CN114627594A - Information security guarantee method and related device of self-service terminal - Google Patents

Information security guarantee method and related device of self-service terminal Download PDF

Info

Publication number
CN114627594A
CN114627594A CN202011436144.3A CN202011436144A CN114627594A CN 114627594 A CN114627594 A CN 114627594A CN 202011436144 A CN202011436144 A CN 202011436144A CN 114627594 A CN114627594 A CN 114627594A
Authority
CN
China
Prior art keywords
user
image
self
service terminal
face image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011436144.3A
Other languages
Chinese (zh)
Inventor
葛鑫
唐国宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011436144.3A priority Critical patent/CN114627594A/en
Publication of CN114627594A publication Critical patent/CN114627594A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/207Surveillance aspects at ATMs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The application provides an information security guarantee method and a related device for a self-service terminal machine. According to the technical scheme, a first image shot by a camera of the self-service terminal is acquired; carrying out user identification on the first image to obtain a first identification result; and if the first identification result is that the first image contains a user face image and the user face image is not the face image of the current accepted user of the self-service terminal machine, displaying the information after the layer covering processing of the accepted user and ending the service provided for the accepted user. According to the technical scheme, the privacy security of the user can be improved, and therefore the information security of the self-service terminal machine is improved.

Description

Information security guarantee method and related device of self-service terminal
Technical Field
The application relates to the technical field of safety, in particular to an information safety guarantee method and a related device for a self-service terminal machine.
Background
In order to adapt to the development of society, various industries such as telecommunication industry, bank industry, logistics industry and the like begin to use the self-service terminal machine to provide convenience for the life of users. When the self-service terminal machine provides service for the user, the self-service terminal machine can display privacy information such as identity information, family information or password information of the user. This may make the user's personal information easily leaked, thereby affecting the personal and family property security of the user.
Therefore, how to improve the information security of the self-service terminal becomes a technical problem to be solved urgently.
Disclosure of Invention
The application provides an information security guarantee method and a related device of a self-service terminal machine, which can improve the information security of the self-service terminal machine. The specific scheme is as follows:
in a first aspect, the application provides an information security guarantee method for a self-service terminal. In the method, when an acceptance user currently exists in the self-service terminal, a first image shot by a camera of the self-service terminal is acquired; performing user identification on the first image to obtain a first identification result; and if the first identification result is that the first image contains a user face image and the user face image is not the face image of the current accepted user of the self-service terminal machine, displaying the information after the layer covering processing of the accepted user and ending the service provided for the accepted user.
According to the method, when the accepted user of the self-service terminal is inconsistent with the browsing user, the information of the accepted user is subjected to layer processing, so that the privacy information of the user can be protected, and the safety and the usability of the self-service terminal equipment can be improved.
Further, in the method of the application, when the accepted user of the self-service terminal machine is inconsistent with the browsing user, the service provided for the accepted user is finished, for example, the accepted user logs out, so that other users can be prevented from operating the service item of the accepted user, and the use safety of the self-service terminal machine can be improved.
With reference to the first aspect, in a first possible implementation manner, if the first identification result is that the first image does not include a user face image, the information after the layer processing of the accepting user is displayed, and information for prompting the accepting user to view a display screen of the self-service terminal is output.
With reference to the first possible implementation manner of the first aspect, in a second possible implementation manner, the method includes: acquiring a plurality of images shot by the camera within a first time length; performing user identification on the multiple images to obtain a second identification result; and if the second recognition result is that the plurality of images all contain facial images of the accepting user and the self-service terminal machine does not receive the operation information of the accepting user within the first time length, displaying the information of the accepting user after the hierarchical processing, outputting information for prompting the accepting user to actively finish the current service, and finishing the service provided for the accepting user after a second time length.
If it is determined that the user is not operating the self-service terminal for a long time, the user is prompted, and any operation of the user is not received within a period of time after the user is prompted, the service of the user can be automatically ended, for example, the user can exit the current login state.
With reference to the first aspect or the first or second possible implementation manner, in a third possible implementation manner, the method includes: acquiring a second image, wherein the second image is an image shot by the camera; performing face recognition on the second image to obtain a third recognition result; if the third recognition result is that the second image does not contain the facial image of the user, displaying an advertisement interface; and if the third recognition result is that the second image comprises a user face image, and the user face image is consistent with a face image corresponding to the identity card detected by the self-service terminal, displaying a service acceptance interface.
With reference to the first aspect or any one of the first to the third possible implementation manners, in a fourth possible implementation manner, the performing user identification on the first image to obtain a first identification result includes: performing face recognition on the first image by using a face recognition model; if a first face image is obtained after face recognition is carried out on the first image, comparing the first face image with a face image in a standby face image database to obtain a comparison result, wherein the face image database comprises a face image of a target accepting user, and the target accepting user comprises a user which can be served by the self-service terminal; if the comparison result is that the facial image which is consistent with the first facial image does not exist in the facial image database, determining that the first image comprises a user facial image, and the user facial image is not the facial image of the accepted user; and if the face image is not obtained after the face recognition is carried out on the first image, determining that the first image does not contain the face image.
With reference to the first aspect, in a fifth possible implementation manner, the target accepting user specifically includes: a user determined by address fence technology, approaching the self-service terminal and having a distance to the self-service terminal less than or equal to a first distance threshold, and the self-service terminal being capable of providing service; and/or a user determined by wifi technology, approaching the self-service terminal and having a distance to the self-service terminal less than or equal to a second distance threshold, and the self-service terminal being capable of providing services; and/or a user who inhales in an area which is less than a third distance threshold value away from the self-service terminal machine and can provide services.
In the implementation mode, the small-range standby face database is established based on various technologies, so that the comparison efficiency of the face images can be improved, the efficiency of judging whether to carry out layer covering processing on the privacy of the accepted user and finish the service of the accepted user by the self-service terminal is improved, and the use safety of the self-service terminal can be further improved.
In a second aspect, the present application provides an information security and security device for a self-service terminal, where the device may include various modules for implementing the method in the first aspect, and the modules may be implemented by software and/or hardware.
For example, the device may include an acquisition module, an identification module, a display module, and an operation module, and optionally, the device further includes a prompt module.
The acquisition module is used for acquiring a first image shot by a camera of the self-service terminal machine when the self-service terminal machine currently has an acceptance user; the identification module is used for carrying out user identification on the first image to obtain a first identification result; if the first identification result is that the first image contains a user face image and the user face image is not the face image of the current accepted user of the self-service terminal machine, the display module is used for displaying the information after the overlay processing of the accepted user, and the operation module is used for ending the service provided for the accepted user.
With reference to the second aspect, in a first possible implementation manner, if the first identification result is that the first image does not include a user face image, the display module is further configured to display information obtained after the layer processing of the accepting user, and the apparatus further includes a prompting module configured to output information for prompting the accepting user to view a display screen of the self-service terminal.
With reference to the first possible implementation manner of the second aspect, in a second possible implementation manner, the obtaining module is further configured to obtain a plurality of images shot by the camera within a first time duration; the identification module is further used for carrying out user identification on the multiple images to obtain a second identification result; if the second recognition result is that the plurality of images all include facial images of the accepting user, and the self-service terminal machine does not receive the operation information of the accepting user within the first time period, the display module is further configured to display the information after the layer covering processing of the accepting user, the prompt module is further configured to output information prompting the accepting user to actively end the current service, and the operation module is further configured to end the service provided for the accepting user after a second time period.
With reference to the second aspect or the first or second possible implementation manner, in a third possible implementation manner, the obtaining module is further configured to obtain a second image, where the second image is an image captured by the camera; the recognition module is further used for carrying out face recognition on the second image to obtain a third recognition result; if the third recognition result is that the second image does not contain the facial image of the user, the display module is further used for displaying an advertisement interface; and if the third recognition result is that the second image comprises a user face image, and the user face image is consistent with a face image corresponding to the identity card detected by the self-service terminal, displaying a service acceptance interface.
With reference to the second aspect or any one of the first to the third possible implementation manners, in a fourth possible implementation manner, the identification module is specifically configured to: performing face recognition on the first image by using a face recognition model; if a first face image is obtained after face recognition is carried out on the first image, comparing the first face image with a face image in a standby face image database to obtain a comparison result, wherein the face image database comprises a face image of a target accepting user, and the target accepting user comprises a user which can be served by the self-service terminal; if the comparison result is that the face image which is consistent with the first face image does not exist in the face image database, determining that the first image contains a user face image, and the user face image is not the face image of the accepted user; and if the face image is not obtained after the face recognition is carried out on the first image, determining that the first image does not contain the face image.
With reference to the first aspect, in a fifth possible implementation manner, the target accepting user specifically includes: a user determined by address fence technology, approaching the self-service terminal and having a distance to the self-service terminal less than or equal to a first distance threshold, and the self-service terminal being capable of providing service; and/or a user determined by wifi technology, who is close to the self-service terminal and whose distance from the self-service terminal is less than or equal to a second distance threshold, and who can be served by the self-service terminal; and/or a user who inhales in an area which is less than a third distance threshold value away from the self-service terminal machine and can provide services.
In a third aspect, the present application provides an information security guarantee device for a self-service terminal, including: a memory and a processor; the memory is to store program instructions; the processor is configured to invoke program instructions in the memory to perform a method according to the first aspect or any one of its possible implementations.
In a fourth aspect, the present application provides a chip comprising at least one processor and a communication interface, the communication interface and the at least one processor are interconnected by a line, and the at least one processor is configured to execute a computer program or instructions to perform the method according to the first aspect or any one of the possible implementations thereof.
In a fifth aspect, the present application provides a computer readable medium storing program code for execution by a device, the program code comprising instructions for performing the method according to the first aspect or any one of its possible implementations.
In a sixth aspect, the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method according to the first aspect or any one of its possible implementations.
In a seventh aspect, the present application provides a self-service terminal machine, including at least one processor and a communication interface, where the communication interface and the at least one processor are interconnected by a line, the communication interface is in communication with a target system, and the at least one processor is configured to execute a computer program or instructions to perform the method according to the first aspect or any one of the possible implementation manners.
Drawings
Fig. 1 is a flowchart of an information security method of a self-service terminal according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an information security and security device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an information security and security device according to another embodiment of the present application.
Detailed Description
In order to protect information security of a user when the user transacts business at a self-service terminal, the application provides an information security guarantee method of the self-service terminal and a related device, and the method obtains an identification result by acquiring an image shot by a camera of the self-service terminal and identifying the user of the image shot by the camera; and then determining the content on the display interface and/or judging whether the current service needs to be ended or not based on the identification result, so that the use safety of the self-service terminal is improved.
The various methods and related apparatus set forth herein are described below with reference to the drawings.
Fig. 1 is a flowchart of an information security method of a self-service terminal according to an embodiment of the present application. As shown in fig. 1, the method may include S101 to S105. The method can be executed by the self-service terminal machine and can also be executed by a chip applied to the self-service terminal machine.
S101, obtaining an image, wherein the image is obtained by shooting through a camera of the self-service terminal machine.
In this step, the image may be an image including an image of the face of the user, or may be a background image, that is, an image not including an image of the face of the user.
The self-service terminal machine can be a self-service terminal machine used by a bank for handling business, a self-service terminal machine used by a business hall of a communication operator, a self-service terminal machine used by a school for handling school affairs, a self-service terminal machine used by a government office for handling related business, a self-service terminal machine used by a cinema for buying tickets and other self-service terminal machines with different applications.
Acquiring an image may be understood as receiving an image taken by a camera from a camera of a self-service terminal, which image is referred to as a first image for purposes of description.
And S102, carrying out user identification on the image to obtain an identification result.
In this step, the face recognition model may be used to perform face recognition on the user. The face recognition model can be a model realized by a deep cascading multitask framework based on a deep learning method. The face recognition model for the user may include two parts, face detection and face alignment. During face detection, FDDB (face detection data set and benchmark) and WIDER FACE (web image dataset for event recognition face) benchmarks can be adopted, AFLW (artificial facial features in the world) benchmarks can be adopted during face alignment, and the benchmarks can meet the requirements of accuracy and real-time performance of face recognition of a self-service terminal.
In this embodiment, the modes of the user logging in the self-service terminal include identity card logging in and mobile phone logging in. As a possible implementation manner, the self-service terminal may receive, through a touch screen or a language receiving device, identity information input by a user, such as an identification number or a mobile phone number and a login password, and load information of the user to implement login of the user.
As another possible implementation manner, the self-service terminal may identify information of an identification card placed by a user through the identification card identification device, and load information of a corresponding user to implement login of the user.
As another possible implementation manner, the self-service terminal may determine the accepting user by identifying the obtained face image and the mapping relationship between the face image and the user information stored in the database, and load the information of the accepting user to implement the login of the user.
And if the face image is obtained after the face recognition is carried out on the image, comparing the face image with the face image in the standby face image database to obtain a comparison result.
In this embodiment, the standby face image database includes a face image of a target accepting user, and the target accepting user includes a user that can be served by the self-service terminal. The user that the self-service terminal can provide service may include a user of an operator to which the self-service terminal belongs, for example, a user that the self-service terminal in a connected business hall can provide service includes a connected user.
In some possible implementation manners, the number of the portrait stored in the standby face image database is optimized to 30 ten thousand by repeatedly comparing, calculating and associating the portrait for the self-service terminal in the business hall where the accepted user is relatively fixed.
Alternatively, for an open business hall, because of the large number of users coming and going every day, 30 ten thousand portrait pictures may be all redundant, or 30 ten thousand portrait pictures may not be enough. Under the condition, the method for dynamically loading the face image in the database or the face image in the static preset data can be used for improving the practicability of the standby face database, so that the accuracy of the face recognition result can be improved.
As an example of dynamically loading the database, the target accepting user specifically includes: a user determined by address fence technology, approaching the self-service kiosk and at a distance from the self-service kiosk that is less than or equal to a first distance threshold, and the self-service kiosk being able to provide service. The first distance threshold may be empirically preset.
As another example of dynamically loading a database, the target accepting user may specifically include: the distance between the user terminal and the self-service terminal is smaller than or equal to a second distance threshold value, and the user terminal can provide services. The second distance threshold may be empirically preset.
As an example of the static preset database, the target accepting user may specifically include: and the user who lives in the area with the distance from the self-service terminal machine less than the third distance threshold value and can provide services by the self-service terminal machine. The third distance threshold may be empirically preset.
For example, the unicom user with the id card 2301 in the harbinst city can be preset in the database of the business hall.
The face image obtained by recognition is compared with the face image in the standby face image database, so that the safety of the self-service terminal equipment and the safety of the displayed information can be guaranteed.
In this embodiment, as another example, the standby human face image database on the self-service terminal device may be a distributed database built based on big data. Wherein, the comparison operation may be multithreading 1 through a DRDS (distributed relational database): the N-way is performed in the alternate face image database, where N represents a positive integer.
In order to ensure the accuracy of image comparison, measures such as feature extraction and pattern recognition can be adopted to perform noise reduction, light smoothing and other processing on the face image. For example, the accuracy of image contrast can be improved by a SIFT (scale-invariant feature transform) algorithm. The SIFT algorithm can still keep good detection performance under the conditions of translation, rotation, noise interference, illumination transformation and the like of an image, and can accurately identify the face under the condition of complex change of the face.
Under the condition that the user logs in through the identity card, the self-service terminal equipment can compare the photographed user facial image with the user facial image corresponding to the identity card detected by the automatic terminal equipment in the standby face image database.
If the comparison result is not consistent, it can be determined that the user corresponding to the shot user face image is not the user corresponding to the identity card.
If the comparison result is that the face image of the user is matched with the identification card, the user corresponding to the shot face image of the user can be determined to be the user corresponding to the identification card.
And if the face image is not obtained after the face recognition is carried out on the image, determining that the image does not contain the face image.
And S103, if the recognition result is that the face image is included and the face image is consistent with the face image corresponding to the identity card detected by the self-service terminal, displaying a service acceptance interface.
As an example, if there is no face image after face recognition of the image, the self-service terminal may play an advertisement interface; if the comparison result is not matched, prompt information that the user logging in the account is not the user can be displayed; if the comparison result is consistent, a service acceptance interface can be displayed, the service acceptance interface can be an interface after the user successfully logs in, and the user can be called an acceptance user.
As an alternative embodiment, the service includes an inquiry service, a payment service, a package replacement service, and the like.
S104, acquiring a first image shot by a camera of the self-service terminal, and performing face recognition to obtain a first recognition result. This step may be performed periodically. The execution period may be set according to a preset.
The implementation manner of performing face recognition on the first object to obtain the first recognition result may refer to the face recognition related content in S102, and is not described herein again.
And S105, if the first identification result is that the first image contains a user face image and the user face image is not the face image of the current accepting user of the self-service terminal machine, displaying the information after the layer covering processing of the accepting user and finishing the service provided for the accepting user.
If the first identification result is that the first image includes the face image of the user, but the face image of the user is not the face image of the current accepting user of the self-service terminal machine, the user information needs to be protected safely, so the user information is subjected to layer covering processing, and the service provided for the accepting user is ended.
In this embodiment, optionally, if none of the plurality of images acquired within a period of time includes a user face image, the information after the layer masking processing of the accepting user is displayed, and information for prompting the accepting user to watch the display screen of the self-service terminal is output. If the result of the image recognition based on the acquired image does not include the face image of the user after a while, the service of the currently accepted user can be terminated.
In this embodiment, optionally, if multiple images acquired within a period of time include the same user facial image, but the user is still within the period of time, or the self-service terminal is not operated, the information after the layer processing of the accepting user may be displayed, and information for prompting the accepting user to leave the service that should be actively exited is output. If the result of the image recognition based on the obtained image does not include the facial image of the user or the user is still or the self-service terminal is not operated after another period of time, the service of the currently accepted user can be ended.
For example, if the accepted user is still for more than 10 seconds, the self-service terminal machine can perform hierarchical processing on the user information and prompt the user to actively quit when the user leaves, and then the self-service terminal machine automatically quits after 5 seconds and returns to the self-service main interface.
In the step, because the user does not look at the screen or leaves the self-service terminal for a short time, the possibility of leakage of the user information exists, and therefore, in order to ensure information safety, the self-service terminal can carry out layer covering processing on the user information and prompt the user to watch the display screen of the self-service terminal.
Fig. 2 is a schematic structural diagram of an information security and security device according to an embodiment of the present application. The apparatus shown in fig. 2 may be used to perform the method described in fig. 1. As shown in fig. 2, the information security and security device 200 of the present embodiment may include: the device comprises an acquisition module 201, an identification module 202 and a display module 203.
For example, the obtaining module 201 may be configured to perform S101, the identifying module 202 may be configured to perform S102, and the displaying module 203 may be configured to perform S104 and S105.
Optionally, the apparatus 200 may further include a prompting module and/or an operating module to implement the related functions in the method shown in fig. 1. For example, the prompting module can be used to implement the functionality associated with prompting in the method described in FIG. 1.
Fig. 3 is a schematic structural diagram of an information security and security device according to another embodiment of the present application. The apparatus shown in fig. 3 may be used to perform the information security method described in fig. 1.
As shown in fig. 3, the apparatus 300 of the present embodiment includes: memory 301, processor 302, communication interface 303, and bus 304. The memory 301, the processor 302 and the communication interface 303 are connected to each other by a bus 304.
The memory 301 may be a Read Only Memory (ROM), a static memory device, a dynamic memory device, or a Random Access Memory (RAM). The memory 301 may store a program, and the processor 302 is configured to perform the steps of the method shown in fig. 1 when the program stored in the memory 301 is executed by the processor 302.
The processor 302 may be a general Central Processing Unit (CPU), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits, and is configured to execute related programs to implement the information security method according to the embodiment of the present application.
The processor 302 may also be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the method of planning an autonomous vehicle according to an embodiment of the present application may be performed by instructions in the form of hardware integrated logic circuits or software in the processor 302.
The processor 302 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 301, and the processor 302 reads the information in the memory 301, and completes the functions required to be performed by the units included in the thermometric apparatus according to the application in combination with the hardware thereof, for example, the steps/functions of the embodiment shown in fig. 1 may be performed.
The communication interface 303 may enable communication between the apparatus 300 and other devices or communication networks using, but not limited to, transceiver means such as transceivers.
Bus 304 may include a path that transfers information between various components of apparatus 300 (e.g., memory 301, processor 302, communication interface 303).
It should be understood that the apparatus 300 shown in the embodiment of the present application may be an electronic device, or may also be a chip configured in the electronic device.
It should be understood that the processor in the embodiments of the present application may be a Central Processing Unit (CPU), and the processor may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It will also be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, but not limitation, many forms of Random Access Memory (RAM) are available, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and direct bus RAM (DR RAM).
The above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer instructions or computer programs. The procedures or functions described in accordance with the embodiments of the present application are produced in whole or in part when the computer instructions or the computer program are loaded or executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more collections of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that the term "and/or" herein is merely one type of association relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. In addition, the "/" in this document generally indicates that the former and latter associated objects are in an "or" relationship, but may also indicate an "and/or" relationship, which may be understood with particular reference to the former and latter text.
In the present application, "at least one" means one or more, "a plurality" means two or more. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc. for storing program codes.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An information security guarantee method of a self-service terminal is characterized in that when an acceptance user currently exists in the self-service terminal, the method comprises the following steps:
acquiring a first image, wherein the first image is an image shot by a camera of a self-service terminal;
carrying out user identification on the first image to obtain a first identification result;
and if the first identification result is that the first image contains a user face image and the user face image is not the face image of the current accepted user of the self-service terminal machine, displaying the information after the layer covering processing of the accepted user and ending the service provided for the accepted user.
2. The method of claim 1, comprising:
and if the first recognition result is that the first image does not contain a user face image, displaying the information after the layer processing of the accepted user, and outputting information for prompting the accepted user to see a display screen of the self-service terminal.
3. The method according to claim 1, characterized in that it comprises:
acquiring a plurality of images shot by the camera within a first time length;
performing user identification on the multiple images to obtain a second identification result;
and if the second recognition result is that the plurality of images all contain facial images of the accepting user and the self-service terminal machine does not receive the operation information of the accepting user within the first time length, displaying the information of the accepting user after the hierarchical processing, outputting information for prompting the accepting user to actively finish the current service, and finishing the service provided for the accepting user after a second time length.
4. A method according to any one of claims 1 to 3, characterized in that the method comprises:
acquiring a second image, wherein the second image is an image shot by the camera;
performing face recognition on the second image to obtain a third recognition result;
if the third recognition result is that the second image does not contain the facial image of the user, displaying an advertisement interface;
and if the third recognition result is that the second image comprises a user face image, and the user face image is consistent with a face image corresponding to the identity card detected by the self-service terminal, displaying a service acceptance interface.
5. The method according to any one of claims 1 to 3, wherein the performing user recognition on the first image to obtain a first recognition result comprises:
performing face recognition on the first image by using a face recognition model;
if a first face image is obtained after face recognition is carried out on the first image, comparing the first face image with a face image in a standby face image database to obtain a comparison result, wherein the face image database comprises a face image of a target accepting user, and the target accepting user comprises a user which can be served by the self-service terminal;
if the comparison result is that the face image which is consistent with the first face image does not exist in the face image database, determining that the first image contains a user face image, and the user face image is not the face image of the accepted user;
and if the face image is not obtained after the face recognition is carried out on the first image, determining that the first image does not contain the face image.
6. The method of claim 5, wherein the target recipient user comprises: a user determined by address fence technology, approaching the self-service terminal and having a distance to the self-service terminal less than or equal to a first distance threshold, and the self-service terminal being capable of providing service; and/or
A user determined by a wifi technology, approaching the self-service terminal and having a distance to the self-service terminal less than or equal to a second distance threshold, and the self-service terminal being capable of providing services; and/or
And the user who lives in the area with the distance from the self-service terminal machine less than the third distance threshold value and can provide services by the self-service terminal machine.
7. An information security guarantee device of a self-service terminal, which is characterized by comprising various functional modules for realizing the method of any one of claims 1 to 6.
8. A chip comprising at least one processor and a communication interface, the communication interface and the at least one processor interconnected by a line, the at least one processor being configured to execute a computer program or instructions to perform the method of any of claims 1 to 6.
9. A self-service terminal, comprising: a memory and a processor;
the memory is to store program instructions;
the processor is configured to invoke program instructions in the memory to perform the method of any of claims 1 to 6.
10. A computer-readable medium, characterized in that the computer-readable medium stores program code for computer execution, the program code comprising instructions for performing the method of any of claims 1 to 6.
CN202011436144.3A 2020-12-10 2020-12-10 Information security guarantee method and related device of self-service terminal Pending CN114627594A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011436144.3A CN114627594A (en) 2020-12-10 2020-12-10 Information security guarantee method and related device of self-service terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011436144.3A CN114627594A (en) 2020-12-10 2020-12-10 Information security guarantee method and related device of self-service terminal

Publications (1)

Publication Number Publication Date
CN114627594A true CN114627594A (en) 2022-06-14

Family

ID=81895129

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011436144.3A Pending CN114627594A (en) 2020-12-10 2020-12-10 Information security guarantee method and related device of self-service terminal

Country Status (1)

Country Link
CN (1) CN114627594A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615940A (en) * 2014-10-27 2015-05-13 腾讯科技(深圳)有限公司 Sensitive information displaying method and device
CN106570408A (en) * 2015-10-08 2017-04-19 阿里巴巴集团控股有限公司 Sensitive information display method and apparatus
CN107169329A (en) * 2017-05-24 2017-09-15 维沃移动通信有限公司 A kind of method for protecting privacy, mobile terminal and computer-readable recording medium
CN107248071A (en) * 2017-06-06 2017-10-13 深圳正品创想科技有限公司 A kind of method and device for the security for improving Quick Response Code consumption certificate
CN107479794A (en) * 2017-09-14 2017-12-15 上海青橙实业有限公司 The display methods and device of terminal interface
CN108009413A (en) * 2017-12-27 2018-05-08 浪潮金融信息技术有限公司 The personal identification method and device of self-aided terminal, computer-readable storage medium, terminal
CN108765778A (en) * 2018-05-29 2018-11-06 禾麦科技开发(深圳)有限公司 A kind of information processing method and its equipment, storage medium, electronic equipment
CN108846968A (en) * 2018-05-29 2018-11-20 禾麦科技开发(深圳)有限公司 A kind of information processing method and its equipment, storage medium, electronic equipment
CN109214290A (en) * 2018-08-03 2019-01-15 深圳市前海圆舟网络科技股份有限公司 A kind of shops's client management method and device based on recognition of face
CN109492536A (en) * 2018-10-12 2019-03-19 大唐高鸿信息通信研究院(义乌)有限公司 A kind of face identification method and system based on 5G framework
CN110866236A (en) * 2019-11-20 2020-03-06 Oppo广东移动通信有限公司 Private picture display method, device, terminal and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615940A (en) * 2014-10-27 2015-05-13 腾讯科技(深圳)有限公司 Sensitive information displaying method and device
CN106570408A (en) * 2015-10-08 2017-04-19 阿里巴巴集团控股有限公司 Sensitive information display method and apparatus
CN107169329A (en) * 2017-05-24 2017-09-15 维沃移动通信有限公司 A kind of method for protecting privacy, mobile terminal and computer-readable recording medium
CN107248071A (en) * 2017-06-06 2017-10-13 深圳正品创想科技有限公司 A kind of method and device for the security for improving Quick Response Code consumption certificate
CN107479794A (en) * 2017-09-14 2017-12-15 上海青橙实业有限公司 The display methods and device of terminal interface
CN108009413A (en) * 2017-12-27 2018-05-08 浪潮金融信息技术有限公司 The personal identification method and device of self-aided terminal, computer-readable storage medium, terminal
CN108765778A (en) * 2018-05-29 2018-11-06 禾麦科技开发(深圳)有限公司 A kind of information processing method and its equipment, storage medium, electronic equipment
CN108846968A (en) * 2018-05-29 2018-11-20 禾麦科技开发(深圳)有限公司 A kind of information processing method and its equipment, storage medium, electronic equipment
CN109214290A (en) * 2018-08-03 2019-01-15 深圳市前海圆舟网络科技股份有限公司 A kind of shops's client management method and device based on recognition of face
CN109492536A (en) * 2018-10-12 2019-03-19 大唐高鸿信息通信研究院(义乌)有限公司 A kind of face identification method and system based on 5G framework
CN110866236A (en) * 2019-11-20 2020-03-06 Oppo广东移动通信有限公司 Private picture display method, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
CA3061783C (en) Resource transfer method, fund payment method, and electronic device
CN108932456B (en) Face recognition method, device and system and storage medium
US10846963B2 (en) Method and systems for event entry with facial recognition
CN109920174B (en) Book borrowing method and device, electronic equipment and storage medium
CN106716436A (en) Information display method and system
CN107077570A (en) System and method for detecting the trial that sensitive information is sent by data distribution passage
CN112800468B (en) Data processing method, device and equipment based on privacy protection
CN110765958A (en) Channel risk control method, device and system based on face recognition
CN112734436A (en) Terminal and method for supporting face recognition
JP6875521B2 (en) Methods and equipment for security verification based on biometric features
CN109191635A (en) Objective method, apparatus and storage medium are sentenced based on face recognition technology
Du Mobile payment recognition technology based on face detection algorithm
CN109787977A (en) Product information processing method, device, equipment and storage medium based on short-sighted frequency
CN110991231B (en) Living body detection method and device, server and face recognition equipment
US9892294B2 (en) Systems and methods for job site management
US10410095B2 (en) Method and system for identifying a payment card design
CN113032047A (en) Face recognition system application method, electronic device and storage medium
CN112686744A (en) Method and device for monitoring external access service, electronic equipment and storage medium
CN111274602A (en) Image characteristic information replacement method, device, equipment and medium
CN114627594A (en) Information security guarantee method and related device of self-service terminal
KR102240495B1 (en) Method for managing abusing user about identification and authentication, and server for the method
US10902106B2 (en) Authentication and authentication mode determination method, apparatus, and electronic device
CN110705439B (en) Information processing method, device and equipment
CN111400621B (en) Position information authenticity verification method and device and electronic equipment
US20160036995A1 (en) System and method for detecting and alerting risks in refill transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination