New technology application scheme of ATM monitoring system

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

With the rapid development of the financial industry, banking services have surpassed traditional service concepts. ATM automatic teller machines have been popularized all over the country. They have brought a lot of convenience to our lives. They have become inseparable assistants in our lives and have been fully integrated. In the daily life of the people.

ATM self-service banking is unattended and provides financial services 24 hours a day. The security of its related equipment and customer transaction process has always been one of the important tasks of the bank’s security department. With the large-scale use of ATM in the financial industry, some problems have gradually been exposed, which severely restricts the development of ATM to a deeper level and higher requirements. At the same time, there have been an increasing number of ATM accounting disputes and ATM financial crime cases. How to protect the safe use of bank ATMs, reduce disputes between banks and customers, protect the interests of customers and banks, and prevent various crimes against ATMs is a problem that needs to be solved urgently.

 
1. Problems that need to be solved in ATM monitoring

1. Supervise whether the cash outlet of the ATM machine is working normally, whether the withdrawal is withdrawn by the withdrawal, and whether the ATM machine swallows the card, so as to minimize the dispute between the bank and the depositor.

2. Since most ATMs are in an unattended environment, it is necessary to supervise and prevent malicious damage by criminals in order to provide an effective basis for the public security organs to obtain evidence afterwards.

3. Prevent and monitor criminals from exploiting the weaknesses of ATMs for fraudulent activities. After completing normal operations on the ATM, they went to the bank to falsely claim that the ATM did not spit out money or did not spit out money, because there is no evidence to prove whether he withdrew or how much money was withdrawn Money has caused entanglement.

4. Monitor and prevent a very small number of criminals from using high-tech means to copy, embezzle, or forge depositors’ savings cards to steal depositors’ money through ATMs, so as to provide an effective basis for public security organs to obtain evidence afterwards.

  
Two, ATM monitoring system demand analysis

Since ATM machines are mainly used in unattended self-service banks, the special structure and use environment of ATM machines and the diversity of machine models put forward special requirements for the selection and installation of monitoring equipment for unattended self-service banks. . The difference between application environment, monitoring object, external interface, etc., ATM monitoring host has many functions and characteristics. At the same time, we need corresponding special technology to realize these special functions.

1. ATM machines themselves are mostly exposed outdoors and unattended, so the design of ATM machines is required to be riot-proof and non-portable, and the ATM monitoring host is also required to have these characteristics.

2. ATM machines require 24 hours to provide services and are unattended, so the ATM monitoring host is required to work stably 24 hours a day. At the same time, banks generally require video recordings to be stored for one to three months, or even half a year.

3. Due to the need to protect the user’s password, the ATM monitoring host requires that the password keyboard and the user’s password information must not be seen in the video screen.

4. The superposition of video card numbers is indispensable as a unique function of the ATM monitoring host. The corresponding card number, transaction type, transaction amount and other information are directly superimposed on the screen, plus the person information on the video screen, which is more convenient to help confirm the follow-up, and at the same time provide greater credibility in handling disputes with users . At the same time, according to the provided card number, all operating data of the cardholder within the specified time can be quickly investigated and dealt with.

5. Accurate alarm detection and powerful alarm linkage function. For example, when the ATM machine is knocked, the duration of the vibration alarm may only be tens of milliseconds. If the sensitivity is not enough, false alarms may occur. The ATM monitoring host supports powerful alarm linkage functions, and responds promptly and accurately when video loss, partial occlusion, or signal alarm occurs. The alarm event can trigger the local siren output and trigger the dialer, or it can be transmitted to the monitoring center through the network, and the monitoring center will make corresponding processing.

6. Powerful network functions, which play a very important role in the ATM monitoring host. Browse images through the network, playback and backup video data through the network, control the alarm through the network, conduct two-way voice intercom through the network, etc. Almost every local function can be realized through the network. The future development trend of the financial industry will inevitably follow the regional centralized management mode, and to realize these functions, the embedded ATM monitoring digital host must have perfect network functions.

3. Working principle of ATM monitoring host system

Under normal circumstances, the main camera of the ATM digital surveillance system performs pre-recording, and the video compression quality and recording time can be adjusted through settings. When the withdrawal person approaches the ATM machine about 50cm, the proximity sensor detects the human body approach signal, the alarm starts, and the ATM monitoring host converts the pre-recorded image of the main camera into a formal video image for recording and saving.

For example, when the withdrawal person destroys the ATM machine, the vibration sensor alarms, the ATM monitoring host sends an alarm signal locally, and calls the control center when it is connected to the network, and continues to record the main camera. After the shock sensor alarms, the embedded ATM monitoring host returns to the normal pre-recording state. 

When the withdrawal person inserts the bank card, an effective operation is performed, and the embedded ATM monitoring host captures the card number and superimposes it on the recorded image. When the cash drawer selects the cash withdrawal service, before the cash is discharged from the ATM, the cash out sensor senses the cash out action, the cash out alarm, and the camera records at the cash out port. When the cash out is completed, the alarm of the cash out sensor is over, the withdrawal is finished and left, the proximity sensor alarm is over, and the embedded host returns to the normal pre-recording state.

  
Fourth, the main features of embedded ATM monitoring host

In response to the demand for ATM monitoring functions, the embedded ATM monitoring host developed by Nanjing Yuantuo Technology Co., Ltd. adopts advanced PSOS embedded real-time operating system (RTOS). The host is compact and has a 10.4-inch LCD screen display function, which solves the problem of ATM The related functions and characteristics of the inconvenience of connecting the display device to the computer are as follows:

1. Video security card number real-time recognition and overlay technology

The video overlay of the system can superimpose card number, date, time, alarm information, etc. on two video images in real time, abandoning the channel mode and preventing the overlay information from being easily modified. At the same time, it is convenient for users to perform combined query through card number, date, time and other information. Especially the card number query provides great convenience for users.

2. Advanced and flexible video image compression method

Using the most advanced computer multimedia processing technology H.264 compression method, it has the advantages of high efficiency compression, low bit rate, high image definition, and low transmission bandwidth. According to the normal transaction 8 hours a day, 3 months of data can be saved.

3. Flexible alarm input and output functions

Flexible configuration of alarm signals (such as card alarm, cash out alarm, vibration alarm, human proximity alarm, fire alarm, etc.). The basic system supports 4 alarm inputs and 2 alarm outputs.

4. Voice dialogue function

Advanced digital voice transmission technology realizes the real-time dialogue function between ATM terminal and ATM center. It is convenient for the ATM center to better manage, monitor and even service the ATM terminal.

5. Image shielding function in the keyboard password input area

To prevent the video signal from covering the keyboard password area under certain circumstances, take preventive measures in time to prevent the user password from leaking, and to ensure the benefit of the withdrawal.

6. Automatically detect the working status of the camera

To ensure that the video is damaged (the video cable is cut, the video source is cut, the camera is damaged, etc.), the alarm is reminded in time to avoid recording useless video or deal with the damage in time.

7. Full dynamic two-channel real-time recording and single-channel synchronous playback, digital storage 2 channels in real-time

Digital images are compressed using flexible and stable algorithms. The compression ratio, frame rate, and image quality can be flexibly adjusted according to user requirements. The system uses two low-light cameras to simultaneously capture the front face image of the customer and the image of the cash outlet in real time, and record the customer’s situation when an alarm signal occurs.

8. Convenient for forensic backup

Provides a USB interface. For users who need to obtain evidence through the USB interface, they can easily and quickly copy the video data to obtain evidence to fulfill their needs for evidence collection.

9. Modular design

Both software and hardware adopt commercialized, generalized, and modular structure, which makes the system have a strong expansion capability, which is easy to maintain, manage and upgrade, and protect the existing investment of users.

10. Broad applicability

It is suitable for mainstream ATM models of various brands on the market: such as NCR, IBM, Dibao, Siemens, Fujitsu, Guangzhou Yuyin, etc.

11. Remote management

Realize the remote transmission, control and query of audio, video and working status information through telephone lines, PSTN, ISDN, TCP/IP and other methods, which greatly reduces the workload of on-site maintenance.

  
5. Application of new ATM anti-card theft technology in the field of ATM monitoring

Main technical features:

First, a high-precision laser distance measurement system is used to perform multi-point distance measurement on the card reader and its surroundings of self-service equipment such as ATM machines, and save the measurement results as a reference value. During normal operation, the card readers of ATM machines and other self-service devices are repeatedly measured according to a certain period or preset conditions, and the received measured distance value is compared with the saved reference value. When the measured distance value does not exceed the alarm When the distance parameter value, the current state is maintained; when the measured distance value exceeds the alarm distance parameter value, indicating that the physical state or form around the card reader has changed, an alarm signal is sent to the control module and the continuous alarm time is counted , If the continuous alarm time statistics exceed the set alarm time parameter threshold, the control module sends out early warning instructions, early warning alarm signals, voice prompts, and on-site photos via the Internet of Things module. At the same time, it does not respond to normal card insertion and other actions. Will produce false positives;

Yuantuo anti-side recording system uses the phase laser ranging module to achieve high-precision laser multi-point ranging, which can form a laser protective net around the card reader. Since the equipment is hoisted at a certain distance in front of the self-service equipment, it is not only convenient to set up, but also concealed. And there is no need to destroy the self-service equipment, the installation position is flexible, and it can be installed within a distance of 0.05m to 20m from the ATM machine card reader; in addition, the laser light path of the device not only has a large detection range, but also is not susceptible to environmental influences and electromagnetic interference, which is effective Solve the problem of false positives and false negatives of traditional equipment.

The system is specially set up with the Internet of Things module, which can monitor the card port status of ATMs at various outlets in real time through the center network, and can actively report to the center in time for various card port abnormalities that occur. At the same time, it can be connected with the SMS alarm module to send SMS alarms to related personnel or the SMS alarm platform of the public security department.

The ATM intelligent anti-theft card system has been successfully applied in some domestic cities. Before the Beijing, Nanjing, and Shanghai World Expos, the above-mentioned ATM smart anti-theft card processing products were installed on the ATMs in Shanghai, and they were connected to the city’s ATM monitoring networking system in Shanghai. The smart anti-theft card networking monitoring of these ATMs was greatly improved. The original monitoring performance has been well received by users.

  

From the perspective of the development trend of the surveillance industry, more and more high-tech are applied to this industry, and the financial industry surveillance needs are also changing accordingly, and the requirements for ATM surveillance will continue to be updated and improved. ATM anti-theft card Continuously improve the ATM monitoring function to make it better and safer to provide users with high-quality services.

Nanjing Yuantuo Technology Co., Ltd. http://www.ytkj.cpooo.com Contact person: Mr. Shi Tel: 18951773276 QQ: 1309013286

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare