CN115471958A - Long key processing method, device, equipment and medium - Google Patents

Long key processing method, device, equipment and medium Download PDF

Info

Publication number
CN115471958A
CN115471958A CN202110650315.0A CN202110650315A CN115471958A CN 115471958 A CN115471958 A CN 115471958A CN 202110650315 A CN202110650315 A CN 202110650315A CN 115471958 A CN115471958 A CN 115471958A
Authority
CN
China
Prior art keywords
key
key information
long
abnormal event
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110650315.0A
Other languages
Chinese (zh)
Other versions
CN115471958B (en
Inventor
陈盘中
胡小敏
王庆华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yihua Time Technology Co Ltd
Original Assignee
Shenzhen Yihua Time Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yihua Time Technology Co Ltd filed Critical Shenzhen Yihua Time Technology Co Ltd
Priority to CN202110650315.0A priority Critical patent/CN115471958B/en
Publication of CN115471958A publication Critical patent/CN115471958A/en
Application granted granted Critical
Publication of CN115471958B publication Critical patent/CN115471958B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/209Monitoring, auditing or diagnose of functioning of ATMs

Abstract

The invention discloses a long key processing method, which analyzes whether a long key abnormal event is an artificial key abnormality caused by an artificial reason or a hardware key abnormality caused by a hardware reason instead of a pure automatic card quitting, and switches equipment to a first safety mode or a second safety mode based on different reasons to guide a client to perform the next round of correct transaction operation. Furthermore, after entering the second safety mode, the device is determined to enter the third safety mode or the fourth safety mode according to the next key information, so that the user is further guided to complete the operation. Therefore, the working efficiency of the self-service equipment in the intelligent bank is improved, the machine does not need to be stopped to terminate the business when a long key is pressed, the working mode is intelligently switched, and a client is accurately guided to correctly use the keyboard to continue corresponding transactions. In addition, a long key processing apparatus, a device and a storage medium are also proposed.

Description

Long key processing method, device, equipment and medium
Technical Field
The invention relates to the technical field of financial terminals, in particular to a method, a device, equipment and a medium for processing a long key.
Background
The intelligent bank is the mainstream development trend of the current bank, the popularization of the intelligent bank depends on an advanced financial intelligent terminal, the business handling does not need to wait in a queue, and the business handling such as activating, electronic bank signing, password and loss reporting unlocking can be completed only by slightly touching the financial intelligent terminal.
However, the intelligent bank has no staff to maintain the equipment at any time, and the business handling is also affected once the equipment fails, for example, when the keys of the existing encryption keyboard are pressed for a long time, the key information is generally continuously sent to the PC and is returned to the PC, active analysis and filtering cannot be performed, so that other key information cannot be normally sent, the user cannot correctly input account information and passwords, the financial terminal equipment can only automatically withdraw the card finally, and the transaction is ended in failure. Therefore, the long key processing in the prior art is too simple to perform reasonable logical processing.
Disclosure of Invention
In view of the above, it is necessary to provide a method, an apparatus, a device, and a medium for processing a long key that intelligently switches an operation mode, in view of the above problems.
A processing method of a long key comprises the following steps:
when a plurality of pieces of same key information which are sent upwards are continuously received and the key intervals of the same key information are smaller than or equal to a preset interval, determining that a long key abnormal event exists, wherein the long key abnormal event comprises man-made key abnormality and hardware key abnormality;
judging whether the long key abnormal event is artificial key abnormality or hardware key abnormality according to the key total duration and the key frequency of the same key information, entering a first safety mode to process the long key abnormal event when the long key abnormal event is determined to be artificial key abnormality, pausing the long key abnormal event, entering a second safety mode to process the long key abnormal event when the long key abnormal event is determined to be hardware key abnormality, and notifying to maintain hardware in the second safety mode;
when the second safety mode is carried out, judging whether next key information is received or not, wherein the next key information is information sent at the next bit of the same key information;
if the next key information is not received, entering a third safety mode to process the long key abnormal event, wherein the third safety mode performs trial and error on the same key information, if the next key information is received, entering a fourth safety mode to process the long key abnormal event, and the fourth safety mode performs trial and error on the same key information and the next key information.
In one embodiment, the determining that the long key abnormal event is an artificial key abnormality or a hardware key abnormality according to the total key duration and the number of keys of the same key information includes:
if the total key press duration is less than or equal to a preset duration threshold, the key press times are greater than or equal to a preset first time threshold and less than or equal to a second time threshold, and the first time threshold is less than the second time threshold, determining that the long key press abnormal event is an artificial key press abnormality;
and if the total key press duration is greater than the duration threshold and the key press times are greater than the second time threshold, judging that the long key press abnormal event is a hardware key press abnormality.
In one embodiment, the entering the first security mode to process the long key exception event includes:
and clearing the uploaded key information, recording the long key abnormal event, and reminding the user that the long key abnormal event is currently generated.
In one embodiment, the entering the second security mode processes the long key exception event, which includes:
and sending the long key abnormal event to a background so as to inform maintenance personnel establishing communication connection with the background to maintain.
In one embodiment, the entering the third security mode to process the long key exception event includes:
if the same key information is in a plaintext, disconnecting the same key information from a first keyboard which is currently used, keeping one of the continuously sent same key information as input key information, and taking the input key information as the last bit of the current input to carry out account number correctness verification at an application end; if the correctness verification does not pass, starting a second keyboard, and reminding a user to re-input key information on the second keyboard;
if the same key information is the ciphertext, disconnecting the connection with the first keyboard, starting the second keyboard, and reminding a user to re-input the key information on the second keyboard.
In one embodiment, the entering the fourth security mode to process the long key exception event includes:
if the same key information is in a plaintext, disconnecting the same key information from a first keyboard which is currently used, reserving one of the continuously sent same key information as input key information, and using the input key information as the last bit of current input to perform first verification of an account number at an application end;
if the first verification is not passed, taking the next key information as the input key information, and taking the input key information as the last currently input bit to perform second verification on the account at the application terminal;
if the second verification is not passed, starting a second keyboard, and reminding a user to re-input key information on the second keyboard;
and if the same key information is the ciphertext, disconnecting the connection with the first keyboard, starting the second keyboard, and reminding a user of re-inputting the key information in the second keyboard.
In one embodiment, the plaintext includes an amount and an account number, and the ciphertext includes an input password and a key.
A long key handling device, the device comprising:
the long key abnormal event judgment module is used for determining that a long key abnormal event exists when a plurality of pieces of same key information which are sent upwards are continuously received and the key interval of the same key information is less than or equal to a preset interval, wherein the long key abnormal event comprises man-made key abnormality caused by man-made reasons and hardware key abnormality caused by hardware reasons;
the first processing module is used for determining that the long key abnormal event is artificial key abnormity or hardware key abnormity according to the key total time and the key frequency of the same key information, entering a first safety mode to process the long key abnormal event when the long key abnormal event is determined to be artificial key abnormity, and entering a second safety mode to process the long key abnormal event when the long key abnormal event is determined to be hardware key abnormity;
the key type judging module is used for judging whether next key information is received or not when the second safety mode is carried out, wherein the next key information is information sent at the next position of the same key information;
and the second processing module is used for entering a third safety mode to process the long key abnormal event if the next key information is received, and entering a fourth safety mode to process the long key abnormal event if the next key information is not received.
A computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
when a plurality of pieces of same key information which are sent upwards are continuously received and the key intervals of the same key information are smaller than or equal to a preset interval, determining that a long key abnormal event exists, wherein the long key abnormal event comprises man-made key abnormality and hardware key abnormality;
judging whether the long key abnormal event is artificial key abnormality or hardware key abnormality according to the total key duration and the key pressing times of the same key information, entering a first safety mode to process the long key abnormal event when the long key abnormal event is determined to be artificial key abnormality, pausing the long key abnormal event, entering a second safety mode to process the long key abnormal event when the long key abnormal event is determined to be hardware key abnormality, and notifying to maintain hardware in the second safety mode;
when the second safety mode is carried out, judging whether next key information is received or not, wherein the next key information is information sent at the next bit of the same key information;
if the next key information is not received, entering a third safety mode to process the long key abnormal event, wherein the third safety mode performs trial and error on the same key information, if the next key information is received, entering a fourth safety mode to process the long key abnormal event, and the fourth safety mode performs trial and error on the same key information and the next key information.
A long key processing device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of:
when a plurality of pieces of same key information which are sent upwards are continuously received and the key intervals of the same key information are smaller than or equal to a preset interval, determining that a long key abnormal event exists, wherein the long key abnormal event comprises man-made key abnormality and hardware key abnormality;
judging whether the long key abnormal event is artificial key abnormality or hardware key abnormality according to the key total duration and the key frequency of the same key information, entering a first safety mode to process the long key abnormal event when the long key abnormal event is determined to be artificial key abnormality, pausing the long key abnormal event, entering a second safety mode to process the long key abnormal event when the long key abnormal event is determined to be hardware key abnormality, and notifying to maintain hardware in the second safety mode;
when the second safety mode is carried out, judging whether next key information is received or not, wherein the next key information is information sent at the next position of the same key information;
if the next key information is not received, entering a third safety mode to process the long key abnormal event, wherein the third safety mode performs trial and error on the same key information, if the next key information is received, entering a fourth safety mode to process the long key abnormal event, and the fourth safety mode performs trial and error on the same key information and the next key information.
The invention provides a method, a device, equipment and a medium for processing a long key, which are used for analyzing whether a long key abnormal event occurs and is caused by man-made key abnormality or hardware key abnormality instead of simple automatic card withdrawal, and switching the equipment to a first safety mode or a second safety mode based on different reasons so as to guide a client to perform the next round of correct transaction operation. Furthermore, after entering the second safety mode, whether the equipment enters the third safety mode or the fourth safety mode is determined according to the next key information, so that the user is further guided to complete the operation. Therefore, the working efficiency of the self-service equipment in the intelligent bank is improved, the intelligent switching of the working mode is realized without stopping the machine to terminate the business when a long key is pressed, and the intelligent switching of the working mode accurately guides a client to correctly use a keyboard to continue to perform corresponding transaction.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Wherein:
FIG. 1 is a flow diagram illustrating a method for processing a long keystroke in one embodiment;
FIG. 2 is a schematic diagram of an embodiment of a long key processing apparatus;
fig. 3 is a block diagram showing the structure of a long key processing device in one embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
As shown in fig. 1, fig. 1 is a schematic flow chart of a long key processing method in an embodiment, where the long key processing method includes the steps of:
and 102, when a plurality of pieces of same key information which are sent upwards are continuously received and the key interval of the same key information is smaller than or equal to a preset interval, determining that a long key abnormal event exists.
The received key information is the input key for the plaintext (such as the amount of money, account number, etc.) input by the customer or the bank maintenance staff. For the ciphertext (such as input password and key), the key information is a special character that is replaced after desensitizing the input key, such as? Or x, etc. Illustratively, several identical key information, i.e. several identical "1" s, or several identical "2" s, etc. And the preset interval may be set to 200ms according to actual conditions. When both conditions are satisfied, it may be determined that a long key abnormal event exists. Further, in the present embodiment, the long key abnormal event is classified into a key abnormality and a hardware key abnormality. For example, a human being carelessly presses an arm on a certain key for a long time, i.e., the human key is abnormal. And continuously sending certain same key information due to equipment failure, namely, the hardware key is abnormal.
And 104, judging whether the long key abnormal event is artificial key abnormality or hardware key abnormality according to the total key duration and the key frequency of the same key information. And when the long key abnormal event is determined to be the artificial key abnormal event, executing the step 106, and entering a first safety mode to process the long key abnormal event. And when the long key abnormal event is determined to be the hardware key abnormal event, executing step 108, and entering a second safety mode to process the long key abnormal event.
The total key pressing duration is duration from the first same key information to the last same key information, and the constraint of key pressing intervals is not considered, for example, the time record of the first same key information is 0s, the time record of the second same key information is 0.4s, the time record of the last same key information is 1s, and the total key pressing duration is 1s. The number of times of pressing the key is constrained by the preset interval, and only the same key information less than or equal to the preset interval is counted, for example, in the previous example, if the second to nth same key information satisfy the preset interval, the number of times of pressing the key is n-1 (i.e., the first same key information is ignored). The first safety mode is aimed at artificial key abnormity, and mainly pauses the continuation of long key abnormity events. The second safety mode is used for maintaining hardware mainly for notification of hardware key abnormity.
In one embodiment, the criteria for determining the man-key abnormality or the hardware key abnormality are: if the total key press duration is less than or equal to the preset duration threshold t and the key press times are greater than or equal to the preset first time threshold N 1 And is less than or equal to the second decimal threshold value N 2 And judging that the long key abnormal event is artificial key abnormality. Wherein the first time threshold value N 1 Less than a second decimal threshold N 2 . If the total key press duration is greater than the duration threshold t and the key press times are greater than the second time threshold N 2 And judging that the long key abnormal event is the hardware key abnormality. Illustratively, the duration threshold t takes 3s, and N 1 Taking 3 times, N 2 Take 5 times. This is because the total duration of the effect of the man-made key abnormality on the device is short and the continuity is not strong. While the hardware key abnormity generally has long total time for influencing the equipment, and the continuity can be always kept.
In a specific application scenario, entering the first security mode to process the long key exception event may include: and clearing the uploaded key information, recording a long key abnormal event, and reminding a user that the long key abnormal event is occurring currently. And entering the second security mode to process the long key abnormal event may include: and sending the long key abnormal event to the background so as to inform maintenance personnel establishing communication connection with the background to maintain.
Step 110, when the second security mode is performed, it is determined whether the next key information is received. If the next key information is not received, go to step 112, enter the third security mode to process the long key abnormal event. If the next key information is received, step 114 is executed to enter a fourth security mode to process the long key abnormal event.
The next key information is the information sent at the next bit of the same key information.
After determining that the hardware key is abnormal, further determining whether the encryption keyboard key belongs to an exclusive type or a preemptive type. The exclusive mode is that when some key information is not disconnected, another key is pressed again, the encryption keyboard does not return key information, and the previous key information is still used, for example, when the key 3 is a long key, 4 keys are pressed simultaneously, and at this time, the encryption keyboard only sends 3-key information, but does not send 4-key information. Preemptive mode means that when a certain key is not disconnected, another key is pressed, and the encryption keyboard returns two key information in an interlaced manner, for example, when the key 3 is a long key, the key 4 is pressed at the same time, and at this time, the encryption keyboard returns 3 and 4 key information in an interlaced manner.
It is thus determined whether the encryption keyboard key is of the exclusive type or the preemptive type based on whether the next key information is received. If the next key information is not received, the key is indicated to be of an exclusive type, and the third safety mode is entered to trial and error the same key information. And if the next key information is received, indicating that the key is in the preemptive type, entering a fourth safety mode to trial and error the same key information and the next key information respectively.
In a specific application scenario, entering the third security mode to process the long key abnormal event includes: if the same key information is in a plaintext form, the connection with the currently used first keyboard is disconnected, one of the continuously sent same key information is reserved as input key information, and the input key information is used as the last currently input bit to carry out account number correctness verification at the application end. For example, if 9 is the same key information that is continuously sent, the 9 is reported to the application as the last bit of the current input and is displayed on the application interface to determine whether the service is normal. If the correctness verification is not passed, a second keyboard is started, wherein the second keyboard is a standby keyboard, can be displayed on a screen in the form of a numeric keyboard, and of course, can also be a physical keyboard which is installed on the financial terminal device in advance. And reminding the user to re-input the key information on the second keyboard. And if the same key information is the ciphertext, disconnecting the connection with the first keyboard, directly starting the second keyboard, and reminding the user to re-input the key information on the second keyboard.
In a specific application scenario, entering the fourth security mode to process the long key abnormal event includes: if the same key information is in the clear text, the connection with the first keyboard which is currently used is disconnected. The same key information and the next key information are screened out as long key information, for example, the key 5 is a long key, and then the key 6 is pressed at the same time, at this time, the encryption keyboard displays the key information 5 and the key information 6 in a staggered manner, and then the key information 5 and the key information 6 are screened out as long key information. And reserving one of the same key information which is continuously sent as input key information, and using the input key information as the last bit of current input to perform first verification of the account number at the application terminal. For example, if the account number has input "1234" and 5 is used as the input key information, then "12345" is used as the guessed account number to perform the first verification to confirm whether the service is normal. And if the first verification is not passed, taking the next key information as input key information, and taking the input key information as the last currently input bit to perform second verification on the account at the application terminal. I.e. 6 as the input key information, then "12346" is used as the guessed account number for the second verification to confirm whether the service is normal. If the second verification fails, starting the second keyboard to remind the user to input key information again on the second keyboard; and if the same key information is the ciphertext, disconnecting the first keyboard, starting the second keyboard, and reminding the user of re-inputting the key information in the second keyboard.
According to the processing method of the long key, for the long key abnormal event, the card is not simply and automatically returned, whether the long key abnormal event is the artificial key abnormality caused by artificial reasons or the hardware key abnormality caused by hardware reasons is analyzed, and the equipment is switched to the first safety mode or the second safety mode based on different reasons to guide the client to conduct the next round of correct transaction operation. Furthermore, after entering the second safety mode, whether the equipment enters the third safety mode or the fourth safety mode is determined according to the next key information, so that the user is further guided to complete the operation. Therefore, the working efficiency of the self-service equipment in the intelligent bank is improved, the intelligent switching of the working mode is realized without stopping the machine to terminate the business when a long key is pressed, and the intelligent switching of the working mode accurately guides a client to correctly use a keyboard to continue to perform corresponding transaction.
In one embodiment, as shown in fig. 2, a long key processing device is provided, the device comprising:
the long key abnormal event determining module 202 is configured to determine that a long key abnormal event exists when a plurality of pieces of same key information that are sent upwards are continuously received and a key interval of the same key information is smaller than or equal to a preset interval, where the long key abnormal event includes a human key abnormality caused by a human factor and a hardware key abnormality caused by a hardware factor;
the first processing module 204 is configured to determine that a long key abnormal event is an artificial key abnormality or a hardware key abnormality according to the total key duration and the key pressing times of the same key information, enter a first safety mode to process the long key abnormal event when the long key abnormal event is determined to be the artificial key abnormality, and enter a second safety mode to process the long key abnormal event when the long key abnormal event is determined to be the hardware key abnormality;
a key type determining module 206, configured to determine whether a next key information is received when the second security mode is performed, where the next key information is an information sent on a next bit of the same key information;
the second processing module 208 is configured to enter a third security mode to process the long key abnormal event if the next key information is received, and enter a fourth security mode to process the long key abnormal event if the next key information is not received.
The long key processing device analyzes whether the long key abnormal event is an artificial key abnormality caused by an artificial reason or a hardware key abnormality caused by a hardware reason instead of simply automatically returning the card, and switches the equipment to the first safety mode or the second safety mode based on different reasons to guide a client to perform a next round of correct transaction operation. Furthermore, after entering the second safety mode, the device is determined to enter the third safety mode or the fourth safety mode according to the next key information, so that the user is further guided to complete the operation. Therefore, the working efficiency of the self-service equipment in the intelligent bank is improved, the intelligent switching of the working mode is realized without stopping the machine to terminate the business when a long key is pressed, and the intelligent switching of the working mode accurately guides a client to correctly use a keyboard to continue to perform corresponding transaction.
In an embodiment, the first processing module 204 is specifically configured to: if the total key press duration is less than or equal to a preset duration threshold, the key press times are greater than or equal to a preset first time threshold and less than or equal to a second time threshold, and the first time threshold is less than the second time threshold, judging that the long key press abnormal event is an artificial key press abnormality; and if the total key press duration is greater than the duration threshold and the key press times are greater than the second time threshold, judging that the long key press abnormal event is the hardware key press abnormality.
In an embodiment, the first processing module 204 is specifically configured to: and clearing the sent key information, recording a long key abnormal event, and reminding the user that the long key abnormal event is currently generated.
In an embodiment, the first processing module 204 is specifically configured to: and sending the long key abnormal event to a background so as to inform maintenance personnel establishing communication connection with the background to maintain.
In an embodiment, the second processing module 208 is specifically configured to: if the same key information is in a plaintext, disconnecting the same key information from the currently used first keyboard, keeping one of the continuously sent same key information as input key information, and taking the input key information as the last bit of the current input to carry out account number correctness verification at an application end; if the correctness is not verified, starting the second keyboard to remind the user to input key information again on the second keyboard; if the same key information is the ciphertext, the connection with the first keyboard is disconnected, the second keyboard is started, and the user is reminded to re-input the key information on the second keyboard.
In an embodiment, the second processing module 208 is specifically configured to: if the same key information is in a plaintext form, disconnecting the same key information from a first keyboard which is currently used, reserving one of the continuously-sent same key information as input key information, and using the input key information as the last currently-input bit to perform first verification on an account number at an application end; if the first verification is not passed, the next key information is used as input key information, and the input key information is used as the last currently input digit to perform second verification on the account at the application end; if the second verification is not passed, starting the second keyboard to remind the user to input key information again on the second keyboard; and if the same key information is the ciphertext, disconnecting the first keyboard, starting the second keyboard, and reminding the user of re-inputting the key information in the second keyboard.
Fig. 3 is a diagram showing an internal structure of a long key processing device in one embodiment. As shown in fig. 3, the long key processing device includes a processor, a memory, and a network interface connected through a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the long key processing device stores an operating system and also stores a computer program, and when the computer program is executed by a processor, the computer program can enable the processor to realize the long key processing method. The internal memory may also store a computer program, and when the computer program is executed by the processor, the computer program may enable the processor to execute the processing method of the long key. It will be understood by those skilled in the art that the structure shown in fig. 3 is a block diagram of only a part of the structure relevant to the present application, and does not constitute a limitation to the long key processing device to which the present application is applied, and a specific long key processing device may include more or less components than those shown in the drawings, or combine some components, or have a different arrangement of components.
A long key processing device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the following steps when executing the computer program: when a plurality of pieces of same key information which are sent upwards are continuously received and the key interval of the same key information is smaller than or equal to a preset interval, determining that a long key abnormal event exists, wherein the long key abnormal event comprises man-made key abnormality and hardware key abnormality; judging whether the long key abnormal event is artificial key abnormality or hardware key abnormality according to the key total duration and the key frequency of the same key information, entering a first safety mode to process the long key abnormal event when the long key abnormal event is determined to be artificial key abnormality, pausing the long key abnormal event, entering a second safety mode to process the long key abnormal event when the long key abnormal event is determined to be hardware key abnormality, and notifying to maintain the hardware in the second safety mode; when the second safety mode is carried out, judging whether next key information is received or not, wherein the next key information is information sent at the next position of the same key information; if the next key information is not received, entering a third safety mode to process the long key abnormal event, trial and error the same key information in the third safety mode, if the next key information is received, entering a fourth safety mode to process the long key abnormal event, and trial and error the same key information and the next key information in the fourth safety mode.
In one embodiment, determining that the long key abnormal event is a man-made key abnormal event or a hardware key abnormal event according to the total key duration and the key pressing times of the same key information includes: if the total key press duration is less than or equal to a preset duration threshold, the key press times are greater than or equal to a preset first time threshold and less than or equal to a second time threshold, and the first time threshold is less than the second time threshold, judging that the long key press abnormal event is an artificial key press abnormality; and if the total key press duration is greater than the duration threshold and the key press times are greater than the second time threshold, judging that the long key press abnormal event is the hardware key press abnormality.
In one embodiment, entering the first secure mode for handling long key exception events includes: and clearing the uploaded key information, recording a long key abnormal event, and reminding a user that the long key abnormal event is occurring currently.
In one embodiment, entering the second security mode to process the long key abnormal event comprises: and sending the long key abnormal event to the background so as to inform maintenance personnel establishing communication connection with the background to maintain.
In one embodiment, entering the third security mode for handling long key exception events includes: if the same key information is in a plaintext, disconnecting the same key information from the currently used first keyboard, keeping one of the continuously sent same key information as input key information, and taking the input key information as the last bit of the current input to carry out account number correctness verification at an application end; if the correctness is not verified, starting the second keyboard to remind the user to re-input key information on the second keyboard; and if the same key information is the ciphertext, disconnecting the first keyboard, starting the second keyboard, and reminding the user of re-inputting the key information in the second keyboard.
In one embodiment, entering the fourth security mode for handling long key exception events includes: if the same key information is in a plaintext, disconnecting the same key information from a first keyboard which is currently used, reserving one of the continuously sent same key information as input key information, and using the input key information as the last bit of the current input to perform first verification on an account number at an application end; if the first verification is not passed, the next key information is used as input key information, and the input key information is used as the last currently input digit to perform second verification on the account at the application end; if the second verification fails, starting the second keyboard to remind the user to input key information again on the second keyboard; if the same key information is the ciphertext, the connection with the first keyboard is disconnected, the second keyboard is started, and the user is reminded to re-input the key information on the second keyboard.
A computer-readable storage medium, storing a computer program which, when executed by a processor, performs the steps of: when a plurality of pieces of same key information which are sent upwards are continuously received and the key interval of the same key information is smaller than or equal to a preset interval, determining that a long key abnormal event exists, wherein the long key abnormal event comprises man-made key abnormality and hardware key abnormality; judging whether the long key abnormal event is artificial key abnormality or hardware key abnormality according to the key total duration and the key frequency of the same key information, entering a first safety mode to process the long key abnormal event when the long key abnormal event is determined to be artificial key abnormality, pausing the long key abnormal event, entering a second safety mode to process the long key abnormal event when the long key abnormal event is determined to be hardware key abnormality, and notifying to maintain the hardware in the second safety mode; when the second safety mode is carried out, judging whether next key information is received or not, wherein the next key information is information sent at the next position of the same key information; if the next key information is not received, entering a third safety mode to process the long key abnormal event, trial and error the same key information in the third safety mode, if the next key information is received, entering a fourth safety mode to process the long key abnormal event, and trial and error the same key information and the next key information in the fourth safety mode.
In one embodiment, determining that the long-key abnormal event is an artificial key abnormality or a hardware key abnormality according to the total key duration and the key pressing times of the same key information includes: if the total key press duration is less than or equal to a preset duration threshold, the key press times are greater than or equal to a preset first time threshold and less than or equal to a second time threshold, and the first time threshold is less than the second time threshold, judging that the long key press abnormal event is an artificial key press abnormality; if the total key pressing duration is greater than the duration threshold and the key pressing times are greater than the second time threshold, the long key pressing abnormal event is judged to be hardware key pressing abnormity.
In one embodiment, entering the first security mode to process the long key abnormal event comprises the following steps: and clearing the sent key information, recording a long key abnormal event, and reminding the user that the long key abnormal event is currently generated.
In one embodiment, entering the second security mode to process the long key abnormal event comprises: and sending the long key abnormal event to a background so as to inform maintenance personnel establishing communication connection with the background to maintain.
In one embodiment, entering the third security mode for handling long key exception events includes: if the same key information is in a plaintext form, disconnecting the same key information from a currently used first keyboard, reserving one of the continuously-sent same key information as input key information, and using the input key information as the last currently-input bit to verify the correctness of the account number at an application end; if the correctness is not verified, starting the second keyboard to remind the user to input key information again on the second keyboard; if the same key information is the ciphertext, the connection with the first keyboard is disconnected, the second keyboard is started, and the user is reminded to re-input the key information on the second keyboard.
In one embodiment, entering the fourth security mode for handling the long key exception event includes: if the same key information is in a plaintext, disconnecting the same key information from a first keyboard which is currently used, reserving one of the continuously sent same key information as input key information, and using the input key information as the last bit of the current input to perform first verification on an account number at an application end; if the first verification fails, the next key information is used as input key information, and the input key information is used as the last currently input digit to perform second verification on the account at the application terminal; if the second verification fails, starting the second keyboard to remind the user to input key information again on the second keyboard; and if the same key information is the ciphertext, disconnecting the first keyboard, starting the second keyboard, and reminding the user of re-inputting the key information in the second keyboard.
It should be noted that the method, the apparatus, the device and the computer-readable storage medium for processing a long key belong to a general inventive concept, and the contents in the embodiments of the method, the apparatus, the device and the computer-readable storage medium for processing a long key are mutually applicable.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not to be construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, and these are all within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A processing method of a long key is characterized by comprising the following steps:
when a plurality of pieces of same key information which are sent upwards are continuously received and the key interval of the same key information is smaller than or equal to a preset interval, determining that a long key abnormal event exists, wherein the long key abnormal event comprises man-made key abnormality and hardware key abnormality;
judging whether the long key abnormal event is artificial key abnormality or hardware key abnormality according to the key total duration and the key frequency of the same key information, entering a first safety mode to process the long key abnormal event when the long key abnormal event is determined to be artificial key abnormality, pausing the long key abnormal event, entering a second safety mode to process the long key abnormal event when the long key abnormal event is determined to be hardware key abnormality, and notifying to maintain hardware in the second safety mode;
when the second safety mode is carried out, judging whether next key information is received or not, wherein the next key information is information sent at the next bit of the same key information;
if the next key information is not received, entering a third safety mode to process the long key abnormal event, wherein the third safety mode performs trial and error on the same key information, if the next key information is received, entering a fourth safety mode to process the long key abnormal event, and the fourth safety mode performs trial and error on the same key information and the next key information.
2. The processing method according to claim 1, wherein the determining that the long key abnormal event is an artificial key abnormality or a hardware key abnormality according to the total key time and the number of key presses of the same key information comprises:
if the total key press duration is less than or equal to a preset duration threshold, the key press times are greater than or equal to a preset first time threshold and less than or equal to a second time threshold, and the first time threshold is less than the second time threshold, determining that the long key press abnormal event is an artificial key press abnormality;
and if the total key press duration is greater than the duration threshold and the key press times are greater than the second time threshold, judging that the long key press abnormal event is a hardware key press abnormality.
3. The processing method according to claim 1, wherein said entering into the first security mode processes the long key exception event, including:
and clearing the uploaded key information, recording the long key abnormal event, and reminding the user that the long key abnormal event is currently generated.
4. The processing method according to claim 1, wherein said entering into the second security mode processes the long key exception event, which comprises:
and sending the long key abnormal event to a background so as to inform maintenance personnel establishing communication connection with the background to maintain.
5. The processing method according to claim 1, wherein said entering into the third security mode processes the long-key exception event, including:
if the same key information is in a plaintext, disconnecting the same key information from a first keyboard which is currently used, keeping one of the continuously sent same key information as input key information, and taking the input key information as the last bit of the current input to carry out account number correctness verification at an application end; if the correctness verification does not pass, starting a second keyboard, and reminding a user to re-input key information on the second keyboard;
if the same key information is the ciphertext, disconnecting the connection with the first keyboard, starting the second keyboard, and reminding a user to re-input the key information on the second keyboard.
6. The processing method according to claim 1, wherein said entering into a fourth security mode processes said long key exception event, comprising:
if the same key information is in a plaintext form, disconnecting the same key information from a first keyboard which is currently used, reserving one of the continuously-sent same key information as input key information, and using the input key information as the last bit of current input to perform first verification on an account number at an application end;
if the first verification is not passed, taking the next key information as the input key information, and taking the input key information as the last currently input bit to perform second verification on the account at the application terminal;
if the second verification is not passed, starting a second keyboard to remind the user to re-input key information on the second keyboard;
and if the same key information is the ciphertext, disconnecting the connection with the first keyboard, starting the second keyboard, and reminding a user of re-inputting the key information in the second keyboard.
7. The process of any one of claims 5 or 6, wherein the plain text comprises an amount and an account number, and the cipher text comprises an input password and a key.
8. A long key processing apparatus, the apparatus comprising:
the long key abnormal event judgment module is used for determining that a long key abnormal event exists when a plurality of pieces of same key information which are sent upwards are continuously received and the key interval of the same key information is less than or equal to a preset interval, wherein the long key abnormal event comprises man-made key abnormality caused by man-made reasons and hardware key abnormality caused by hardware reasons;
the first processing module is used for determining that the long key abnormal event is artificial key abnormity or hardware key abnormity according to the key total duration and the key frequency of the same key information, entering a first safety mode to process the long key abnormal event when determining that the long key abnormal event is artificial key abnormity, and entering a second safety mode to process the long key abnormal event when determining that the long key abnormal event is hardware key abnormity;
the key type judging module is used for judging whether next key information is received or not when the second safety mode is carried out, wherein the next key information is information sent at the next position of the same key information;
and the second processing module is used for entering a third safety mode to process the long key abnormal event if the next key information is received, and entering a fourth safety mode to process the long key abnormal event if the next key information is not received.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 7.
10. A long key processing device comprising a memory and a processor, characterized in that the memory stores a computer program which, when executed by the processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 7.
CN202110650315.0A 2021-06-10 2021-06-10 Processing method, device, equipment and medium for long key Active CN115471958B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110650315.0A CN115471958B (en) 2021-06-10 2021-06-10 Processing method, device, equipment and medium for long key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110650315.0A CN115471958B (en) 2021-06-10 2021-06-10 Processing method, device, equipment and medium for long key

Publications (2)

Publication Number Publication Date
CN115471958A true CN115471958A (en) 2022-12-13
CN115471958B CN115471958B (en) 2023-11-10

Family

ID=84364332

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110650315.0A Active CN115471958B (en) 2021-06-10 2021-06-10 Processing method, device, equipment and medium for long key

Country Status (1)

Country Link
CN (1) CN115471958B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05233484A (en) * 1992-02-18 1993-09-10 Mitsubishi Electric Corp Data communication device
JP2001109563A (en) * 1999-10-13 2001-04-20 Sky Think System Kk Input device locking method
JP2005149473A (en) * 2003-10-20 2005-06-09 Keiichi Kato Input support system for disabled, and aged people
CN101266564A (en) * 2007-03-16 2008-09-17 三星电子株式会社 Method and apparatus for providing help upon user's wrong button manipulation
CN101876930A (en) * 2009-04-28 2010-11-03 致伸科技股份有限公司 Keyboard automatic test system
CN106547663A (en) * 2016-10-31 2017-03-29 北京小米移动软件有限公司 Button management method and device
CN107329862A (en) * 2017-06-19 2017-11-07 北京小米移动软件有限公司 Detection method, device and the terminal of keyboard
CN108121631A (en) * 2016-11-28 2018-06-05 北京小米移动软件有限公司 Screen abnormality based reminding method and device
CN110471806A (en) * 2019-07-23 2019-11-19 九阳股份有限公司 A kind of exception button processing method and a kind of cooking apparatus
CN111104237A (en) * 2018-10-26 2020-05-05 上海宝信软件股份有限公司 Configurable fault automation handling method and system and computer storage medium
CN111552589A (en) * 2020-05-09 2020-08-18 中国航空无线电电子研究所 Full-keyboard-oriented key jamming detection and function maintenance method and management framework
CN112882850A (en) * 2021-03-09 2021-06-01 北京字节跳动网络技术有限公司 Key event processing method, device, equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05233484A (en) * 1992-02-18 1993-09-10 Mitsubishi Electric Corp Data communication device
JP2001109563A (en) * 1999-10-13 2001-04-20 Sky Think System Kk Input device locking method
JP2005149473A (en) * 2003-10-20 2005-06-09 Keiichi Kato Input support system for disabled, and aged people
CN101266564A (en) * 2007-03-16 2008-09-17 三星电子株式会社 Method and apparatus for providing help upon user's wrong button manipulation
CN101876930A (en) * 2009-04-28 2010-11-03 致伸科技股份有限公司 Keyboard automatic test system
CN106547663A (en) * 2016-10-31 2017-03-29 北京小米移动软件有限公司 Button management method and device
CN108121631A (en) * 2016-11-28 2018-06-05 北京小米移动软件有限公司 Screen abnormality based reminding method and device
CN107329862A (en) * 2017-06-19 2017-11-07 北京小米移动软件有限公司 Detection method, device and the terminal of keyboard
CN111104237A (en) * 2018-10-26 2020-05-05 上海宝信软件股份有限公司 Configurable fault automation handling method and system and computer storage medium
CN110471806A (en) * 2019-07-23 2019-11-19 九阳股份有限公司 A kind of exception button processing method and a kind of cooking apparatus
CN111552589A (en) * 2020-05-09 2020-08-18 中国航空无线电电子研究所 Full-keyboard-oriented key jamming detection and function maintenance method and management framework
CN112882850A (en) * 2021-03-09 2021-06-01 北京字节跳动网络技术有限公司 Key event processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN115471958B (en) 2023-11-10

Similar Documents

Publication Publication Date Title
US10528940B2 (en) PIN servicing
US9177272B2 (en) Method and system of obtaining diagnostic data from a device at a remote location
CN103745538B (en) The cipher code protection method of finance account and system
EP3048592A1 (en) Method, device, and self service equipment thereof for card processing in card reader
CN110084561A (en) Breakpoint follow-up method, electronic device and readable storage medium storing program for executing
CN107730775A (en) Self-service dealing method, apparatus, system and electronic equipment
CN112866282B (en) Method and device for verifying time information in block chain
CN106446667B (en) Password data processing method, device and equipment
EA038252B1 (en) Method for automatically crediting deposited money funds in case of failures
CN110930161A (en) Method for determining operation time of business operation and self-service business operation equipment
CN115471958A (en) Long key processing method, device, equipment and medium
CN113299016A (en) Service timing method and system of self-service terminal, self-service equipment and storage medium
JP4371084B2 (en) ATM usage limit setting method, ATM usage limit setting device, and ATM usage limit setting program
CN103685146A (en) Data processing device and data processing method for safety information interaction
WO2019190344A1 (en) System for monitoring a network of self-service devices
CN110955884B (en) Method and device for determining upper limit times of password trial and error
CN112634049A (en) Method and device for preventing repeated posting of receipt and payment transactions
CN112651730A (en) Transfer method and system of account transfer platform
CN112217944A (en) Online ticket processing method, device, equipment and storage medium
CN111523994A (en) Nine-factor imperfect control system for personal customer information on mobile banking
US20180165681A1 (en) Unauthorized Usage Detection Using Transaction Management and Analytics Platforms
US20220318813A1 (en) Method for processing bank transactions and electronic device using method
CN115509847A (en) Key failure detection method and device, computer equipment and storage medium
KR20040037678A (en) Password management method using short message system
CN115375452A (en) Banknote cashing method and device based on non-real-time verification code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant