Malicious tampering preventing method based on self-service terminal of government center

文档序号:274259 发布日期:2021-11-19 浏览:29次 中文

阅读说明:本技术 一种基于政务中心自助服务终端的防恶意篡改方法 (Malicious tampering preventing method based on self-service terminal of government center ) 是由 张振杰 谢涛 勾鑫晔 郭婷 马文卓 田凌 姜玲 张贝贝 于 2021-07-26 设计创作,主要内容包括:本发明创造属于服务终端领域,具体涉及了一种基于政务中心自助服务终端的防恶意篡改方法。S1:初始化;S2:获取使用者的身份证信息;S3:将使用者的身份证信息与使用者的生理特征以及联系方式建立绑定;S4:根据使用者的生理特征与身份证信息的绑定,检测是否处于可被操作状态,如果是,跳转S5,如果不是,拒绝接受操作指令,并提示进行身份验证;S5:获取使用者给出的指令,并执行相关指令,跳转S4;S6:判定是否需要结束服务,如果不是,跳转S4,如果是,退出当前身份证。在使用者中途离开自助设备或不处于填表状态时,自助设备会进行锁机,禁止他人使用以及浏览,保护了使用者的填表信息,有效防止了填表信息被恶意篡改情况的发生。(The invention belongs to the field of service terminals, and particularly relates to a malicious tampering prevention method based on a self-service terminal of a government center. S1: initializing; s2: acquiring the identity card information of a user; s3: establishing binding between the identity card information of the user and the physiological characteristics and the contact way of the user; s4: detecting whether the user is in an operable state or not according to the binding of the physiological characteristics of the user and the identity card information, if so, jumping to S5, and if not, refusing to accept an operation instruction and prompting to carry out identity verification; s5: acquiring an instruction given by a user, executing a related instruction, and jumping to S4; s6: and judging whether the service needs to be ended, if not, jumping to S4, and if so, exiting the current identity card. When the user leaves the self-service equipment midway or is not in a form filling state, the self-service equipment can lock the machine, and the use and the browsing of other people are forbidden, so that the form filling information of the user is protected, and the form filling information is effectively prevented from being maliciously tampered.)

1. A malicious tampering preventing method based on a self-service terminal of a government center is characterized by comprising the following main steps:

s1: initializing;

s2: acquiring the identity card information of a user;

s3: establishing binding between the identity card information of the user and the physiological characteristics and the contact way of the user;

s4: detecting whether the user is in an operable state or not according to the binding of the physiological characteristics of the user and the identity card information, if so, jumping to S5, and if not, refusing to accept an operation instruction and prompting to carry out identity verification;

s5: acquiring an instruction given by a user, executing a related instruction, and jumping to S4;

s6: and judging whether the service needs to be ended, if not, jumping to S4, and if so, exiting the current ID card and ending the service for the user, eliminating the legacy information of the user and ending.

2. The method for preventing malicious tampering based on the government center self-service terminal according to claim 1, wherein the step S3 comprises the steps of:

a1: acquiring the identity card information of a user;

a2: acquiring facial information and fingerprint information of a user;

a3: the face information and the fingerprint information of the user are temporarily associated with the identity card information.

3. The method for preventing malicious tampering based on the government center self-service terminal according to claim 2, wherein the step of detecting whether the government center self-service terminal is in an operable state at S4 comprises the following substeps:

b1: detecting whether in the administrator operation mode, if so, jumping to S5, and if not, jumping to B2;

b2: detecting whether the identity card can still be read, if so, skipping to B3, and if not, skipping to S6;

b3: detecting whether the fingerprint of the user can be acquired, if yes, jumping to B4, and if not, jumping to B6;

b4: detecting whether the frontal face image of the user can be recognized, if so, recognizing as an operable state, jumping to S5, and if not, jumping to B5;

b5: refusing to accept the operation instruction, adopting a text prompt to carry out identity verification, and jumping to B1;

b6: and (4) turning off the display screen, refusing to accept the operation instruction, sending a voice prompt for authentication, and jumping to B1.

4. The method for preventing malicious tampering based on the government center self-service terminal according to claim 3, wherein the step S6 comprises the following steps:

c1: timing from turning off the display screen, and after a first time threshold value is passed, the display screen is still not lighted, and then information is sent to the mobile phone of a user;

c2: counting time from sending information to the mobile phone of the user, judging whether reply information of the user is received or not after a second time threshold value, if so, skipping to C3, and if not, skipping to C4;

c3: judging whether the service needs to be ended or not according to the reply information of the user, and skipping to C4 if the service needs to be ended; if not, go to C5;

c4: informing the administrator, quitting the identity card of the user after the administrator is in place, and jumping to S1;

c5: continuing timing, calculating the total duration of turning off the display screen, judging whether the total duration is greater than a third time threshold, if so, jumping to C4, and if not, jumping to C6;

c6: and calculating the time from the time of receiving the short message, and jumping to C2 after a fourth threshold value is passed.

5. The method for preventing malicious tampering based on the government center self-service terminal according to claim 4, wherein the step C4 comprises the following steps:

d1: sending a notice to the administrator and confirming that the administrator is in place;

d2: acquiring the number information of the administrator;

d3: and sending the number information of the administrator to the user, and giving the ID card quit to the administrator for storage.

6. The method for preventing malicious tampering based on the government center self-service terminal according to claim 5, wherein the method for confirming the administrator is in place is based on whether the administrator fingerprint can be detected, and when the administrator fingerprint is detected, the method indicates that the administrator is in place.

7. A government center self-service terminal, which is suitable for any one of claims 1-6, and is a method for preventing malicious tampering based on the government center self-service terminal, and the method comprises the following steps:

one or more processors;

storage means for storing one or more programs;

the camera is electrically connected with the processor;

the touch display screen is electrically connected with the processor;

the fingerprint collector is electrically connected with the processor;

and the identity card reader is electrically connected with the processor.

Technical Field

The invention belongs to the field of service terminals, and particularly relates to a malicious tampering prevention method based on a self-service terminal of a government center.

Background

The government affair service center is a comprehensive management service mechanism which is set by the people government and centrally handles administrative permission, administrative payment, administrative confirmation, administrative collection and other service items within the authority range of the current government, and is an important platform for strengthening government affair service, improving administrative efficiency and providing high-quality, convenient and efficient service for people. When people transact business in a government center, a large number of forms which have numbers and cannot be filled and printed by a network are required to be filled and printed manually and are difficult to avoid. When manual form filling, the form filling error is inevitable.

Chinese publication No. CN207883046U, published japanese 20180918, discloses a form-filling self-service terminal. The form filling self-service terminal comprises a body, wherein the body comprises an operation table and a visual table, and the operation table is provided with an installation cavity; the main control device is arranged in the mounting cavity; the display screen is arranged on the visual table; the identity card reader is arranged on the operating platform and is electrically connected with the main control device; the social security card reader is arranged on the operating platform and is electrically connected with the main control device; the information input equipment is arranged on the operating platform and is electrically connected with the main control device; and the form printing equipment is arranged on the operating platform and is electrically connected with the main control device. So not only can effectively improve the personnel of working in business fill out table efficiency and accuracy in the government affairs hall, reduce the time of working in business, reduce staff and the personnel of working in business's energy simultaneously and consume, promote the experience of working in business and feel.

However, the disadvantage is that the user needs to fill in a large number of forms sometimes, and the user is inevitably away from the currently used self-service terminal in the process of filling the forms, and needs to answer a telephone call or go to a toilet or the like. After the user leaves the self-service terminal, other people can use the self-service terminal, so that malicious tampering on the form content of the user on the self-service terminal can exist, or the error of the form filled in front by the user due to misoperation can also exist, and the problem that the form filling content is seriously leaked can also exist.

Summary of the invention

Aiming at the technical problems, the invention provides a malicious tampering prevention method based on a self-service terminal of a government center.

In order to achieve the purpose, the technical scheme adopted by the invention is that the malicious tampering preventing method based on the self-service terminal of the government center comprises the following main steps: s1: initializing; s2: acquiring the identity card information of a user; s3: establishing binding between the identity card information of the user and the physiological characteristics and the contact way of the user; s4: detecting whether the user is in an operable state or not according to the binding of the physiological characteristics of the user and the identity card information, if so, jumping to S5, and if not, refusing to accept an operation instruction and prompting to carry out identity verification; s5: acquiring an instruction given by a user, executing a related instruction, and jumping to S4; s6: and judging whether the service needs to be ended, if not, jumping to S4, and if so, exiting the current ID card and ending the service for the user, eliminating the legacy information of the user and ending.

Preferably, S3 includes the following steps: a1: acquiring the identity card information of a user; a2: acquiring facial information and fingerprint information of a user; a3: the face information and the fingerprint information of the user are temporarily associated with the identity card information.

Preferably, the step of detecting whether the mobile terminal is in the operable state in S4 includes the following sub-steps: the step S4 of detecting whether the device is in an operable state includes the following sub-steps: b1: detecting whether in the administrator operation mode, if so, jumping to S5, and if not, jumping to B2; b2: detecting whether the identity card can still be read, if so, jumping to B3, and if not, jumping to S6; b3: detecting whether the fingerprint of the user can be acquired, if yes, jumping to B4, and if not, jumping to B6; b4: detecting whether the frontal face image of the user can be recognized, if so, recognizing as an operable state, jumping to S5, and if not, jumping to B5; b5: refusing to accept the operation instruction, adopting a text prompt to carry out identity verification, and jumping to B1; b6: and (4) turning off the display screen, refusing to accept the operation instruction, sending a voice prompt for authentication, and jumping to B1.

Preferably, S6 includes the following steps: c1: timing from turning off the display screen, and after a first time threshold value is passed, the display screen is still not lighted, and then information is sent to the mobile phone of a user; c2: counting time from sending information to the mobile phone of the user, judging whether reply information of the user is received or not after a second time threshold value, if so, skipping to C3, and if not, skipping to C4; c3: judging whether the service needs to be ended or not according to the reply information of the user, and skipping to C4 if the service needs to be ended; if not, go to C5; c4: informing the administrator, quitting the identity card of the user after the administrator is in place, and jumping to S1; c5: continuing timing, calculating the total duration of turning off the display screen, judging whether the total duration is greater than a third time threshold, if so, jumping to C4, and if not, jumping to C6; c6: and calculating the time from the time of receiving the short message, and jumping to C2 after a fourth threshold value is passed.

Preferably, C4 comprises the following steps: d1: sending a notice to the administrator and confirming that the administrator is in place; d2: acquiring the number information of the administrator; d3: the administrator number information is sent to the user, and the id card is returned to the administrator for storage, and the process goes to S1.

Preferably, the method for confirming that the administrator is in place is based on whether the administrator fingerprint can be detected, and when the administrator fingerprint is detected, the method indicates that the administrator is in place.

Preferably, the government center self-service terminal is applicable to the method for preventing malicious tampering based on the government center self-service terminal, and comprises the following steps: one or more processors; storage means for storing one or more programs; the camera is electrically connected with the processor; the touch display screen is electrically connected with the processor; the fingerprint collector is electrically connected with the processor; and the identity card reader is electrically connected with the processor.

The beneficial effects created by the invention are as follows: according to the method, when the user leaves the self-service equipment midway or is not in the form filling state, the self-service equipment can lock the machine and forbid other people to use and browse, the form filling information of the user is protected, and the form filling information is effectively prevented from being maliciously tampered. In addition, in order to not influence the further use of other people, when the user leaves the self-service equipment for a long enough time, the user can automatically eject the identity card of the user for being kept by an administrator, and the used information of the user is initialized, so that the leakage of form filling information is further prevented.

Drawings

In order to more clearly illustrate the invention in its embodiments, reference will now be made briefly to the accompanying drawings, which are to be used in the embodiments. In all the drawings, the elements or parts are not necessarily drawn to actual scale.

FIG. 1 is a schematic flow chart of the main steps

FIG. 2 is a schematic flow chart of the sub-steps in S4

FIG. 3 is a schematic diagram of a self-service terminal

Reference numerals:

1-a processor, 2-a storage device, 3-an identity card reader, 4-a camera, 5-a fingerprint collector and 6-a touch display screen.

Detailed Description

Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only used as examples, and the protection scope of the present invention is not limited thereby.

A malicious tampering prevention method based on a self-service terminal of a government center comprises the following main steps: s1: and (5) initializing. S2: and acquiring the identity card information of the user. S3: and establishing binding between the identity card information of the user and the physiological characteristics and the contact way of the user. S4: and detecting whether the user is in an operable state or not according to the binding of the physiological characteristics of the user and the ID card information, if so, jumping to S5, and if not, refusing to accept the operation instruction and prompting to carry out identity verification. Detecting whether the operation can be carried out in S4 includes the following sub-steps: the step S4 of detecting whether the device is in an operable state includes the following sub-steps: b1: it is checked whether it is in the administrator operation mode, and if so, it jumps to S5, and if not, it jumps to B2. B2: checking whether the ID card can still be read, if yes, jumping to B3, and if not, jumping to S6. B3: and detecting whether the fingerprint of the user can be acquired, if so, jumping to B4, and if not, jumping to B6. B4: it is checked whether the frontal face image of the user can be recognized, and if so, it is recognized as an operable state, a jump is made to S5, and if not, a jump is made to B5. B5: refusing to accept the operation instruction, adopting text prompt to carry out identity verification, and jumping to B1. B6: and (4) turning off the display screen, refusing to accept the operation instruction, sending a voice prompt for authentication, and jumping to B1.

S5: the instruction given by the user is fetched and the relevant instruction is executed, jumping to S4. S6: and judging whether the service needs to be ended, if not, jumping to S4, and if so, exiting the current ID card and ending the service for the user, eliminating the legacy information of the user and ending.

S6 includes the steps of: c1: and timing from turning off the display screen, and after the first time threshold value is passed, the display screen is still not lighted, and then information is sent to the mobile phone of the user. C2: and counting time from the time of sending the information to the mobile phone of the user, judging whether the reply information of the user is received after a second time threshold value, if so, skipping to C3, and if not, skipping to C4. C3: and judging whether the service needs to be ended or not according to the reply information of the user, and if the service needs to be ended, jumping to C4. If the end is not required, a jump to C5 is made. C4: the administrator is notified, and after the administrator is in place, the user' S identification card is exited and a jump is made to S1. C4 includes the steps of: d1: and sending a notice to the administrator and confirming that the administrator is in place. D2: the number information of the administrator is acquired. D3: and sending the number information of the administrator to the user, and giving the ID card quit to the administrator for storage. In D1, the method for confirming the presence of the administrator is based on whether the administrator fingerprint can be detected, and when the administrator fingerprint is detected, it indicates that the administrator is present.

C5: continuing timing, and calculating the total duration of turning off the display screen, wherein whether the total duration is greater than a third time threshold, if so, jumping to C4, and if not, jumping to C6. C6: and calculating the time from the time of receiving the short message, and jumping to C2 after a fourth threshold value is passed.

In consideration of resource occupation, the user may leave for a long time, and the user may be forced to quit the id card. Wherein the first time threshold is 30 minutes, and a reminding short message and a selection short message are sent to the user after the user leaves the service terminal for 30 minutes. Whether the service is finished or not is confirmed according to the reply of the user. Wherein the second time threshold is 5 minutes, the third time threshold is 1 hour, and the fourth time threshold is 15 minutes. And then, before confirming that the user can not return to the terminal within the specified time, the terminal informs the administrator, quits the identity card and is kept by the administrator, and the terminal carries out initialization setting to empty the use information of the user.

A self-service terminal of a government center is suitable for a method for preventing malicious tampering based on the self-service terminal of the government center, and comprises the following steps: one or more processors 1. The storage device 2 is used for storing one or more programs. And the camera 4 is electrically connected with the processor 1. And the touch display screen 6 is electrically connected with the processor 1. And the fingerprint collector 5 is electrically connected with the processor 1. And the identity card reader 3 is electrically connected with the processor 1.

According to the method, when the user leaves the self-service equipment midway or is not in the form filling state, the self-service equipment can lock the machine and forbid other people to use and browse, the form filling information of the user is protected, and the form filling information is effectively prevented from being maliciously tampered. In addition, in order to not influence the further use of other people, when the user leaves the self-service equipment for a long enough time, the user can automatically eject the identity card of the user for being kept by an administrator, and the used information of the user is initialized, so that the leakage of form filling information is further prevented.

The self-service terminal is different from other conventional self-service terminals in that other self-service terminals only have the function of verifying information, and generally return the identity card to a user after the information of the identity card is collected. However, in the present application, it is considered that a large number of forms need to be filled, and if the user directly logs off the usage right of the user after leaving the system halfway, the form filled in by the user before is invalidated. But if the user does not log off, the user cannot use the form, and the form filled by the user risks information leakage and malicious tampering by others. Therefore, in the application, the identity card can be quitted only after the self-service terminal equipment finishes the service of the user. In this case, as long as the id card is still in the device, it indicates that the user still needs to use the device to fill in the report, and the information filled in by the user needs to be protected and protected.

The fingerprint collector 5 can confirm that the user is located in front of the service terminal, the camera 4 can collect the face image of the user, and when the face of the user is opposite to the terminal, the user is explained to use the terminal to fill up the table with concentration. Therefore, when the user has other things and can not concentrate on filling the form, but the user is positioned in front of the machine position, only the forced screen locking operation is carried out, and illegal browsing and modification of the contents of the form filling are prevented when the user is not noticed by others.

When the user leaves the terminal but the identity card is still in the terminal, the display screen of the terminal is extinguished, and the user is refused to accept any instruction when the user returns to the terminal position without confirmation or without the authorization of an administrator. The form filling information of the user is better protected, and the problem that the form filling content is formatted because the user leaves the terminal is avoided.

The above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same. While the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: it is also possible to modify the solutions described in the previous embodiments or to substitute some or all of them with equivalents. The modifications or the substitutions do not make the essence of the corresponding technical solution depart from the scope of the technical solution of the embodiments of the present invention, and the technical solution is covered by the claims and the specification of the present invention.

10页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种自助扫码租赁广告位式广告机及其租赁方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!