CN115345623A - ATM withdrawal monitoring method, equipment, medium and product based on identity verification - Google Patents

ATM withdrawal monitoring method, equipment, medium and product based on identity verification Download PDF

Info

Publication number
CN115345623A
CN115345623A CN202210980610.7A CN202210980610A CN115345623A CN 115345623 A CN115345623 A CN 115345623A CN 202210980610 A CN202210980610 A CN 202210980610A CN 115345623 A CN115345623 A CN 115345623A
Authority
CN
China
Prior art keywords
transaction
transaction type
biological characteristic
characteristic information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210980610.7A
Other languages
Chinese (zh)
Inventor
吕明明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210980610.7A priority Critical patent/CN115345623A/en
Publication of CN115345623A publication Critical patent/CN115345623A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/203Dispensing operations within ATMs

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses an ATM withdrawal monitoring method, equipment, a medium and a product based on identity authentication, which can be applied to the financial field or other fields. The method comprises the steps of obtaining a card number of a bank card to be subjected to transaction operation; acquiring account opening information corresponding to the card number, wherein the account opening information comprises a corresponding relation between preset multiple groups of transaction type authorities and biological characteristic information; collecting the biological characteristic information of the card holder; searching a target transaction type authority corresponding to the biological characteristic information of the card holder from the corresponding relation between the multi-group transaction type authority and the biological characteristic information; if the transaction operation implemented by the cardholder does not belong to the target transaction type authority, the transaction operation is not responded; if the transaction operation implemented by the cardholder belongs to the target transaction type authority, the transaction operation is responded, so that the financial security is ensured, meanwhile, the transaction operation can be performed without being limited to the account issuer, and the method is flexible, convenient and fast.

Description

ATM withdrawal monitoring method, equipment, medium and product based on identity verification
Technical Field
The application relates to the field of self-service withdrawal, in particular to an ATM withdrawal monitoring method, equipment, medium and product based on identity verification.
Background
An ATM (Automated Teller Machine) is a Machine that can perform transaction operations such as depositing and withdrawing operations and transfer operations by using bank cards and bank card passwords. If the bank card is stolen by an illegal person, the transaction operation can be carried out through the ATM, for example, the bank card password is written on the bank card, the illegal person can carry the stolen bank card and the bank card password to carry out the transaction operation through the ATM, for example, the illegal person carries the stolen bank card and the bank card password to draw money through the ATM.
When the situation occurs, financial loss of the user can be caused, and therefore, potential safety hazards exist.
Disclosure of Invention
In view of the foregoing, the present application provides identity verification-based ATM withdrawal monitoring methods, devices, media, and products.
In order to achieve the above purpose, the present application provides the following technical solutions:
the application provides an ATM withdrawal monitoring method based on identity authentication in a first aspect, which comprises the following steps:
acquiring a card number of a bank card to be subjected to transaction operation;
acquiring account opening information corresponding to the card number, wherein the account opening information comprises a preset corresponding relation between multiple groups of transaction type authorities and biological characteristic information;
collecting the biological characteristic information of a card holder;
searching a target transaction type authority corresponding to the biological characteristic information of the card holder from the corresponding relation between the plurality of sets of transaction type authorities and the biological characteristic information;
if the transaction operation carried out by the cardholder does not belong to the target transaction type authority, the transaction operation is not responded;
and if the transaction operation implemented by the cardholder belongs to the target transaction type authority, responding to the transaction operation.
With reference to the first aspect, in a first possible implementation manner, the method further includes:
if the target transaction type authority corresponding to the biological characteristic information of the card holder is not searched from the corresponding relationship between the multiple groups of transaction type authorities and the biological characteristic information, generating an operation failure instruction, wherein the operation failure instruction comprises the biological characteristic information of the card holder;
and sending the operation failure instruction to a server, wherein the operation failure instruction is used for instructing the server to input the biological characteristic information of the card holder into a bank blacklist.
With reference to the first aspect, in a first possible implementation manner, the method further includes:
if the target transaction type authority corresponding to the biological characteristic information of the card holder is not found from the corresponding relationship between the plurality of sets of transaction type authorities and the biological characteristic information, sending a first 5G fifth generation mobile communication technology message for granting the transaction type authority to the card holder or not to the terminal equipment logged with the communication account corresponding to the card number;
receiving a second 5G message fed back by the terminal device, wherein the second 5G message carries the identity information of the account issuer and the transaction type authority granted by the account issuer;
and if the identity information carried by the second 5G message is consistent with the reserved identity information corresponding to the card number, constructing a corresponding relation between the biological characteristic information of the card holder and the transaction type authority granted by the account holder.
With reference to the first aspect, in a first possible implementation manner, the method further includes:
controlling and displaying an input password interface;
acquiring a password input by the card holder;
and if the password is the same as the reserved password corresponding to the card number, executing the transaction operation responding step.
With reference to the first aspect, in a first possible implementation manner, the transaction type authority includes a transaction number upper limit, and after the step of executing the transaction operation if the transaction operation performed by the cardholder belongs to the target transaction type authority, the method further includes:
deducting the upper limit of the transaction times;
and if the upper limit deduction of the transaction times is reduced to zero, eliminating the target transaction type authority corresponding to the second biological characteristic information.
With reference to the first aspect, in a first possible implementation manner, the transaction type right includes an expiration date, and further includes:
if the current time is later than the valid period contained in the target transaction type authority, the transaction operation is not responded;
and if the current time is earlier than the valid period contained in the target transaction type authority, executing the transaction operation responding step.
The application provides in a second aspect an Automatic Teller Machine (ATM) withdrawal monitoring device based on identity verification, comprising:
the first acquisition unit is used for acquiring the card number of a bank card to be subjected to transaction operation;
the second acquisition unit is used for acquiring account opening information corresponding to the card number, wherein the account opening information comprises preset corresponding relations between multiple sets of transaction type authorities and biological characteristic information;
the acquisition unit is used for acquiring the biological characteristic information of a card holder;
the searching unit is used for searching the target transaction type authority corresponding to the biological characteristic information of the card holder from the corresponding relation between the plurality of sets of transaction type authorities and the biological characteristic information;
the first response unit is used for not responding to the transaction operation if the transaction operation carried out by the cardholder does not belong to the target transaction type authority;
and the second response unit is used for responding to the transaction operation if the transaction operation carried out by the cardholder belongs to the target transaction type authority.
A third aspect of the present application provides an automated teller machine ATM comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the authentication-based ATM withdrawal monitoring method as any one of the above.
A fourth aspect of the present application provides a computer readable storage medium having instructions which, when executed by a processor of an automated teller machine, ATM, enable the ATM to perform an authentication based ATM withdrawal monitoring method as described in any one of the preceding claims.
A fifth aspect of the present application provides a computer program product directly loadable into an internal memory of a computer, said memory being included in the ATM and comprising software code, said computer program being loadable and executable via the computer and being capable of implementing any of the authentication based ATM withdrawal monitoring methods described above.
According to the technical scheme, the card number of the bank card to be subjected to transaction operation and account opening information corresponding to the card number are obtained, because the account opening information comprises the corresponding relation between a plurality of groups of transaction type authorities preset by an account opener and biological characteristic information, a target transaction type authority corresponding to the collected biological characteristic information of the card holder can be searched from the corresponding relation, if the transaction operation performed by the card holder belongs to the target transaction type authority, the transaction operation can be performed, the transaction operation not limited to the card holder can be performed through the biological characteristic information, the transaction operation allowed by the transaction type authority can be performed after the corresponding relation between the transaction type authority and the biological characteristic information is prestored, and the financial security is ensured and the transaction operation is more flexible.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a block diagram of a hardware architecture in accordance with an exemplary embodiment;
fig. 2 is a flow diagram of an authentication-based ATM withdrawal monitoring method provided in accordance with an exemplary embodiment;
FIG. 3 is a diagram illustrating a correspondence provided in accordance with an exemplary embodiment;
FIG. 4A is a diagram providing authorization to a cardholder for a transaction type, according to an example embodiment;
FIG. 4B is a diagram of granting a cardholder transaction type privileges provided in accordance with an exemplary embodiment;
FIG. 5 is a block diagram of an identity verification based ATM withdrawal monitoring apparatus provided in accordance with an exemplary embodiment;
FIG. 6 is a block diagram of an apparatus device provided in accordance with an example embodiment.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
The embodiment of the application provides a self-service cash dispenser ATM withdrawal monitoring method, equipment, medium and product based on identity authentication.
Illustratively, the ATM11 may be any electronic product that can interact with a user through one or more of a keyboard, a touch pad, a touch screen, voice interaction, handwriting equipment, or physical keys.
Illustratively, the ATM may be mobile, and may be fixed.
The server 12 may be, for example, one server, a server cluster composed of a plurality of servers, or a cloud computing service center.
It should be understood that fig. 1 is merely an example and does not limit the number of ATMs 11 and the number of servers 12, and that fig. 1 is merely an example and does not limit the appearance of the ATM11.
In an optional implementation manner, the ATM withdrawal monitoring method based on identity verification provided in the embodiment of the present application may be applied to the ATM11 described above, which relates to two cases.
The first condition is as follows: the corresponding relation of the preset multiple sets of transaction type authorities and the biological characteristic information included in the account opening information is stored in the ATM11 or the bank card.
In the first case, the ATM11 obtains the card number of the bank card to be executed with the transaction operation and the account opening information corresponding to the card number, and then collects the biometric information of the card holder; after the collection is finished, the ATM11 searches the target transaction type authority corresponding to the collected biological characteristic information of the card holder from the corresponding relation between the self or multiple sets of transaction type authorities obtained from the bank card and the biological characteristic information; if the transaction operation performed by the cardholder does not belong to the target transaction type authority, the ATM11 does not respond to the transaction operation; if the transaction operation performed by the cardholder belongs to the target transaction type jurisdiction, the ATM11 responds to the transaction operation.
The "correspondence between the preset sets of transaction type permissions and biometric information included in the account opening information" may be stored in a database, which may be located in the ATM11, for example, or may be independent of the ATM11.
And a second condition: the correspondence between the preset sets of transaction type permissions and biometric information included in the account opening information is stored in the server 12.
In case two, the interaction between the ATM11 and the server 12 is required in the course of performing the authentication-based ATM withdrawal monitoring method.
The ATM11 acquires the card number of a bank card to be executed with transaction operation and then acquires the biological characteristic information of a card holder; after the collection is finished, the ATM11 sends the card number of the bank card and the collected biological characteristic information to the server 12, the server 12 obtains account opening information corresponding to the card number, and a target transaction type authority corresponding to the biological characteristic information of the card holder is searched from the corresponding relation between a plurality of preset transaction type authorities and the biological characteristic information included in the account opening information; the server 12 feeds back the search result to the ATM11, and if the search result received by the ATM11 is that the transaction operation implemented by the cardholder does not belong to the target transaction type authority, the ATM11 does not respond to the transaction operation; if the ATM11 receives the lookup result that the transaction operation performed by the cardholder belongs to the target transaction type authority, the ATM11 responds to the transaction operation.
The "correspondence between preset sets of transaction type permissions and biometric information included in the account opening information" may be stored in a database, which may be located in the server 12, or may be independent of the server 12.
Those skilled in the art will appreciate that the aforementioned ATMs and servers are merely exemplary and that other existing or future ATMs or servers, as may be suitable for use with the present disclosure, are intended to be included within the scope of the present disclosure and are hereby incorporated by reference.
The following describes an ATM withdrawal monitoring method based on identity verification according to the embodiment of the present application with reference to the above hardware architecture.
Referring to fig. 2, fig. 2 is a flowchart of an identity verification-based ATM withdrawal monitoring method, which may be applied to the ATM11 described above, according to an exemplary embodiment, and the method includes the following steps S201 to S206 in implementation.
Step S201: and acquiring the card number of the bank card to be subjected to transaction operation.
Exemplary, transaction operations include, but are not limited to: one or more of a deposit operation, a withdrawal operation, a transfer operation, a password modification operation, and an account balance checking operation.
Step S202: and acquiring account opening information corresponding to the card number, wherein the account opening information comprises a preset corresponding relation between multiple sets of transaction type authorities and biological characteristic information.
Exemplary transaction type permissions include: the cardholder is able to use the bank card to conduct transaction operations.
Exemplary biometric information includes, but is not limited to: fingerprint information, iris information, voiceprint information, finger vein information.
Exemplary, transaction type permissions include, but are not limited to: one or more of a deposit operation, a withdrawal operation, a transfer operation, a password modification operation, and an account balance checking operation.
In order to make those skilled in the art understand the correspondence between the multiple sets of transaction type permissions and biometric information mentioned in the embodiments of the present application, the following description is given by way of example. As shown in fig. 3, a schematic diagram of a corresponding relationship provided in the embodiment of the present application is shown.
In fig. 3, the card number of the bank card to be executed with the transaction operation is 6478123412341234; the users having the transaction type authority of the bank card comprise: chen II, zhang III, li IV, wang Wu, zhao Liu, sun Qin, zhouBa, wu Jiu; wherein, the biological characteristic information corresponding to the old two is fingerprint information 1; the biological characteristic information corresponding to Zhang III is fingerprint information 2; the biological characteristic information corresponding to the Lifours is voiceprint information 1; the biological characteristic information corresponding to the Wangwang is voiceprint information 2; the biological characteristic information corresponding to Zhao Liu is voiceprint information 3; the biological characteristic information corresponding to the sun seven is iris information 1; the biological characteristic information corresponding to the ZhouBa is iris information 2; the biological characteristic information corresponding to Wujiu is finger vein information; the corresponding relationship between the biological characteristic information and the transaction type authority is as follows: the transaction type authority corresponding to the fingerprint information 1 comprises: deposit operation, withdrawal operation, transfer operation, password modification operation and account balance checking operation; the transaction type authority corresponding to the fingerprint information 2 comprises: deposit operation, withdrawal operation, and transfer operation; the transaction type authority corresponding to the voiceprint information 1 is a deposit operation; the transaction type authority corresponding to the voiceprint information 2 is password modification operation; the transaction type authority corresponding to the voiceprint information 3 is an account balance checking operation; the transaction type authority corresponding to the iris information 1 comprises the following steps: withdrawal operation and transfer operation; the transaction type authority corresponding to the iris information 2 comprises: withdrawal operation and transfer operation; the transaction type authority corresponding to the finger vein information comprises the following steps: deposit operation and transfer operation.
Fig. 3 is an example, and does not limit the layout and content of the corresponding relationship between the multiple sets of transaction type rights and the biometric information.
As can be seen from fig. 3, the account holder sets the transaction type authority of the card holder for the bank card in advance, so that the purpose that the account holder can perform the transaction operation only through the biometric information is achieved, and the account holder can perform the transaction operation more flexibly while the financial security is ensured.
For example, fig. 3 shows a user name, which may not be included in the actual application. Here a user name for ease of subsequent instantiation.
Step S203: biometric information of the card holder is collected.
For example, since the preset biometric information types corresponding to each card number may be different or the same, there are two cases as follows.
In the first case: after the ATM completes the steps S201 and S202, all the biometric information types corresponding to the card number need to be determined, and after the determination is completed, the ATM controls the acquisition modules displaying all the biometric information types corresponding to the card number to prompt the card holder to select the corresponding acquisition module to acquire the biometric information.
Still taking fig. 3 as an example, when the cardholder uses a bank card with a card number 6478123412341234 to perform a transaction operation, after the ATM performs steps S201 and S202, all the biometric information types corresponding to the card number are determined, and as shown in fig. 3, all the biometric information types corresponding to the bank card with a card number 6478123412341234 include: fingerprint information, iris information, voiceprint information, finger vein information, control display acquisition interface, acquisition interface includes: the fingerprint collecting module is used for collecting fingerprint information of a card holder, the iris collecting module is used for collecting iris information of the card holder, the voiceprint collecting module is used for collecting voiceprint information of the card holder, the finger vein collecting module is used for collecting finger vein information of the card holder, the card holder can select the corresponding collecting module to collect biological characteristic information, for example, the card holder is Zhang three, the biological characteristic information corresponding to Zhang three is fingerprint information, and the Zhang three passes through the fingerprint collecting module to collect the fingerprint information.
For example, one user may set one or more kinds of biometric information in one bank card, and if the same user sets multiple kinds of biometric information, the transaction type authorities corresponding to different kinds of biometric information are different; or, if the same user has multiple kinds of biometric information, the transaction types corresponding to different kinds of biometric information have the same authority, and the embodiment of the present application is not limited.
In the second case: after the ATM completes the steps S201 and S202, the ATM does not need to determine all the biometric information types corresponding to the card number, and controls the acquisition modules displaying all the biometric information types that the ATM supports acquisition, so that the card holder selects the corresponding acquisition module to perform the acquisition of the biometric information.
Still taking fig. 3 as an example, when the cardholder uses the bank card with the card number 6478123412341234 to perform transaction operation, the ATM controls the display and collection interface after completing step S201 and step S202, because the ATM supports all the biometric information types collected as: fingerprint information, iris information, voiceprint information and finger vein information, so that the collection interface of the ATM control display comprises: the fingerprint collecting module is used for collecting fingerprint information of a card holder, the iris collecting module is used for collecting iris information of the card holder, the voiceprint collecting module is used for collecting voiceprint information of the card holder, the finger vein collecting module is used for collecting finger vein information of the card holder, the card holder can select the corresponding collecting module to collect biological characteristic information, for example, the card holder is Zhang three, the biological characteristic information corresponding to Zhang three is fingerprint information, and the Zhang three passes through the fingerprint collecting module to collect the fingerprint information.
Step S204: and searching the target transaction type authority corresponding to the biological characteristic information of the card holder from the corresponding relation between the plurality of sets of transaction type authorities and the biological characteristic information.
Illustratively, still taking the above-mentioned cardholder zhang san as an example, after the fingerprint information of zhang san is collected, the target transaction type authority corresponding to the collected fingerprint information is searched from the corresponding relationship shown in fig. 3, and if the similarity between the collected fingerprint information and the fingerprint information 2 is higher than or equal to the preset threshold, the target transaction type authority corresponding to the fingerprint information 2 is the target transaction type authority of zhang san, and thus determining the target transaction type authority that zhang san has includes: deposit operation, withdrawal operation, and transfer operation.
Step S205: and if the transaction operation carried out by the cardholder does not belong to the target transaction type authority, the transaction operation is not responded.
For example, still taking the cardholder zhang three as an example, if the transaction operation performed by the cardholder zhang three is a password modification operation, the target transaction type authority of zhang three acquired by the ATM includes: the ATM does not respond to the password modifying operation implemented by Zhang III because the transaction operation implemented by Zhang III is the password modifying operation which does not belong to the target transaction type authority of Zhang III.
Step S206: and if the transaction operation carried out by the cardholder belongs to the target transaction type authority, responding to the transaction operation.
For example, still taking the card holder three as an example, if the transaction operation performed by the card holder three is a withdrawal operation, the target transaction type authority of the card holder three acquired by the ATM includes: the ATM responds to the withdrawal operation implemented by Zhang III because the transaction operation implemented by Zhang III is the withdrawal operation and the withdrawal operation belongs to the target transaction type authority of Zhang III.
In summary, by acquiring the card number of the bank card to be subjected to the transaction operation and the account opening information corresponding to the card number, because the account opening information includes the corresponding relationship between the multiple sets of transaction type permissions preset by the account opening person and the biological characteristic information, the target transaction type permission corresponding to the collected biological characteristic information of the card holder can be searched from the corresponding relationship, if the transaction operation performed by the card holder belongs to the target transaction type permission, the transaction operation can be performed, so that the transaction operation not limited to the account opening person can be performed through the biological characteristic information, and after the corresponding relationship between the transaction type permission and the biological characteristic information is prestored, the transaction operation allowed by the transaction type permission can be performed, thereby ensuring the financial security and making the transaction operation more flexible.
In an optional implementation manner, if the bank card is stolen by an illegal person, the account holder does not know who has stolen the bank card, and even if the additional handling is subsequently performed, the identity of the illegal person is difficult to determine, so that the prevention is difficult. Under the condition, the embodiment of the application automatically stores the collected biological characteristic information and records the biological characteristic information in the bank blacklist after detecting that the comparison between the biological characteristic information prestored in the card holder and the biological characteristic information prestored in the bank card fails, so that an issuer can know the identity of the illegal molecule by checking the bank blacklist, and the illegal molecule is prevented. Based on this, the embodiments of the present application provide, but are not limited to, the following method, which includes the following steps a11 and a12.
Step A11: and if the target transaction type authority corresponding to the biological characteristic information of the card holder is not searched from the corresponding relationship between the plurality of sets of transaction type authorities and the biological characteristic information, generating an operation failure instruction, wherein the operation failure instruction comprises the biological characteristic information of the card holder.
Exemplarily, if the illegal party a performs a transaction operation using the stolen bank card shown in fig. 3, assuming that the acquisition module selected by the illegal party a is a fingerprint acquisition module, after the ATM finishes fingerprint acquisition, searching for a target transaction type authority corresponding to the acquired fingerprint information from the corresponding relationship shown in fig. 3, and if the similarity between the acquired fingerprint information and all fingerprint information stored in the corresponding relationship is lower than a preset threshold, determining that the fingerprint information does not have the corresponding target transaction type authority, thereby determining that the illegal party a does not have the target transaction type authority of the bank card, so that the ATM generates an operation failure instruction, where the operation failure instruction includes: fingerprint information of illegal molecule a.
Step A12: and sending the operation failure instruction to a server, wherein the operation failure instruction is used for instructing the server to input the biological characteristic information of the card holder into a bank blacklist.
Illustratively, in the example of the step a11, after the ATM generates the operation failure instruction, the operation failure instruction is sent to the server, and after the server receives the operation failure instruction, the server records the received fingerprint information of the illegal molecule a into the bank blacklist according to the operation failure instruction.
In conclusion, after the comparison failure of the biological characteristic information prestored in the card holder and the bank card is detected, the ATM automatically stores the collected biological characteristic information, the collected biological characteristic information is uploaded to the server, the biological characteristic information is recorded in the bank blacklist through the server, the limitation on illegal molecules can be realized, and when an account holder needs to check who steals the bank card, the bank can provide the information recorded by the bank blacklist to the account holder, so that the account holder can know who steals the bank card, and the prevention can be realized.
In an alternative embodiment, there is a case where the cardholder does not have the target transaction type authority of the bank card, and thus cannot use the bank card to perform the transaction operation, but the cardholder is a user who is allowed to use the bank card by the issuer, and only the correspondence between the biometric information and the target transaction type authority has not been established yet through the bank counter, for example, the issuer encounters an emergency, or the issuer is inconvenient to use the bank card to perform the operation, and then the cardholder is entrusted to use the bank card to perform the transaction operation, and if the cardholder goes to the bank counter to establish the correspondence between the biometric information and the target transaction type authority, the operation is cumbersome. Under the condition, the embodiment of the application inquires whether the issuer authorizes the cardholder or not when the target transaction type authority corresponding to the biometric information of the cardholder is not found in the corresponding relation, and if the issuer authorizes the cardholder, the corresponding relation between the biometric information of the cardholder and the transaction type authority granted by the issuer is established, so that the problem that the corresponding relation can be established without going to a bank counter when the cardholder does not have the target transaction type authority of a bank card is solved. Based on this, the present embodiment provides, but is not limited to, a method including the following steps B11 to B13.
Step B11: and if the target transaction type authority corresponding to the biological characteristic information of the card holder is not found from the corresponding relationship between the plurality of sets of transaction type authorities and the biological characteristic information, sending a first 5G fifth-generation mobile communication technology message for judging whether the card holder is granted with the transaction type authority or not to the terminal equipment logged with the communication account corresponding to the card number.
For example, assuming that the biometric information collected by the ATM is voiceprint information, if the similarity between the collected voiceprint information and all stored voiceprint information in the corresponding relationship is lower than a preset threshold, it is determined that the voiceprint information does not have a corresponding target transaction type authority, and therefore, a first 5G message of whether to grant the card holder transaction type authority is sent to the terminal device which logs in the communication account corresponding to the card number.
Illustratively, the first 5G message may be: for example, the terminal device controls an authorization interface for granting the transaction type authority of the cardholder to enable the issuer to select the transaction type authority granted to the cardholder in the authorization interface, and details of the transaction type authority granted to the cardholder are shown in fig. 4A and 4B.
In order to make those skilled in the art more aware of the authority granted to the cardholder for the transaction type mentioned in the embodiments of the present application, the following description is given by way of example. As shown in fig. 4A and 4B, schematic diagrams of the authorization of transaction type for cardholders are provided in the embodiment of the present application.
Still taking fig. 3 as an example, the transaction type permissions that a bank card with a card number 6478123412341234 may be granted include: deposit operation, withdrawal operation, transfer operation, password modification operation and account balance checking operation.
For example, if the account issuer receives the first 5G message and clicks "allow authorization", the terminal device may display an authorization interface as shown in fig. 4A, and the transaction type authority that the account issuer may grant includes: deposit operation, withdrawal operation, transfer operation, password modification operation and account balance checking operation; the issuer may drag the authorized target transaction type authority to the authorization area, for example, the issuer has dragged the deposit operation to be completed, the withdrawal operation is being dragged, and the issuer drags the authorization interface after completing the authorization interface that the issuer wants to authorize all the target transaction type authorities as shown in fig. 4B, the transaction type authority granted by the issuer to the cardholder includes: deposit operation, withdrawal operation; after the account issuer completes authorization, the account issuer clicks the display screen to complete authorization.
Fig. 4A and 4B are only examples, and do not limit the layout and content of the authorization interface.
As can be seen from fig. 4A and 4B, after receiving the first 5G message sent by the ATM, the issuer of the bank card can send the transaction type right to be authorized to the ATM, and after receiving the transaction type right granted by the issuer, the ATM can establish a corresponding relationship between the biometric information of the cardholder and the transaction type right granted by the issuer according to the granted transaction type right, so that when the cardholder does not have the target transaction type right of the bank card, the corresponding relationship can be established without going to a bank counter, and the operation is simple and convenient.
For example, if the account issuer does not need authorization, after the click forbids authorization, step a11 and step a12 are executed.
Step B12: and receiving a second 5G message fed back by the terminal equipment, wherein the second 5G message carries the identity information of the account holder and the transaction type authority granted by the account holder.
For example, the ATM needs to verify whether the account opening person is authorized by itself, so the second 5G message needs to carry identity information of the account opening person by itself, and if the identity information is verified, it is determined that the account opening person is authorized by itself.
Exemplary account issuer identity information includes, but is not limited to: the account holder comprises one or more of the biometric information of the account holder, the identity card number of the account holder and the name of the account holder.
Illustratively, the terminal device of the account issuer receives the first 5G message sent by the ATM, and if the account issuer needs authorization, after clicking the authorization permission, the terminal device prompts the account issuer to input identity information, assuming that the identity information of the account issuer includes: the biometric information of the issuer and the identification number of the issuer, after the issuer finishes the collection of the biometric information and the input of the identification number, the authorization operation as shown in fig. 4A and 4B is carried out, and after the authorization is finished, the second 5G message including the identity information and the transaction type authority granted by the issuer is sent to the ATM.
Step B13: and if the identity information carried by the second 5G message is consistent with the reserved identity information corresponding to the card number, establishing a corresponding relation between the biological feature information of the card holder and the transaction type authority granted by the account issuer.
Illustratively, taking the example of the step B12 as an example, after receiving the second 5G message fed back by the account issuer, comparing the identity information carried in the second 5G message with the reserved identity information corresponding to the card number, and if the comparison is consistent, constructing a corresponding relationship between the biometric information of the card holder and the transaction type authority granted by the account issuer.
Illustratively, if the corresponding relationship between the biometric information of the card holder and the transaction type authority granted by the account holder is successfully constructed, the step S203 is returned to the execution step S203, that is, the step S203 is executed again to acquire the biometric information, and the target transaction type authority corresponding to the acquired biometric information is searched from the updated corresponding relationship, or the corresponding target transaction type authority is searched from the updated corresponding relationship based on the biometric information acquired when the step S203 is executed for the first time.
In summary, when the target transaction type right corresponding to the biometric information of the cardholder is not found in the correspondence, the issuer is asked whether to authorize the cardholder to perform the operation, and if the issuer authorizes the account, the correspondence between the biometric information of the cardholder and the transaction type right granted by the issuer is established, so that the problem that when the cardholder does not have the target transaction type right of the bank card, the correspondence can be established without going to a bank counter is solved, and the operation is simple and convenient.
In an alternative embodiment, to enhance financial security in a bank card account, the ATM may respond to a transaction by having the cardholder enter a reserved password for the bank card after determining that the transaction performed by the cardholder belongs to the target transaction type authority, and if the password is verified. Based on this, the embodiments of the present application provide, but are not limited to, a method including the following steps C11 to C13.
Step C11: and controlling to display a password input interface.
Step C12: and acquiring the password input by the card holder.
Step C13: and if the password is the same as the reserved password corresponding to the card number, executing the transaction operation responding step.
Illustratively, the reserved password may be 123456. For example, the cardholder inputs the password of 123456, the input password is identical to the reserved password, and the ATM performs step S206.
Illustratively, the reserved password may be 123456. For example, the cardholder inputs 654321 as the password, the input password is different from the reserved password, and the ATM performs step a11 and step a12.
In summary, the financial security in the bank card account is enhanced by verifying the identity of the cardholder with the password again after determining that the transaction operation performed by the cardholder belongs to the target transaction type authority, and only after the password verification is also passed will the ATM respond to the transaction operation performed by the cardholder.
In an alternative embodiment, in order to enhance the financial security in the bank card account, if the account issuer only needs the card holder to perform the transaction operations for a specific number of times, the target transaction type authority of the card holder is removed after the number of transaction operations performed by the card holder reaches the specific number of times, so as to enhance the financial security in the bank card account. Based on this, the present embodiment provides, but is not limited to, the following method, which includes the following steps D11 and D12.
Step D11: and deducting the upper limit of the transaction times.
Illustratively, the transaction type privilege includes an upper limit on the number of transactions.
For the card holder, there are one or more transaction operations that can be performed on the bank card, and for different transaction operations, the upper limit of the transaction times corresponding to each transaction operation may be the same or different.
It can be understood that, since the transaction operation to be performed by the cardholder is already determined in steps S201 to S205, the upper limit of the transaction times of the transaction type authority corresponding to the transaction operation is deducted after the transaction operation is successfully responded to for the transaction operation.
For example, taking the above card holder zhang san as an example, the target transaction type authority that zhang san has is the target transaction type authority corresponding to the fingerprint information 2, including: deposit operation, withdrawal operation, and transfer operation. The upper limits of the times of granting the target transaction type authority of Zhang III by the account issuer are respectively: the upper limit of the transaction times of the deposit operation is 3 times, the upper limit of the transaction times of the withdrawal operation is 5 times, and the upper limit of the transaction times of the transfer operation is 6 times. Suppose that Zhang III uses a bank card to perform deposit operation for 2 times, withdrawal operation for 4 times and transfer operation for 3 times, if the current transaction operation is withdrawal operation and withdrawal is successful, the upper limit of the transaction times of the withdrawal operation is reduced by 1, the upper limit of the transaction times of the withdrawal operation is finally obtained as 0 time, and the upper limit of the transaction times of the transfer operation and the upper limit of the transaction times of the deposit operation are unchanged.
Step D12: and if the upper limit deduction of the transaction times is not larger than zero, eliminating the target transaction type authority corresponding to the second biological characteristic information.
For example, taking the above cardholder zhang three as an example, the upper limits of the number of target transaction type permissions of zhang three at the current time are respectively: the upper limit of the transaction times of the deposit operation is 1 time, the upper limit of the transaction times of the withdrawal operation is 0 time, and the upper limit of the transaction times of the transfer operation is 3 times. Because the upper limit of the transaction times of the withdrawal operation is equal to 0 time, the withdrawal operation corresponding to the fingerprint information 2 is eliminated, and the target transaction type authority of Zhang III at this time is updated to be: deposit operation and transfer operation.
In summary, the issuer can set the upper limit of the transaction times of the target transaction type authority possessed by the cardholder, and after the number of transaction operations performed by the cardholder reaches a specific number, the target transaction type authority of the cardholder is eliminated, so as to enhance the financial security in the bank card account.
It is understood that the issuer may not only set the upper limit of transaction times, but also set the upper limit of transaction amount for deposit operation, withdrawal operation and transfer operation, and set the validity period for the authorization of transaction type, which will be illustrated below.
The condition of transaction amount upper limit is set for deposit operation, withdrawal operation and transfer operation of an account holder.
For example, taking the above-mentioned card holder zhang san as an example, zhang san has the target transaction type authority corresponding to the fingerprint information 2: deposit operation, withdrawal operation, and transfer operation. Taking the withdrawal operation as an example, assuming that the transaction amount upper limit of the withdrawal operation corresponding to the fingerprint information 2 set by the account holder is 30000, assuming that the withdrawal is performed by Zhang three 40000, the withdrawal fails because 40000 is larger than the transaction amount upper limit 30000 of the withdrawal operation. Assuming that Zusanyi withdraws money 20000, because 20000 is smaller than the upper limit of the transaction amount of the withdrawal operation 30000, the withdrawal is successful, after the ATM successfully executes the withdrawal operation, the upper limit of the transaction amount of the withdrawal operation corresponding to the fingerprint information 2 is deducted, and the upper limit of the transaction amount of the withdrawal operation corresponding to the fingerprint information 2 is deducted 20000, so that the upper limit of the transaction amount of the withdrawal operation corresponding to the fingerprint information 2 is 10000.
For the case that the issuer sets the validity period for the transaction type authority, the embodiment of the present application provides the following steps E11 and E12.
For the card holder, there are one or more transaction operations that can be performed on the bank card, and for different transaction operations, the valid period corresponding to each transaction operation may be the same or may be different.
Step E11: and if the current time is later than the valid period contained in the target transaction type authority, the transaction operation is not responded.
For example, taking the above cardholder zhang as an example, the target transaction type authority of zhang is the target transaction type authority corresponding to the fingerprint information 2: deposit operation, withdrawal operation, and transfer operation. Wherein, the valid period set by the account holder for the deposit operation of Zhao is 8 months, 25 days and 12 days, the valid period of the withdrawal operation is 8 months, 15 days and 12 days, and the valid period of the transfer operation is 8 months, 20 days and 12 days. Suppose Zusanli is 8 months and 18 days: 00 uses bank card to make withdrawal operation, since 8 months, 18 days, 18:00 is 12 months and 15 days later than the valid period 8 included in the withdrawal operation, and the ATM does not respond to the withdrawal operation.
Step E12: and if the current time is earlier than the valid period contained in the target transaction type authority, executing the transaction operation responding step.
For example, taking the above-mentioned card holder zhang san as an example, zhang san has the target transaction type authority corresponding to the fingerprint information 2: deposit operation, withdrawal operation, and transfer operation. Wherein, the validity period of the deposit operation of the account issuer for Zhang III is 8 months, 25 days and 12 days, the validity period of the withdrawal operation is 8 months, 15 days and 12 days, and the validity period of the transfer operation is 8 months, 20 days and 12 days. Suppose Zusanli is 8 months and 8 days 18:00 withdrawal operation using bank card, since 8 months, 8 days 18:00 is earlier than the valid period 8, 15, 12 included in the withdrawal operation, 00, the ATM performs step S206.
The method is described in detail in the embodiments disclosed in the present application, and the method of the present application can be implemented by using various types of apparatuses, so that the present application also discloses an apparatus, and the following detailed description is given for specific embodiments.
Referring to fig. 5, fig. 5 is a block diagram of an authentication-based ATM withdrawal monitoring apparatus provided according to an example embodiment, the apparatus comprising: a first obtaining unit 51, a second obtaining unit 52, an acquiring unit 53, a searching unit 54, a first responding unit 55 and a second responding unit 56, wherein:
the first obtaining unit 51 is used for obtaining the card number of the bank card to be executed with the transaction operation.
The second obtaining unit 52 is configured to obtain account opening information corresponding to the card number, where the account opening information includes a preset correspondence between multiple sets of transaction type permissions and biometric information.
And the acquisition unit 53 is used for acquiring the biometric information of the card holder.
The searching unit 54 is configured to search the target transaction type authority corresponding to the biometric information of the card holder from the correspondence between the plurality of sets of transaction type authorities and the biometric information.
A first response unit 55, configured to not respond to the transaction operation performed by the cardholder if the transaction operation does not belong to the target transaction type authority.
A second response unit 56, configured to respond to the transaction operation performed by the cardholder if the transaction operation belongs to the target transaction type authority.
In an optional implementation manner, the ATM withdrawal monitoring apparatus based on identity authentication further includes:
and the generating module is used for generating an operation failure instruction if the target transaction type authority corresponding to the biological characteristic information of the card holder is not found from the corresponding relation between the plurality of sets of transaction type authorities and the biological characteristic information, wherein the operation failure instruction comprises the biological characteristic information of the card holder.
The first sending module is used for sending the operation failure instruction to a server, and the operation failure instruction is used for indicating the server to input the biological characteristic information of the card holder into a bank blacklist.
In an optional implementation manner, the ATM withdrawal monitoring apparatus based on identity authentication further includes:
and the second sending module is used for sending a first 5G fifth-generation mobile communication technology message whether to grant the transaction type authority of the card holder to the terminal equipment which logs in the communication account corresponding to the card number if the target transaction type authority corresponding to the biological characteristic information of the card holder is not found from the corresponding relationship between the plurality of sets of transaction type authorities and the biological characteristic information.
And the receiving module is used for receiving a second 5G message fed back by the terminal equipment, wherein the second 5G message carries the identity information of the account issuer and the transaction type authority granted by the account issuer.
And the construction module is used for constructing the corresponding relation between the biological characteristic information of the card holder and the transaction type authority granted by the account holder if the identity information carried by the second 5G message is consistent with the reserved identity information corresponding to the card number.
In an optional implementation manner, the ATM withdrawal monitoring apparatus based on identity authentication further includes:
and the display module is used for controlling and displaying the password input interface.
And the acquisition module is used for acquiring the password input by the card holder.
And the first execution module is used for executing the second response unit if the password is the same as the reserved password corresponding to the card number.
In an optional implementation manner, the ATM withdrawal monitoring apparatus based on authentication, where the transaction type authority includes a transaction upper limit, and after the second response unit is executed, the apparatus further includes:
and the deduction sub-module is used for deducting the upper limit of the transaction times.
And the eliminating submodule is used for eliminating the target transaction type authority corresponding to the second biological characteristic information if the upper limit deduction of the transaction times is reduced to zero.
In an optional implementation manner, the ATM withdrawal monitoring apparatus based on identity verification, where the transaction type authority includes an authority valid duration upper limit, further includes:
and the response module is used for not responding to the transaction operation if the current time is later than the valid period contained in the target transaction type authority.
And the second execution module is used for executing the second response unit if the current time is earlier than the valid period contained in the target transaction type authority.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
FIG. 6 is a block diagram of an apparatus, which may be an ATM11, provided in accordance with an exemplary embodiment, including but not limited to: a processor 61, a memory 62, a network interface 63, an I/O controller 64, and a communication bus 65.
It should be noted that the structure of the device shown in fig. 6 is not intended to limit the device, and the device may include more or less components than those shown in fig. 6, or some components may be combined, or a different arrangement of components may be used, as will be appreciated by those skilled in the art.
The following is a detailed description of the various components of the apparatus of fig. 6:
the processor 61 is a control center of the apparatus, connects various parts of the entire apparatus using various interfaces and lines, performs various functions of the apparatus and processes data by running or executing software programs and/or modules stored in the memory 62 and calling data stored in the memory 62, thereby performing overall monitoring of the apparatus. Processor 61 may include one or more processing units; illustratively, the processor 61 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 61.
Processor 61 may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), one or more Integrated circuits configured to implement embodiments of the present invention, or the like.
The Memory 62 may include Memory, such as a Random-Access Memory (RAM) 621 and a Read-Only Memory (ROM) 622, and may also include a mass storage device 623, such as at least 1 disk storage. Of course, the device may also include hardware required for other services.
The memory 62 is configured to store the executable instructions of the processor 61. The processor 61 has the functions shown in the ATM withdrawal monitoring method based on authentication.
A wired or wireless network interface 63 is configured to connect the server to a network.
The processor 61, the memory 62, the interface 63, and the I/O controller 64 may be connected to each other by a communication bus 65, which may be an ISA (Industry Standard Architecture) bus, a PCI (peripheral component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc.
In an exemplary embodiment, the device may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the authentication-based ATM withdrawal monitoring method as provided by any of the embodiments of the present disclosure.
In an exemplary embodiment there is also provided a computer readable storage medium having instructions which, when executed by a processor of an ATM11, enable the ATM11 to perform an authentication-based ATM withdrawal monitoring method as described in any one of the above.
In an exemplary embodiment there is also provided a computer program product directly loadable into the internal memory of a computer comprised by the ATM11 and containing software code, the computer program being such that, when loaded and executed by a computer, it is able to carry out the authentication based ATM withdrawal monitoring method as defined in any one of the above.
It should be noted that the ATM withdrawal monitoring method, device, medium and product based on identity authentication provided by the present invention can be used in the financial field or other fields. The other fields are arbitrary fields other than the financial field, for example, the field of system management. The above description is only an example, and does not limit the application fields of the ATM withdrawal monitoring method, device, medium and product based on identity authentication provided by the present invention.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice in the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements that have been described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
It should be noted that the features described in the embodiments in the present specification may be replaced with or combined with each other. For the device or system type embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment. It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Those skilled in the art will appreciate that the above-described ATMs are by way of example only, and that other existing or future ATMs, as may be suitable for use with the present disclosure, are intended to be included within the scope of the present disclosure and are hereby incorporated by reference.

Claims (10)

1. An ATM (automatic teller machine) withdrawal monitoring method based on identity authentication is characterized by comprising the following steps:
acquiring a card number of a bank card to be subjected to transaction operation;
acquiring account opening information corresponding to the card number, wherein the account opening information comprises a preset corresponding relation between multiple groups of transaction type authorities and biological characteristic information;
collecting the biological characteristic information of a card holder;
searching a target transaction type authority corresponding to the biological characteristic information of the card holder from the corresponding relation between the plurality of sets of transaction type authorities and the biological characteristic information;
if the transaction operation carried out by the cardholder does not belong to the target transaction type authority, the transaction operation is not responded;
and if the transaction operation implemented by the cardholder belongs to the target transaction type authority, responding to the transaction operation.
2. The identity verification-based ATM cash withdrawal monitoring method of claim 1, further comprising:
if the target transaction type authority corresponding to the biological characteristic information of the card holder is not searched from the corresponding relationship between the multiple groups of transaction type authorities and the biological characteristic information, generating an operation failure instruction, wherein the operation failure instruction comprises the biological characteristic information of the card holder;
and sending the operation failure instruction to a server, wherein the operation failure instruction is used for instructing the server to input the biological characteristic information of the card holder into a bank blacklist.
3. An identity verification based ATM withdrawal monitoring method according to claim 1 or 2, further comprising:
if the target transaction type authority corresponding to the biological characteristic information of the card holder is not searched from the corresponding relationship between the plurality of sets of transaction type authorities and the biological characteristic information, sending a first 5G fifth-generation mobile communication technology message for judging whether the card holder is granted with the transaction type authority or not to the terminal equipment logged with the communication account corresponding to the card number;
receiving a second 5G message fed back by the terminal device, wherein the second 5G message carries the identity information of the account holder and the transaction type authority granted by the account holder;
and if the identity information carried by the second 5G message is consistent with the reserved identity information corresponding to the card number, establishing a corresponding relation between the biological feature information of the card holder and the transaction type authority granted by the account issuer.
4. An ATM withdrawal monitoring method based on identity verification according to claim 1 or 2, further comprising:
controlling and displaying an input password interface;
acquiring a password input by the card holder;
and if the password is the same as the reserved password corresponding to the card number, executing the transaction operation responding step.
5. An ATM withdrawal monitoring method based on identity verification as claimed in claim 1 or claim 2 wherein said transaction type entitlement includes a transaction time cap, and further comprising, after said step of responding to said transaction operation if said transaction operation performed by said cardholder belongs to said target transaction type entitlement:
deducting the upper limit of the transaction times;
and if the upper limit deduction of the transaction times is reduced to zero, eliminating the target transaction type authority corresponding to the second biological characteristic information.
6. An identity verification based ATM withdrawal monitoring method according to claim 1 or 2, wherein the transaction type permissions include expiry dates, further comprising:
if the current time is later than the valid period contained in the target transaction type authority, the transaction operation is not responded;
and if the current time is earlier than the valid period contained in the target transaction type authority, executing the transaction operation responding step.
7. An ATM withdrawal monitoring device based on identity authentication, comprising:
the first acquisition unit is used for acquiring the card number of a bank card to be subjected to transaction operation;
the second acquisition unit is used for acquiring account opening information corresponding to the card number, wherein the account opening information comprises a preset corresponding relation between a plurality of groups of transaction type authorities and biological characteristic information;
the acquisition unit is used for acquiring the biological characteristic information of a card holder;
the searching unit is used for searching the target transaction type authority corresponding to the biological characteristic information of the card holder from the corresponding relation between the plurality of sets of transaction type authorities and the biological characteristic information;
the first response unit is used for not responding to the transaction operation if the transaction operation carried out by the cardholder does not belong to the target transaction type authority;
and the second response unit is used for responding to the transaction operation if the transaction operation carried out by the cardholder belongs to the target transaction type authority.
8. An Automatic Teller Machine (ATM), comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the authentication-based ATM withdrawal monitoring method of any one of claims 1 to 6.
9. A computer readable storage medium having instructions which, when executed by a processor of an automated teller machine, ATM, enable the ATM to perform the authentication based ATM withdrawal monitoring method of any one of claims 1 to 6.
10. A computer program product directly loadable into the internal memory of a computer, said memory being the memory comprised by the ATM of claim 8 and containing software code, said computer program being loadable through the computer and executable to implement the authentication based ATM withdrawal monitoring method of any one of claims 1 to 6.
CN202210980610.7A 2022-08-16 2022-08-16 ATM withdrawal monitoring method, equipment, medium and product based on identity verification Pending CN115345623A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210980610.7A CN115345623A (en) 2022-08-16 2022-08-16 ATM withdrawal monitoring method, equipment, medium and product based on identity verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210980610.7A CN115345623A (en) 2022-08-16 2022-08-16 ATM withdrawal monitoring method, equipment, medium and product based on identity verification

Publications (1)

Publication Number Publication Date
CN115345623A true CN115345623A (en) 2022-11-15

Family

ID=83952261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210980610.7A Pending CN115345623A (en) 2022-08-16 2022-08-16 ATM withdrawal monitoring method, equipment, medium and product based on identity verification

Country Status (1)

Country Link
CN (1) CN115345623A (en)

Similar Documents

Publication Publication Date Title
US20210295304A1 (en) Systems and methods for transacting at an atm using a mobile device
US7802723B2 (en) System and method for nameless biometric authentication and non-repudiation validation
US6095413A (en) System and method for enhanced fraud detection in automated electronic credit card processing
US10282717B1 (en) Card-less financial transaction
US20110071946A1 (en) Credit applicant and user authentication solution
US20080249947A1 (en) Multi-factor authentication using a one time password
US20150287017A1 (en) Systems and Methods for Transacting at an ATM Using a Mobile Device
CN109389457A (en) Method of network entry, device, equipment and the readable storage medium storing program for executing of application gathering permission
US11514146B2 (en) Risk-based biometric identification and authentication with trusted source for security access
EP2979258A1 (en) Security system
US20210201294A1 (en) Bank card privacy information hiding method, bank card and computer readable storage medium
US20160328717A1 (en) BioWallet Biometrics Platform
CN105956858B (en) Payment method and electronic equipment
US20070233667A1 (en) Method and apparatus for sample categorization
US20200364722A1 (en) Biometric payment processing that configures payment processing for a determined merchant of record
CN115345623A (en) ATM withdrawal monitoring method, equipment, medium and product based on identity verification
US20210185036A1 (en) Secure authentication system
CN113989949A (en) ETC payment method, ETC payment device, ETC payment server and ETC payment medium
JP2014106793A (en) ATM limited payment system
WO2021234476A1 (en) De-identified identity proofing methods and systems
CN117975632A (en) Safe withdrawal method and device of ATM, ATM and medium
CN115345624A (en) Bank card and account product association method and device, electronic equipment and product
CN111681010A (en) Transaction verification method and device
JP2006092477A (en) Account management apparatus and account management method
CN115293768A (en) Method, device, server and medium for transaction by using entity card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination