CN110162560A - Finance data interface butt joint method, device, computer equipment and storage medium - Google Patents
Finance data interface butt joint method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110162560A CN110162560A CN201910302169.5A CN201910302169A CN110162560A CN 110162560 A CN110162560 A CN 110162560A CN 201910302169 A CN201910302169 A CN 201910302169A CN 110162560 A CN110162560 A CN 110162560A
- Authority
- CN
- China
- Prior art keywords
- interface
- data
- financial risks
- user
- access parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 210000001503 joint Anatomy 0.000 title claims abstract description 29
- 238000013475 authorization Methods 0.000 claims description 32
- 238000003032 molecular docking Methods 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 16
- 238000006243 chemical reaction Methods 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 6
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 claims description 5
- 239000010931 gold Substances 0.000 claims description 5
- 229910052737 gold Inorganic materials 0.000 claims description 5
- 241000208340 Araliaceae Species 0.000 claims description 3
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims description 3
- 235000003140 Panax quinquefolius Nutrition 0.000 claims description 3
- 235000008434 ginseng Nutrition 0.000 claims description 3
- 238000011161 development Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 10
- 238000000586 desensitisation Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 241001269238 Data Species 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000013011 mating Effects 0.000 description 1
- 239000000155 melt Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/258—Data format conversion from or to a database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The present invention relates to data more frontier, a kind of finance data interface butt joint method, device, computer equipment and storage medium are disclosed, in method, obtain the interface requirements list for carrying user identifier that user is sent by user terminal;It obtains and the matched access parameter configuration information of each financial risks data-interface;Described configuration file will be written with each matched access parameter configuration information of financial risks data-interface, and send the configuration file to the user terminal.Finance data interface butt joint method provided by the invention, the interface requirements list of user's offer can be provided, matched access parameter configuration information is obtained, substantially increase finance data interface between bank and enterprise docks efficiency, saves corresponding development cost.
Description
Technical field
The present invention relates to data more frontiers more particularly to a kind of finance data interface butt joint method, device, computer to set
Standby and storage medium.
Background technique
Existing business bank and enterprise carry out interface relevant with finance data when docking, and need to be arranged dedicated finance
Data mating interface.Existing settling mode is that relevant interface code is write by special operation maintenance personnel, completes special purpose interface
Docking.
However, the special purpose interface that business bank docks with enterprise is large number of, often there are hundreds of thousands of.Existing interface
Docking mode inefficiency, development cost are high.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of finance data interface butt joint method, device, calculating
Machine equipment and storage medium dock efficiency with improve finance data interface between bank and enterprise.
A kind of finance data interface butt joint method, comprising:
Obtain the interface requirements list for carrying user identifier that user is sent by user terminal, the interface requirements column
Table includes multiple financial risks data-interfaces;
It obtains and each matched access parameter configuration information of financial risks data-interface, the access parameter configuration
Information includes the access link of the financial risks data-interface, the access parameter of at least one;
Described configuration file will be written with each matched access parameter configuration information of financial risks data-interface, and
Send the configuration file to the user terminal.
A kind of finance data interface docking facilities, comprising:
Interface list module is obtained, is needed for obtaining user by the interface for carrying user identifier that user terminal is sent
List is asked, the interface requirements list includes multiple financial risks data-interfaces;
Configuration information module is obtained, is configured for obtaining with each matched access parameter of financial risks data-interface
Information, the access parameter configuration information include the access link of the financial risks data-interface, the access ginseng of at least one
Number;
Transmitting configuration file module, for matching described with each matched access parameter of financial risks data-interface
Confidence breath write-in configuration file, and send the configuration file to the user terminal.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing
The computer program run on device, the processor realize above-mentioned finance data interface docking side when executing the computer program
Method.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter
Calculation machine program realizes above-mentioned finance data interface butt joint method when being executed by processor.
Above-mentioned finance data interface butt joint method, device, computer equipment and storage medium obtain user and pass through user's end
The interface requirements list for carrying user identifier sent is held, the interface requirements list includes that multiple financial risks data connect
Mouthful, to obtain the financial risks data-interface that user needs to dock.It obtains matched with each financial risks data-interface
Access parameter configuration information, the access parameter configuration information include that the access of the financial risks data-interface links, at least
One access parameter, to get the access parameter configuration information for the financial risks data-interface that user needs to dock, simultaneously
User's permission for accessing financial risks data-interface is provided.It will described and each matched access of financial risks data-interface
Configuration file is written in parameter configuration, and sends the configuration file to the user terminal, for the user terminal
The connection with each financial risks data-interface is established according to the configuration file, so that user obtains and financial risks number
The configuration file docked according to interface.Finance data interface butt joint method provided by the invention can automatically parse user's offer
Interface requirements list obtains matched access parameter configuration information, substantially increases finance data interface between bank and enterprise
Efficiency is docked, corresponding development cost is saved.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of finance data interface butt joint method in one embodiment of the invention;
Fig. 2 is a flow diagram of finance data interface butt joint method in one embodiment of the invention;
Fig. 3 is a flow diagram of finance data interface butt joint method in one embodiment of the invention;
Fig. 4 is a flow diagram of finance data interface butt joint method in one embodiment of the invention;
Fig. 5 is a flow diagram of finance data interface butt joint method in one embodiment of the invention;
Fig. 6 is a flow diagram of finance data interface butt joint method in one embodiment of the invention;
Fig. 7 is a flow diagram of finance data interface butt joint method in one embodiment of the invention;
Fig. 8 is a structural schematic diagram of finance data interface docking facilities in one embodiment of the invention;
Fig. 9 is a structural schematic diagram of finance data interface docking facilities in one embodiment of the invention;
Figure 10 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Finance data interface butt joint method provided in this embodiment, can be applicable in the application environment such as Fig. 1, wherein use
Family terminal is communicated by network with server-side.Wherein, user terminal includes but is not limited to various personal computers, notebook
Computer, smart phone, tablet computer and portable wearable device.Server-side can use independent server either multiple clothes
The server cluster of business device composition is realized.
In one embodiment, it as shown in Fig. 2, providing a kind of finance data interface butt joint method, is applied in this way in Fig. 1
In server-side for be illustrated, include the following steps:
S10, the interface requirements list for carrying user identifier that user is sent by user terminal is obtained, the interface needs
Asking list includes multiple financial risks data-interfaces.
In the present embodiment, business bank or other finance services can provide multiple financial risks data-interfaces for
Family selection.Here, user can be medium-sized and small enterprises or mechanism, and user identifier can refer to the account of the medium-sized and small enterprises or mechanism
Name in an account book claims, i.e., identifies used in one side of user in carrying out financial risks data transmission.For example, user is carrying out financial risks
When data-interface docks, the name on account used is " abc123 ", then user identifier also uses " abc123 " to indicate.
Financial risks data-interface can receive user by the financial risks data of user terminal uploads, and or, passing through
User terminal provides a user financial risks data.Here, financial risks data-interface includes but is not limited to personal loan letter
Breath interface, personal illegal information interface, enterprise's industry and commerce data-interface, business taxation negative information interface, enterprise patent information connect
Mouthful.In the financial system of some complexity, the quantity of financial risks data-interface is up to hundreds of.
User can choose the financial risks data-interface of oneself needs from all financial risks data-interfaces, and formed and connect
Mouth list of requirements.For example, the interface requirements list that user's first is chosen may include:
[' personal loan information interface ', ' enterprise's industry and commerce data-interface ', ' business taxation negative information connects Userlist=
Mouthful ', ' enterprise patent information interface '].
S20, it obtains and each matched access parameter configuration information of financial risks data-interface, the access parameter
Configuration information includes the access link of the financial risks data-interface, the access parameter of at least one.
Here, server-side can generate corresponding configuration file based on the interface requirements list that user selects.Herein
Place, configuration file include and the matched access parameter configuration information of each financial risks data-interface, each financial risks data
Interface corresponds to an access parameter configuration information.
Wherein, access parameter configuration information includes the access link of financial risks data-interface, the access ginseng of at least one
Number.Here, financial risks data-interface access link be user private access link (under some scenes, dedicated visit
Ask that link can also be indicated with URL), different users, the access link generated is different.Access parameter can be user
Access inquiry field when financial risks data-interface.For example, user is when accessing enterprise patent information interface, access parameter can
To be " Business Name ".The number of access parameter can be more than one.For another example, user connects in access business taxation negative information
Mouthful, access parameter can be " status of a legal person card number " and " enterprise's industrial and commercial registration title ".
S30, described text will be configured with each matched access parameter configuration information write-in of financial risks data-interface
Part, and send the configuration file to the user terminal.
In the present embodiment, can by interface requirements list with each matched access parameter of financial risks data-interface
Configuration information is sent to user terminal.Here, can by interface requirements list with each financial risks data-interface
The access parameter configuration information write-in configuration file matched, and send configuration file to user terminal.User terminal refers to using
The terminal of family access financial risks data-interface.
User terminal can establish the connection with each financial risks data-interface based on the configuration file got, and
Carry out corresponding financial risks data transmission.Configuration file may include two-part content, respectively user information and interface
Information.Wherein, user information includes but is not limited to the unique identification of user, identity field after desensitization.Interface message includes but not
It is limited to interface name, the address interface url, interface charging standard, the configuration of interface validity period.Here, interface validity period configuration refers to
To be some user access validity period to the authorization of certain interface.
It include recognition of face interface in the interface requirements list that user A is sent in an application example, bank card authentication connects
Mouthful, business risk degree identifies interface, industrial and commercial information interface, enterprise's persecutio interface, personal blacklist query interface etc..Through certainly
After dynamic matching, the configuration file of generation may include the following contents:
(the first row configuration) user name: user A;User's unique identification: user A desensitization identification card number;Interface name: face is known
Not;Interface expense: 1 yuan every time;Interface calls the address url: http: // ... com.cn;Interface validity period: to 2019-12-
31;
(configuration of the second row) user name: user A;User's unique identification: user A desensitization identification card number;Interface name: bank card
Authentication;Interface expense: 1 yuan every time;Interface calls the address url: http: // ... com.cn;Interface validity period: to 2019-
12-31;
……。
In configuration file, every a line records the access parameter of an interface.It can recorde more than one use in configuration file
The access parameter configuration information of family mark.For example, in interface requirements list, it is possible to specify the account of more than one user identifier with
Different financial risks data-interfaces are docked.Such as, accessible " recognition of face " interface of user A and user B, then can be with
It indicates are as follows:
User name: user A;User's unique identification: user A desensitization identification card number;Interface name: recognition of face;Interface expense:
1 yuan every time;Interface calls the address url: http: // ... com.cn;Interface validity period: to 2019-12-31;
User name: user B;User's unique identification: user B desensitization identification card number;Interface name: recognition of face;Interface expense:
1 yuan every time;Interface calls the address url: http: // ... com.cn;Interface validity period: to 2019-12-31.
In step S10-S30, the interface requirements list for carrying user identifier that user is sent by user terminal is obtained,
The interface requirements list includes multiple financial risks data-interfaces, needs the financial risks data docked to connect to obtain user
Mouthful.It obtains and each matched access parameter configuration information of financial risks data-interface, the access parameter configuration information
Access link, the access parameter of at least one including the financial risks data-interface, need to dock to get user
The access parameter configuration information of financial risks data-interface, while user's permission for accessing financial risks data-interface being provided.It will
It is described to be written configuration file with the matched access parameter configuration information of each financial risks data-interface, and by the configuration
File sends the user terminal to, so that the user terminal is established and each financial risks according to the configuration file
The connection of data-interface, so that user obtains the configuration file docked with financial risks data-interface.
Optionally, as shown in figure 3, after step S10, further includes:
S21, the user identifier is added to server-side authorization Access Column corresponding with the financial risks data-interface
It is corresponding with a server-side authorization access list at least to there is a financial risks data-interface in table.
In the present embodiment, some financial risks data-interfaces need to verify user identifier.For example, it is desired to verification
A corresponding server-side authorization access list has can be set in financial risks interface, if user identifier is present in the server-side and awards
It weighs in access list, then the connection request for allowing to carry the user identifier obtains the data of the interface, if user identifier does not exist
In the server-side authorization access list, then the connection request for not allowing to carry the user identifier obtains the data of the interface.
Thus, when carrying out the docking of finance data interface, other than needing to configure corresponding configuration file, it is also necessary to assign
Access authority of the user identifier in specified finance data interface.It can be by the way that server-side authorization access be added in user identifier
The mode of list provides the permission of access finance data interface for user.The user identifier of user is added to and financial risks
After the corresponding server-side authorization access list of data-interface, user can ground from financial risks data-interface upload or download gold
Melt risk data.
Under normal circumstances, the corresponding server-side authorization access list of a financial risks data-interface.Such as financial risks
Data-interface A corresponding with service end authorizes access list A.There may also be multiple financial risks data-interfaces to correspond to the same service
End authorization access list.As financial risks data-interface A, B, C corresponding with service end authorizes access list A.It is some that there is association to close
The financial risks data-interface of system can correspond to the same server-side authorization access list.
Optionally, as shown in figure 4, after step S30, further includes:
S40, the inquiry request including user identifier that the user terminal is sent is received, the inquiry request includes at least
One financial risks data-interface for needing to dock, the financial risks data-interface that each needs dock correspond at least one
Access parameter.
In the present embodiment, user terminal can send inquiry request to server-side, to obtain from financial risks data-interface
The financial risks data needed.Here, server-side can respond the financial risks data including more than one (including one)
The inquiry request of interface.Inquiry request includes the user identifier of user.For example, in the inquiry request that user terminal is sent, it can
Only to include the financial risks data-interface for needing to dock, it also may include two or three financial risks for needing to dock
Data-interface.Each financial risks data-interface corresponds to the access parameter of at least one.Such as, it is desirable to obtain the individual of " Zhang San "
The data of illegal information interface, the then access parameter for needing to obtain include: name " Zhang San ", ID card No.
“42070119XXXXXXXXXX”。
S50, judge that the user identifier whether there is in corresponding with the financial risks data-interface for needing to dock
In server-side authorization access list.
In the present embodiment, if user identifier is present in service corresponding with the financial risks data-interface for needing to dock
End authorization access list, then the user can obtain or upload financial risks data from financial risks data-interface.If user marks
Know not in server-side authorization access list corresponding with the financial risks data-interface for needing to dock, then the user cannot
Financial risks data are obtained or uploaded from financial risks data-interface.If the server-side authorization access list of A interface includes user
The user identifier of first, the accessible A interface of user's first;The server-side authorization access list of B interface does not include the user of user's first
Mark, user's first can not access B interface.
If S60, the user identifier are present in server-side corresponding with the financial risks data-interface for needing to dock
It authorizes in access list, is called and the matched financial wind of the access parameter from the financial risks data-interface for needing to dock
Dangerous data.
S70, the user terminal is sent to the matched financial risks data of the access parameter by described.
In the present embodiment, if user identifier is present in server-side corresponding with the financial risks data-interface docked is needed and awards
It weighs in access list, i.e., the user has the permission for accessing and needing the financial risks data-interface docked, at this point it is possible to from the gold
Melt risk data interface to call and the matched financial risks data of access parameter.For example, by the calling of interface data, Ke Yicong
Personal illegal information interface gets financial risks data relevant to " Zhang San " and puts on record the time such as case state, law court's title
Deng.If prompting " no respective record " without relevant financial risks data.
In step S40-S70, the inquiry request including user identifier that the user terminal is sent is received, the inquiry is asked
Ask the financial risks data-interface for needing to dock including at least one, each financial risks data-interface pair for needing to dock
The access parameter of at least one is answered, to obtain the inquiry request of user.Judge the user identifier whether there is in the need
In the corresponding server-side authorization access list of the financial risks data-interface to be docked, to judge whether user has access needs
The permission of the financial risks data-interface of docking.If the user identifier is present in and the financial risks data for needing to dock
In the corresponding server-side authorization access list of interface, called and the access from the financial risks data-interface for needing to dock
The matched financial risks data of parameter, to obtain financial risks data required for user.It will the described and access parameter
The financial risks data matched are sent to the user terminal, and financial risks data required for user, which are sent to user, to be made
User terminal.
Optionally, as shown in figure 5, step S60 includes:
If S601, the inquiry request include the access request of more than two financial risks data-interfaces, lead to
The mode for crossing parallel calling is called and the matched finance of the access parameter from the financial risks data-interface for needing to dock
Risk data.
In the present embodiment, if inquiry request includes the access request of more than two financial risks data-interfaces, server-side
The different financial risks data-interface of the mode parallel calling of multithreading can be used, obtain the data of financial risks data-interface.
In step S601, if the access that the inquiry request includes more than two financial risks data-interfaces is asked
It asks, then needs the financial risks data-interface docked calling to match with the access parameter from described by way of parallel calling
Financial risks data, with improve obtain financial risks data speed, reduce the waiting time of user.
Optionally, as shown in fig. 6, the access parameter configuration information is also if the financial risks data-interface concerning security matters
Including authorized user message, before step S60, further includes:
S602, the verifying authorized user message;
If S603, the authorized user message are verified, allow to need the financial risks data docked to connect from described
Mouth calls and the matched financial risks data of the access parameter;
If the verifying of S604, the authorized user message does not pass through, refuse from the financial risks data for needing to dock
Interface calls and the matched financial risks data of the access parameter.
In the present embodiment, financial risks data-interface concerning security matters, which can be, is related to the data-interface of some nonpublic informations, such as
Personal loan information interface, personal illegal information interface, enterprise's industry and commerce data-interface.Authorized user message refers to be signed through user
The authorization message generated after corresponding Business agreement.Since one can be got from the financial risks data-interface of these concerning security matters
A little sensitive datas may mention if user does not have these sensitive datas of reasonable employment to financial risks data-interface is provided
Supplier has an adverse effect.Thus user is needed to make a promise and (sign corresponding Business agreement), reasonable employment sensitive data.
Authorized user message can be authority or authorization code.Authorized user message can be generated in server-side, and send user institute to
User terminal.
User is when financial risks data-interface uploads or obtains data, it is desirable to provide authorized user message.Such as, in individual
Credit information interface, access parameter include passport NO., type of credential and authority.Here, authority refers to using
Family authorization message.
Verifying authorized user message is exactly whether the authority in the access parameter for compare user's transmission is pre- with server-side
The authority deposited is identical.If the authority in access parameter is identical as the authority that server-side prestores, it is verified;
If authority in access parameter and the authority that server-side prestores be not identical, verify and do not pass through.
If authorized user message is verified, allows to call from the financial risks data-interface for needing to dock and join with access
The matched financial risks data of number.If authorized user message verifying does not pass through, refuse the financial risks data docked from needs
Interface calls and the matched financial risks data of access parameter.
In step S602-S604, the authorized user message is verified, to ensure that the transmission of financial risks data obtains user
Authorization.If the authorized user message is verified, allow to call from the financial risks data-interface for needing to dock
With the matched financial risks data of the access parameter so that user obtained in the case where verification information is verified needed for
Financial risks data.If the authorized user message is verified, refuse to need the financial risks data docked to connect from described
Mouth calls and the matched financial risks data of the access parameter, to prevent user from verifying in unsanctioned situation in verification information
Financial risks data needed for obtaining.
Optionally, as shown in fig. 7, after step S10, further includes:
S11, the user terminal be the data side of uploading when, acquisition it is matched with each financial risks data-interface
Pattern verifies configuration information.
S12, after the upload data for receiving the specified financial risks data-interface that the user sends, according to the finger
The pattern verification configuration information that deposit melts risk data interface carries out pattern conversion to the upload data.
S13, the upload data after progress pattern conversion are stored in the specified corresponding storage location of financial risks data-interface.
In the present embodiment, pattern verification configuration information be can store in cloud server.Each financial risks data-interface
Corresponding one style verifies configuration information.It is available corresponding if interface requirements list includes 5 financial risks data-interfaces
5 patterns verify configuration information.The data point reuse that pattern is verified configuration information and can be uploaded with user is specified financial risks number
According to the corresponding data format of interface.
It, can be according to specified financial wind after receiving the upload data of specified financial risks data-interface of user's transmission
The pattern verification configuration information of dangerous data-interface carries out pattern conversion to above-mentioned upload data.For example, if specified financial risks
The upload data that data-interface receives are loan data, then the decimal point that can be usually related to the amount of the loan retains digit.If
The pattern verification configuration information of specified financial risks data-interface includes: that decimal point retains 3 digits;And it uploads corresponding in data
The decimal point of loan data retains 2 digits, such as 34621.16 yuan, then pattern verification configuration information can correct the loan data
Are as follows: 34621.160 yuan.
Upload data after pattern converts are stored in the specified corresponding storage location of financial risks data-interface, the storage position
Set the list that can be in database.
In step S11-S13, when the user terminal is data upload side, obtain and each financial risks data
The pattern of Interface Matching verifies configuration information, verifies configuration information to obtain the pattern for uploading data for calibration.It is receiving
After the upload data for the specified financial risks data-interface that the user sends, according to the specified financial risks data-interface
Pattern verifies configuration information and carries out pattern conversion to the upload data, and the data that user is sent are converted into server-side and meet
The pattern of specification.Upload data after progress pattern conversion are stored in the specified corresponding storage location of financial risks data-interface,
To complete the storing process of the financial risks data (i.e. upload data) uploaded to user.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
In one embodiment, a kind of finance data interface docking facilities are provided, the finance data interface docking facilities with it is upper
Finance data interface butt joint method in embodiment is stated to correspond.As shown in figure 8, the finance data interface docking facilities include obtaining
It takes interface list module 10, obtain configuration information module 20 and transmitting configuration file module 30.Each functional module is described in detail such as
Under:
Obtain interface list module 10, the interface for carrying user identifier sent for obtaining user by user terminal
List of requirements, the interface requirements list include multiple financial risks data-interfaces;
Configuration information module 20 is obtained, is matched for obtaining with each matched access parameter of financial risks data-interface
Confidence breath, the access parameter configuration information include access link, the access of at least one of the financial risks data-interface
Parameter;
Transmitting configuration file module 30, being used for will described and each matched access parameter of financial risks data-interface
Configuration file is written in configuration information, and sends the configuration file to the user terminal.
Optionally, as shown in figure 9, finance data interface docking facilities further include:
Mark module 21 is added, for the user identifier to be added to clothes corresponding with the financial risks data-interface
Business end authorizes access list, at least there is a financial risks data-interface and a server-side authorization access list
It is corresponding;
Inquiry request module 40 is received, the inquiry request including user identifier sent for receiving the user terminal,
The inquiry request includes the financial risks data-interface that at least one needs to dock, each financial risks for needing to dock
Data-interface corresponds to the access parameter of at least one;
Authorization check module 50, for judging that the user identifier whether there is in the financial risks docked with the needs
In the corresponding server-side authorization access list of data-interface;
Data module 60 is called, needs the financial risks data docked to connect with described if being present in for the user identifier
In the corresponding server-side authorization access list of mouth, calls from the financial risks data-interface for needing to dock and join with the access
The matched financial risks data of number;
Data module 70 is sent, for being sent to the use with the matched financial risks data of the access parameter for described
Family terminal.
Optionally, calling data module 60 includes:
Parallel calling unit, if for the inquiry request including the visit of more than two financial risks data-interfaces
It asks request, is then called and the access parameter by way of parallel calling from the financial risks data-interface for needing to dock
Matched financial risks data.
Optionally, if the financial risks data-interface concerning security matters, the access parameter configuration information further includes that user awards
Weigh information, finance data interface docking facilities further include:
Authentication module, for verifying the authorized user message;
Allow calling module, if being verified for the authorized user message, allows from the gold for needing to dock
Melt risk data interface to call and the matched financial risks data of the access parameter;
Refuse calling module, if not passing through for authorized user message verifying, refusal is docked from the needs
Financial risks data-interface calls and the matched financial risks data of the access parameter.
Optionally, finance data interface docking facilities further include:
Style configuration module is obtained, for obtaining and each finance when the user terminal is data upload side
The pattern of risk data Interface Matching verifies configuration information;
Pattern conversion module, in the upload data for receiving the specified financial risks data-interface that the user sends
Afterwards, configuration information is verified according to the pattern of the specified financial risks data-interface and pattern conversion is carried out to the upload data;
Data memory module is stored in specified financial risks data-interface pair for that will carry out the upload data after pattern conversion
The storage location answered.
Specific restriction about finance data interface docking facilities may refer to dock above for finance data interface
The restriction of method, details are not described herein.Modules in above-mentioned finance data interface docking facilities can be fully or partially through
Software, hardware and combinations thereof are realized.Above-mentioned each module can be embedded in the form of hardware or independently of the place in computer equipment
It manages in device, can also be stored in a software form in the memory in computer equipment, in order to which processor calls execution or more
The corresponding operation of modules.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 10.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is for storing data involved in finance data interface butt joint method.The network interface of the computer equipment
For being communicated with external terminal by network connection.To realize a kind of finance data when the computer program is executed by processor
Interface butt joint method.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor perform the steps of when executing computer program
Obtain the interface requirements list for carrying user identifier that user is sent by user terminal, the interface requirements column
Table includes multiple financial risks data-interfaces;
It obtains and each matched access parameter configuration information of financial risks data-interface, the access parameter configuration
Information includes the access link of the financial risks data-interface, the access parameter of at least one;
Described configuration file will be written with each matched access parameter configuration information of financial risks data-interface, and
Send the configuration file to the user terminal.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
Obtain the interface requirements list for carrying user identifier that user is sent by user terminal, the interface requirements column
Table includes multiple financial risks data-interfaces;
It obtains and each matched access parameter configuration information of financial risks data-interface, the access parameter configuration
Information includes the access link of the financial risks data-interface, the access parameter of at least one;
Described configuration file will be written with each matched access parameter configuration information of financial risks data-interface, and
Send the configuration file to the user terminal.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of finance data interface butt joint method characterized by comprising
Obtain the interface requirements list for carrying user identifier that user is sent by user terminal, the interface requirements list packet
Include multiple financial risks data-interfaces;
It obtains and each matched access parameter configuration information of financial risks data-interface, the access parameter configuration information
Access link, the access parameter of at least one including the financial risks data-interface;
It described will be written configuration file with each matched access parameter configuration information of financial risks data-interface, and by institute
It states configuration file and sends the user terminal to.
2. finance data interface butt joint method as described in claim 1, which is characterized in that the acquisition user passes through user's end
The interface requirements list for carrying user identifier sent is held, the interface requirements list includes multiple financial risks data-interfaces
Later, further includes:
The user identifier is added to server-side authorization access list corresponding with the financial risks data-interface, is at least deposited
It is corresponding with a server-side authorization access list in a financial risks data-interface.
3. finance data interface butt joint method as claimed in claim 2, which is characterized in that described by described and each gold
Melt the access parameter configuration information write-in configuration file of risk data Interface Matching, and sends the configuration file to user end
After end, further includes:
The inquiry request including user identifier that the user terminal is sent is received, the inquiry request includes at least one needs
The financial risks data-interface of docking, each access ginseng for needing the financial risks data-interface docked to correspond at least one
Number;
Judge that the user identifier whether there is in needing the corresponding server-side of the financial risks data-interface that docks to award with described
It weighs in access list;
It is accessed if the user identifier is present in server-side authorization corresponding with the financial risks data-interface for needing to dock
In list, called and the matched financial risks data of the access parameter from the financial risks data-interface for needing to dock;
The user terminal is sent to the matched financial risks data of the access parameter by described.
4. finance data interface butt joint method as claimed in claim 3, which is characterized in that described from the gold for needing to dock
Melt risk data interface to call and the matched financial risks data of the access parameter, comprising:
If the inquiry request includes the access request of more than two financial risks data-interfaces, pass through parallel calling
Mode need the financial risks data-interface that docks to call and the matched financial risks data of the access parameter from described.
5. finance data interface butt joint method as claimed in claim 3, which is characterized in that if the financial risks data-interface
Concerning security matters, then the access parameter configuration information further includes authorized user message;
It is described to be called and the matched financial risks data of the access parameter from the financial risks data-interface for needing to dock
Before, further includes:
Verify the authorized user message;
If the authorized user message is verified, allow from the financial risks data-interface calling for needing to dock and institute
State the matched financial risks data of access parameter;
If authorized user message verifying does not pass through, refuse to call from the financial risks data-interface for needing to dock with
The matched financial risks data of access parameter.
6. finance data interface butt joint method as described in claim 1, which is characterized in that the acquisition user passes through user's end
After the interface requirements list for carrying user identifier for holding transmission, further includes:
When the user terminal is data upload side, obtains and verified with each matched pattern of financial risks data-interface
Configuration information;
After the upload data for receiving the specified financial risks data-interface that the user sends, according to the specified financial wind
The pattern verification configuration information of dangerous data-interface carries out pattern conversion to the upload data;
Upload data after progress pattern conversion are stored in the specified corresponding storage location of financial risks data-interface.
7. a kind of finance data interface docking facilities characterized by comprising
Interface list module is obtained, is arranged for obtaining user by the interface requirements for carrying user identifier that user terminal is sent
Table, the interface requirements list include multiple financial risks data-interfaces;
Configuration information module is obtained, matches confidence with each matched access parameter of financial risks data-interface for obtaining
Breath, the access parameter configuration information include the access link of the financial risks data-interface, the access parameter of at least one;
Transmitting configuration file module, for described confidence will to be matched with each matched access parameter of financial risks data-interface
Breath write-in configuration file, and send the configuration file to the user terminal.
8. finance data interface docking facilities as claimed in claim 7, which is characterized in that further include:
Mark module is added, is awarded for the user identifier to be added to server-side corresponding with the financial risks data-interface
Access list is weighed, it is corresponding with a server-side authorization access list at least to there is a financial risks data-interface;
Inquiry request module is received, the inquiry request including user identifier sent for receiving the user terminal is described to look into
Asking request includes the financial risks data-interface that at least one needs to dock, and the financial risks data that each needs dock connect
Mouth corresponds to the access parameter of at least one;
Authorization check module connects for judging that the user identifier whether there is in the financial risks data docked with the needs
In the corresponding server-side authorization access list of mouth;
Data module is called, if being present in for the user identifier corresponding with the financial risks data-interface for needing to dock
Server-side authorization access list in, need the financial risks data-interface that docks to call to match with the access parameter from described
Financial risks data;
Data module is sent, for being sent to user's end with the matched financial risks data of the access parameter for described
End.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor
The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to
Any one of 6 finance data interface butt joint methods.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In realization finance data interface docking side as described in any one of claim 1 to 6 when the computer program is executed by processor
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910302169.5A CN110162560A (en) | 2019-04-16 | 2019-04-16 | Finance data interface butt joint method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910302169.5A CN110162560A (en) | 2019-04-16 | 2019-04-16 | Finance data interface butt joint method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110162560A true CN110162560A (en) | 2019-08-23 |
Family
ID=67639433
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910302169.5A Pending CN110162560A (en) | 2019-04-16 | 2019-04-16 | Finance data interface butt joint method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110162560A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110806945A (en) * | 2019-11-05 | 2020-02-18 | 浪潮云信息技术有限公司 | Interface docking method, device and computer readable medium |
CN111523297A (en) * | 2020-04-21 | 2020-08-11 | 上海优扬新媒信息技术有限公司 | Data processing method and device |
CN112000389A (en) * | 2020-06-24 | 2020-11-27 | 苏州浪潮智能科技有限公司 | Configuration recommendation method, system, device and computer storage medium |
CN112529692A (en) * | 2020-12-16 | 2021-03-19 | 平安银行股份有限公司 | Merchant risk auditing method, device and equipment and readable storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010150229A2 (en) * | 2009-06-25 | 2010-12-29 | Retail Mobile Credit Specialists (Proprietary) Limited | A financial transaction system and a method for operating a financial transaction system |
CN105989179A (en) * | 2015-03-06 | 2016-10-05 | 北京邮电大学 | Financial data processing method and system |
CN106649488A (en) * | 2016-09-30 | 2017-05-10 | 广东网金数据服务有限公司 | Method and device for invoking multi-data-source interaction interface |
CN107463409A (en) * | 2017-08-11 | 2017-12-12 | 深圳乐信软件技术有限公司 | A kind of interface conversion method, interface convertor, storage medium and electric terminal |
CN107766088A (en) * | 2017-09-27 | 2018-03-06 | 努比亚技术有限公司 | Interface optimization method, system and computer-readable recording medium |
CN108196879A (en) * | 2018-01-09 | 2018-06-22 | 平安科技(深圳)有限公司 | Method for processing business, device, equipment and computer readable storage medium |
CN108334465A (en) * | 2018-02-06 | 2018-07-27 | 深圳壹账通智能科技有限公司 | Configuration method, device, equipment and the computer readable storage medium of communication interface |
CN108629682A (en) * | 2018-05-07 | 2018-10-09 | 平安普惠企业管理有限公司 | User's financial risks appraisal procedure, device, equipment and readable storage medium storing program for executing |
WO2018201978A1 (en) * | 2017-05-04 | 2018-11-08 | 平安科技(深圳)有限公司 | Interface call data processing method, apparatus, computer device and storage medium |
CN109413203A (en) * | 2018-11-29 | 2019-03-01 | 平安科技(深圳)有限公司 | A kind of transaction data acquisition methods and device |
CN109583867A (en) * | 2018-11-30 | 2019-04-05 | 银联商务股份有限公司 | Channel docking system and method |
-
2019
- 2019-04-16 CN CN201910302169.5A patent/CN110162560A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010150229A2 (en) * | 2009-06-25 | 2010-12-29 | Retail Mobile Credit Specialists (Proprietary) Limited | A financial transaction system and a method for operating a financial transaction system |
CN105989179A (en) * | 2015-03-06 | 2016-10-05 | 北京邮电大学 | Financial data processing method and system |
CN106649488A (en) * | 2016-09-30 | 2017-05-10 | 广东网金数据服务有限公司 | Method and device for invoking multi-data-source interaction interface |
WO2018201978A1 (en) * | 2017-05-04 | 2018-11-08 | 平安科技(深圳)有限公司 | Interface call data processing method, apparatus, computer device and storage medium |
CN107463409A (en) * | 2017-08-11 | 2017-12-12 | 深圳乐信软件技术有限公司 | A kind of interface conversion method, interface convertor, storage medium and electric terminal |
CN107766088A (en) * | 2017-09-27 | 2018-03-06 | 努比亚技术有限公司 | Interface optimization method, system and computer-readable recording medium |
CN108196879A (en) * | 2018-01-09 | 2018-06-22 | 平安科技(深圳)有限公司 | Method for processing business, device, equipment and computer readable storage medium |
CN108334465A (en) * | 2018-02-06 | 2018-07-27 | 深圳壹账通智能科技有限公司 | Configuration method, device, equipment and the computer readable storage medium of communication interface |
CN108629682A (en) * | 2018-05-07 | 2018-10-09 | 平安普惠企业管理有限公司 | User's financial risks appraisal procedure, device, equipment and readable storage medium storing program for executing |
CN109413203A (en) * | 2018-11-29 | 2019-03-01 | 平安科技(深圳)有限公司 | A kind of transaction data acquisition methods and device |
CN109583867A (en) * | 2018-11-30 | 2019-04-05 | 银联商务股份有限公司 | Channel docking system and method |
Non-Patent Citations (2)
Title |
---|
余小高;许传华;: "基于Web服务和Agent的P2P金融风险预警系统技术架构研究", 科技创业月刊, no. 04, pages 39 - 41 * |
张松;: "人工智能在科技金融监管中的应用探索", 中国信用卡, no. 04, pages 52 - 55 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110806945A (en) * | 2019-11-05 | 2020-02-18 | 浪潮云信息技术有限公司 | Interface docking method, device and computer readable medium |
CN110806945B (en) * | 2019-11-05 | 2022-03-22 | 浪潮云信息技术股份公司 | Interface docking method, device and computer readable medium |
CN111523297A (en) * | 2020-04-21 | 2020-08-11 | 上海优扬新媒信息技术有限公司 | Data processing method and device |
CN112000389A (en) * | 2020-06-24 | 2020-11-27 | 苏州浪潮智能科技有限公司 | Configuration recommendation method, system, device and computer storage medium |
CN112000389B (en) * | 2020-06-24 | 2022-07-08 | 苏州浪潮智能科技有限公司 | Configuration recommendation method, system, device and computer storage medium |
CN112529692A (en) * | 2020-12-16 | 2021-03-19 | 平安银行股份有限公司 | Merchant risk auditing method, device and equipment and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110162560A (en) | Finance data interface butt joint method, device, computer equipment and storage medium | |
CN110599181B (en) | Data processing method, device and equipment based on block chain and storage medium | |
US20180075536A1 (en) | Multiparty reconciliation systems and methods | |
CN109447811A (en) | Method, accounting nodes and the medium of Transaction Information are inquired in block chain network | |
WO2018176140A1 (en) | Systems and methods for executing and delivering electronic documents | |
US7729989B1 (en) | Method and apparatus for message correction in a transaction authorization service | |
CN101873333B (en) | Enterprise data maintenance method, device and system based on banking system | |
CN109544156A (en) | Data processing method, device, equipment and storage medium based on block chain | |
KR101876674B1 (en) | Method of managing common account using block chain and system performing the same | |
US20180322571A1 (en) | System and method for facilitating electronic transactions | |
CN109584040A (en) | Business data processing method, device, equipment and storage medium based on block chain | |
CN106504044A (en) | A kind of billing method and system | |
CN106209766A (en) | The bidirectional applications platform of a kind of mobile phone and method | |
CN109743321A (en) | Block chain, application program, the user authen method of application program and system | |
US20240080208A1 (en) | Blockchain application method and blockchain application terminal apparatus | |
CN110659993A (en) | Resource management method and device based on block chain network | |
CN113127822A (en) | Enterprise electronic seal management method and system based on enterprise chain code | |
KR20200055178A (en) | Management server and method of digital signature for electronic document | |
CA2970301C (en) | Improved network for onboarding and delivery of electronic payments to payees | |
CN105956839A (en) | Payment method and payment device applied to smart home platform | |
CN103198428A (en) | System and method for air depositing and withdrawing of bank | |
CN108376303A (en) | internet management system and management method | |
CN104375830B (en) | A kind of collocation method and device of the electronic payment platform based on fund | |
CN110619566A (en) | On-chain pledge asset return system and method through on-chain digital currency settlement | |
KR102107454B1 (en) | System for multiplication of financial payment networks, method for financial services using the same and computer program for the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |