CN111738733A - Method and device for processing suspicious account operation - Google Patents

Method and device for processing suspicious account operation Download PDF

Info

Publication number
CN111738733A
CN111738733A CN202010552044.0A CN202010552044A CN111738733A CN 111738733 A CN111738733 A CN 111738733A CN 202010552044 A CN202010552044 A CN 202010552044A CN 111738733 A CN111738733 A CN 111738733A
Authority
CN
China
Prior art keywords
account
information
receiver
state
job
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010552044.0A
Other languages
Chinese (zh)
Other versions
CN111738733B (en
Inventor
张绪景
罗东晓
韦传荣
王正庚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010552044.0A priority Critical patent/CN111738733B/en
Publication of CN111738733A publication Critical patent/CN111738733A/en
Application granted granted Critical
Publication of CN111738733B publication Critical patent/CN111738733B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/407Cancellation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a method and a device for processing suspicious account operation, wherein the method comprises the following steps: acquiring log information of cross-system jobs and receiver job success information, wherein the log information comprises: calling abnormal information by a program; judging whether the operation is a suspicious account operation or not according to the program calling abnormal information in the log information; in response to the judgment result being the suspicious account operation, judging whether the receiver corresponding to the suspicious account operation is successfully processed according to the receiver operation success information; and performing compensation processing on the receiving party in response to the judgment result that the receiving party has successfully processed. By the method and the device, the problem of inconsistent account calling across systems can be timely and effectively solved.

Description

Method and device for processing suspicious account operation
Technical Field
The invention relates to the field of data processing, in particular to a method and a device for processing suspicious account operation.
Background
When a bank system is called by a cross-application system, in some cases, such as network delay interruption, abnormity of machines, databases and the like can cause abnormity of a calling program, and at the moment, a calling party does not know whether the called program successfully processes posting, and the condition is called 'questioning account'. When the account is doubted, the caller needs to further confirm the problem of account consistency caused by the doubted account and carry out compensation measures. For example, the first party transfers a hundred-yuan RMB to the second party, firstly, the account of the second party is increased by one hundred yuan, the data of the account of the second party is updated and then an instruction is sent to the first party, the first party receives the instruction and then subtracts one hundred yuan from the account, and at this time, the transaction is completed. If abnormity occurs, after the account of the party B is increased by one hundred elements, the party A does not receive a determined signal, and at the moment, the party A does not know how to process, and the scene is called suspicious account. When the account is doubted, it must be determined whether the account of party B has been increased by one hundred and the corresponding processing is done, otherwise the financial instability is caused by the uneven accounting. The question of the account is generated to bring risks and challenges to the safe operation of a bank system and the maintenance of the stability of a financial market.
The problem of resolving the doubtful account is mainly manually judged and intervened at present, namely after the calling program fails abnormally, the successful channel log of the called program is checked, and if the successful record is checked to indicate that the other side is successfully processed, compensation (correction) processing is required at the moment. However, the efficiency of manually judging and intervening the suspicious account is low, so that the problem of inconsistent accounting for cross-system calling cannot be timely and effectively solved.
Disclosure of Invention
In view of the above, the present invention provides a method and an apparatus for processing an account-suspected operation, so as to solve at least one of the above-mentioned problems.
According to a first aspect of the present invention, there is provided a method for processing a suspicious account job, the method comprising: acquiring log information of cross-system jobs and receiver job success information, wherein the log information comprises: calling abnormal information by a program; judging whether the operation is a suspicious account operation according to the program calling abnormal information in the log information; responding to the judgment result that the account is doubtful operation, and judging whether a receiver corresponding to the doubtful operation is successfully processed according to the receiver operation success information; and responding to the judgment result that the receiving party has successfully processed, and performing compensation processing on the receiving party.
According to a second aspect of the present invention, there is provided an apparatus for processing an account-suspected job, the apparatus comprising: an information obtaining unit, configured to obtain log information of cross-system jobs and receiver job success information, where the log information includes: calling abnormal information by a program; the account-suspected operation judging unit is used for judging whether the operation is an account-suspected operation according to the program calling abnormal information in the log information; the receiver processing and judging unit is used for responding to the judgment result that the receiver job is the suspicious account job and judging whether the receiver corresponding to the suspicious account job is successfully processed according to the receiver job success information; and the compensation processing unit is used for responding to the judgment result that the receiver has successfully processed, and then performing compensation processing on the receiver.
According to a third aspect of the present invention, there is provided an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method when executing the program.
According to a fourth aspect of the invention, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the above-mentioned method.
According to the technical scheme, whether the operation is the account questioning operation is judged by calling the abnormal information according to the acquired program, whether the receiver corresponding to the account questioning operation is successfully processed is judged according to the receiver operation success information when the operation is judged to be the account questioning operation, and the receiver is compensated when the receiver is successfully processed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow diagram of a method of processing a suspicious account job according to an embodiment of the present invention;
FIG. 2 is a block diagram of an arrangement of an audit job processing apparatus according to an embodiment of the present invention;
FIG. 3 is a block diagram of an exemplary configuration of an audit job processing apparatus according to an embodiment of the present invention;
fig. 4 is a flowchart of the suspicious account identification performed by the suspicious account identification unit according to the embodiment of the present invention;
FIG. 5 is a diagram of a reconciliation instruction register table according to an embodiment of the present invention;
FIG. 6 is a block diagram of a background processing unit for reconciliation according to an embodiment of the invention;
FIG. 7 is a flow diagram of an audit command validation module performing audit command validation according to an embodiment of the present invention;
FIG. 8 is a diagram illustrating a table of information to be compensated for a billing instruction according to an embodiment of the present invention;
FIG. 9 is a flow diagram of an account suspected compensation processing module performing account suspected compensation according to an embodiment of the invention;
fig. 10 is a schematic block diagram of a system configuration of an electronic apparatus 600 according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Because the existing account questioning problem is mainly judged and intervened manually, the processing efficiency is low, and the problem of inconsistent accounting of cross-system calling cannot be timely and effectively solved. Based on this, the embodiment of the invention provides a processing scheme of the account-suspected operation, and discloses a method capable of effectively solving the problem of the account-suspected problem from the viewpoint of system architecture. Embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a method for processing an account inquiring job according to an embodiment of the present invention, as shown in fig. 1, the method includes:
step 101, obtaining log information of cross-system operation and receiving party operation success information, wherein the log information comprises: and calling exception information by the program.
In actual operation, the account of the system a initiates a transaction (or called as an operation) to the account of the system B to perform a transfer operation, the transaction can be realized by calling a relevant program, and the log information in the process of calling the program is the log information of the cross-system operation.
The program call exception information may be no return, timeout, or communication error.
And the receiver job success information represents transfer success information of an account (for example, the system B account) for accepting the transfer.
And step 102, judging whether the operation is a suspicious account operation according to the program calling abnormal information in the log information.
And 103, responding to the judgment result that the account is the suspected account job, and judging whether the receiver corresponding to the suspected account job is successfully processed according to the receiver job success information.
And 104, in response to the judgment result that the receiving party has successfully processed, performing compensation processing on the receiving party (for example, the system B account).
Compared with manual operation in the prior art, the method and the device can automatically identify the suspicious account and automatically compensate the suspicious account, so that the problem of inconsistent accounts invoked across systems can be timely and effectively solved.
For step 103, after the determination result is the account-suspected operation, the account-suspected operation may be further configured with account-suspected status information according to a predetermined rule, where the account-suspected status information includes one of the following: a to-be-confirmed state and a confirmed state. The predetermined rule is a rule for setting the status information, and may depend on actual operations.
And then, judging whether the receiver corresponding to the suspicious account job with the state to be confirmed is successfully processed according to the receiver job success information and the preset judgment time configuration information.
The determination time configuration information here is used to indicate whether the determination operation is performed within a predetermined time, for example, whether the suspected billing job in the state to be confirmed is the first processing, if so, the processing is performed, otherwise, whether the suspected billing job in the state to be confirmed is 5 minutes from the last processing time is determined, if less than 5 minutes, the suspected billing job in the state to be confirmed is not processed, that is, the determination operation of step 103 is not performed. Therefore, data blockage caused by frequently processing one instruction can be avoided, and the burden of a system background is reduced.
When the determination result in step 104 is that the receiving party has successfully processed, the status information of the account to be confirmed is updated to the confirmed status.
And then, compensating the sender corresponding to the suspicious account operation according to the preset compensation time configuration information and the compensation time threshold.
The compensation time allocation information is similar to the judgment time allocation information described above, and is also used to indicate whether the compensation operation is performed within a predetermined time.
The compensation time threshold is the maximum compensation time of the receiver corresponding to the suspicious account operation, and when the compensation time exceeds the maximum compensation time and the compensation is not successful, the compensation operation is not executed any more, and manual processing can be subsequently performed.
Based on similar inventive concepts, the embodiment of the present invention further provides a device for processing an account-suspected operation, and preferably, the device is used for implementing the flow in the above method embodiment.
Fig. 2 is a block diagram showing the configuration of the reconciliation job processing apparatus, which, as shown in fig. 2, includes: an information acquisition unit 21, a suspicious account job judgment unit 22, a receiving party processing judgment unit 23, and a compensation processing unit 24, wherein:
an information obtaining unit 21, configured to obtain log information of a cross-system job and receiver job success information, where the log information includes: calling abnormal information by a program;
a suspicious account job judging unit 22, configured to judge whether the job is a suspicious account job according to the program call exception information in the log information;
the receiver processing and judging unit 23 is configured to, in response to the judgment result being a suspicious account job, judge whether a receiver corresponding to the suspicious account job has been successfully processed according to the receiver job success information;
and the compensation processing unit 24 is configured to perform compensation processing on the receiving side in response to that the judgment result is that the receiving side has successfully processed.
The method comprises the steps that whether the operation is the account suspected operation is judged by the account suspected operation judging unit 22 according to the acquired program calling abnormal information, when the operation is judged to be the account suspected operation, the receiving party processing judging unit 23 judges whether the receiving party corresponding to the account suspected operation is successfully processed according to the receiving party operation success information, and when the receiving party is judged to be successfully processed, the compensation processing unit 24 carries out compensation processing on the receiving party.
Specifically, the compensation processing unit may perform compensation processing on the receiver corresponding to the suspicious account job according to predetermined compensation time configuration information and a compensation time threshold.
In one embodiment, the apparatus may further include: the state setting unit is used for setting the suspected account state information for the suspected account operation according to a preset rule, and the suspected account state information comprises one of the following information: a to-be-confirmed state and a confirmed state.
Accordingly, the receiving-side processing and determining unit may be specifically configured to: and judging whether the receiver corresponding to the suspicious account operation in the state to be confirmed is successfully processed or not according to the receiver operation success information and the preset judgment time configuration information.
In one embodiment, the apparatus may further include: and the state updating unit is used for updating the state information of the suspected account operation from the state to be confirmed to the confirmed state when the judgment result of the receiver processing judgment unit is that the receiver has successfully processed.
For a better understanding of the invention, a specific example is given below.
Fig. 3 is a block diagram showing an exemplary configuration of a device for processing an audit trail job according to an embodiment of the present invention, as shown in fig. 3, the device including: the cross-system calls a log acquisition unit 1, a suspected account identification unit 2 and a suspected account background processing unit 3, and each unit is described in detail below.
And the cross-system call log acquisition unit has the functions of registering cross-system call logs and acquiring important log information of input and output and running of a program, wherein the log information is used as a basis for suspicious account identification.
And the suspicious account identification unit has the function of analyzing and processing the log information obtained by the log acquisition unit and judging whether the program has suspicious accounts in the calling process.
Fig. 4 is a flow chart of the identification of the suspicious account by the suspicious account identification unit, as shown in fig. 4, the program call log is firstly analyzed, if the analysis is the suspicious account, the suspicious account record is registered to the suspicious account instruction register table, as shown in fig. 5, the suspicious account state is initialized to 1-suspicious to-be-confirmed (corresponding to the above-mentioned to-be-confirmed state). The unit judges whether the account is doubted or not according to the conditions of no return, overtime and return of a specific error code when the program is called. If the program is called without return or overtime, the network exception can be considered to generate an account questioning problem, and therefore the transaction is registered as an account questioning. In addition, if a special error code is returned in the program call, the program call can also be judged as suspicious. For example, 4019-gateway communication error and timeout, 5205-invoke other program error, 96000327-service architecture exception. The suspicious account identification unit registers records which generate suspicious accounts as much as possible as the suspicious accounts, and after the suspicious account records are registered in a suspicious account instruction register, the suspicious account background can confirm and process each instruction record one by one.
And the suspicious account background processing unit has the functions of starting a timing task in the background, scanning the suspicious account instruction register list registered by the suspicious account identification unit at intervals, and confirming and processing suspicious account records. As shown in fig. 6, the unit contains two processing modules: the system comprises an account-suspected instruction confirmation module and an account-suspected compensation processing module. These two modules are described separately below.
The function of the account-calling instruction confirming module is to further confirm and process the account-calling instruction registered by the account-calling identification module, namely to confirm whether the called program has been successfully processed by the account-calling process (namely, the receiver has been successfully processed). If the called program is successfully posted, setting the posting state as 2-suspicious confirmation, successfully trading and processing to be compensated (corrected); and if the called program does not successfully enter the account, setting the suspicious account state as 3-suspicious confirmation, and the original transaction does not exist.
In actual practice, confirming whether the called program was successfully processed may be accomplished by checking the successful channel log of the called program, and if a record can be found, confirming that the program was successfully processed. Generally, when a transaction is successful, the program will register a successful channel log, facilitating subsequent check query. In addition, the program posting processing and the channel log which is successfully registered are in an atomic transaction, and the condition that the program processing is successful and the channel log is not registered does not exist.
Fig. 7 is a flowchart of confirmation of the account suspected instruction executed by the account suspected instruction confirmation module, and as shown in fig. 7, the parameter time Ti (corresponding to the judgment time configuration information) is written into a specific time in the flowchart. First, the account suspected instruction confirming module starts a timing task in the background, scans the account suspected instruction register table (see fig. 5) every 30 seconds (time parameter configuration T1), and obtains the account suspected instruction to be confirmed, that is, the account suspected state is 1 — the account suspected instruction to be confirmed is suspicious. When the account suspected command to be confirmed is processed, firstly, whether the last processing time of the account suspected command is 5 minutes or not is judged (time parameter configuration T2), if the last processing time of the account suspected command is less than 5 minutes (T2), the account suspected command is not processed at this time, and the command is skipped directly. The purpose of controlling each account questioning instruction to be processed only once within every 5 minutes (time parameter configuration T2) is to avoid data blockage caused by frequently processing one instruction and reduce the burden of the background of the system. If the time is 5 minutes before the last processing (time configuration T2), the background inquires the successful channel log of the called program, if the record is found, the instruction transaction is successfully posted, and compensation processing is needed, so the state of the suspicious account is updated to 2-suspicious confirmation, the original transaction is successful, and the suspicious account is to be compensated (positive processing), and is registered in the suspicious account instruction to-be-compensated information table shown in the figure 8, and then is handed to the suspicious account compensation processing module for processing. If the found channel log does not exist, whether the registration time of the suspicious account is within 30 minutes (time parameter configuration T3) is further judged, if the registration time is within T3, whether the suspicious account instruction is temporarily checked out can not be determined in consideration of the delay reason of the channel log which is successfully registered after the transaction of the called program is successful, therefore, the suspicious account state is not updated, only the processing time stamp field is updated, and the next scanning is confirmed again. If the found channel log does not exist and the account is registered beyond 30 minutes (T3), the transaction can be judged to be not successfully posted, so the state of the account-inquiring command is updated to 3-account-inquiring confirmation, the original transaction does not exist, at this time, because the called program is not successfully processed, the account-inquiring background does not need to be compensated, and the life cycle of the account-inquiring command is ended.
And the account-checking compensation processing module is used for performing compensation (correcting) processing on the account-checking command which confirms the successful account check. The compensation method is to call the compensation service or reverse service of the corresponding program to restore the accounting data to the state before the accounting. For example, if the original transaction calls system B to add 100 yuan to account B, the corresponding compensation processing calls system B to subtract 100 yuan from account B, and if the original transaction calls system B to subtract 100 yuan from account B, the corresponding compensation processing calls system B to add 100 yuan to account B.
Fig. 9 is a flowchart of the account suspected compensation processing module executing account suspected compensation, and as shown in fig. 9, the time parameter Ti (corresponding to the compensation time configuration information) is written into a specific time number in the flowchart. First, the account suspected compensation processing module starts a timing task in the background, scans the information table to be compensated of the account suspected instruction shown in fig. 8 every 30 seconds (time parameter T1), and obtains the account suspected instruction whose state is 1-to-be-compensated processing. When each doubtful account command to be compensated is processed, the doubtful account command to be compensated is controlled to be processed only once within every 5 minutes (time parameter T2), and compensation processing is performed only three times in total, if compensation processing is not successful for three times, the background is not processed, and manual post-processing is performed. The purpose of such control is to avoid data congestion caused by frequently processing a certain suspicious account instruction. As shown in fig. 9, for each account suspected instruction to be compensated, it is first determined whether there is 5 minutes from the last processing time of the instruction (time parameter T2), and if there is not 5 minutes, the instruction is skipped without being processed this time. If the last processing time of the account questioning instruction is 5 minutes, the compensation service (or reverse service) of the corresponding program is called for compensation processing, if the compensation processing is successful, the compensation state is updated to 2-the compensation processing is successful, and the account questioning instruction compensation processing is completed. If the compensation processing fails, further judging whether the compensation processing times of the questioning account instruction is less than twice, if so, updating the compensation times, and then performing the compensation processing again. If the compensation times are twice, the compensation state is directly updated to be 3-compensation processing failure, manual processing is needed, and the notebook is not scanned any more next time in the account questioning background. In order to improve the processing efficiency, the account suspected compensation processing module can only scan the account suspected instruction with the state of 1-to-be-compensated.
Through the operation processing device for the doubtful accounts, the automatic identification and the automatic compensation of the doubtful accounts can be realized, the manual intervention is reduced, the system calling efficiency is improved, and the problem of the consistency of the accounts for cross-system calling is effectively solved.
In practical operation, the units and the modules may be combined or may be singly arranged, and the present invention is not limited thereto.
The present embodiment also provides an electronic device, which may be a desktop computer, a tablet computer, a mobile terminal, and the like, but is not limited thereto. In this embodiment, the electronic device can be implemented by referring to the above method embodiment and the embodiment of the suspicious operation processing apparatus, and the contents thereof are incorporated herein, and repeated descriptions are omitted.
Fig. 10 is a schematic block diagram of a system configuration of an electronic apparatus 600 according to an embodiment of the present invention. As shown in fig. 10, the electronic device 600 may include a central processor 100 and a memory 140; the memory 140 is coupled to the central processor 100. Notably, this diagram is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the audit job processing functionality may be integrated into the central processor 100. The central processor 100 may be configured to control as follows:
acquiring log information of cross-system jobs and receiver job success information, wherein the log information comprises: calling abnormal information by a program;
judging whether the operation is a suspicious account operation according to the program calling abnormal information in the log information;
responding to the judgment result that the account is doubtful operation, and judging whether a receiver corresponding to the doubtful operation is successfully processed according to the receiver operation success information;
and responding to the judgment result that the receiver has successfully processed, and performing compensation processing on the sender corresponding to the suspicious account operation.
As can be seen from the above description, according to the electronic device provided in the embodiment of the present application, whether an operation is a suspicious account operation is determined by calling abnormal information according to an obtained program, when the operation is determined as the suspicious account operation, whether a receiver corresponding to the suspicious account operation has been successfully processed is determined according to receiver operation success information, and when the receiver has been successfully processed, a sender corresponding to the suspicious account operation is compensated.
In another embodiment, the suspicious account job processing device may be configured separately from the central processing unit 100, for example, the suspicious account job processing device may be configured as a chip connected to the central processing unit 100, and the suspicious account job processing function is realized by the control of the central processing unit.
As shown in fig. 10, the electronic device 600 may further include: communication module 110, input unit 120, audio processing unit 130, display 160, power supply 170. It is noted that the electronic device 600 does not necessarily include all of the components shown in FIG. 10; furthermore, the electronic device 600 may also comprise components not shown in fig. 10, which may be referred to in the prior art.
As shown in fig. 10, the central processor 100, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, the central processor 100 receiving input and controlling the operation of the various components of the electronic device 600.
The memory 140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 100 may execute the program stored in the memory 140 to realize information storage or processing, etc.
The input unit 120 provides input to the cpu 100. The input unit 120 is, for example, a key or a touch input device. The power supply 170 is used to provide power to the electronic device 600. The display 160 is used to display an object to be displayed, such as an image or a character. The display may be, for example, an LCD display, but is not limited thereto.
The memory 140 may be a solid state memory such as Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 140 may also be some other type of device. Memory 140 includes buffer memory 141 (sometimes referred to as a buffer). The memory 140 may include an application/function storage section 142, and the application/function storage section 142 is used to store application programs and function programs or a flow for executing the operation of the electronic device 600 by the central processing unit 100.
The memory 140 may also include a data store 143, the data store 143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by the electronic device. The driver storage portion 144 of the memory 140 may include various drivers of the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging application, address book application, etc.).
The communication module 110 is a transmitter/receiver 110 that transmits and receives signals via an antenna 111. The communication module (transmitter/receiver) 110 is coupled to the central processor 100 to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 110 is also coupled to a speaker 131 and a microphone 132 via an audio processor 130 to provide audio output via the speaker 131 and receive audio input from the microphone 132 to implement general telecommunications functions. Audio processor 130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, an audio processor 130 is also coupled to the central processor 100, so that recording on the local can be enabled through a microphone 132, and so that sound stored on the local can be played through a speaker 131.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, and the computer program is executed by a processor to implement the steps of the method for processing the suspicious account job.
In summary, the cross-system call account-suspected data processing scheme provided by the embodiment of the invention can realize automatic identification and automatic compensation of account-suspected matters, reduce manual intervention, improve system call efficiency, and effectively solve the problem of consistency of the cross-system call accounts.
The preferred embodiments of the present invention have been described above with reference to the accompanying drawings. The many features and advantages of the embodiments are apparent from the detailed specification, and thus, it is intended by the appended claims to cover all such features and advantages of the embodiments which fall within the true spirit and scope thereof. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the embodiments of the invention to the exact construction and operation illustrated and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope thereof.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (12)

1. A method for processing a statement job, the method comprising:
acquiring log information of cross-system jobs and receiver job success information, wherein the log information comprises: calling abnormal information by a program;
judging whether the operation is a suspicious account operation according to the program calling abnormal information in the log information;
responding to the judgment result that the account is doubtful operation, and judging whether a receiver corresponding to the doubtful operation is successfully processed according to the receiver operation success information;
and responding to the judgment result that the receiving party has successfully processed, and performing compensation processing on the receiving party.
2. The method of claim 1, wherein in response to determining that the job is a suspicious account job, the method further comprises:
setting the account-calling state information for the account-calling operation according to a preset rule, wherein the account-calling state information comprises one of the following information: a to-be-confirmed state and a confirmed state.
3. The method of claim 2, wherein determining whether the recipient corresponding to the suspicious account job has successfully processed according to the recipient job success information comprises:
and judging whether the receiver corresponding to the suspicious account operation in the state to be confirmed is successfully processed or not according to the receiver operation success information and the preset judgment time configuration information.
4. The method of claim 3, wherein in response to determining that the receiving party has successfully processed the data, the method further comprises:
and updating the state information of the account suspected operation from the state to be confirmed to the confirmed state.
5. The method of claim 2, wherein compensating the receiver comprises:
and performing compensation processing on the receiving party according to preset compensation time configuration information and a compensation time threshold.
6. An apparatus for processing a statement job, the apparatus comprising:
an information obtaining unit, configured to obtain log information of cross-system jobs and receiver job success information, where the log information includes: calling abnormal information by a program;
the account-suspected operation judging unit is used for judging whether the operation is an account-suspected operation according to the program calling abnormal information in the log information;
the receiver processing and judging unit is used for responding to the judgment result that the receiver job is the suspicious account job and judging whether the receiver corresponding to the suspicious account job is successfully processed according to the receiver job success information;
and the compensation processing unit is used for responding to the judgment result that the receiver has successfully processed, and then performing compensation processing on the receiver.
7. The apparatus of claim 6, further comprising:
the state setting unit is used for setting the suspected account state information for the suspected account operation according to a preset rule, and the suspected account state information comprises one of the following information: a to-be-confirmed state and a confirmed state.
8. The apparatus according to claim 7, wherein the receiver processing determining unit is specifically configured to:
and judging whether the receiver corresponding to the suspicious account operation in the state to be confirmed is successfully processed or not according to the receiver operation success information and the preset judgment time configuration information.
9. The apparatus of claim 8, further comprising:
and the state updating unit is used for updating the suspected account state information of the suspected account operation from the state to be confirmed to the confirmed state.
10. The apparatus according to claim 7, wherein the compensation processing unit is specifically configured to:
and performing compensation processing on the receiving party according to preset compensation time configuration information and a compensation time threshold.
11. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 5 are implemented when the processor executes the program.
12. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.
CN202010552044.0A 2020-06-17 2020-06-17 Method and device for processing suspicious account operation Active CN111738733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010552044.0A CN111738733B (en) 2020-06-17 2020-06-17 Method and device for processing suspicious account operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010552044.0A CN111738733B (en) 2020-06-17 2020-06-17 Method and device for processing suspicious account operation

Publications (2)

Publication Number Publication Date
CN111738733A true CN111738733A (en) 2020-10-02
CN111738733B CN111738733B (en) 2024-02-20

Family

ID=72649534

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010552044.0A Active CN111738733B (en) 2020-06-17 2020-06-17 Method and device for processing suspicious account operation

Country Status (1)

Country Link
CN (1) CN111738733B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045682A (en) * 2009-10-19 2011-05-04 中兴通讯股份有限公司 Method and system for handling abnormal transactions of payment services
CN102289865A (en) * 2011-07-16 2011-12-21 汉军智能系统(上海)有限公司 Method and system for automatically balancing abnormal record of payment card transaction
US20160379184A1 (en) * 2015-06-25 2016-12-29 Bank Of America Corporation Dynamic resource management associated with payment instrument exceptions processing
CN108764868A (en) * 2018-05-25 2018-11-06 全链通有限公司 Block chain node-agent account checking method and block reconciliation agent node
CN110335154A (en) * 2019-07-17 2019-10-15 中国银行股份有限公司 It is a kind of based on accounting processing method, equipment and the system of depositing guard system
CN110428240A (en) * 2019-07-30 2019-11-08 中国工商银行股份有限公司 The suspicious transaction automatic identification of one kind and processing method, terminal and server
CN110659983A (en) * 2019-09-29 2020-01-07 中国工商银行股份有限公司 Bank accounting data processing method and device, electronic equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045682A (en) * 2009-10-19 2011-05-04 中兴通讯股份有限公司 Method and system for handling abnormal transactions of payment services
CN102289865A (en) * 2011-07-16 2011-12-21 汉军智能系统(上海)有限公司 Method and system for automatically balancing abnormal record of payment card transaction
US20160379184A1 (en) * 2015-06-25 2016-12-29 Bank Of America Corporation Dynamic resource management associated with payment instrument exceptions processing
CN108764868A (en) * 2018-05-25 2018-11-06 全链通有限公司 Block chain node-agent account checking method and block reconciliation agent node
CN110335154A (en) * 2019-07-17 2019-10-15 中国银行股份有限公司 It is a kind of based on accounting processing method, equipment and the system of depositing guard system
CN110428240A (en) * 2019-07-30 2019-11-08 中国工商银行股份有限公司 The suspicious transaction automatic identification of one kind and processing method, terminal and server
CN110659983A (en) * 2019-09-29 2020-01-07 中国工商银行股份有限公司 Bank accounting data processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111738733B (en) 2024-02-20

Similar Documents

Publication Publication Date Title
US20110151832A1 (en) Mobile phone and sim card operation method thereof
CN112486719B (en) Method and equipment for RPC interface call failure processing
EP4213037A1 (en) Data storage and reconciliation method and system
CN113760611B (en) System site switching method and device, electronic equipment and storage medium
CN111738733B (en) Method and device for processing suspicious account operation
CN112116339A (en) Capital full link control verification method and device
CN113159913A (en) Accounting information processing method and device
CN111222869A (en) Transaction data processing method, device, computer equipment and medium
CN108234778B (en) Method and device for generating digital graph rule
CN112799945B (en) Batch file verification method and device
CN112732733A (en) Data checking processing method and device
CN111930626B (en) Automatic testing method and device based on PaaS cloud service
CN112346874A (en) Abnormal volume processing method and device based on cloud platform
CN112101810A (en) Risk event control method, device and system
CN114490402A (en) Method and device for checking validity of message field
CN111930624A (en) Test link message data processing method and device
CN111796958A (en) Transaction anti-hanging method and device under Dubbo frame
CN113052691A (en) Distributed account checking system service balancing method, node and cluster
CN113190338A (en) Method, device and system for processing service data
CN111262794A (en) Gateway flow control method and device
CN114285657B (en) Firewall security policy change verification method and device
CN114401223B (en) Information processing device and method
CN113965489B (en) Link timeout detection method, device, computer equipment and storage medium
CN113886238A (en) Automatic monitoring method and device for test cases
CN113342695A (en) Software version testing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant