CN109493545B - Control method and terminal equipment - Google Patents
Control method and terminal equipment Download PDFInfo
- Publication number
- CN109493545B CN109493545B CN201910039601.6A CN201910039601A CN109493545B CN 109493545 B CN109493545 B CN 109493545B CN 201910039601 A CN201910039601 A CN 201910039601A CN 109493545 B CN109493545 B CN 109493545B
- Authority
- CN
- China
- Prior art keywords
- card
- time point
- user
- terminal equipment
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/207—Surveillance aspects at ATMs
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/209—Monitoring, auditing or diagnose of functioning of ATMs
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The application provides a control method and terminal equipment, which are applied to terminal equipment comprising a card reader and relate to the technical field of data exchange safety. And then can avoid first card to be used by illegal user in the in-process of carrying out the data transaction, and then safer.
Description
Technical Field
The present application relates to the technical field of data exchange security, and in particular, to a control method and a terminal device.
Background
Currently, a variety of self-service services can be performed on a self-service terminal device, for example, a business transaction can be performed on a bank self-service machine, and the business transaction includes: and operations of money taking, money saving, transfer and the like. When the operation is carried out, a user only needs to insert the bank card into the self-service terminal equipment of the bank and input the corresponding password of the bank card in the input area of the terminal equipment, and business transaction can be carried out on the bank card when the password of the bank card input by the user is correct. However, in this process, if a lawless person inserts another card into the card inlet of the card reader of the self-service terminal device and the operation is finished for the user, the user can take the card and leave the card; at this time, if the user mistakenly thinks that the operation is completed and takes away the card inserted by the illegal molecule to leave, the loss of property will be caused because the password of the own bank card is already input at this time and the bank card is still remained in the self-service terminal equipment of the bank.
Disclosure of Invention
The embodiment of the application provides a control method and a terminal device, which can alleviate a risk of data loss possibly existing in the operation by using the terminal device.
In order to alleviate the risk of data loss possibly existing in the operation by using the terminal equipment; the technical scheme adopted by the embodiment of the application is as follows:
in a first aspect, a control method provided in an embodiment of the present application is applied to a terminal device including a card reader, and the method includes:
when a first card exists in the card reader, monitoring whether a second card exists at a card inlet of the card reader or not, wherein the first card is used for data transaction;
and if the second card exists, monitoring the time point when the second card leaves the card inlet of the card reader, and performing first operation on the first card at the time point so as to enable the data corresponding to the first card to be in an unchangeable state.
In the embodiment of the application, when a user uses a first card to perform data transaction, whether a second card exists at a card inlet of a card reader is continuously detected, if the second card exists at the card inlet, and only when the second card is pulled out of the card inlet of the card reader, the terminal device performs a first operation on the first card, so that data corresponding to the first card is in an unchangeable state, and the user cannot continue data transaction through the first card. And then can avoid first card to be used by illegal user in the in-process of carrying out the data transaction, and then safer.
Optionally, performing a first operation on the first card at the time point, so that data corresponding to the first card is in an unchangeable state, includes:
and transmitting the first card to a card storage area in the terminal equipment at the time point so as to enable the data of the first card to be in an unchangeable state.
In the embodiment of the application, the first card is transmitted to the card storage area in the terminal equipment, so that the data of the first card is in an unchangeable state, the data of the first card is well protected, and the safety and the reliability of the first card in the using process are improved.
Optionally, after the first card is transmitted to the inside of the terminal device at the time point, the method further includes:
and the terminal equipment sends notification information representing that the first card is in a locking state to the mobile terminal equipment corresponding to the first card, wherein the mobile terminal equipment is different from the terminal equipment.
In this embodiment of the application, when the user takes the second card away and leaves the first card in the terminal device, since the notification information can be sent to the mobile terminal device corresponding to the first card, the user belonging to the first card is notified that the user belonging to the first card is locked, and the user belonging to the first card can perform appropriate processing on the first card in time, for example: loss reporting processing is achieved, and the practicability is higher.
Optionally, performing a first operation on the first card at the time point, so that data corresponding to the first card is in an unchangeable state, includes:
sending a password input prompt message of the first card to a user at the time point;
acquiring password information input by the user according to the password input prompt information;
judging whether the password information is correct or not;
and if the data is incorrect, transmitting the first card to the card storage area so as to enable the data of the first card to be in an unchangeable state.
In the embodiment of the application, when the second card leaves the card inlet, the password input prompt message is given to enable the user to input the corresponding password information, so that the user can continue to conduct data transaction on the first card. When the password information input by the user is incorrect, the first operation is carried out on the first card, so that the situation that the user inserts a second card into a card inlet of the card reader due to misoperation to further influence the use of the first card can be avoided.
Optionally, in transmitting the first card to the inside of the terminal device, so that the data of the first card is in an unchangeable state, the method further includes:
and opening a camera on the terminal equipment, acquiring the image information of the user and sending the image information to an alarm terminal.
In the embodiment of the application, the image information of the user can be acquired by arranging the camera, and then help can be provided for tracing the reason of the existence of the second card in the future, so that the safety in the card using process is further improved.
Optionally, after monitoring whether a second card exists at the card inlet of the card reader when a first card exists inside the card reader, and before performing a first operation on the first card at the time point, the method further includes:
if the second card exists at the card inlet of the card reader, opening a camera on the terminal equipment, and acquiring first image information of the user from the current time point to the time point and second image information of the time point;
judging whether the first image information and the second image information are consistent;
if not, executing the following steps: and performing a first operation on the first card at the time point so as to enable the data corresponding to the first card to be in an unchangeable state.
In the embodiment of the application, when the second card exists at the card inlet, the image information of the user is acquired, and when the image information of the user before the time point is found to be different from the image information of the user at the time point, it is proved that the user operating the first card changes, for example, the user to which the first card belongs may be changed into an illegal user, and at this time, from the viewpoint of ensuring the security, the first operation is performed on the first card, so that the data corresponding to the first card is in an unchangeable state, and the security is further improved.
Optionally, after performing a first operation on the first card at the time point to enable data corresponding to the first card to be in an unchangeable state, the method further includes:
and dialing an alarm call.
Optionally, after performing a first operation on the first card at the time point to enable data corresponding to the first card to be in an unchangeable state, the method further includes:
and controlling the alarm equipment on the terminal equipment to perform alarm prompt.
Optionally, after performing a first operation on the first card at the time point to enable data corresponding to the first card to be in an unchangeable state, the method further includes:
and sending prompt information to a background operator terminal of the terminal equipment.
In the embodiment of the application, after the first operation is performed on the first card, the user can be reminded that the first card is locked, and the police officer can be informed, so that the police officer can capture illegal molecules in time, and the safety is higher. Meanwhile, the prompt information is sent to the background operator terminal, so that the background operator can arrange the police officer to take out the card in the card storage area according to the prompt information, and the card can be conveniently recognized by a user to which the card belongs.
In a second aspect, an embodiment of the present application provides a terminal device, including: a card reader, a processor and a memory; the card reader and the memory are both connected to the processor, the memory storing computer readable instructions which, when executed by the processor, perform the steps of the method according to the first aspect.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic flowchart of a control method provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart illustrating another control method provided by an embodiment of the present application;
FIG. 3 is a schematic flow chart of another control method provided in the embodiments of the present application;
fig. 4 is a schematic connection diagram of another terminal device provided in the embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, it is further noted that, unless expressly stated or limited otherwise, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Referring to fig. 1, an embodiment of the present application provides a control method, which is applied to a terminal device including a card reader.
In the embodiment of the invention, the terminal equipment comprising the card reader can identify the card inserted into the card reader and can perform corresponding business transaction on the card. For example: when the terminal device is an Automatic Teller Machine (ATM), when a bank card is inserted into the card inlet, the card reader can transmit the bank card to the inside, the ATM identifies the bank card, an operation prompt is displayed on a display interface of the ATM, and then a user can perform data transaction on the bank card according to the operation prompt. Of course, it should be noted that the terminal device including the card reader is not limited to an ATM, and in a specific embodiment, the terminal device may also be other self-service devices that need to insert a card, such as a self-service payment machine for dining hall card recharging, a library self-service borrowing machine, and the like.
The control method comprises the following steps:
and S110, when a first card exists in the card reader, monitoring whether a second card exists at a card inlet of the card reader or not, wherein the first card is used for data transaction.
In step S110, if the first card exists inside the card reader, that is, when the user uses the first card to perform data transaction, whether the second card exists in the card inlet is continuously monitored. For example, by using the ATM, when a user inserts a bank card into the card inlet (at this time, the first card is equivalent to a bank card), the card reader brings the bank card into the ATM for identification, and prompts the user to input a bank card password, and when the bank card password input by the user is correct, the user can perform data transaction on the bank card. Wherein, for the terminal device being an ATM machine, the data transaction may include: the ATM can continuously monitor whether a second card exists in the card inlet or not in the process of data transaction of a user on the bank card; if the card exists, the card reader carries the bank card into the ATM for identification, so that the second card can only be left in the card inlet. When the user completes the data transaction on the bank card, the second card may be mistaken as the bank card for performing the data transaction. And may remove only the second card and leave the bank card in which the data transaction is being conducted inside the ATM, which may result in unnecessary financial loss.
In the whole process of data transaction of the first card by the user, the second card is not monitored at the card inlet, so that the process of data transaction performed by the user can be represented to be safe.
And S120, if a second card exists in the card inlet, monitoring the time point when the second card leaves the card inlet of the card reader, and performing first operation on the first card at the time point so as to enable the data corresponding to the first card to be in an unchangeable state.
In step S120, when it is monitored that the second card exists at the card inlet, the second card at the card inlet may be monitored all the time, and when the terminal device monitors that the second card leaves the card inlet, a time point when the second card leaves the card inlet may be recorded immediately; and at the current time point, the data of the first card is in an unchangeable state, namely, the user can not carry out data transaction on the first card. Taking the above listed ATM as an example, when the user takes the second card, although the bank card still exists in the ATM, the ATM cannot perform data transaction on the bank card, so that the property in the bank card can be well protected.
It can be seen that, when the first card exists in the terminal device, and the user performs a data transaction on the first card, and when the second card is detected to exist in the card inlet, the terminal device does not terminate the data transaction on the first card. The termination terminal device terminates the data transaction with the first card only when the second card is removed from the card entry slot.
In the embodiment of the application, when a user uses a first card to perform data transaction, whether a second card exists at a card inlet of a card reader is continuously detected, if the second card exists at the card inlet, and only when the second card is pulled out of the card inlet of the card reader, the terminal device performs a first operation on the first card, so that data corresponding to the first card is in an unchangeable state, and the user cannot continue data transaction through the first card. And then can avoid first card to be used by illegal user in the in-process of carrying out the data transaction, and then safer.
In the embodiment of the present application, the card inlet of the card reader and the card inlet of the terminal device are corresponding to each other, in other words, the card inlet of the card reader may also be referred to as the card inlet of the terminal device. The card is inserted into the card inlet, namely the card inlet of the card reader can be referred to, and the card inlet of the terminal equipment can also be referred to.
Optionally, the step S120 of performing a first operation on the first card at the time point to make the data corresponding to the first card in the unchangeable state may specifically be:
and transmitting the first card to a card storage area in the terminal equipment at the time point so as to enable the data of the first card to be in an unchangeable state.
In the embodiment of the application, when the second card leaves the card inlet, the first card existing in the card reader is sent to the card storage area in the terminal equipment for storage, and then no card exists in the card reader. Of course, there is no way to continue data transactions on the first card; and further, the data corresponding to the first card can be well protected.
Optionally, after the first card is transmitted to the inside of the terminal device at the time point, the method further includes:
the terminal equipment sends notification information representing that the first card is in a locking state to the mobile terminal equipment corresponding to the corresponding first card, wherein the mobile terminal equipment is different from the terminal equipment.
When the first card is sent to the card storing area inside the terminal equipment for storage, the user does not know that the first card is transmitted to the card storing area of the terminal equipment at the moment. At the moment, the user actually uses the second card in the hand, and the user mistakenly considers the second card as the first card, so that the user can find that the card in the hand is not the first card only when the user needs to perform data transaction on the first card next time. Therefore, when the first card is sent to the card storage area in the terminal equipment for storage; at this time, the terminal device may send notification information to the mobile terminal device corresponding to the first card, so as to notify that the first card has been transmitted to the card storage area of the terminal device.
The mobile terminal device may be a device that is convenient for the user to carry about, for example, when the mobile terminal device is a mobile phone, the terminal device may send a short message to the mobile phone to notify the user that the first card is locked, and then the user may perform corresponding processing in time according to the short message received on the mobile phone, so as to recover the use of the first card as soon as possible, and the practicability is higher.
The following is specifically exemplified by an ATM, and the first card corresponds to a bank card used by a user to perform data transaction, that is, when the user performs business transaction by using the bank card; when the second card is found to exist in the card inlet, after the user takes the second card away, the card reader sends the bank card into a card storage area in the ATM, at the moment, the terminal equipment sends a short message or calls to a mobile phone number corresponding to the bank card and informs the user of the bank card that the bank card is locked, and certain operation can be specifically carried out to enable the first card to be recovered to be normally used. For example, the service platform corresponding to the bank card may be accessed and unlocked, so that the bank card can be used continuously. When the user does not process the first card for a certain time, the user can dial the phone number corresponding to the bank card again to recover the normal use of the first card.
The arrangement of the embodiment of the application can avoid the inconvenience caused by incapability of using the card when the user does not know that the bank card is locked and is transmitted to the card storage area inside the ATM, and can avoid the time waste caused by the user transacting a new bank card again; is very suitable for use. And the first card is transmitted to the card storage area in the terminal equipment, so that the data of the first card is in an unchangeable state, the data of the first card is well protected, and the safety and the reliability of the first card in the using process are improved.
Optionally, referring to fig. 2, the step S120 performs a first operation on the first card at the time point, so that data corresponding to the first card is in an unchangeable state, including:
step S130: and sending a password input prompt message of the first card to the user at the time point.
When the second card leaves the card inlet, password input prompt information can be displayed on a display device of the terminal equipment, so that a user can input a password corresponding to the first card. The password corresponding to the first card is not limited, and may be a character password, or a physiological characteristic password, such as a fingerprint, an iris, and the like; and may be specifically determined by the type of terminal device. And the prompt message can be the form that the display of prompt message and be furnished with corresponding voice broadcast carries out at display device, specifically can be: when the user is required to input the password, the following can be displayed on the display device of the terminal equipment: please enter the correct password and the speaker of the terminal device may emit a voice "please the user to enter the correct password and check the surrounding environment". If the terminal equipment needs to record the iris information of the user, the loudspeaker of the terminal equipment can send out voice to 'please the user to look at the camera and wait for the iris information to be acquired'. Of course, there are many ways to present information, and this is not intended to be limiting and exemplary.
Step S140: and acquiring password information input by the user according to the password input prompt information.
The user inputs password information according to the prompt information and the operation of the prompt information, and if the password is a character password, the password can be input through a keyboard arranged on the terminal equipment; if the password is a fingerprint password, the password can be input through a fingerprint acquisition device arranged on the terminal equipment; if the password is the iris password, the iris acquisition camera arranged on the terminal equipment can be used for acquiring the iris information of the user. Of course, in a specific embodiment, the input password information may be a combination of a character password and a physiological characteristic password, which is not limited herein, and the user only needs to input the password information according to the prompt information.
Step S150: and judging whether the password information is correct or not.
When the password is a character password, if the password information input by the user is completely the same as the password information corresponding to the first card, otherwise, the input password information is represented to be incorrect; when the password is the physiological characteristic password, the matching degree of the password information input by the user corresponding to the password information corresponding to the first card reaches more than 99%, otherwise, the input password information is represented to be incorrect. If the password is the combination of the character password and the physiological characteristic password, the password information input by the user is represented as correct password information only when the character password and the physiological characteristic password input by the user are both correct. For example, if the character password input by the user is correct but the physiological characteristic password is wrong, the password information input by the user is represented as incorrect password information, and if the character password input by the user is wrong but the physiological characteristic password is correct, the password information input by the user is also represented as incorrect password information.
Of course, in a specific embodiment, the terminal device may give the user an opportunity to input the password information multiple times, so as to avoid the user from inputting the password information incorrectly due to misoperation or stress. For example, the opportunity to input password information three times may be set, that is, the user may input password information three times based on the prompt information. In other words, in the embodiment of the present application, if the password information input by the user for the first time according to the prompt information is incorrect, the password information may be input again, and when the password information input again is still incorrect, the password information may be input once, and only when the password information input by the user for three times is incorrect, the password information input by the user is represented as incorrect password information.
Step S160: and if the password information is incorrect, transmitting the first card to a card storage area of the terminal equipment so as to enable the data of the first card to be in an unchangeable state.
If the terminal equipment finally judges that the password information input by the user is incorrect password information, the card reader transmits the first card to the card storage area of the terminal equipment, and at the moment, the current user cannot change the data of the first card. Of course, if the last password information is determined to be correct, business transaction can be continuously performed on the first card, and therefore the first card can be prevented from being locked by the user due to misoperation.
For example, when the terminal device is an ATM, when a user uses a first card to perform a business transaction, and when the first card is not taken out yet, if the user wants to replace one card to perform a data transaction, the user mistakenly inserts a second card into the card slot. After the second card is inserted into the card inlet, the user finds that the first card still exists in the ATM, so that the second card can be taken out, and the first card can be taken out by correctly inputting the password information corresponding to the first card; the practicality is higher.
Of course, in the embodiment of the present invention, if the terminal device is an ATM, in order to better protect the funds in the first card, when the second card exists at the card inlet of the card reader, the maximum amount of the first card in the current transaction will be limited to 3000 dollars, and of course, the maximum amount of the transaction may be other amounts, and is not limited, and in a specific embodiment, the maximum amount of the transaction may be other amounts.
Optionally, in step S160, simultaneously with or after the first card is transferred to the card storage area of the terminal device, the method further includes:
and opening a camera on the terminal equipment, acquiring image information of the user and sending the image information to the alarm terminal.
The terminal equipment in the embodiment of the invention is provided with the camera, when the password input by the user is incorrect, the user who inputs the password at the moment is possibly not the user corresponding to the first card, the card reader transmits the first card to the card storage area, and the camera of the terminal equipment works to acquire the image information of the current user and can send the image information to the alarm terminal. The alarm terminal can be a police station, a police office corresponding to the terminal equipment and the like. If the password is input as an illegal member, the image information can provide beneficial help when the police picks up the illegal member.
In summary, it can be seen that, in the embodiment of the present application, the first operation performed on the first card may refer to when the second card leaves the card inlet; the terminal equipment directly swallows the first card into a card storage area in the terminal equipment. The first operation may also refer to that when the second card leaves the card entry slot, the terminal device needs to obtain the password corresponding to the first card input by the user again, and if the password input is wrong, the terminal device spits the first card into the card storage area inside the terminal device. Therefore, after the first operation is performed on the first card, the user has no way to directly perform data transaction on the first card.
Optionally, referring to fig. 3, after monitoring whether a second card exists at a card inlet of the card reader when a first card exists inside the card reader, and before performing a first operation on the first card at the time point, the control method further includes:
step 122: and if a second card exists at the card inlet of the card reader, opening a camera on the terminal equipment, and acquiring first image information of the user from the current time point to the time point and second image information of the time point.
In step 122, the current time point and the time point are two different time points, the current time point refers to the time point when the second card exists in the card inlet, the time point refers to the time point when the second card leaves the card inlet, and the current time point is prior to the time point in time. When the user performs the business transaction on the first card again, if the second card is detected to exist at the card inlet, the terminal device opens the camera at the moment, acquires the first image information of the current user and stores the acquired first image information. When the second card leaves the card inlet, the camera acquires the second image information of the user at the moment, and stores the acquired second image information.
Step 124: and judging whether the first image information and the second image information are consistent.
In step 124, if the difference between the first image information and the second image information is more than 1%, it represents that the first image information and the second image information are inconsistent; in other words, the operator for the first card changes from the current point in time to the point in time. Of course, the threshold for the difference between the two image information is not limited to 1%, and in a specific embodiment, the threshold for the difference between the two image information may be set according to actual needs.
Step 126: if the first image information and the second image information are not consistent, step 120 is executed: and performing first operation on the first card at a time point so as to enable the data corresponding to the first card to be in an unchangeable state.
Of course, in the specific embodiment, when there is a second card in the card inlet, the camera may always obtain the image information of the user using the terminal device, and if it is detected that the image information of the user obtained by the camera changes between the time when the second card is inserted into the card inlet and the time when the second card is separated from the card inlet, step 120 may be immediately executed. And further, the data information of the first card can be better protected.
Optionally, after performing the first operation on the first card at the time point in step 126 to make the data corresponding to the first card in the unchangeable state, the method further includes:
and dialing an alarm call.
In the embodiment of the application, the terminal equipment can dial an alarm telephone so as to facilitate a police to act quickly, and further illegal molecules can be mastered and put down as soon as possible.
Optionally, after performing the first operation on the first card at the time point in step 126 to make the data corresponding to the first card in the unchangeable state, the method further includes:
and controlling an alarm device on the terminal device to perform alarm prompt.
When the alarm device on the terminal device works; at the moment, if a policeman is near the terminal equipment, the policeman can receive the alarm prompt information and can quickly respond to the alarm prompt information, so that illegal molecules can be conveniently mastered and put down; the safety of the first card in the data transaction process is improved, and the practicability of the scheme provided by the embodiment of the application can be improved.
The alarm prompt in the embodiment of the present application may be that an alarm of the terminal device sounds, and a flashing light on the terminal device flashes. Of course, in the embodiment of the present application, the alarm prompt is not limited, in a specific implementation manner, the alarm prompts set by different types of terminal devices may be different, and different types of alarm prompts may be set by the same type of terminal devices according to different application scenarios. For example, when the terminal device is placed at a position closer to the police station, the alarm prompt may be that only the alarm of the terminal device sounds, and the alarm sound may be smaller. If the terminal device is located at a position far from the police station, the alarm prompt may be that an alarm of the terminal device sounds and a flashing light on the terminal device flashes, and the sound of the alarm may be larger. Meanwhile, different alarm prompts can be adopted according to the change of time; the alert prompt may be an alarm sounding, such as during daytime, and at night, an alarm sounding and a flashing off light.
Optionally, after performing the first operation on the first card at the time point in step 126 to make the data corresponding to the first card in the unchangeable state, the method further includes:
and sending prompt information to a background operator terminal of the terminal equipment.
The operator of the terminal equipment can operate the first card according to the prompt message; for example, arranging a police officer to check and take the first card out of the card storage area, and sending the first card to a specified service platform for storage, so that a user can conveniently take the card out; and further, the data of the first card can be well protected.
The embodiment of the present application further provides a terminal device 10, including: a card reader 100, a processor 200, and a memory 300; the card reader 100 and the memory 300 are both connected to the processor 200, and the memory 300 stores computer readable instructions which, when executed by the processor 200, perform any of the steps of the above embodiments.
The control method and the terminal device provided by the embodiment of the application comprise the following steps: when a first card exists in the card reader, monitoring whether a second card exists at a card inlet of the card reader or not, wherein the first card is used for data transaction; and if so, monitoring the time point when the second card leaves the card inlet of the card reader, and performing first operation on the first card at the time point so as to enable the data corresponding to the first card to be in an unchangeable state. In the embodiment of the application, when a user uses a first card to perform data transaction, whether a second card exists at a card inlet of a card reader is continuously detected, if the second card exists at the card inlet, and only when the second card is pulled out of the card inlet of the card reader, the terminal device performs a first operation on the first card, so that data corresponding to the first card is in an unchangeable state, and the user cannot continue data transaction through the first card. And then can avoid first card to be used by illegal user in the in-process of carrying out the data transaction, and then safer.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a notebook computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk. It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (9)
1. A control method is applied to a terminal device comprising a card reader, and comprises the following steps:
when a first card exists in the card reader, monitoring whether a second card exists at a card inlet of the card reader or not, wherein the first card is used for data transaction;
if a second card exists, monitoring the time point when the second card leaves the card inlet, and performing a first operation on the first card at the time point to enable the data corresponding to the first card to be in an unchangeable state: and transmitting the first card to a card storage area in the terminal equipment at the time point so as to enable the data of the first card to be in an unchangeable state at the time point and later.
2. The method according to claim 1, wherein after the first card is transmitted to the inside of the terminal device at the time point, the method further comprises:
and the terminal equipment sends notification information representing that the first card is in a locking state to the mobile terminal equipment corresponding to the first card, wherein the mobile terminal equipment is different from the terminal equipment.
3. The method of claim 1, wherein performing a first operation on the first card at the time point to make data corresponding to the first card in an unchangeable state comprises:
sending a password input prompt message of the first card to a user at the time point;
acquiring password information input by the user according to the password input prompt information;
judging whether the password information is correct or not;
and if the data is incorrect, transmitting the first card to the card storage area so as to enable the data of the first card to be in an unchangeable state.
4. The method of claim 3, wherein, while or after transferring the first card to the card deposit area, the method further comprises:
and opening a camera on the terminal equipment, acquiring the image information of the user and sending the image information to an alarm terminal.
5. The method of claim 1, wherein after monitoring a card inlet of the card reader for the presence of a second card when a first card is present inside the card reader, and before performing a first operation on the first card at the time point, the method further comprises:
if the second card exists at the card inlet of the card reader, opening a camera on the terminal equipment, and acquiring first image information of the user from the current time point to the time point and second image information of the time point;
judging whether the first image information and the second image information are consistent;
if not, executing the following steps: and performing a first operation on the first card at the time point so as to enable the data corresponding to the first card to be in an unchangeable state.
6. The method of claim 5, wherein after performing the first operation on the first card at the time point to make the data corresponding to the first card in the unchangeable state, the method further comprises:
and dialing an alarm call.
7. The method of claim 5, wherein after performing the first operation on the first card at the time point to make the data corresponding to the first card in the unchangeable state, the method further comprises:
and controlling the alarm equipment on the terminal equipment to perform alarm prompt.
8. The method of claim 5, wherein after performing the first operation on the first card at the time point to make the data corresponding to the first card in the unchangeable state, the method further comprises:
and sending prompt information to a background operator terminal of the terminal equipment.
9. A terminal device, comprising: a card reader, a processor and a memory; the card reader and the memory are both connected to the processor, the memory storing computer readable instructions which, when executed by the processor, perform the steps of the method according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910039601.6A CN109493545B (en) | 2019-01-15 | 2019-01-15 | Control method and terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910039601.6A CN109493545B (en) | 2019-01-15 | 2019-01-15 | Control method and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109493545A CN109493545A (en) | 2019-03-19 |
CN109493545B true CN109493545B (en) | 2021-06-29 |
Family
ID=65714711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910039601.6A Active CN109493545B (en) | 2019-01-15 | 2019-01-15 | Control method and terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109493545B (en) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8579191B2 (en) * | 2008-06-27 | 2013-11-12 | Diebold Self-Service Systems, Division Of Diebold, Incorporated | Automated banking system controlled responsive to data bearing records |
CN103186947A (en) * | 2011-12-29 | 2013-07-03 | 梁开军 | Card forgetting prevention device for ATM (automatic teller machine) |
CN103456092B (en) * | 2013-09-16 | 2016-01-20 | 广州广电运通金融电子股份有限公司 | Card reader transaction card method, device |
CN104091390A (en) * | 2014-06-09 | 2014-10-08 | 中国建设银行股份有限公司 | System and method for bank self-service terminal card-swallowing reminding and processing |
CN204946172U (en) * | 2015-09-17 | 2016-01-06 | 邢强 | For the something lost card burglary-resisting system of ATM |
CN107633625B (en) * | 2017-08-10 | 2020-07-24 | 深圳怡化电脑股份有限公司 | Self-service transaction reminding method and device and terminal equipment |
-
2019
- 2019-01-15 CN CN201910039601.6A patent/CN109493545B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN109493545A (en) | 2019-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3048592B1 (en) | Method, device, and self service equipment thereof for card processing in card reader | |
CN113366487A (en) | Operation determination method and device based on expression group and electronic equipment | |
JP4951364B2 (en) | Suspicious behavior monitoring method and apparatus | |
WO2003098525A1 (en) | Method for guaranteeing safe financial transactions when using wireless network | |
CN109243104A (en) | Event-handling method and ATM | |
CN113052580A (en) | Method, system and terminal for processing payment by agency based on 5G message and biological recognition | |
KR20140065818A (en) | System and method for verifying safety of account | |
JP2001312469A (en) | Authenticating device | |
CN107862601B (en) | Cash withdrawal method and system with automatic positioning alarm function | |
JP2005122266A (en) | System and method for card-usage transaction processing, and program for card-usage transaction processing | |
CN109493545B (en) | Control method and terminal equipment | |
CN113609351A (en) | Loss reporting and releasing method and device for bank card | |
CN110032898B (en) | Data clearing method and device, electronic equipment and storage medium | |
CN206312231U (en) | A kind of bank account system | |
CN109543562A (en) | Identity identifying method, insurance institution's server and the terminal of insured people | |
CN104618326B (en) | A kind of information processing method and electronic equipment | |
CN106921941A (en) | A kind of system and method and communication terminal for pursuing stolen communication terminal | |
CN106603814A (en) | Operation method and device for false shutdown of mobile terminal | |
CN105118191B (en) | Withdrawal method with the automatic teller machine of encryption function and the automatic teller machine | |
KR20040098407A (en) | System and Method of financial transaction using Emergency Password Number | |
CN110490587B (en) | Method and device for rapidly locking bank card | |
CN107963058A (en) | Vehicle-mounted automatic alarm method and device | |
US20230419280A1 (en) | Gesture recognition for advanced security | |
CN207976946U (en) | Safe automatic teller machine and system | |
CN108922073B (en) | Card reader card processing method and device and self-service terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |