A kind of enchashment control method of ATM
The present invention is application number: 2014105942589, the applying date: 2014-10-29, invention
Title: the divisional application of the enchashment control method of a kind of ATM.
Technical field
The present invention relates to ATM technical field, be specifically related to a kind of ATM
Enchashment control method.
Background technology
ATM is as the service terminal of bank, it is not necessary to manpower intervention, greatly facilitates people
Daily life, but just because of prosthetic is on duty, this also causes ATM to become illegal repeatedly
The crime target of molecule, ATM safety problem in use annoyings vast holding always
User, problem mainly goes out in identity and password authentification link, common problem such as:
Lawless person installs robber's code device on keyboard.There is a kind of code device of stealing can be attached to bank at present
On the button of ATM, the password that client presses can be automatically recorded.When holder is by step
Input password, screen but shows ' this card is by bank's keeping ', and operation afterwards cannot proceed,
The password that remittee inputs can directly be launched by false keyboard circuit board behind.
Lawless person utilizes false card slot crime.False ATM socket is fixed on former by lawless person
Coming the position of true socket, after bank card is inserted false socket by holder, false card slot is internal to be arranged
Read-write equipment reproducible card on full detail.
Lawless person hides pick-up lens at advertising portfolio etc..There is advertising portfolio etc. on some ATM sides
Thing, wherein can a microcam, by video camera by the money on keyboard and fluorescent screen by intrinsic energy
News are taken, and pass to outside 200 meters.
Lawless person installs secret camera head on ATM, steals holder's bank card password;
Pick up the strip of withdrawing the money abandoned after holder withdraws the money simultaneously and obtain holder's card number, recycling electricity
Card number is write on another magnetic card by brain, read-write magnetic card machine, uses after adulterium bank card.
Lawless person uses has the keyboard of memory function or the material of similar plastics thin film to cover
On ATM keyboard, steal holder's bank card password, and utilization gulps down card device and obtains holder
Bank card.
Summary of the invention
(1) to solve the technical problem that
Technical problem solved by the invention is to provide a kind of more safe and reliable ATM
Enchashment control method.
(2) technical scheme
For solving above-mentioned technical problem, the invention provides the enchashment controlling party of a kind of ATM
Method, described ATM has a central controller, and the people being connected with this central controller
Machine interactive device, described ATM also stores the user preset information of user, described user
Presupposed information includes ID and corresponding computations formula, described method include as
Lower step:
(1) user inputs ID to be verified by described human-computer interaction device;
(2) user inputs the amount of cash needing to extract on human-computer interaction interface;
(3) central controller transfers the computations formula corresponding with aforementioned ID to above-mentioned
Amount of cash calculates, it is thus achieved that encrypted result data;
(4) central controller triggers the checking data input screen of human-computer interaction device;
(5) user's input validation data;
(6) above-mentioned checking data are compared by central controller with encrypted result data, if
The two coincide, then by authentication, central controller is according to above-mentioned ID, cash gold
Volume sends automatic money output instruction to ATM, and otherwise central controller passes through human-computer interaction device
Report an error to user.
Wherein, the amount of cash in described step (2) is that a 4-digit number integer is constituted,
Representing kilobit, hundred, ten, individual position respectively, wherein, kilobit and hundred represent user at this
The actual bank note number that need to extract during secondary operation, ten and bit position are by user's stochastic inputs;
Described user preset information also includes that one has used amount of cash log, in above-mentioned steps
(6) in, after above-mentioned checking data and encrypted result data are compared by central controller,
If the two coincide, then before central controller continues step after execution, first make gold in cash
Inquiring about this amount of cash in volume log to be the most recorded, if not being recorded, then central authorities control
Device by this amount of cash record after described use in amount of cash log, after continuing executing with
Continuous step, if being recorded, central controller is reported an error to user by human-computer interaction device.
Wherein, the user preset information in described step (1) also includes: currently available cash
Quota data;In described step (6), send automatically to go out to ATM at central controller
Before paper money instruction, first by kilobit and the double figures of hundred compositions of the amount of cash in step (2)
Compare, if after the former is less than or equal to this current available cash amount after being multiplied by 100
Person, then central controller sends automatic money output instruction to ATM, and otherwise central controller leads to
Cross human-computer interaction device to report an error to user.
Wherein, the computation rule of described computations formula is by user preset.
(3) beneficial effect
During owing to withdrawing the money every time, with being first to input withdraw funds per family, then input validation code, and
Identifying code produces after being calculated withdraw funds by computations formula, it is to avoid exposure user
Bank card uniquely withdraw the money the risk of password;
When withdrawing the money, system compulsive requirement user inputs different withdraw funds, i.e. each every time
The withdraw funds that secondary action of withdrawing the money produces is all unique with identifying code, and is disposable, i.e.
Just this time withdraw the money action by lawless person stolen user input information, also it cannot be used for
Next time withdraws the money, and greatly ensure that the safety of bank card.
Computations formula can arrange different complexity voluntarily according to the custom of individual, and bank is only
Ensure computing formula have basic security ensure on the premise of, can give user bigger
Sexual behavior mode space, has the most also ensured the safety of bank card.
This method is without doing hardware modification to existing ATM device, it is only necessary to its backstage journey of upgrading
Sequence, is easy to dispose and implements.
Accompanying drawing explanation
Fig. 1 is this method operational flowchart.
Detailed description of the invention
Below in conjunction with the accompanying drawings and embodiment, the detailed description of the invention of the present invention is made the most in detail
Describe.Following example are used for illustrating the present invention, but are not limited to the scope of the present invention.
The enchashment control method of the ATM in the present embodiment, described ATM has in one
Centre controller, and the human-computer interaction device being connected with this central controller, described ATM
Also storage have the user preset information of user, described user preset information include ID and with
The computations formula of correspondence, described method comprises the steps:
(1) user inputs ID to be verified by described human-computer interaction device;
(2) user inputs the amount of cash needing to extract on human-computer interaction interface;
(3) central controller transfers the computations formula corresponding with aforementioned ID to above-mentioned
Amount of cash calculates, it is thus achieved that encrypted result data;
(4) central controller triggers the checking data input screen of human-computer interaction device;
(5) user's input validation data;
(6) above-mentioned checking data are compared by central controller with encrypted result data, if
The two coincide, then by authentication, central controller is according to above-mentioned ID, cash gold
Volume sends automatic money output instruction to ATM, and otherwise central controller passes through human-computer interaction device
Report an error to user.
Wherein, the amount of cash in described step (2) is that a 4-digit number integer is constituted,
Representing kilobit, hundred, ten, individual position respectively, wherein, kilobit and hundred represent user at this
The actual bank note number that need to extract during secondary operation, ten and bit position are by user's stochastic inputs;
Described user preset information also includes that one has used amount of cash log, in above-mentioned steps
(6) in, after above-mentioned checking data and encrypted result data are compared by central controller,
If the two coincide, then before central controller continues step after execution, first make gold in cash
Inquiring about this amount of cash in volume log to be the most recorded, if not being recorded, then central authorities control
Device by this amount of cash record after described use in amount of cash log, after continuing executing with
Continuous step, if being recorded, central controller is reported an error to user by human-computer interaction device.
Wherein, the user preset information in described step (1) also includes: currently available cash
Quota data;In described step (6), send automatically to go out to ATM at central controller
Before paper money instruction, first by kilobit and the double figures of hundred compositions of the amount of cash in step (2)
Compare, if after the former is less than or equal to this current available cash amount after being multiplied by 100
Person, then central controller sends automatic money output instruction to ATM, and otherwise central controller leads to
Cross human-computer interaction device to report an error to user.
Wherein, the computation rule of described computations formula is by user preset.
An actual process of withdrawing the money according to the method described above is as follows:
Herein, the computations formula preset is: withdraw funds is multiplied by 8+ withdraw funds-7,
Take the first six digits of result as identifying code, less than six, after zero padding.
Preset on bank card, have 2100 yuan of avails.
Pre-set user uses withdraw funds first.
User needs enchashment 500 yuan;
User inserts bank card (i.e. inputting ID to ATM), input withdraw funds:
532 (32 make random number by oneself for user), calculate according to above-mentioned encryption formula:
532*8+532-7=4781, less than six, zero padding obtains 478100, so correct checking
Code should be 478100.
User fetches lower input 478100, empirical tests, this identifying code be user's bank card first
Using, be verified, next proceed to checking, on subscriber card, available balance is more than 500 yuan,
After ATM neglects position and ten, according to the actual enchashment amount of money 500 yuan of user, from
Dynamic note output 5 (note output of current general ATM is defaulted as hundred yuan of paper money).
If user still wants to withdraw the money 500 yuan next time, other in addition to 532 of input 5 beginning
Any three bit digital, if the 3-dimensional digital code of 5 beginnings has been used light, can be by silver
Row sales counter resets formula and reactivates whole identifying code, does not affect user and uses.
If now, all operations process of user is all spied on acquisition, lawless person by lawless person
Replicate and obtain identical bank card, and during according to user's aforesaid operations process repetitive operation, in input
After 478100, i.e. can report an error because this identifying code has been used, it is impossible to succeed, and only with
Limited steals record, and lawless person is the computations formula being difficult to crack user, therefore
Ensure the safety of user's card.If the computing formula that user's design is more complicated, then bank
The safety coefficient of card also will be higher.