CN114283537A - Control method and device of card sender, computer equipment and storage medium - Google Patents

Control method and device of card sender, computer equipment and storage medium Download PDF

Info

Publication number
CN114283537A
CN114283537A CN202111641937.3A CN202111641937A CN114283537A CN 114283537 A CN114283537 A CN 114283537A CN 202111641937 A CN202111641937 A CN 202111641937A CN 114283537 A CN114283537 A CN 114283537A
Authority
CN
China
Prior art keywords
card
terminal
card sender
destroying
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111641937.3A
Other languages
Chinese (zh)
Inventor
刘威
彭昊
陈树生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202111641937.3A priority Critical patent/CN114283537A/en
Publication of CN114283537A publication Critical patent/CN114283537A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application relates to a control method and device of a card sender, computer equipment and a storage medium. The method comprises the following steps: judging whether the distance between the card sender and the terminal is greater than a preset distance in real time; if the distance between the card sender and the terminal is detected to be larger than the preset distance, accumulating the maintenance duration of the detected state, and detecting a destruction instruction sent by the terminal through the first wireless connection; if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction. Compared with the existing card sender control method, the card sender with the destroying device can destroy the bank card in the card sender after the machine is stolen or lost, so that the problem of information leakage caused by card loss is avoided.

Description

Control method and device of card sender, computer equipment and storage medium
Technical Field
The present application relates to the field of secure issuing of bank cards, and in particular, to a method and an apparatus for controlling a card issuer, a computer device, a storage medium, and a computer program product.
Background
With the development of modern society, direct fund transfer business is more and more adopted when transacting financial business, cash transactions are less and less, and people need transacting a plurality of bank cards. However, the existing bank card transaction requires that a customer personally go to a bank business hall for queuing and the like, so that the efficiency is low. The bank home service can improve the working efficiency, but bank workers need to carry various card handling devices, so that the bank home service also has certain difficulty in practice.
In the prior art, bank workers provide home-entry card issuing services for clients through portable card issuing machines, and the portable card issuing machines can be connected with business systems of banks to achieve the function of remotely transacting and issuing cards. However, compared with the business processing at a bank outlet, the portable card sender has low security coefficient of the environment for home card sending and complex personnel, and greatly increases the risk of losing or stealing the card sender. Once the portable card sender is lost or stolen, the cards in the card box fall into the hands of lawless persons to be utilized as a cheating tool, and data and keys of a joint name organization are written into some joint name cards in advance, so that client information is leaked once the cards are stolen.
Disclosure of Invention
In view of the above, it is necessary to provide a secure and reliable card sender control method, apparatus, computer device, computer readable storage medium and computer program product for solving the above technical problems.
In a first aspect, the present application provides a method for controlling a card sender. The method comprises the following steps:
judging whether the distance between the card sender and the terminal is greater than a preset distance in real time;
if the distance between the card sender and the terminal is detected to be larger than the preset distance, accumulating the maintenance duration of the detected state, and detecting a destruction instruction sent by the terminal through the first wireless connection;
if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction.
In one embodiment, the preset distance is a maximum communication distance of the second wireless connection; correspondingly, judge in real time whether the distance between card sender and the terminal is greater than the preset distance, include:
acquiring a second wireless connection state between the card sender and the terminal in real time;
and if the second wireless connection state between the card sender and the terminal is detected to be disconnected, determining that the distance between the card sender and the terminal is greater than the preset distance.
In one embodiment, before determining whether the distance between the card sender and the terminal is greater than the preset distance in real time, the method further includes:
if a first wireless connection request carrying verification information sent by a terminal is detected, verifying the first wireless connection request;
and if the verification is passed, establishing a first wireless connection with the terminal, wherein the first wireless connection request is also used for configuring a preset duration.
In one embodiment, the verification information includes at least one of the following three kinds of information, which are face feature information, fingerprint information and verification codes acquired by the terminal respectively.
In one embodiment, the card sender comprises a recovery box and a card outlet, wherein cards in the recovery box comprise cards with failed issuing; correspondingly, the method further comprises:
acquiring card application information, and matching the card application information with a registered card application information base;
if the matching fails, repeating the matching process, if the matching is successful, ending the repeated matching process, and issuing the card through a card outlet; if the matching is failed every time within the preset matching duration and the continuous failure times are larger than the preset threshold value, the repeated matching process is finished, and the card is recovered through the recovery box.
In one embodiment, the card sender includes a standby switch; correspondingly, the method further comprises:
and if a first power supply closing instruction triggered by the standby switch and a second power supply closing instruction sent by the terminal are detected, the power supply to the destroying device is cut off.
In one embodiment, after destroying the second target card in the card sender by the destroying device, the method further includes:
and sending the card number information corresponding to the destroyed card to a server, wherein the card number information is used for indicating the server to logout the destroyed card.
In a second aspect, the application further provides a control device of the card sender. The device comprises:
the judging module is used for judging whether the distance between the card sender and the terminal is greater than the preset distance in real time;
the detection module is used for accumulating the detected maintaining time of the state and detecting a destruction instruction sent by the terminal through the first wireless connection if the distance between the card sender and the terminal is detected to be larger than the preset distance;
the destroying module is used for automatically destroying the first target card in the card sender through the destroying device if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, and destroying the second target card in the card sender through the destroying device based on the destroying instruction if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length.
In a third aspect, the application also provides a card sender. The card sender comprises a destroying device, a memory and a processor, wherein the memory stores a computer program, and the processor realizes the following steps when executing the computer program:
judging whether the distance between the card sender and the terminal is greater than a preset distance in real time;
if the distance between the card sender and the terminal is detected to be larger than the preset distance, accumulating the maintenance duration of the detected state, and detecting a destruction instruction sent by the terminal through the first wireless connection;
if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction.
In a fourth aspect, the present application further provides a computer-readable storage medium. The computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
judging whether the distance between the card sender and the terminal is greater than a preset distance in real time;
if the distance between the card sender and the terminal is detected to be larger than the preset distance, accumulating the maintenance duration of the detected state, and detecting a destruction instruction sent by the terminal through the first wireless connection;
if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction.
In a fifth aspect, the present application further provides a computer program product. The computer program product comprising a computer program which when executed by a processor performs the steps of:
judging whether the distance between the card sender and the terminal is greater than a preset distance in real time;
if the distance between the card sender and the terminal is detected to be larger than the preset distance, accumulating the maintenance duration of the detected state, and detecting a destruction instruction sent by the terminal through the first wireless connection;
if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction.
The control method, the control device, the computer equipment, the storage medium and the computer program product of the card sender judge whether the distance between the card sender and the terminal is larger than the preset distance in real time; if the distance between the card sender and the terminal is detected to be larger than the preset distance, accumulating the maintenance duration of the detected state, and detecting a destruction instruction sent by the terminal through the first wireless connection; if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction. Compared with the existing card sender control method, the card sender with the destroying device is used for managing the cards, the bank cards in the card sender can be destroyed after the card sender is stolen or lost, and the problems of card loss and possible leakage of client reservation information are solved.
Drawings
Fig. 1 is a diagram showing an application environment of a control method of a card issuer in one embodiment;
FIG. 2 is a flowchart illustrating a method of controlling a card issuer according to one embodiment;
FIG. 3 is a flowchart illustrating a step of determining whether a distance between a card sender and a terminal is greater than a preset distance in real time in one embodiment;
fig. 4 is a flowchart illustrating a control method of the card issuer in another embodiment;
fig. 5 is a flowchart illustrating a control method of a card issuer in yet another embodiment;
FIG. 6 is a flowchart illustrating an information matching process in one embodiment
Fig. 7 is a block diagram showing a configuration of a control device of the card sender in one embodiment;
fig. 8 is an internal structural diagram of the card issuer in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various terms, but these terms are not limited by these terms unless otherwise specified. These terms are only used to distinguish one term from another. For example, the third preset threshold and the fourth preset threshold may be the same or different without departing from the scope of the present application.
The control method of the card sender provided by the embodiment of the application can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104, or may be located on the cloud or other network server. In this embodiment, the card issuing management system server is a bastion machine deployed with security control software, and calls the service data in the bank host data storage system in an interface mode. The terminal 102 may be, but is not limited to, various smart phones, tablet computers, and portable wearable devices, which may be smart watches, smart bracelets, and the like. The server 104 may be implemented as a stand-alone server or as a server cluster comprised of multiple servers.
In one embodiment, as shown in fig. 2, a method for controlling a card sender is provided, which is described by taking the method as an example applied to the terminal card sender in fig. 1, and an executing subject is a server, and the method includes the following steps:
step 201, judging whether the distance between a card sender and a terminal is greater than a preset distance in real time;
step 202, if the distance between the card sender and the terminal is detected to be greater than the preset distance, accumulating the detected maintaining time of the state, and detecting a destruction instruction sent by the terminal through the first wireless connection;
step 203, if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction.
The "preset distance" in step 201 is a safety distance set according to a specific application scenario and used for determining whether the card sender is lost, and when the distance between the card sender and the terminal is greater than the preset distance, it means that the position of the card sender exceeds a preset range, and there is a possibility of loss or theft. Specifically, when the judgment is performed, the distance between the card sender and the terminal may be directly obtained according to the positioning device, and then compared with the preset distance, or the judgment may be performed according to the short-range communication connection between the card sender and the terminal.
In step 202, the "detected state" refers to a state where the distance between the card sender and the terminal is greater than the preset distance, that is, a state where the card sender is lost or stolen may exist. "accumulation" means that the time is continued from a state where the distance between the card sender and the terminal is detected to be greater than the preset distance, and "maintenance duration" means the time is continued from a state where the distance between the card sender and the terminal is detected to be greater than the preset distance. By "first wireless connection" is meant that a wireless network connection exists between the card issuer and the terminal for communication.
In step 203, the "first target card" and the "second target card" may be cards in the same location or different locations, and the types of the cards may be the same or different, such as a blank card, a joint card or a card failed to be issued in a recycling box, where the joint card refers to a bank card issued by an issuing bank in conjunction with an institution for profit, and most commonly, a joint debit card, and information of an institution customer is written in the joint card in advance.
Specifically, when the card sender is far away from the terminal, the terminal can remind the bank service personnel that the card sender exceeds a safe distance and inquire whether the card in the card sender needs to be destroyed or not, when the bank service personnel confirm, the terminal can send a destruction instruction to the card sender through wireless connection, and the card sender can start a destruction device to destroy the card after receiving the destruction instruction; however, when the banking staff cannot confirm and send the destruction instruction to the card sender through the wireless connection, the card sender may set "automatic destruction time", that is, the preset time duration in step 203, and when the distance between the card sender and the terminal is always greater than the preset distance and the destruction instruction is not received, the card sender may automatically destroy the card.
In addition, the operation of destroying the card in the card issuing machine may be initiated by the banking staff for cleaning the card in the case that the card issuing machine is not lost. When a card sender with a recovery box is destroyed, after the card sender receives a destruction instruction, all cards in the card sender are sent to the recovery box for destruction; the cards in the card sender can also be directly sent into the destroying device.
In the control method of the card sender, whether the distance between the card sender and the terminal is greater than a preset distance is judged in real time; if the distance between the card sender and the terminal is detected to be larger than the preset distance, accumulating the maintenance duration of the detected state, and detecting a destruction instruction sent by the terminal through the first wireless connection; if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction. Compared with the existing card sender control method, the card sender with the destroying device is used for managing the cards, the bank cards in the card sender can be destroyed after the card sender is stolen or lost, and the problems of card loss and possible leakage of client reservation information are solved.
With reference to the content of the foregoing embodiment, in an embodiment, as shown in fig. 3, the preset distance is a maximum communication distance of the second wireless connection, and accordingly, the embodiment of the present invention does not specifically limit a manner of determining whether the distance between the card sender and the terminal is greater than the preset distance in real time, including but not limited to:
step 301, acquiring a second wireless connection state between the card sender and the terminal in real time;
step 302, if it is detected that the second wireless connection state between the card sender and the terminal is disconnected, it is determined that the distance between the card sender and the terminal is greater than the preset distance.
The "second wireless connection" in step 301 refers to a short-range communication connection mode between the card sender and the terminal, the short-range communication refers to communication through a wireless USB, an ieee802.ll communication protocol, a Transfer Jet, or a wireless HD, and currently, widely used short-range wireless communication technologies are Bluetooth (Bluetooth), wireless local area network 802.11(Wi-Fi), and infrared data transmission (IrDA). Meanwhile, some near-field wireless technology standards with development potential are as follows: ZigBee, ultra wide band (ultrawide band), short range communication (NFC), WiMedia, GPS, DECT, and private wireless systems, among others. Specifically, the distance between the card sender and the terminal is judged according to the state of short-distance wireless communication connection between the card sender and the terminal.
In a specific embodiment, a card sender includes a bluetooth communication module, and a banking staff uses a terminal to perform matching connection with bluetooth of the card sender, where a preset distance at this time is a maximum distance for using bluetooth communication, and is generally within 10 meters, which is not limited herein. When the distance between the card sender and the terminal is greater than the preset distance, the Bluetooth connection between the card sender and the terminal is disconnected, so that a method for judging whether the card sender is far away from the terminal or not according to the Bluetooth connection state can be adopted. In addition, the card sender can possess devices such as alarm lamp and buzzer, and the distance between card sender and terminal is greater than the default distance, and after the bluetooth connection disconnection between the two, the alarm lamp on the card sender machine case can flash buzzer and also can sound and remind banking staff, and the terminal also can remind to some extent simultaneously.
In the control method of the card sender, a second wireless connection state between the card sender and the terminal is acquired in real time; and if the second wireless connection state between the card sender and the terminal is detected to be disconnected, determining that the distance between the card sender and the terminal is greater than the preset distance. And the method for judging the second connection state between the card sender and the terminal is adopted to realize the function of preventing the card sender from being lost.
In an embodiment, as shown in fig. 4, before determining whether the distance between the card sender and the terminal is greater than the preset distance in real time, the embodiment of the present invention is not specifically limited, including but not limited to:
step 401, if a first wireless connection request carrying verification information sent by a terminal is detected, verifying the first wireless connection request;
step 402, if the verification is passed, establishing the first wireless connection with the terminal, wherein the first wireless connection request is also used for configuring a preset duration.
The "verification information" in step 401 is information sent by the terminal to request the establishment of the first wireless connection with the card sender, and may be acquired by the terminal, such as face feature information, fingerprint information, verification code, and the like, or may be directly input at the terminal, such as a control password of the card sender. The "first wireless connection" refers to a wireless network connection between the card sender and the terminal, and the terminal may control the card sender through the first wireless connection with the card sender, including obtaining and checking an operation condition of the card sender, modifying an equipment parameter of the card sender (for example, a mode of the card sender, a preset duration of the card sender, and the like), controlling a switch of the card sender, and the like. It should be noted that information such as device parameters of the card sender may also be directly set by the card sender itself.
In addition, before the card sender verifies the first wireless connection request, the terminal sends authentication information to the server, and after the server passes the verification of the authentication information, the server sends the verified information to the card sender for the card sender to verify the authentication information in the first wireless connection request. Finally, in other embodiments, the service personnel can directly use the touch screen of the card sender to complete the login authentication of the server.
In the control method of the card sender, if a first wireless connection request carrying verification information sent by a terminal is detected, the first wireless connection request is verified; and if the verification is passed, establishing the first wireless connection with the terminal, wherein the first wireless connection request is also used for configuring a preset duration. Identity verification is carried out before the card sender is controlled, non-service personnel are prevented from operating the card sender, and safety of the card sender is improved.
With reference to the content of the foregoing embodiment, the embodiment of the present invention does not specifically limit the verification information, including but not limited to at least one of the following three information, which are the face feature information, the fingerprint information, and the verification code acquired by the terminal respectively.
It should be noted that, in general, terminal devices have functions of collecting information, such as screen fingerprint recognition and camera face recognition, and general terminal devices have a communication function and can acquire a dynamic verification code. The safety factor of the information is higher, so when the first wireless connection request is verified, at least one kind of information collected by the terminal is sent to the card sender together with the first wireless connection request for verification.
In the control method of the card sender, the verification information comprises at least one of the following three kinds of information, namely face feature information, fingerprint information and verification codes acquired by the terminal. The method can realize multiple identity authentication, provides a safer card sender control method, and solves the problem that the information of a client is leaked due to the fact that a lawless person steals the card sender in the outgoing service of a bank to obtain the bank card in the card sender.
In one embodiment, as shown in fig. 5, the card sender comprises a recycling box and a card outlet, wherein the cards in the recycling box comprise the cards with failed issuing; correspondingly, the control method of the card sender further comprises the following steps:
step 501, card application information is obtained, and the card application information is matched with a registered card application information base;
step 502, if the matching fails, repeating the matching process, if the matching is successful, ending the repeated matching process, and issuing a card through a card outlet; if the matching is failed every time within the preset matching duration and the continuous failure times are larger than the preset threshold value, the repeated matching process is finished, and the card is recovered through the recovery box.
The "card application information" in step 501 is information for authentication of the card issuer acquired by using a device on the card issuer before issuing the card. The "card application registered information" is information stored in the client profile in advance in the server system or identity information called by the server in other authenticated systems. The "preset matching duration" in step 502 refers to a time range of information matching, which represents a fault tolerance rate of the matching process, and the setting meaning of the "preset matching duration" may refer to a setting that the number of times of password login of the bank card system in one day cannot exceed 3 times. And the 'failure of each matching' indicates that multiple matching verifications are required to be failed at the moment, but the matching success can jump out of the cycle of repeated matching.
Specifically, as shown in fig. 6, a camera, an identification card reader and a fingerprint instrument of the card issuing machine are used to obtain card application information of the card issuer, and the obtained biological characteristics and identification card information of the card issuer are compared with those in the server, if matching is successful, the bank card is ejected from a departure port, and the card issuing process is completed; and if the information of the card issuers fails to be matched for many times, the bank card is placed into a recovery box of the card sender. In the flowchart of fig. 6, "m" is a preset threshold, which is an upper limit of the number of times that continuous failures can occur within a preset matching duration, and "n" is the number of times of matching failures. As can be seen from the flow chart, in the matching process, once the matching is successful, the card issuing is completed, and the card issuing service corresponding to the application of the card application information is ended.
According to the control method of the card sender, the card sender comprises a recovery box and a card outlet, and cards in the recovery box comprise cards which fail to be issued; correspondingly, card application information is obtained, and the card application information is matched with a registered card application information base; if the matching fails, repeating the matching process, if the matching is successful, ending the repeated matching process, and issuing the card through a card outlet; if the matching is failed every time within the preset matching duration and the continuous failure times are larger than the preset threshold value, the repeated matching process is finished, and the card is recovered through the recovery box. The identity of the card issuer is verified through multiple identity authentication devices on the card issuer, so that the card is prevented from being falsely drawn, and the risk that lawbreakers open accounts by using false identity cards and operate for customers by banking staff is avoided.
In one embodiment, the card sender includes a standby switch; correspondingly, the control method of the card sender further comprises the following steps:
and if a first power supply closing instruction triggered by the standby switch and a second power supply closing instruction sent by the terminal are detected, the power supply to the destroying device is cut off.
The destroying device is characterized in that a power supply of the destroying device and a power supply of the card sending device are separated in the card sending machine, and a standby switch is correspondingly arranged on the destroying device part to control the card sending machine to enter a standby state or a working state. In the standby switch state, the destroying device and the alarm device of the card sender still work and give an alarm, so that the equipment is ensured not to be lost; the standby switch can not directly turn off the power supply, the power supply of the equipment can be turned off only through the touch screen and the equipment control function of the terminal, a first power supply turn-off instruction is triggered through the touch screen, and a second power supply turn-off instruction is sent by the equipment control function of the terminal. In a specific embodiment, the card sender may set a "card protection mode", and when the standby switch cannot directly turn off the power supply in the "card protection mode", the destruction device may be automatically triggered to destroy the card before the battery power supply of the destruction device is exhausted.
In the control method of the card sender, the card sender comprises a standby switch, and if a first power supply closing instruction triggered by the standby switch and a second power supply closing instruction sent by a terminal are detected, the power supply to the destroying device is cut off. The problems that after a lawless person steals the card sender, the power supply is turned off and the self-destruction function of the bank card is destroyed are solved.
In one embodiment, after destroying the second target card in the card sender by the destroying device, the method further includes:
and sending card number information corresponding to the destroyed card to a server, wherein the card number information is used for indicating the server to logout the destroyed card.
It should be noted that, if the banking staff confirms that the card sender is lost, the terminal selects to destroy, and after the fingerprint confirmation, the terminal sends a destroy instruction to the card sender to destroy the blank cards one by one. The card sender sends the residual blank card into a card reader to read bank card information, then sends the bank card information into a destroying device to be destroyed, sends the card information to a server after the bank card information is destroyed, and cancels the card in the server.
In the above method for controlling the card sender, after destroying the second target card in the card sender by the destroying device, the method further includes: and sending card number information corresponding to the destroyed card to a server, wherein the card number information is used for indicating the server to logout the destroyed card. The card is cancelled, so that the card control condition of the card sender is consistent with the record in the server, and the condition of information confusion is avoided.
It should be understood that although the steps of fig. 2, 3, 4 and 5 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2, 3, 4, and 5 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least some of the other steps.
It should be noted that the technical solutions described above may be implemented as independent embodiments in actual implementation processes, or may be combined with each other and implemented as combined embodiments. In addition, when the contents of the embodiments of the present invention are described above, the different embodiments are described according to the corresponding sequence only based on the idea of convenient description, for example, the sequence of the data flow is not limited to the execution sequence between the different embodiments, nor is the execution sequence of the steps in the embodiments limited. Accordingly, in the actual implementation process, if it is necessary to implement multiple embodiments provided by the present invention, the execution sequence provided in the embodiments of the present invention is not necessarily required, but the execution sequence between different embodiments may be arranged according to requirements.
In combination with the content of the above embodiments, in one embodiment, referring to fig. 7, there is provided a control device of a card issuer, including: a first control module 701, a second control module 702, and a third control module 703, wherein:
the first control module 701 is used for judging whether the distance between the card sender and the terminal is greater than a preset distance in real time;
a second control module 702, configured to accumulate a detected state maintaining duration and detect a destruction instruction sent by the terminal through the first wireless connection if it is detected that the distance between the card sender and the terminal is greater than the preset distance;
the third control module 703 is configured to, if the duration is greater than the preset duration and the destruction instruction is not detected in the time period corresponding to the duration, automatically destroy the first target card in the card sender through the destruction device, and if the duration is not greater than the preset duration and the destruction instruction is detected in the time period corresponding to the duration, destroy the second target card in the card sender through the destruction device based on the destruction instruction.
In one embodiment, the preset distance is a maximum communication distance of the second wireless connection; accordingly, the first control module 701 includes:
acquiring a second wireless connection state between the card sender and the terminal in real time;
and if the second wireless connection state between the card sender and the terminal is detected to be disconnected, determining that the distance between the card sender and the terminal is greater than the preset distance.
In one embodiment, the control device of the card sender further comprises an authentication module and a connection module, wherein:
the verification module is used for verifying the first wireless connection request if the first wireless connection request carrying the verification information sent by the terminal is detected;
and the connection module is used for establishing a first wireless connection with the terminal if the verification is passed, and the first wireless connection request is also used for configuring a preset duration.
In one embodiment, the verification module further comprises: the verification information comprises at least one of the following three kinds of information, namely face feature information, fingerprint information and verification codes acquired by the terminal.
In one embodiment, the card sender comprises a recovery box and a card outlet, wherein cards in the recovery box comprise cards with failed issuing; correspondingly, the device further comprises:
the matching module is used for acquiring the card application information and matching the card application information with the registered card application information base;
the card processing module is used for repeating the matching process if the matching fails, and ending the repeated matching process and issuing the card through the card outlet if the matching succeeds; if the matching is failed every time within the preset matching duration and the continuous failure times are larger than the preset threshold value, the repeated matching process is finished, and the card is recovered through the recovery box.
In one embodiment, the card sender includes a standby switch; correspondingly, the device further comprises:
and if a first power supply closing instruction triggered by the standby switch and a second power supply closing instruction sent by the terminal are detected, the power supply to the destroying device is cut off.
In one embodiment, the third control module 703 further includes:
and sending the card number information corresponding to the destroyed card to a server, wherein the card number information is used for indicating the server to logout the destroyed card.
The respective modules in the control device of the card sender may be wholly or partially implemented by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a card sender, the internal structure of which may be as shown in fig. 8. The card sender comprises a processor, a memory, a communication interface, a display screen and an input device which are connected through a system bus. Wherein the processor of the card issuer is configured to provide computing and control capabilities. The memory of the card sender comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the card sender is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a method of controlling a card sender. The display screen of the card sender can be a liquid crystal display screen or an electronic ink display screen, and the input device of the card sender can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the card sender, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the configuration shown in fig. 8 is a block diagram of only a portion of the configuration associated with the present application and is not intended to limit the computing device to which the present application may be applied, and that a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a card sender is provided, comprising a destruction device, a memory and a processor, the memory having stored therein a computer program, the processor implementing the following steps when executing the computer program:
judging whether the distance between the card sender and the terminal is greater than a preset distance in real time;
if the distance between the card sender and the terminal is detected to be larger than the preset distance, accumulating the maintenance duration of the detected state, and detecting a destruction instruction sent by the terminal through the first wireless connection;
if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the preset distance is the maximum communication distance of the second wireless connection; correspondingly, judge in real time whether the distance between card sender and the terminal is greater than the preset distance, include:
acquiring a second wireless connection state between the card sender and the terminal in real time;
and if the second wireless connection state between the card sender and the terminal is detected to be disconnected, determining that the distance between the card sender and the terminal is greater than the preset distance.
In one embodiment, the processor, when executing the computer program, further performs the steps of: before judging whether the distance between the card sender and the terminal is greater than the preset distance in real time, the method further comprises the following steps:
if a first wireless connection request carrying verification information sent by a terminal is detected, verifying the first wireless connection request;
and if the verification is passed, establishing a first wireless connection with the terminal, wherein the first wireless connection request is also used for configuring a preset duration.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the verification information comprises at least one of the following three kinds of information, namely face feature information, fingerprint information and verification codes acquired by the terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the card sender comprises a recovery box and a card outlet, and cards in the recovery box comprise cards which fail to be issued; correspondingly, the method further comprises:
acquiring card application information, and matching the card application information with a registered card application information base;
if the matching fails, repeating the matching process, if the matching is successful, ending the repeated matching process, and issuing the card through a card outlet; if the matching is failed every time within the preset matching duration and the continuous failure times are larger than the preset threshold value, the repeated matching process is finished, and the card is recovered through the recovery box.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the card sender comprises a standby switch; correspondingly, the method further comprises:
and if a first power supply closing instruction triggered by the standby switch and a second power supply closing instruction sent by the terminal are detected, the power supply to the destroying device is cut off.
In one embodiment, the processor, when executing the computer program, further performs the steps of: after destroying the second target card in the card sender through the destroying device, the method further comprises the following steps:
and sending the card number information corresponding to the destroyed card to a server, wherein the card number information is used for indicating the server to logout the destroyed card.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
judging whether the distance between the card sender and the terminal is greater than a preset distance in real time;
if the distance between the card sender and the terminal is detected to be larger than the preset distance, accumulating the maintenance duration of the detected state, and detecting a destruction instruction sent by the terminal through the first wireless connection;
if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction.
In one embodiment, the computer program when executed by the processor further performs the steps of: the preset distance is the maximum communication distance of the second wireless connection; correspondingly, judge in real time whether the distance between card sender and the terminal is greater than the preset distance, include:
acquiring a second wireless connection state between the card sender and the terminal in real time;
and if the second wireless connection state between the card sender and the terminal is detected to be disconnected, determining that the distance between the card sender and the terminal is greater than the preset distance.
In one embodiment, the computer program when executed by the processor further performs the steps of: before judging whether the distance between the card sender and the terminal is greater than the preset distance in real time, the method further comprises the following steps:
if a first wireless connection request carrying verification information sent by a terminal is detected, verifying the first wireless connection request;
and if the verification is passed, establishing a first wireless connection with the terminal, wherein the first wireless connection request is also used for configuring a preset duration.
In one embodiment, the computer program when executed by the processor further performs the steps of: the verification information comprises at least one of the following three kinds of information, namely face feature information, fingerprint information and verification codes acquired by the terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of: the card sender comprises a recovery box and a card outlet, and cards in the recovery box comprise cards which fail to be issued; correspondingly, the method further comprises:
acquiring card application information, and matching the card application information with a registered card application information base;
if the matching fails, repeating the matching process, if the matching is successful, ending the repeated matching process, and issuing the card through a card outlet; if the matching is failed every time within the preset matching duration and the continuous failure times are larger than the preset threshold value, the repeated matching process is finished, and the card is recovered through the recovery box.
In one embodiment, the computer program when executed by the processor further performs the steps of: the card sender comprises a standby switch; correspondingly, the method further comprises:
and if a first power supply closing instruction triggered by the standby switch and a second power supply closing instruction sent by the terminal are detected, the power supply to the destroying device is cut off.
In one embodiment, the computer program when executed by the processor further performs the steps of: after destroying the second target card in the card sender through the destroying device, the method further comprises the following steps:
and sending the card number information corresponding to the destroyed card to a server, wherein the card number information is used for indicating the server to logout the destroyed card.
In one embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, performs the steps of:
judging whether the distance between the card sender and the terminal is greater than a preset distance in real time;
if the distance between the card sender and the terminal is detected to be larger than the preset distance, accumulating the maintenance duration of the detected state, and detecting a destruction instruction sent by the terminal through the first wireless connection;
if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying the first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying the second target card in the card sender through the destroying device based on the destroying instruction.
In one embodiment, the computer program when executed by the processor further performs the steps of: the preset distance is the maximum communication distance of the second wireless connection; correspondingly, judge in real time whether the distance between card sender and the terminal is greater than the preset distance, include:
acquiring a second wireless connection state between the card sender and the terminal in real time;
and if the second wireless connection state between the card sender and the terminal is detected to be disconnected, determining that the distance between the card sender and the terminal is greater than the preset distance.
In one embodiment, the computer program when executed by the processor further performs the steps of: before judging whether the distance between the card sender and the terminal is greater than the preset distance in real time, the method further comprises the following steps:
if a first wireless connection request carrying verification information sent by a terminal is detected, verifying the first wireless connection request;
and if the verification is passed, establishing a first wireless connection with the terminal, wherein the first wireless connection request is also used for configuring a preset duration.
In one embodiment, the computer program when executed by the processor further performs the steps of: the verification information comprises at least one of the following three kinds of information, namely face feature information, fingerprint information and verification codes acquired by the terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of: the card sender comprises a recovery box and a card outlet, and cards in the recovery box comprise cards which fail to be issued; correspondingly, the method further comprises:
acquiring card application information, and matching the card application information with a registered card application information base;
if the matching fails, repeating the matching process, if the matching is successful, ending the repeated matching process, and issuing the card through a card outlet; if the matching is failed every time within the preset matching duration and the continuous failure times are larger than the preset threshold value, the repeated matching process is finished, and the card is recovered through the recovery box.
In one embodiment, the computer program when executed by the processor further performs the steps of: the card sender comprises a standby switch; correspondingly, the method further comprises:
and if a first power supply closing instruction triggered by the standby switch and a second power supply closing instruction sent by the terminal are detected, the power supply to the destroying device is cut off.
In one embodiment, the computer program when executed by the processor further performs the steps of: after destroying the second target card in the card sender through the destroying device, the method further comprises the following steps:
and sending the card number information corresponding to the destroyed card to a server, wherein the card number information is used for indicating the server to logout the destroyed card.
It should be noted that, the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high-density embedded nonvolatile Memory, resistive Random Access Memory (ReRAM), Magnetic Random Access Memory (MRAM), Ferroelectric Random Access Memory (FRAM), Phase Change Memory (PCM), graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases referred to in various embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing based data processing logic devices, etc., without limitation.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (10)

1. A method for controlling a card dispenser, wherein the card dispenser includes a destruction device, the method comprising:
judging whether the distance between the card sender and the terminal is greater than a preset distance in real time;
if the fact that the distance between the card sender and the terminal is larger than the preset distance is detected, accumulating the detected maintaining time of the state, and detecting a destroying instruction sent by the terminal through first wireless connection;
if the maintaining time length is longer than the preset time length and the destroying instruction is not detected in the time period corresponding to the maintaining time length, automatically destroying a first target card in the card sender through the destroying device, and if the maintaining time length is not longer than the preset time length and the destroying instruction is detected in the time period corresponding to the maintaining time length, destroying a second target card in the card sender through the destroying device based on the destroying instruction.
2. The method of claim 1, wherein the predetermined distance is a maximum communication distance of the second wireless connection; correspondingly, the real-time judgment of whether the distance between the card sender and the terminal is greater than a preset distance includes:
acquiring a second wireless connection state between the card sender and the terminal in real time;
and if the second wireless connection state between the card sender and the terminal is detected to be disconnected, determining that the distance between the card sender and the terminal is greater than the preset distance.
3. The method according to claim 1, wherein before the real-time determining whether the distance between the card sender and the terminal is greater than a preset distance, the method further comprises:
if a first wireless connection request carrying verification information sent by the terminal is detected, verifying the first wireless connection request;
and if the verification is passed, establishing the first wireless connection with the terminal, wherein the first wireless connection request is also used for configuring the preset duration.
4. The method according to claim 3, wherein the verification information includes at least one of face feature information, fingerprint information and verification code acquired by the terminal.
5. The method of claim 1, wherein the card sender comprises a recycling box and an exit slot, wherein cards in the recycling box comprise cards for which the issuance failed; accordingly, the method further comprises:
acquiring card application information, and matching the card application information with a registered card application information base;
if the matching fails, repeating the matching process, if the matching is successful, ending the repeated matching process, and issuing the card through the card outlet; if the matching is failed every time within the preset matching duration and the continuous failure times are larger than the preset threshold value, the repeated matching process is ended, and the card is recovered through the recovery box.
6. The method of claim 1, wherein the card sender comprises a standby switch; accordingly, the method further comprises:
and if a first power supply closing instruction triggered by the standby switch and a second power supply closing instruction sent by the terminal are detected, the power supply to the destroying device is cut off.
7. The method according to claim 1, further comprising, after destroying the second target card in the card sender by the destruction device:
and sending card number information corresponding to the destroyed card to a server, wherein the card number information is used for indicating the server to logout the destroyed card.
8. A card sender comprising destruction means, a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any of claims 1 to 7 when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
10. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method of any one of claims 1 to 7 when executed by a processor.
CN202111641937.3A 2021-12-29 2021-12-29 Control method and device of card sender, computer equipment and storage medium Pending CN114283537A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111641937.3A CN114283537A (en) 2021-12-29 2021-12-29 Control method and device of card sender, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111641937.3A CN114283537A (en) 2021-12-29 2021-12-29 Control method and device of card sender, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114283537A true CN114283537A (en) 2022-04-05

Family

ID=80878077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111641937.3A Pending CN114283537A (en) 2021-12-29 2021-12-29 Control method and device of card sender, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114283537A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2515070Y (en) * 2001-11-14 2002-10-09 谷至华 Digital car management device
CN201812296U (en) * 2010-04-01 2011-04-27 中国移动通信集团江西有限公司 Transmission device and card sending machine
CN103208015A (en) * 2013-01-31 2013-07-17 刘小云 Self-service terminal and self-service card-issuing system and method applying same
CN103354016A (en) * 2013-07-01 2013-10-16 广东欧珀移动通信有限公司 Mobile terminal loss preventing alarm system, related device and alarm method
CN104200174A (en) * 2014-08-27 2014-12-10 成都卫士通信息产业股份有限公司 Automatic destruction structure for information of electronic equipment
CN205644592U (en) * 2016-04-22 2016-10-12 深圳怡化电脑股份有限公司 Portable card distributing device
US20170116588A1 (en) * 2015-10-23 2017-04-27 Instant Access 360 Inc. Systems and methods for providing customized tokens
CN207182286U (en) * 2017-08-07 2018-04-03 鸿秦(北京)科技有限公司 A kind of safe solid state hard disc for powering off automaticdata and destroying
CN112848712A (en) * 2020-12-29 2021-05-28 航天信息股份有限公司企业服务分公司 Seal anti-theft system and method of seal machine
CN113076564A (en) * 2021-04-13 2021-07-06 山东北斗云信息技术有限公司 Hard disk protection method, device and equipment based on Beidou positioning and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2515070Y (en) * 2001-11-14 2002-10-09 谷至华 Digital car management device
CN201812296U (en) * 2010-04-01 2011-04-27 中国移动通信集团江西有限公司 Transmission device and card sending machine
CN103208015A (en) * 2013-01-31 2013-07-17 刘小云 Self-service terminal and self-service card-issuing system and method applying same
CN103354016A (en) * 2013-07-01 2013-10-16 广东欧珀移动通信有限公司 Mobile terminal loss preventing alarm system, related device and alarm method
CN104200174A (en) * 2014-08-27 2014-12-10 成都卫士通信息产业股份有限公司 Automatic destruction structure for information of electronic equipment
US20170116588A1 (en) * 2015-10-23 2017-04-27 Instant Access 360 Inc. Systems and methods for providing customized tokens
CN205644592U (en) * 2016-04-22 2016-10-12 深圳怡化电脑股份有限公司 Portable card distributing device
CN207182286U (en) * 2017-08-07 2018-04-03 鸿秦(北京)科技有限公司 A kind of safe solid state hard disc for powering off automaticdata and destroying
CN112848712A (en) * 2020-12-29 2021-05-28 航天信息股份有限公司企业服务分公司 Seal anti-theft system and method of seal machine
CN113076564A (en) * 2021-04-13 2021-07-06 山东北斗云信息技术有限公司 Hard disk protection method, device and equipment based on Beidou positioning and storage medium

Similar Documents

Publication Publication Date Title
JP6479769B2 (en) Method and system for providing locking function of customer control account
US8868458B1 (en) Remote account control system and method
CN105447969A (en) Messaging customer mobile device when electronic bank card used
CN105308607A (en) Trusted device
US10417631B2 (en) Systems and methods for activating account card functions based on physical device interactions
WO2019128198A1 (en) Radio frequency identification technology-based electronic device, and control method
CN105447694A (en) Receiving fingerprints through touch screen of ce device
US20160162893A1 (en) Open, on-device cardholder verification method for mobile devices
US11803835B2 (en) Methods and systems for displaying account information
CN105447696A (en) Automatic notification of transaction by bank card to customer device
US10896413B2 (en) Casino cash system, apparatus and method utilizing integrated circuit cards
CN104680669A (en) Financial business transaction system and method
US20200097942A1 (en) System and method for loading prepaid card with funds using a mobile device
US20230306430A1 (en) System and method for detecting fraudulent bank transaction
CN106446667B (en) Password data processing method, device and equipment
Gokul et al. Biometric based smart atm using rfid
CN106097601A (en) Banking system and the method for account is entered without card intelligence
US11803837B2 (en) Intelligent real time card alert system to detect suspicious contactless card reader
CN103473865A (en) Security monitoring method for self-service intelligent POS (point of sale) payment terminal
CN114283537A (en) Control method and device of card sender, computer equipment and storage medium
CN1508746A (en) Personal identity information integrating apparatus
CN116645181A (en) Business transaction method and device
JP2007115285A (en) Automatic transaction device and automatic transaction system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220405

RJ01 Rejection of invention patent application after publication