[go: up one dir, main page]

CN113936366B - Method and device for monitoring cash of bank trunk and crown word number collecting buffer memory - Google Patents

Method and device for monitoring cash of bank trunk and crown word number collecting buffer memory Download PDF

Info

Publication number
CN113936366B
CN113936366B CN202111466746.8A CN202111466746A CN113936366B CN 113936366 B CN113936366 B CN 113936366B CN 202111466746 A CN202111466746 A CN 202111466746A CN 113936366 B CN113936366 B CN 113936366B
Authority
CN
China
Prior art keywords
cash
crown word
word number
initial
crown
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111466746.8A
Other languages
Chinese (zh)
Other versions
CN113936366A (en
Inventor
郝灵
吴渊
吴迪
管正国
任玉栋
徐亮
杨亚平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202111466746.8A priority Critical patent/CN113936366B/en
Publication of CN113936366A publication Critical patent/CN113936366A/en
Application granted granted Critical
Publication of CN113936366B publication Critical patent/CN113936366B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/10Safes or strong-rooms for valuables with alarm, signal or indicator
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D11/00Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
    • G07D11/009Depositing devices
    • G07D11/0096Accepting paper currency or other valuables in containers, e.g. in code-marked envelopes

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a method and a device for monitoring cash of a bank trunk and a crown word number collecting buffer memory. The method comprises the following steps: acquiring transaction data and corresponding crown word number files sent by terminal equipment in real time; during the checking period of the current transaction period, acquiring checking transaction data and checking crown word number files sent by the terminal equipment; before the next transaction period starts, acquiring an initial crown word number file sent by terminal equipment; the initial crown number file is compared with the inventory crown number file to determine if there is an anomaly in the tail box cash. According to the application, whether cash in the tail box is replaced by a person is analyzed according to the uniqueness of the crown word number file, the continuity of business handling is ensured, the risk prevention and control of the cash business of the tail box are enhanced, and the prevention and control means and the prevention and control capability of banks on the operation risk of staff are enhanced.

Description

Method and device for monitoring cash of bank trunk and crown word number collecting buffer memory
Technical Field
The application relates to the technical field of bank safety monitoring, in particular to a method and a device for monitoring cash of a bank trunk and a crown word number collecting buffer memory.
Background
Currently, the physical management of the net point tail boxes of most banks is incorporated into the system management. However, the existing system management only achieves the management of accounts. For the physical management of the tail box, a dead zone exists, namely that the specific paper money in the tail box cannot be known exactly, and whether a teller has the phenomenon of drawing or not (namely, cash is stolen). For example, the teller withdraws a portion of the cash in the tail box at the time of the day of the website, and returns the cash to the tail box before the business operation on the next day. Such risk prevention and control is difficult to find at the first time, and may lead to continuous crime by subsequent teller, such as failing to return, which may cause a loss of the bank and affect the reputation of the bank. Therefore, the existing trunk inventory can only achieve the coincidence of the real object (paper money) amount and account of the trunk. The system records the real object (paper money) amount of the day, but when the bill is stored in the stock box in the next day, if the paper money in the tail box is replaced after being extracted, the manager cannot find the bill, the accuracy of the actual inspection of the tail box is poor, and the safety risk is high.
Disclosure of Invention
The embodiment of the application aims to provide a method and a device for monitoring cash of a bank trunk and a crown word number collecting and caching machine, and aims to solve the problem that the bank trunk cash in the prior art is high in safety risk.
To achieve the above object, a first aspect of the present application provides a method for monitoring cash of a bank trunk, applied to a crown word number collecting buffer machine, the crown word number collecting buffer machine being in communication with a terminal device, the method comprising:
acquiring transaction data and corresponding crown word number files sent by terminal equipment in real time;
during the checking period of the current transaction period, acquiring checking transaction data and checking crown word number files sent by the terminal equipment;
before the next transaction period starts, acquiring an initial crown word number file sent by terminal equipment;
The initial crown number file is compared with the inventory crown number file to determine if there is an anomaly in the tail box cash.
In the embodiment of the application, comparing the initial crown word number file with the inventory crown word number file to determine whether the tail box cash has an abnormality comprises the following steps:
obtaining inventory cash data according to the inventory crown word number file;
Obtaining initial cash data according to the initial crown word number file;
Judging whether the initial cash data and the checking cash data are consistent;
in the case where the initial cash data and the inventory cash data are inconsistent, it is determined that there is an abnormality in the trunk cash.
In the embodiment of the application, obtaining the inventory cash data according to the inventory crown word number file comprises the following steps:
And accumulating the cash data corresponding to all the inventory crown word numbers in the inventory crown word number file to obtain inventory cash data.
In an embodiment of the present application, the method further includes:
judging whether the checking transaction data and the checking cash data are consistent;
and determining that the tail box cash is abnormal under the condition that the inventory transaction data and the inventory cash data are inconsistent.
In the embodiment of the application, obtaining initial cash data according to the initial crown word number file comprises the following steps:
And accumulating the cash data corresponding to all the initial crown numbers in the initial crown number file to obtain initial cash data.
In an embodiment of the present application, the method further includes:
Before the next transaction period starts, acquiring initial account data input by the terminal equipment;
judging whether the initial account data and the initial cash data are consistent;
in the case where the initial account data and the initial cash data do not coincide, it is determined that there is an abnormality in the trunk cash.
In the embodiment of the application, comparing the initial crown word number file with the inventory crown word number file to determine whether the tail box cash has an abnormality comprises the following steps:
comparing all initial crown word numbers in the initial crown word number file with all inventory crown word numbers in the inventory crown word number file;
Judging whether an initial crown word number different from the checking crown word number exists in the initial crown word number file;
in the case that an initial crown number different from the inventory crown number exists in the initial crown number file, it is determined that there is an abnormality in the trunk cash.
In the embodiment of the application, the terminal equipment communicates with the authentication equipment, and the terminal equipment acquires the crown word number file corresponding to the transaction data through the authentication equipment.
In an embodiment of the present application, the crown word number collecting buffer memory is further in communication with the management device, and the method further includes:
and under the condition that the cash in the tail box is abnormal, sending early warning information to the management equipment.
In an embodiment of the present application, the method further includes:
And under the condition that the tail box cash is abnormal, determining abnormal transaction data corresponding to the abnormal crown word number file according to the comparison result.
A second aspect of the present application provides a crown word size collection cache comprising:
A memory configured to store instructions; and
A processor configured to invoke the instructions from the memory and when executing the instructions, to implement the method for monitoring bank trunk cash described above.
A third aspect of the application provides an apparatus for monitoring cash in a bank trunk, the apparatus comprising:
The crown word number collecting buffer memory;
the terminal equipment is communicated with the crown word number acquisition buffer memory and is used for acquiring transaction data input by a user and a crown word number file sent by the fake identifying equipment;
the fake identifying device is communicated with the terminal device and is used for acquiring a crown word number file corresponding to the current transaction and sending the crown word number file to the terminal device;
and the management equipment is communicated with the crown word number acquisition buffer memory and is used for receiving the early warning information sent by the crown word number acquisition buffer memory.
In an embodiment of the present application, a fake authentication device includes:
and the image acquisition unit is used for acquiring the cash image in the current transaction.
A fourth aspect of the application provides a machine-readable storage medium having stored thereon instructions for causing a machine to perform the above-described method for monitoring bank trunk cash.
A fifth aspect of the application provides a computer program product comprising a computer program which, when executed by a processor, implements the method for monitoring bank trunk cash described above.
According to the technical scheme, during the counting process of the current transaction period, counting transaction data and counting crown number files are obtained, before the next transaction period starts, initial crown number files are obtained, and the initial crown number files and the counting crown number files are compared to determine whether the cash of the tail box is abnormal or not. Therefore, whether cash in the tail box is replaced by a person can be analyzed according to the uniqueness of the crown word number file, continuity of business handling is guaranteed, risk prevention and control of cash business of the tail box are enhanced, and prevention and control means and prevention and control capability of banks on employee operation risks are enhanced.
Additional features and advantages of embodiments of the application will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain, without limitation, the embodiments of the application. In the drawings:
FIG. 1 schematically illustrates an application environment diagram of a method for monitoring bank trunk cash in accordance with an embodiment of the present application;
FIG. 2 schematically illustrates a flow diagram of one embodiment of a method for monitoring bank trunk cash in accordance with an embodiment of the present application;
FIG. 3 schematically illustrates a refinement of one embodiment of step 208 of FIG. 1;
FIG. 4 schematically illustrates a refinement of another embodiment of step 208 of FIG. 1;
FIG. 5 schematically illustrates a block diagram of a crown word size collection cache, according to an embodiment of the application;
Fig. 6 schematically shows an internal structural view of a computer device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it should be understood that the detailed description described herein is merely for illustrating and explaining the embodiments of the present application, and is not intended to limit the embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that, if directional indications (such as up, down, left, right, front, and rear … …) are included in the embodiments of the present application, the directional indications are merely used to explain the relative positional relationship, movement conditions, etc. between the components in a specific posture (as shown in the drawings), and if the specific posture is changed, the directional indications are correspondingly changed.
In addition, if there is a description of "first", "second", etc. in the embodiments of the present application, the description of "first", "second", etc. is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present application.
Fig. 1 schematically shows an application environment schematic of a method for monitoring bank trunk cash according to an embodiment of the present application. The method for monitoring bank trunk cash provided by the application can be applied to an application environment shown in figure 1. The crown word number collection buffer 102 is respectively in communication with the terminal device 104 and the management device 108 through a network, and the terminal device 104 is in communication with the banknote checking device 106 through the network. The crown word number collection cache 102 may be implemented by a separate server or a server cluster formed by a plurality of servers. The terminal device 104 may be disposed at a teller terminal, and may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, for obtaining transaction data input by a user and a crown file sent by the authentication device. The counterfeit identifying device 106 may not be limited to a banknote validator, and may include an image acquisition unit configured to acquire a crown word number file corresponding to the current transaction, and send the crown word number file to the terminal device. The management device 108 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the management device 108 may be disposed on a manager side, such as a tap teller, for receiving the early warning information sent by the crown word number collection cache.
Figure 2 schematically illustrates a flow diagram of one embodiment of a method for monitoring bank trunk cash in accordance with an embodiment of the present application. As shown in fig. 2, in an embodiment of the present application, a method for monitoring cash in a bank trunk is provided, and this embodiment is mainly exemplified by the application of the method to the crown word number collection buffer 102 in fig. 1, where the crown word number collection buffer may be in communication with a terminal device, and the method may include the following steps.
Step 202, acquiring transaction data and a corresponding crown word number file sent by a terminal device in real time.
Transaction data refers to data related to the current transaction entered by the teller. The teller inputs transaction data to the terminal equipment according to the specific condition of the current transaction, and then takes out or stores cash from the tail box according to the transaction data, and the teller needs to count the cash through the counterfeit identifying equipment, such as a cash identifier, in the cash taking out or storing process. In the prior art, ticket face data of the current transaction is generally recorded only through the fake identifying device. The fake identifying device of the embodiment of the application can also count the crown word number of cash and send the crown word number file to the terminal device.
The crown number file may include a crown number image file of cash checked by the authentication device in the current transaction. The crown word number image file may include, but is not limited to, date and time corresponding to cash, crown word number picture, currency, denomination, version, counterfeit money, and device machine code. The crown word number collection buffer memory can identify the crown word numbers of all cash in the current transaction through the crown word number file sent by the terminal equipment. The crown number generally refers to the cash crown number, which is used to record a cash issuing sequence, such as FA00008888. The crown number of a cash must be unique, and thus, the inflow or outflow information of cash corresponding to a transaction can be determined by the crown number. Note that, in the embodiment of the present application, cash notes are mentioned.
In one example, the terminal device communicates with the crown word number collection buffer and the authentication device, and upon conducting a money-taking transaction, the teller enters current transaction data into the terminal device and withdraws cash from the boot into the authentication device for counting. The fake identifying equipment checks cash, sends the crown number file to the terminal equipment, and the terminal equipment sends transaction data input by the teller and the crown number file sent by the fake identifying equipment to a crown number acquisition buffer memory with the nearby crown number, and the crown number acquisition buffer memory temporarily stores the crown number file and simultaneously analyzes the crown number file. According to the embodiment of the application, the transaction data of each transaction is integrated with the crown word number file, so that the transaction with problems can be accurately found according to the ratio of the crown word number file.
Step 204, during the checking period of the current transaction period, the checking transaction data and the checking crown word number file sent by the terminal device are obtained.
The bank can conduct the checking of the current transaction period after each transaction period is finished, for example, taking one day as one transaction period, and conducting the checking of the end of day at the end of day. The counting of the prior art only counts the transaction data of the current period and cash in the tail box, and cannot know exactly which cash in the tail box is. Thus, there may be instances where the teller is taking cash. As long as the teller places an equal amount of cash into the boot before the next transaction period begins, it is difficult to find the case where the boot cash is stolen. Therefore, in the embodiment of the application, during the counting period of the current transaction period, the crown word number acquisition buffer memory not only acquires the counting transaction data sent by the terminal equipment, but also acquires the counting crown word number file, so that the initial crown word number file is compared with the counting crown word number file before the next transaction period starts.
Step 206, before the next transaction period starts, the initial crown file sent by the terminal device is obtained.
Before the initial crown number file, i.e. the new transaction period starts, the teller puts cash of the tail box into the fake identifying equipment for checking to obtain the crown number file. And after receiving the initial crown word number file sent by the fake identifying device, the terminal device sends the initial crown word number file to the crown word number acquisition buffer. In this way, the crown number collection buffer memory can acquire the inventory crown number file of the last transaction period and the initial crown number file of the current transaction period, which are sent by the terminal equipment, before each transaction period starts.
Step 208, comparing the initial crown number file with the inventory crown number file to determine whether there is an abnormality in the trunk cash.
The crown word number collecting buffer memory compares the initial crown word number file of the current transaction period with the inventory crown word number file of the last transaction period before each transaction period starts, and whether the cash of the tail box is abnormal can be determined according to the comparison result of the initial crown word number file and the inventory crown word number file. If the abnormal situation exists, the fact that the cash in the tail box is possibly moved by a person is indicated, and an alarm can be given according to specific conditions so as to remind a manager that the cash in the tail box is at safety risk.
In the embodiment of the application, during the counting of the current transaction period, counting transaction data and a counting crown number file are acquired, and before the next transaction period starts, an initial crown number file is acquired, and the initial crown number file and the counting crown number file are compared to determine whether the cash of the tail box is abnormal or not. Therefore, whether cash in the tail box is replaced by a person can be analyzed according to the uniqueness of the crown word number file, continuity of business handling is guaranteed, risk prevention and control of cash business of the tail box are enhanced, and prevention and control means and prevention and control capability of banks on employee operation risks are enhanced.
Fig. 3 schematically shows a detailed flow chart of an embodiment of step 208 in fig. 1. As shown in FIG. 3, in one embodiment of the present application, step 208 of comparing the initial crown number file with the inventory crown number file to determine whether there is an anomaly in the trunk cash may include:
step 302, obtaining inventory cash data according to the inventory crown word number file;
Step 304, obtaining initial cash data according to the initial crown word number file;
step 306, judging whether the initial cash data and the checking cash data are consistent;
in step 308, if the initial cash data and the inventory cash data do not match, it is determined that there is an abnormality in the trunk cash.
In the embodiment of the application, if the tail box cash is stolen, there may be a case that the initial crown number file and the inventory crown number file are inconsistent in cash data (such as cash sum or ticket data). The total amount of cash, i.e. the amount of cash, is for example 10 sheets 100 yuan 1000 yuan. The number of the ticket data, i.e. the number of the ticket, for example, 1000 yuan of the ticket data can be 10 sheets of 100 yuan, 20 sheets of 50 yuan, 5 sheets of 100 yuan plus 10 sheets of 50 yuan, etc.
The crown word number collecting buffer memory can obtain inventory cash data according to inventory crown word number files, and can also obtain initial cash data according to initial crown word number files. The counting of cash data is that of the counting period of the transaction period, for example, cash data corresponding to all counting crown numbers of the current transaction period is accumulated, and final cash data of the current transaction period is obtained, namely, the counting of cash data. The initial cash data is cash data before the transaction period starts, for example, cash data corresponding to all initial crown numbers in all initial crown number files are accumulated before the transaction period starts, so as to obtain initial cash data. If the initial cash data and the inventory cash data are inconsistent, an abnormality in the trunk cash is indicated.
According to the embodiment of the application, by comparing the initial cash data with the inventory cash data, whether the cash of the tail box is abnormal or not is judged, the risk prevention and control of cash business of the tail box are enhanced, and the prevention and control means and the prevention and control capability of banks on the operation risk of staff are enhanced.
In one example, step 302, obtaining inventory cash data from an inventory crown word number file may include:
And accumulating the cash data corresponding to all the inventory crown word numbers in the inventory crown word number file to obtain inventory cash data.
Specifically, the cash data is checked, i.e., cash data during the checking of the transaction cycle. And accumulating the cash data corresponding to all the counting crown numbers in the counting crown number file of the current transaction period to obtain the counting cash data. Counting the crown word number file, namely the sum of all crown word number files in the current transaction period. And summarizing all the crown word number files in the current transaction period to obtain a checking crown word number file, and obtaining cash data such as cash total sum or ticket face data sum remained after the current period of the tail box is finished according to all cash crown word numbers contained in the checking crown word number file.
In an embodiment of the present application, the method may further include:
judging whether the checking transaction data and the checking cash data are consistent;
and determining that the tail box cash is abnormal under the condition that the inventory transaction data and the inventory cash data are inconsistent.
Specifically, during the transaction period inventory, it may also be determined whether the tail box cash is abnormal based on a comparison of the inventory transaction data and the inventory cash data. During the checking period of the current transaction period, the teller checks cash of the tail box through the fake identifying equipment, the fake identifying equipment sends the crown number file to the terminal equipment, and the terminal equipment sends the crown number file and the transaction data to the crown number collecting buffer memory together. The crown word number collecting buffer memory is used for obtaining and recording all crown word numbers in the crown word number file, comparing the checking transaction data with the checking cash data, and determining that the tail box cash is abnormal under the condition that the checking transaction data is inconsistent with the checking cash data, and needing to check again and find out abnormal transactions. By comparing the checking transaction data with the checking cash data during checking, whether the tail box cash is abnormal or not can be timely judged, and the safety of the tail box cash is improved.
In one example, step 304, deriving initial cash data from the initial crown file may include:
And accumulating the cash data corresponding to all the initial crown numbers in the initial crown number file to obtain initial cash data.
Specifically, the initial cash data, that is, the cash data before the transaction period starts, is accumulated with the cash data corresponding to all initial crown numbers in the initial crown number file before the transaction period starts, and the initial cash data can be obtained. And (3) before the initial crown word number file, namely the current transaction period, placing cash in the tail box into the fake identifying equipment by a teller for checking, and obtaining the sum of initial crown word numbers of all cash, namely the initial crown word number file. In this way, the crown word size collection buffer can be facilitated to compare the initial cash data with the inventory cash data of the last transaction period to determine whether the tail box cash is abnormal.
In an embodiment of the present application, the method may further include:
Before the next transaction period starts, acquiring initial account data input by the terminal equipment;
judging whether the initial account data and the initial cash data are consistent;
in the case where the initial account data and the initial cash data do not coincide, it is determined that there is an abnormality in the trunk cash.
Specifically, before the next transaction period begins, it may also be determined whether there is an anomaly in the trunk cash based on a comparison of the initial accounting data and the initial cash data. The teller needs to enter an initial accounting data, i.e. the initial amount of the boot, before the transaction period starts. And checking cash of the tail box through the fake identifying equipment, sending the crown word number file to the terminal equipment by the fake identifying equipment, and sending the crown word number file and transaction data to the crown word number acquisition buffer memory together by the terminal equipment. The crown word number collecting buffer memory is used for obtaining and recording all crown word numbers in the crown word number file, comparing the initial account data with the initial cash data, and determining that the tail box cash is abnormal under the condition that the initial account data and the initial cash data are inconsistent. By comparing the initial account data with the initial cash data before the next transaction period starts, whether the tail box cash is abnormal or not can be timely judged, and the safety of the tail box cash is improved.
Fig. 4 schematically shows a refinement of another embodiment of step 208 in fig. 1. In another embodiment of the present application, as shown in FIG. 4, step 208, comparing the initial crown number file with the inventory crown number file to determine whether there is an anomaly in the trunk cash may include:
Step 402, comparing all initial crown word numbers in the initial crown word number file with all inventory crown word numbers in the inventory crown word number file;
Step 404, judging whether an initial crown word number different from the checking crown word number exists in the initial crown word number file;
step 406, determining that the tail box cash is abnormal in the case that the initial crown word number different from the checking crown word number exists in the initial crown word number file.
In the embodiment of the application, if the tail box cash is stolen, the cashier respectively and sequentially returns the stolen cash according to the ticket before the next transaction period starts, and although the initial cash data and the checking cash data can be aligned, the condition that the initial crown number file and the checking crown number file are inconsistent may exist. Therefore, the embodiment of the application can also compare all initial crown numbers in the initial crown number file with all inventory crown numbers in the inventory crown number file to find out whether different crown numbers exist. If different crown word numbers exist, the abnormal existence of the cash of the trunk is indicated, and early warning information needs to be sent to the management equipment.
According to the embodiment of the application, the initial crown word number and the inventory crown word number are compared to judge whether the cash of the tail box is abnormal, so that the risk prevention and control of cash business of the tail box are enhanced, and the prevention and control means and prevention and control capability of banks on the operation risk of staff are enhanced.
In the embodiment of the application, the terminal equipment can communicate with the authentication equipment, and the terminal equipment can acquire the crown word number file corresponding to the transaction data through the authentication equipment.
Specifically, the counterfeit authentication device is a device for checking cash, and is used for identifying the authenticity of the cash, and may include, but is not limited to, a banknote validator and the like. The fake identifying device of the embodiment of the application can comprise an image collecting unit which is used for collecting the image files of cash and sending the image files to the crown word number collecting and buffering machine, wherein the crown word number collecting and buffering machine receives the image files of the cash (namely the crown word number files) and can identify the crown word number of each cash. Therefore, the fake identifying device of the embodiment of the application can be used for acquiring the crown word number file corresponding to the current transaction and sending the crown word number file to the terminal device so that the crown word number acquisition buffer can analyze and store the crown word number contained in the crown word number file.
In the embodiment of the application, the crown word number collecting buffer memory can also be communicated with the management device, and the method can further comprise the following steps:
and under the condition that the cash in the tail box is abnormal, sending early warning information to the management equipment.
Specifically, the crown word number collecting buffer memory can also communicate with the management equipment, and early warning information can be timely sent to the management equipment under the condition that the crown word number collecting buffer memory supervises that the cash security is abnormal. And under the condition that the reminding information is received, a manager (such as a tap teller) can know that the cash of the tail box has safety risks in time. In one example, specific reminder information may be set according to different anomalies. For example, the early warning information is classified, such as class I early warning information, which can be processed remotely by a manager, and class II early warning information, which requires the manager to go to the site for verification. In this way, the workload of the manager can be reduced.
In an embodiment of the present application, the method may further include:
And under the condition that the tail box cash is abnormal, determining abnormal transaction data corresponding to the abnormal crown word number file according to the comparison result.
Specifically, in the prior art, when the tail box cash is abnormal, staff of the bank needs to check the abnormal condition of the whole transaction period, so that the workload is huge and the efficiency is low. In the embodiment of the application, the crown word number is associated with specific one-time business operation, and the abnormal transaction data can be quickly found through the abnormal crown word number file, so that the investigation efficiency is improved, and management personnel can conveniently analyze reasons and position risks.
It should be understood that, although the steps in the above-described flowcharts are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps of the flowcharts described above may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order in which the sub-steps or stages are performed is not necessarily sequential, and may be performed in turn or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Fig. 5 schematically shows a block diagram of a crown word size collection buffer according to an embodiment of the application. As shown in fig. 5, an embodiment of the present application provides a crown word size collection buffer, which may include:
A memory 510 configured to store instructions; and
Processor 520 is configured to invoke instructions from memory 510 and when executing the instructions, to implement the method for monitoring bank trunk cash described above.
Specifically, in an embodiment of the present application, processor 520 may be configured to:
acquiring transaction data and corresponding crown word number files sent by terminal equipment in real time;
during the checking period of the current transaction period, acquiring checking transaction data and checking crown word number files sent by the terminal equipment;
before the next transaction period starts, acquiring an initial crown word number file sent by terminal equipment;
The initial crown number file is compared with the inventory crown number file to determine if there is an anomaly in the tail box cash.
Further, the processor 520 may be further configured to:
comparing the initial crown number file with the inventory crown number file to determine if there is an anomaly in the tail box cash includes:
obtaining inventory cash data according to the inventory crown word number file;
Obtaining initial cash data according to the initial crown word number file;
Judging whether the initial cash data and the checking cash data are consistent;
in the case where the initial cash data and the inventory cash data are inconsistent, it is determined that there is an abnormality in the trunk cash.
Further, the processor 520 may be further configured to:
obtaining inventory cash data according to the inventory crown word number file comprises the following steps:
And accumulating the cash data corresponding to all the inventory crown word numbers in the inventory crown word number file to obtain inventory cash data.
Further, the processor 520 may be further configured to:
judging whether the checking transaction data and the checking cash data are consistent;
and determining that the tail box cash is abnormal under the condition that the inventory transaction data and the inventory cash data are inconsistent.
Further, the processor 520 may be further configured to:
obtaining initial cash data from the initial crown word number file includes:
And accumulating the cash data corresponding to all the initial crown numbers in the initial crown number file to obtain initial cash data.
Further, the processor 520 may be further configured to:
Before the next transaction period starts, acquiring initial account data input by the terminal equipment;
judging whether the initial account data and the initial cash data are consistent;
in the case where the initial account data and the initial cash data do not coincide, it is determined that there is an abnormality in the trunk cash.
Further, the processor 520 may be further configured to:
comparing the initial crown number file with the inventory crown number file to determine if there is an anomaly in the tail box cash includes:
comparing all initial crown word numbers in the initial crown word number file with all inventory crown word numbers in the inventory crown word number file;
Judging whether an initial crown word number different from the checking crown word number exists in the initial crown word number file;
in the case that an initial crown number different from the inventory crown number exists in the initial crown number file, it is determined that there is an abnormality in the trunk cash.
In the embodiment of the application, the terminal equipment communicates with the authentication equipment, and the terminal equipment acquires the crown word number file corresponding to the transaction data through the authentication equipment.
Further, the processor 520 may be further configured to:
and under the condition that the cash in the tail box is abnormal, sending early warning information to the management equipment.
Further, the processor 520 may be further configured to:
And under the condition that the tail box cash is abnormal, determining abnormal transaction data corresponding to the abnormal crown word number file according to the comparison result.
In the embodiment of the application, during the counting of the current transaction period, counting transaction data and a counting crown number file are acquired, and before the next transaction period starts, an initial crown number file is acquired, and the initial crown number file and the counting crown number file are compared to determine whether the cash of the tail box is abnormal or not. Therefore, whether cash in the tail box is replaced by a person can be analyzed according to the uniqueness of the crown word number file, continuity of business handling is guaranteed, risk prevention and control of cash business of the tail box are enhanced, and prevention and control means and prevention and control capability of banks on employee operation risks are enhanced.
As shown in fig. 1, an apparatus for monitoring cash in a bank trunk according to an embodiment of the present application may include:
The crown word size collection buffer 102 described above;
the terminal equipment 104 is communicated with the crown word number acquisition buffer 102 and is used for acquiring transaction data input by a user and crown word number files sent by the fake identification equipment 106;
The fake identifying device 106 is communicated with the terminal device 104 and is used for acquiring a crown word number file corresponding to the current transaction and sending the crown word number file to the terminal device 104;
the management device 108 is in communication with the crown word number collection cache 102, and is configured to receive the early warning information sent by the crown word number collection cache 102.
In an embodiment of the present application, the crown word number collection cache 102 may communicate with the terminal device 104 and the management device 108, respectively, via a network, and the terminal device 104 may communicate with the banknote validator 106 via the network. The crown word number collection cache 102 may be implemented by a separate server or a server cluster formed by a plurality of servers. The terminal device 104 may be disposed at a teller terminal, and may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, for obtaining transaction data input by a user and a crown file sent by the authentication device. The counterfeit detection device 106 may not be limited to a banknote validator, and may be configured to obtain a crown word number file corresponding to the current transaction, and send the crown word number file to the terminal device 104. The management device 108 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the management device 108 may be disposed on a manager side, such as a tap teller, for receiving the early warning information sent by the crown word number collection cache 102.
In an embodiment of the present application, the authentication device 106 may include:
and the image acquisition unit is used for acquiring the cash image in the current transaction.
Specifically, the counterfeit authentication device 106 is a device for checking cash, and is used for identifying the authenticity of cash, and may include, but is not limited to, a bill validator and the like. The authentication device 106 according to the embodiment of the present application may include an image acquisition unit (not shown in the figure) for acquiring an image file of cash and sending the image file to the crown word number acquisition buffer 102, where the crown word number acquisition buffer 102 receives the image file of cash (i.e. crown word number file) and can identify the crown word number of each cash. The image acquisition unit may include, but is not limited to, a video camera, a scanner, and the like. Therefore, the authentication device 106 of the embodiment of the present application may be configured to obtain a crown word number file corresponding to the current transaction, and send the crown word number file to the terminal device, so that the crown word number acquisition buffer 102 analyzes and stores crown word numbers included in the crown word number file.
Embodiments of the present application also provide a machine-readable storage medium having stored thereon instructions for causing a machine to perform the above-described method for monitoring bank trunk cash.
The embodiment of the application also provides a computer program product adapted to perform, when executed on a processor, a program initialized with the method steps of: acquiring transaction data and corresponding crown word number files sent by terminal equipment in real time; during the checking period of the current transaction period, acquiring checking transaction data and checking crown word number files sent by the terminal equipment; before the next transaction period starts, acquiring an initial crown word number file sent by terminal equipment; the initial crown number file is compared with the inventory crown number file to determine if there is an anomaly in the tail box cash.
In one embodiment, the inventory cash data is obtained from an inventory crown word number file; obtaining initial cash data according to the initial crown word number file; judging whether the initial cash data and the checking cash data are consistent; in the case where the initial cash data and the inventory cash data are inconsistent, it is determined that there is an abnormality in the trunk cash.
In one embodiment, cash data corresponding to all the count crown numbers in the count crown number file is accumulated to obtain count cash data.
In one embodiment, determining whether the inventory transaction data and the inventory cash data are consistent; and determining that the tail box cash is abnormal under the condition that the inventory transaction data and the inventory cash data are inconsistent.
In one embodiment, cash data corresponding to all initial crown numbers in the initial crown number file is accumulated to obtain initial cash data.
In one embodiment, the initial account data input by the terminal device is acquired before the next transaction period begins; judging whether the initial account data and the initial cash data are consistent; in the case where the initial account data and the initial cash data do not coincide, it is determined that there is an abnormality in the trunk cash.
In one embodiment, all initial crown numbers in the initial crown number file are compared with all inventory crown numbers in the inventory crown number file; judging whether an initial crown word number different from the checking crown word number exists in the initial crown word number file; in the case that an initial crown number different from the inventory crown number exists in the initial crown number file, it is determined that there is an abnormality in the trunk cash.
In one embodiment, the terminal device communicates with the authentication device, and the terminal device obtains the crown word number file corresponding to the transaction data through the authentication device.
In one embodiment, in the event of an anomaly in the trunk cash, the pre-warning information is sent to the management device.
In one embodiment, in the case that the tail box cash is abnormal, abnormal transaction data corresponding to the abnormal crown word number file is determined according to the comparison result.
Fig. 6 schematically shows an internal structural view of a computer device according to an embodiment of the present application. A computer device is provided, which may be a terminal, and an internal structure diagram thereof may be as shown in fig. 6. The computer apparatus includes a processor a01, a network interface a02, a display screen a04, an input device a05, and a memory (not shown in the figure) which are connected through a system bus. Wherein the processor a01 of the computer device is adapted to provide computing and control capabilities. The memory of the computer device includes an internal memory a03 and a nonvolatile storage medium a06. The nonvolatile storage medium a06 stores an operating system B01 and a computer program B02. The internal memory a03 provides an environment for the operation of the operating system B01 and the computer program B02 in the nonvolatile storage medium a06. The network interface a02 of the computer device is used for communication with an external terminal through a network connection. The computer program, when executed by the processor a01, implements a method for monitoring bank trunk cash. The display screen a04 of the computer device may be a liquid crystal display screen or an electronic ink display screen, and the input device a05 of the computer device may be a touch layer covered on the display screen, or may be a key, a track ball or a touch pad arranged on a casing of the computer device, or may be an external keyboard, a touch pad or a mouse.
It will be appreciated by those skilled in the art that the structure shown in FIG. 6 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer-readable media include both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (12)

1. A method for monitoring cash in a bank trunk, applied to a crown word number collection cache, the crown word number collection cache being in communication with a terminal device, the method comprising:
acquiring transaction data and corresponding crown word number files sent by the terminal equipment in real time;
during the checking of the current transaction period, acquiring checking transaction data and a checking crown word number file sent by the terminal equipment;
before the next transaction period starts, acquiring an initial crown word number file sent by the terminal equipment;
Comparing the initial crown word number file with the inventory crown word number file to determine whether the tail box cash is abnormal, including:
accumulating cash data corresponding to all the counting crown word numbers in the counting crown word number file to obtain counting cash data;
obtaining initial cash data according to the initial crown word number file;
Judging whether the initial cash data and the checking cash data are consistent;
Determining that the tail box cash is abnormal under the condition that the initial cash data and the inventory cash data are inconsistent; and
Judging whether the inventory transaction data and the inventory cash data are consistent;
and determining that the tail box cash is abnormal under the condition that the inventory transaction data and the inventory cash data are inconsistent.
2. The method of claim 1, wherein obtaining initial cash data from the initial crown file comprises:
and accumulating the cash data corresponding to all the initial crown numbers in the initial crown number file to obtain initial cash data.
3. The method according to claim 2, wherein the method further comprises:
Before the next transaction period starts, acquiring initial account data input by the terminal equipment;
Judging whether the initial account data and the initial cash data are consistent;
And determining that the tail box cash is abnormal under the condition that the initial account data and the initial cash data are inconsistent.
4. The method of claim 1, wherein comparing the initial crown file and the inventory crown file to determine whether there is an anomaly in the trunk cash comprises:
comparing all initial crown word numbers in the initial crown word number file with all inventory crown word numbers in the inventory crown word number file;
Judging whether an initial crown word number different from the checking crown word number exists in the initial crown word number file;
And determining that the tail box cash is abnormal under the condition that an initial crown word number different from the inventory crown word number exists in the initial crown word number file.
5. The method of claim 1, wherein the terminal device communicates with a counterfeit authentication device, and wherein the terminal device obtains a crown file corresponding to the transaction data via the counterfeit authentication device.
6. The method of claim 1, wherein the crown word size collection cache is further in communication with a management device, the method further comprising:
and sending early warning information to the management equipment under the condition that the tail box cash is abnormal.
7. The method according to claim 1, wherein the method further comprises:
and under the condition that the tail box cash is abnormal, determining abnormal transaction data corresponding to the abnormal crown word number file according to the comparison result.
8. The utility model provides a crown word number gathers buffer memory which characterized in that includes:
A memory configured to store instructions; and
A processor configured to invoke the instructions from the memory and when executed enable the method for monitoring bank trunk cash according to any one of claims 1 to 7.
9. An apparatus for monitoring cash in a bank trunk, the apparatus comprising:
The crown word size collection cache of claim 8;
The terminal equipment is communicated with the crown word number acquisition buffer memory and is used for acquiring transaction data input by a user and a crown word number file sent by the fake identification equipment;
The fake identifying device is communicated with the terminal device and is used for acquiring a crown word number file corresponding to the current transaction and sending the crown word number file to the terminal device;
And the management equipment is communicated with the crown word number acquisition buffer memory and is used for receiving the early warning information sent by the crown word number acquisition buffer memory.
10. The apparatus of claim 9, wherein the authentication device comprises:
and the image acquisition unit is used for acquiring the cash image in the current transaction.
11. A machine-readable storage medium having stored thereon instructions for causing a machine to perform the method for monitoring bank trunk cash according to any one of claims 1 to 7.
12. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the method for monitoring bank trunk cash according to any one of claims 1 to 7.
CN202111466746.8A 2021-12-03 2021-12-03 Method and device for monitoring cash of bank trunk and crown word number collecting buffer memory Active CN113936366B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111466746.8A CN113936366B (en) 2021-12-03 2021-12-03 Method and device for monitoring cash of bank trunk and crown word number collecting buffer memory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111466746.8A CN113936366B (en) 2021-12-03 2021-12-03 Method and device for monitoring cash of bank trunk and crown word number collecting buffer memory

Publications (2)

Publication Number Publication Date
CN113936366A CN113936366A (en) 2022-01-14
CN113936366B true CN113936366B (en) 2024-09-06

Family

ID=79288719

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111466746.8A Active CN113936366B (en) 2021-12-03 2021-12-03 Method and device for monitoring cash of bank trunk and crown word number collecting buffer memory

Country Status (1)

Country Link
CN (1) CN113936366B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112116450A (en) * 2020-09-21 2020-12-22 中国建设银行股份有限公司 Risk warning method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5255458B2 (en) * 2009-01-05 2013-08-07 日立オムロンターミナルソリューションズ株式会社 Banknote transaction device and banknote transaction system
JP6089707B2 (en) * 2013-01-10 2017-03-08 沖電気工業株式会社 Information processing apparatus and cash processing terminal
JP2015049526A (en) * 2013-08-29 2015-03-16 沖電気工業株式会社 Cash processor
JP2015184802A (en) * 2014-03-20 2015-10-22 沖電気工業株式会社 Cash management system and cash handling device
CN107168973A (en) * 2016-03-08 2017-09-15 山东新北洋信息技术股份有限公司 A kind of paper money number information processing method, apparatus and system
CN106910278A (en) * 2017-01-18 2017-06-30 浙江维融电子科技股份有限公司 A kind of serial number management method of the RMB based on bar code
CN106886941A (en) * 2017-01-19 2017-06-23 浙江维融电子科技股份有限公司 A kind of bank finance information management system
CN108428282A (en) * 2018-02-02 2018-08-21 深圳怡化电脑股份有限公司 Cash box paper currency management method, system and self-aided terminal
CN113592616A (en) * 2021-06-28 2021-11-02 吉林银行股份有限公司 Processing method for realizing consistency of teller real object and account

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112116450A (en) * 2020-09-21 2020-12-22 中国建设银行股份有限公司 Risk warning method and device

Also Published As

Publication number Publication date
CN113936366A (en) 2022-01-14

Similar Documents

Publication Publication Date Title
CN110457957B (en) Information processing method and device of electronic bill, electronic equipment and medium
US9368002B2 (en) Sensor system for detection of a partial retrieval of dispensed currency at an automated teller machine
KR101237220B1 (en) Bill recognition device, bill recognition system, and recording medium
US10783501B1 (en) Digital currency cash grid
RU2562765C2 (en) Banknote processing
CN101958019A (en) Banknote number management method for carrying out transaction by using automatic teller machine (ATM)
JP5752882B2 (en) Surveillance camera system
CN114125004B (en) Method, device and server for supervising cash security of banking outlets
CN203165071U (en) Cash payment and management device
CN111984734A (en) Data processing method, device and equipment based on block chain and storage medium
WO2017032056A1 (en) Point-of-sale-based cash-out determining method and apparatus
CN113936366B (en) Method and device for monitoring cash of bank trunk and crown word number collecting buffer memory
CN106408751A (en) Stocktaking method and system of ATM (automatic teller machine)
CN103198558B (en) Bank counter intelligent processing terminal
JP2012150622A (en) Automatic transaction device and automatic transaction system
CN107016052A (en) A kind of information intelligent processing method
US20070080217A1 (en) Alarm password for triggering a security response
CN110876038A (en) Traceable video monitoring system and method for trading place
JP5899300B2 (en) Surveillance camera system
CN211529155U (en) Embedded file master control system based on TPCM trusted platform
CN201222275Y (en) Portable cheque identifier
CN103310552A (en) Video superimposition system and method suitable for financial client business system of counter and ATM (automatic teller machine)
CN113051257A (en) Service data cleaning method and device
CN202600868U (en) Automatic teller machine with third party currency detector port
CN111897844A (en) Report validity detection method and device based on granularity information and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant