and its driving and CPU and its driving;
    8th division unit, for by sorted industrial computer module class be divided into non-suspicious item network interface card and its driving and sound card and It drives;
    9th division unit, for by sorted system associated component be divided into suspicious item IE components, activex control and Flash controls;
    Tenth division unit, for sorted system associated component to be divided into non-suspicious item system font component and system language Say pack assembly;
    11st division unit, update patch for sorted system mend to be divided into suspicious item system component;
    12nd division unit, for sorted system mend to be divided into non-suspicious item system security update patch;
    13rd division unit, for the sorted system other configurations paid close attention to be divided into suspicious item hyperthread and more Nuclear technology, Direct3D acceleration techniques, USB power source aspect and power supply option;
    14th division unit, for by the sorted registration table paid close attention to be divided into HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet, HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows NT and HKEY_CURRENT_USER\Control Panel。
  9. 9. device according to claim 6, it is characterised in that the acquisition module, including:
    First detection unit, on the basis of presently described self-aided terminal normal operation, by every layer of every class resource can The order of the priority of doubtful item or non-suspicious item from high to low continues whether to detect the self-aided terminal operation after one by one increasing It is problematic;
    Determining unit, if for detecting that the self-aided terminal operation is problematic, it is determined that the increased suspicious item or institute State the problem of non-suspicious item exists for the self-aided terminal.
  10. 10. device according to claim 6, it is characterised in that the acquisition module, including:
    Second detection unit, on the basis of presently described self-aided terminal normal operation, by every layer of every class resource extremely Whether problematic continue to detect the self-aided terminal operation after a few suspicious item or at least one non-suspicious item increase;
    3rd rejected unit, if for detecting that self-aided terminal operation is problematic, at least one suspicious item or At least one non-suspicious item is excluded one by one according to the order of priority from high to low described in person.
CN201510701221.6A 2015-10-26 2015-10-26 A kind of method and device for obtaining self-service terminal problem Active CN105405219B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510701221.6A CN105405219B (en) 2015-10-26 2015-10-26 A kind of method and device for obtaining self-service terminal problem

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510701221.6A CN105405219B (en) 2015-10-26 2015-10-26 A kind of method and device for obtaining self-service terminal problem

Publications (2)

Publication Number Publication Date
CN105405219A CN105405219A (en) 2016-03-16
CN105405219B true CN105405219B (en) 2018-03-02

Family

ID=55470683

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510701221.6A Active CN105405219B (en) 2015-10-26 2015-10-26 A kind of method and device for obtaining self-service terminal problem

Country Status (1)

Country Link
CN (1) CN105405219B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056216A (en) * 2006-04-10 2007-10-17 华为技术有限公司 A test system and test method
CN101833621A (en) * 2010-04-27 2010-09-15 广州广电运通金融电子股份有限公司 Terminal safety audit method and system
US8317087B1 (en) * 2007-03-27 2012-11-27 Diebold Self-Service Systems Automated banking system controlled responsive to data bearing records
CN104216825A (en) * 2013-06-04 2014-12-17 北京神州泰岳软件股份有限公司 Problem locating method and system
CN104796270A (en) * 2014-01-16 2015-07-22 国际商业机器公司 Method and device for recommending suspicious components during problem diagnosis of cloud application

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8245076B2 (en) * 2008-12-23 2012-08-14 Ncr Corporation Method and apparatus for initiating corrective action for an electronic terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056216A (en) * 2006-04-10 2007-10-17 华为技术有限公司 A test system and test method
US8317087B1 (en) * 2007-03-27 2012-11-27 Diebold Self-Service Systems Automated banking system controlled responsive to data bearing records
CN101833621A (en) * 2010-04-27 2010-09-15 广州广电运通金融电子股份有限公司 Terminal safety audit method and system
CN104216825A (en) * 2013-06-04 2014-12-17 北京神州泰岳软件股份有限公司 Problem locating method and system
CN104796270A (en) * 2014-01-16 2015-07-22 国际商业机器公司 Method and device for recommending suspicious components during problem diagnosis of cloud application

Also Published As

Publication number Publication date
CN105405219A (en) 2016-03-16

Similar Documents

Publication Publication Date Title
US9448908B2 (en) System and method for model based session management
KR101802876B1 (en) Multi-character continuous handwriting input method
CN105989268A (en) Safety access method and system for human-computer identification
Kalinowski et al. Evidence-based guidelines to defect causal analysis
CN104794050A (en) Application program test method, device and system
CN113596844A (en) Early warning method, device, medium and electronic equipment based on data information
CN107193747B (en) Code testing method and device and computer equipment
CN105405218B (en) A kind of method and device for obtaining self-service terminal problem
CN105354944B (en) A kind of method and device for dividing self-service terminal problem
CN105405219B (en) A kind of method and device for obtaining self-service terminal problem
CN108885750A (en) Emerging defect and safety monitoring system
CN108235761A (en) The method and device of automatic detection control
Silva et al. Towards making safety-critical systems safer: learning from mistakes
Malakoutikhah et al. The prevalence of unsafe behaviors in Iranian workers: a systematic review and meta-analysis
CN105184581A (en) Intelligent production quality detection tracing method and system based on Internet of things
Power et al. Comparing the comprehensiveness of three expert inspection methodologies for detecting errors in interactive systems
CN105740830B (en) Electronic signature identification method based on verifying means
Uddin et al. Construction hazard recognition: a smart literature review
Heinbach et al. Visual partial inspection of fire safety equipment using machine learning
Szewieczek et al. Methodology of the quality management in the productive process
Kubenke et al. Assessing the efficiency of information retrieval from the digital shadow at the shop floor using it assistive systems
CN101968768B (en) Defect-based software security test requirement acquisition and classification method
Winkler et al. Investigating the effect of expert ranking of use cases for design inspection
CN111475811A (en) User input privacy detection method for Android application dynamic generation control
KR102155860B1 (en) Method and apparatus for monitoring inspector based on cause of return

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180423

Address after: 210002 Jiangsu, Nanjing City, Jiangsu Province, Yuhuatai District, Ande Gate Street, No. 50, East China Development and operation center, A seat 12

Patentee after: Nanjing Yihua Information Technology Co., Ltd.

Address before: 518038, Shenzhen, Nanshan District, Houhai Avenue, No., Yi finance, science and technology building, building 30, building 2388

Co-patentee before: Shenzhen Yihua Time Technology Co., Ltd.

Patentee before: Shenzhen Yihua Computer Co., Ltd.

Co-patentee before: Shenzhen Yihua Financial Intelligent Research Institute