CN111178850B - Transaction method, device and system - Google Patents

Transaction method, device and system Download PDF

Info

Publication number
CN111178850B
CN111178850B CN201911418098.1A CN201911418098A CN111178850B CN 111178850 B CN111178850 B CN 111178850B CN 201911418098 A CN201911418098 A CN 201911418098A CN 111178850 B CN111178850 B CN 111178850B
Authority
CN
China
Prior art keywords
authorization
information
transaction
authorization information
core system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911418098.1A
Other languages
Chinese (zh)
Other versions
CN111178850A (en
Inventor
丁海兰
管婷婷
杜文睿
张朋
李娜
邓玉林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN201911418098.1A priority Critical patent/CN111178850B/en
Publication of CN111178850A publication Critical patent/CN111178850A/en
Application granted granted Critical
Publication of CN111178850B publication Critical patent/CN111178850B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a transaction method, a device and a system, wherein the method comprises the following steps: acquiring and storing first authorization information of a peripheral system; generating authorization identification data according to the first authorization information; transmitting the authorization identification data and the transaction information to a core system, and receiving second authorization information transmitted by the core system; the second authorization information is generated by the core system according to the authorization identification data and the transaction information; combining the first authorization information and the second authorization information to obtain combined authorization data; and acquiring the combined authorization information according to the combined authorization data, and sending the combined authorization information to the core system so that the core system carries out transaction according to the authorized combined information. The invention obtains the combined authorization information through the combined authorization data, reduces the times of obtaining the authorization information in one transaction process, improves the efficiency of the teller to transact the business, reduces the waiting time of the client and can improve the client experience.

Description

Transaction method, device and system
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a transaction method, device, and system.
Background
In some special scenarios, the front-end system needs to call 2 or more systems in series according to service requirements to complete a service function (a transaction flow often corresponds to an independent service), and the respective authorization check points of different systems are mutually independent, when each time an authorization point is encountered, the system triggering the authorization returns an authorization mark or an authorization packet to the front-end system, and the front-end system prompts the teller to perform authorization operation, so that if one transaction triggers the authorization point of 2 or more systems, the teller initiates 2 or more authorization requests to the authorized teller through the front-end system, the authorized teller needs to enter 2 or more authorization information, and the front-end system also needs to perform 2 or more authorization information checks to complete the transaction, and the multiple authorization reduces the efficiency of the teller to transact the service.
Disclosure of Invention
The invention provides a transaction method, a transaction device and a transaction system, which can reduce the times of acquiring authorization information in a transaction process, improve the efficiency of a teller in handling business and reduce the waiting time of a customer.
In a first aspect, an embodiment of the present invention provides a transaction method, applied to a front-end system, where the method includes: acquiring and caching first authorization information of a peripheral system; generating authorization identification data according to the first authorization information; transmitting the authorization identification data and the transaction information to a core system, and receiving second authorization information transmitted by the core system; the second authorization information is generated by the core system according to the authorization identification data and the transaction information; combining the first authorization information and the second authorization information to obtain combined authorization data; and acquiring the combined authorization information according to the combined authorization data, and sending the combined authorization information to the core system so that the core system carries out transaction according to the combined authorization information.
In a second aspect, an embodiment of the present invention further provides a transaction method applied to a core system, where the core system is communicatively connected to a peripheral system and a front-end system respectively, the method including: acquiring authorization identification data and transaction information, and generating second authorization information according to the authorization identification data and the transaction information; the authorization identification data is used for judging whether the peripheral system is about to execute authorization operation or not, and the authorization identification data is generated by the front-end system according to first authorization information acquired from the peripheral system; transmitting the second authorization information to the front-end system; acquiring combined authorization information, and carrying out transaction according to the combined authorization information; the combined authorization information is acquired by the front-end system according to the first authorization information and the second authorization information.
In a third aspect, an embodiment of the present invention further provides a transaction device, applied to a front-end system, where the device includes: the cache module is used for acquiring and caching the first authorization information of the peripheral system; the generation module is used for generating authorization identification data according to the first authorization information; the first sending module is used for sending the authorization identification data and the transaction information to a core system and receiving second authorization information sent by the core system; the second authorization information is generated by the core system according to the authorization identification data and transaction information; the merging module is used for merging the first authorization information and the second authorization information to obtain merged authorization data; the first acquisition module is used for acquiring the combined authorization information according to the combined authorization data and sending the combined authorization information to the core system so that the core system can conduct transactions according to the combined authorization information.
In a fourth aspect, an embodiment of the present invention further provides a transaction device, applied to a core system, where the device includes: the second acquisition module is used for acquiring the authorization identification data and the transaction information and generating second authorization information according to the authorization identification data and the transaction information; the authorization identification data is used for judging whether the peripheral system is about to execute authorization operation or not, and the authorization identification data is generated by the front-end system according to first authorization information acquired from the peripheral system; the second sending module is used for sending the second authorization information to the front-end system; the transaction module is used for acquiring the combined authorization information and carrying out transaction according to the combined authorization information; the combined authorization information is acquired by the front-end system according to the first authorization information and the second authorization information.
In a fifth aspect, embodiments of the present invention further provide a transaction system, the system including: a front-end system, a core system, and at least one peripheral system; the front-end system is in communication connection with each peripheral system; the front-end system is in communication connection with the core system; the front-end system comprises the transaction device; the core system comprises the transaction device.
In a sixth aspect, an embodiment of the present invention further provides a computer device, including a memory, and a processor, where the memory stores a computer program that can be executed on the processor, and the processor implements the transaction method described above when executing the computer program.
In a seventh aspect, embodiments of the present invention also provide a computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the transaction method described above.
The embodiment of the invention has the following beneficial effects: the embodiment of the invention provides a transaction scheme, which comprises the following steps: acquiring and caching first authorization information sent by a peripheral system, generating authorization identification data according to the first authorization information, sending the authorization identification data and transaction information to a core system, then receiving second authorization information sent by the core system, generating the second authorization information by the core system according to the authorization identification data and the transaction information, combining the first authorization information and the second authorization information to obtain combined authorization data, thereby acquiring combined authorization information according to the combined authorization data, and finally sending the combined authorization information to the core system to enable the core system to conduct transaction according to the combined authorization information. The embodiment of the invention obtains the combined authorization information through the combined authorization data, reduces the times of obtaining the authorization information in one transaction process, improves the efficiency of the teller for handling the business, reduces the waiting time of the client and can improve the client experience.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a transaction method according to an embodiment of the present invention;
FIG. 2 is a flow chart of another transaction method according to an embodiment of the present invention;
FIG. 3 is a diagram showing the original business flow of the back money laundering and core system provided by the embodiment of the invention in series when the back money laundering and core system authorization are involved;
FIG. 4 is a schematic diagram of a transaction operation flow using the scheme according to an embodiment of the present invention;
FIG. 5 is a block diagram of a transaction device according to an embodiment of the present invention;
FIG. 6 is a block diagram of another transaction device according to an embodiment of the present invention;
fig. 7 is a block diagram of a computer device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The overseas front-end system is connected with the overseas core system and 30 overseas peripheral systems, so that the teller can complete the business handling function of each system through the teller.
Overseas core system: the system is characterized by taking a customer as a center, and meets the requirements of centralized management of customer information, separation of transaction and accounting, whole bank account, separation of foreground and background, flexible and safe parameter control and centralized management of operation risks, thereby realizing a new generation of bank system with unified version and centralized data logic.
Peripheral system: refers to a system which surrounds a core system, provides information and conveys instructions, and assists the core system to operate, such as a money laundering system, an online banking system, a credit system and the like.
Overseas teller front end system: the terminal platform used directly by the finger teller bears the important functions of connection with the core system and the peripheral system, and provides a new generation system of unified basic services such as processing flow, business logic control, user interaction processing, peripheral calling and the like, and is hereinafter referred to as a front-end system.
Referring to fig. 3, the anti-money laundering and core system is connected in series with the original business process when the anti-money laundering and core system authorization are involved, some core transactions involving customer information types of the front-end system of overseas teller need to be sent to the anti-money laundering peripheral system for checking and then sent to the core system for completing the transactions, if the transaction information hits the authorization point of the anti-money laundering system when the anti-money laundering system is sent to the front-end system, the anti-money laundering system returns a hit authorization mark to the front-end system, the front-end prompts the teller to input the authorization information, the front-end verifies the authorization information, after the authorization passes, the front-end sends the transaction information to the core system, if the authorization point of the core system is hit at the moment, the core system returns 07 the authorization packet (the data in the 07 authorization packet has a preset format, the authorization packet contains the authorization prompt information of the core system), the front-end displays the authorization prompt information, the teller inputs the authorization information, and the front-end verifies the authorization information, and the core system returns the transaction completion information to the front-end after the verification passes. Thus, for core transactions that require sending back money, there are cases where 2 grants are required.
In summary, in the existing scheme, there is a problem of low business handling efficiency: 2 times of authorization can be performed in one transaction, so that the business which can be transacted in unit time of a teller is reduced, and the efficiency is low; the problem of poor customer experience exists, the teller transacts business long, the waiting time of the customer transacts business is long, and the customer experience is poor.
Based on the above, the transaction method, the device and the system provided by the embodiment of the invention can avoid repeated authorization operations in one transaction.
For the convenience of understanding the present embodiment, a transaction method disclosed in the embodiment of the present invention will be described in detail first.
The embodiment of the invention provides a transaction method, which is applied to a front-end system, wherein the front-end system is respectively in communication connection with a peripheral system and a core system, and referring to a transaction method flow chart shown in fig. 1, the method comprises the following steps:
step S102, obtaining and caching first authorization information of the peripheral system.
In the embodiment of the invention, the peripheral system can have one or more peripheral systems, the peripheral system sends first authorization information to the front-end system, the first authorization information is a judgment result of whether the transaction needs authorization or not, which is generated by the peripheral system according to the transaction information, and the front-end system caches the first authorization information after acquiring the first authorization information. The first authorization information includes authorization level data that may be used to determine authorization level requirements.
Step S104, generating authorization identification data according to the first authorization information.
In an embodiment of the present invention, based on the first authorization information, authorization identification data may be generated, which may be used to determine whether the peripheral system requires an authorization operation.
Step S106, the authorization identification data and the transaction information are sent to the core system, and second authorization information sent by the core system is received.
In the embodiment of the invention, the authorization identification data and the transaction information are sent to the core system so that the core system can generate a judging result of whether the transaction needs the authorization of the core system according to the identification data and the transaction information to obtain the second authorization information, and if the transaction needs the authorization, the second authorization information comprises the authorization level information, the prompt information and the like of the core system and is used for authorizing the transaction. And then, the front-end system receives second authorization information sent by the core system.
Step S108, combining the first authorization information and the second authorization information to obtain combined authorization data.
In the embodiment of the invention, the first authorization information is adjusted according to the structure and the format of the second authorization information, and the adjusted structure and format of the first authorization information are the same as those of the second authorization information. And combining the adjusted first authorization information and the second authorization information to obtain combined authorization data.
Step S110, acquiring the combined authorization information according to the combined authorization data, and sending the combined authorization information to the core system so that the core system carries out transactions according to the combined authorization information.
In the embodiment of the invention, the front-end system displays the combined authorization data, and the authorized teller inputs the authorization information according to the displayed prompt information such as the combined authorization data to obtain the combined authorization information, so that the authorization information of the peripheral system and the core system is obtained at one time, the business operation is more simplified, the authorization prompt information of all different systems related to one transaction is simultaneously displayed, and the teller can finish one transaction only by performing authorization at most. In addition, the service handling time is shortened, the authorized times of the teller for completing one transaction are reduced, the efficiency of the teller for handling the service is improved, the waiting of the client is reduced, and the client experience can be improved.
The embodiment of the invention provides a transaction scheme, which comprises the following steps: acquiring and caching first authorization information sent by a peripheral system, generating authorization identification data according to the first authorization information, sending the authorization identification data and transaction information to a core system, then receiving second authorization information sent by the core system, generating the second authorization information by the core system according to the authorization identification data and the transaction information, combining the first authorization information and the second authorization information to obtain combined authorization data, thereby acquiring combined authorization information according to the combined authorization data, and finally sending the combined authorization information to the core system to enable the core system to conduct transaction according to the combined authorization information. The embodiment of the invention obtains the combined authorization information through the combined authorization data, reduces the times of obtaining the authorization information in one transaction process, improves the efficiency of the teller for handling the business, reduces the waiting time of the client and can improve the client experience.
In order to improve the inspection efficiency of the peripheral system, before the first authorization information of the peripheral system is acquired and cached, the method may further include the following steps:
acquiring transaction data and classification information of at least one peripheral system; and according to the classification information of the peripheral system, sending the target transaction data to the peripheral system so as to enable the peripheral system to generate first authorization information.
In the embodiment of the invention, the peripheral system can be a system with different functions, for example, a money back-washing system, the front-end system acquires the current transaction data, and the peripheral system classification information related to the current transaction, for example, the money back-washing system, and the transaction data related to the money back-washing system is used as target transaction data and sent to the money back-washing peripheral system, so that the peripheral system generates first authorization information, all the transaction data are prevented from being sent to the peripheral system, and the inspection efficiency is improved.
In order to enable the user to know the transaction result in time, the combined authorization information is acquired according to the combined authorization data, and the combined authorization information is sent to the core system, so that after the core system performs the transaction according to the combined authorization information, the method can further be executed according to the following steps:
in the embodiment of the invention, the front-end system acquires the transaction result sent by the core system, displays the transaction result on the front-end interface and prompts the completion of the transaction.
The embodiment of the invention also provides a transaction method which is applied to the core system, wherein the core system is respectively in communication connection with the peripheral system and the front-end system; referring to another transaction method flow diagram shown in fig. 2, the method includes the steps of:
step S202, obtaining authorization identification data and transaction information, and generating second authorization information according to the identification data and the transaction information.
In the embodiment of the invention, the core system acquires the authorization identification data and the transaction information sent by the front-end system, and can judge whether the peripheral system is to execute the authorization operation or not according to the identification data. It should be noted that, the core system determines the data format of the authorization packet in the second authorization information by determining whether the peripheral system needs authorization.
Step S204, the second authorization information is sent to the front-end system.
In the embodiment of the invention, when the core system receives the authorization identification data, whether the core system hits an authorization point or not, the core system returns the second authorization information to the front-end system, and the front-end is triggered to integrate and display the authorization information.
Step S206, obtaining the combined authorization information, and carrying out transaction according to the combined authorization information.
In the embodiment of the invention, the front-end system generates the authorization merging data according to the first authorization information and the second authorization information, further acquires the merging authorization information, and sends the merging authorization information to the core system. The combined authorization information comprises the authorization information of the peripheral system and the authorization information of the core system which are obtained at one time, and the core system carries out transactions according to the combined authorization information, so that the authorization operation times in one transaction are reduced, the number of business which can be transacted in unit time of a teller is increased, the efficiency is improved, the business transacting time is shortened, the authorization times of the teller for completing one transaction is reduced, the business transacting efficiency of the teller is improved, the customer waiting is reduced, and the customer experience is improved.
In view of generating the second authorization information from the identification data and the transaction information in order to optimize the presentation effect of the front-end on the combined authorization data, the following steps may be performed:
judging whether the peripheral system is to execute the authorization operation according to the identification data; if yes, judging whether the core system needs to execute the authorization operation according to the transaction information; if the core system does not need to execute the authorization operation, generating an empty authorization packet in a target format, and taking the empty authorization packet as second authorization information; if the core system needs to execute the authorization operation, generating second authorization information in a target format according to the transaction information; if not, generating second authorization information according to the transaction information.
In the embodiment of the present invention, for example, it may be agreed that if the value of the authorization identification data is set to "1" in the front-end system, it indicates that the peripheral system needs authorization, and if the value of the authorization identification data is set to "0" in the front-end system, it indicates that the peripheral system does not need authorization. When the core system detects that the peripheral system authorization mark is '1', a 07 authorization packet is returned to the front-end system, if the core system does not relate to authorization at this time, the returned 07 packet is an empty packet, the 07 authorization packet is an empty authorization packet in a target format, and if the core system also needs authorization, the returned 07 packet contains authorization level information, prompt information and the like of the core system, and the 07 authorization packet is the authorization packet in the target format. The format and structure of the 07 authorization packet may be set according to actual requirements, and the embodiment of the present invention is not limited in this way.
In view of the fact that, in order to facilitate making the transaction result known to the user, the following steps may also be performed after the transaction is performed according to the consolidated authorization information:
and sending the transaction result to the front-end system so that the front-end system displays the transaction result.
In the embodiment of the invention, the transaction result is sent to the front-end system, so that the front-end displays the transaction result on the front-end interface to prompt the completion of the transaction.
Taking 2 different systems as an example, the front end needs to be modified as follows under the condition that the original transaction function is not affected:
1. firstly interacting with the 1 st system, and if the system involves authorization, saving the authorization information returned by the system, including an authorization mark, an authorization level requirement and the like;
2. and then interacting with the 2 nd system, if the system also detects that the authorization is needed, combining the authorization information returned by the system with the authorization information returned by the 1 st system, and then performing one-time display, if the system does not involve authorization, directly displaying the authorization information of the 1 st system.
3. When the front end checks the authorization information, the front end checks the highest level authorization requirement in the 2 systems.
Referring to the schematic flow chart of the transaction operation using the present scheme shown in fig. 4, the present scheme is described in one specific implementation.
1. The office clerk logs in the front-end system, inputs transaction information on the interface and submits the transaction information;
2. the front-end system confirms whether the transaction information is to be sent to check the anti-money laundering system, if so, part of the transaction information is sent to check the anti-money laundering system;
3. the money back-flushing system judges whether the transaction needs authorization or not, if so, an authorization identifier and authorization level information are returned to the front-end system;
4. the front-end system caches the authorization identifier and the authorization level information returned by the money back-washing system, and the front-end sets the peripheral system authorization identifier as 1 and sends the peripheral system authorization identifier and the transaction information to the core system together;
5. when the core system detects that the peripheral system authorization mark is 1, returning a 07 authorization packet to the front-end system, if the core system does not relate to authorization at the time, the returned 07 packet is an empty packet, and if the core system also needs authorization, the returned 07 packet contains authorization level information, prompt information and the like of the core system;
6. the front-end system combines the anti-money laundering authorization level information cached in the step 4 with the authorization packet returned by the core system, temporarily stores the combined authorization information on a front-end authorization interface, and prompts a teller to authorize according to prompt;
7. the authorization teller agrees to authorize and enters authorization information according to the prompt information;
8. the front-end system checks the authorization information and sends the authorization information and the transaction information to the core system after the authorization information and the transaction information pass through the front-end system;
9. the core system only performs authorization information check when the transaction involves the core authorization, and returns the transaction result to the front-end system.
10. The front-end system displays the transaction result on the front-end interface, and the transaction is completed.
In the embodiment of the invention, the authorization of the back money laundering and the authorization of the core system are combined, and when the core transaction needs to be sent to the back money laundering system, the authorization is only needed to be carried out once at most. Teller front-end system: and (3) caching and merging the authorization packets by each background system of the serial line, displaying all authorization information and checking the input information of the authorization teller. And the core system is used for checking the peripheral system authorization identifier sent by the front end, and when the peripheral system authorization identifier is needed, an authorization packet is returned 07 to trigger the front end to walk the authorization process.
It should be noted that, the system type for performing the authorization merging is confirmed: the core system and the peripheral system have different authorization triggering mechanisms, the core system returns 07 an authorization packet to the front end to trigger the front end bullet authorization interface to conduct authorization checking, the front end also needs to send the authorization information to the core system for checking after the authorization information is checked, and the transaction can be successfully completed after the core system is checked; the peripheral system authorization is that the peripheral returns authorization information to trigger the front-end bullet authorization interface or agree in advance which transactions need authorization by the front-end active bullet authorization interface, the front-end verification is passed, the authorization information is not required to be sent to the peripheral system for verification, and the subsequent flow is continued after the front-end authorization is passed, so that if the core system in the system related to authorization integration is provided with the core system, the core background matching transformation is possibly required, and for the authorization integration only related to the peripheral system, the front-end transformation is only required.
The front-end system may be used to perform caching, integration and presentation of authorization packages: for the authorization integration of the core system and the money laundering system, the front-end system firstly calls the money laundering system to check the customer information, and then sends the transaction information to the core system for transaction, so that the front-end needs to buffer the 1 st system-money laundering authorization information, and the core system also returns the authorization package to merge and intensively display the authorization package on an authorization interface. The front end performs authorization verification: the front end needs to synthesize all authorization requirements of 2 systems to verify the authorization information. And (3) matching and modifying a core system: when the 1 st system back-washing money needs to be authorized, the front end sends a peripheral authorization identifier to the core system, and when the core system receives the identifier, whether the core system hits an authorization point or not, the core system returns 07 packets to the front end to trigger the front end to integrate and display authorization information (if only back-washing money needs to be authorized, the core system returns an empty 07 authorization packet to the front end).
The embodiment of the invention provides a transaction method, a device and a system, wherein the method comprises an authorization information caching mechanism of a front-end system, a mechanism for combining authorization information of a plurality of systems and then displaying the combined authorization information and completing authorization of the systems; the system of front-end system tandem triggers the mechanism of front-end authorization by the empty authorization packet when the core system is involved. The number of authorized operations in one transaction can be reduced, so that the business operation is more simplified, the business handling time is reduced, and the customer experience is improved.
The embodiment of the invention also provides a transaction device which is applied to the front-end system, referring to a structural block diagram of the transaction device shown in fig. 5, the device comprises:
the caching module 51 is configured to acquire and cache first authorization information of the peripheral system; a generating module 52, configured to generate authorization identification data according to the first authorization information; a first sending module 53, configured to send the authorization identification data and the transaction information to the core system, and receive the second authorization information sent by the core system; the second authorization information is generated by the core system according to the authorization identification data and the transaction information; the merging module 54 is configured to merge the first authorization information and the second authorization information to obtain merged authorization data; the first obtaining module 55 is configured to obtain the combined authorization information according to the combined authorization data, and send the combined authorization information to the core system, so that the core system performs a transaction according to the combined authorization information.
In one embodiment, the apparatus further comprises: an authorization sending module, configured to: acquiring transaction data and classification information of at least one peripheral system; and according to the classification information of the peripheral system, sending the target transaction data to the peripheral system so as to enable the peripheral system to generate first authorization information.
In one embodiment, the apparatus further comprises: the result acquisition module is used for: and acquiring and displaying the transaction result.
The embodiment of the invention also provides a transaction device which is applied to a core system, referring to another structural block diagram of the transaction device shown in fig. 6, the device comprises:
a second obtaining module 61, configured to obtain authorization identification data and transaction information, and generate second authorization information according to the identification data and the transaction information; the authorization identification data is used for judging whether the peripheral system is about to execute authorization operation; a second sending module 62, configured to send second authorization information to the front-end system; the transaction module 63 is configured to obtain the combined authorization information, and perform a transaction according to the combined authorization information; the combined authorization information is acquired by the front-end system according to the first authorization information and the second authorization information.
In one embodiment, the second obtaining module is specifically configured to: judging whether the peripheral system is to execute the authorization operation according to the identification data; if yes, judging whether the core system needs to execute the authorization operation according to the transaction information; if the core system does not need to execute the authorization operation, generating an empty authorization packet in a target format, and taking the empty authorization packet as second authorization information; if the core system needs to execute the authorization operation, generating second authorization information in a target format according to the transaction information; if not, generating second authorization information according to the transaction information.
In one embodiment, the apparatus further comprises a result sending module configured to: and sending the transaction result to the front-end system so that the front-end system displays the transaction result.
The embodiment of the invention also provides a transaction system, which comprises a front-end system, a core system and at least one peripheral system; the front-end system is in communication connection with each peripheral system; the front-end system is in communication connection with the core system; the front-end system comprises the transaction device; the core system comprises another transaction device as described above.
In the embodiment of the invention, the front-end system, the core system and the peripheral systems can independently operate, the front-end system can respectively interact with the core system and each peripheral system, and after a plurality of pieces of authorization information from the peripheral systems or the core system are spliced, the authorization information of each peripheral system and each core system is acquired from an authorization teller at one time, so that the authorization operation times of the teller and the authorization teller are reduced.
The embodiment of the present invention further provides a computer device, referring to the schematic block diagram of the structure of the computer device shown in fig. 7, where the computer device includes a memory 71, and a processor 72, and the memory stores a computer program that can be run on the processor, and when the processor executes the computer program, the processor implements the steps of any of the methods described above.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described computer device may refer to corresponding procedures in the foregoing method embodiments, which are not repeated here
Embodiments of the present invention also provide a computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the steps of any of the methods described above.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above examples are only specific embodiments of the present invention, and are not intended to limit the scope of the present invention, but it should be understood by those skilled in the art that the present invention is not limited thereto, and that the present invention is described in detail with reference to the foregoing examples: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention, and are intended to be included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (13)

1. A transaction method, characterized in that the method is applied to a front-end system, and the front-end system is respectively in communication connection with a peripheral system and a core system; the method comprises the following steps:
acquiring and caching first authorization information of a peripheral system;
generating authorization identification data according to the first authorization information;
transmitting the authorization identification data and the transaction information to a core system, and receiving second authorization information transmitted by the core system; the second authorization information is generated by the core system according to the authorization identification data and transaction information;
combining the first authorization information and the second authorization information to obtain combined authorization data;
and acquiring the combined authorization information according to the combined authorization data, and sending the combined authorization information to the core system so that the core system carries out transaction according to the combined authorization information.
2. The method of claim 1, further comprising, prior to obtaining and caching the first authorization information for the peripheral system:
acquiring transaction data and classification information of at least one peripheral system;
and according to the classification information of the peripheral system, sending target transaction data to the peripheral system so as to enable the peripheral system to generate first authorization information.
3. The method of claim 1, wherein obtaining the consolidated authorization information based on the consolidated authorization data and transmitting the consolidated authorization information to the core system such that the core system performs the transaction based on the consolidated authorization information further comprises:
and acquiring and displaying the transaction result.
4. A transaction method, characterized in that the method is applied to a core system, and the core system is respectively in communication connection with a peripheral system and a front-end system; the method comprises the following steps:
acquiring authorization identification data and transaction information, and generating second authorization information according to the authorization identification data and the transaction information; the authorization identification data is used for judging whether the peripheral system is about to execute authorization operation or not, and the authorization identification data is generated by the front-end system according to first authorization information acquired from the peripheral system;
transmitting the second authorization information to a front-end system;
acquiring merging authorization information, and carrying out transaction according to the merging authorization information; the combined authorization information is acquired by the front-end system according to the first authorization information and the second authorization information.
5. The method of claim 4, wherein generating second authorization information from the identification data and the transaction information comprises:
judging whether the peripheral system is to execute authorization operation according to the identification data;
if yes, judging whether the core system needs to execute authorization operation according to the transaction information;
if the core system does not need to execute the authorization operation, generating an empty authorization packet in a target format, and taking the empty authorization packet as second authorization information;
if the core system needs to execute the authorization operation, generating second authorization information in a target format according to the transaction information;
if not, generating second authorization information according to the transaction information.
6. The method of claim 4, further comprising, after conducting the transaction based on the consolidated authorization information:
and sending the transaction result to the front-end system so that the front-end system displays the transaction result.
7. A transaction device for use in a head-end system, the device comprising:
the cache module is used for acquiring and caching the first authorization information of the peripheral system;
the generation module is used for generating authorization identification data according to the first authorization information;
the first sending module is used for sending the authorization identification data and the transaction information to a core system and receiving second authorization information sent by the core system; the second authorization information is generated by the core system according to the authorization identification data and transaction information;
the merging module is used for merging the first authorization information and the second authorization information to obtain merged authorization data;
the first acquisition module is used for acquiring the combined authorization information according to the combined authorization data and sending the combined authorization information to the core system so that the core system can conduct transactions according to the combined authorization information.
8. The apparatus of claim 7, wherein the apparatus further comprises: an authorization sending module, configured to:
acquiring transaction data and classification information of at least one peripheral system;
and according to the classification information of the peripheral system, sending target transaction data to the peripheral system so as to enable the peripheral system to generate first authorization information.
9. A transaction device for use in a core system, the device comprising:
the second acquisition module is used for acquiring the authorization identification data and the transaction information and generating second authorization information according to the authorization identification data and the transaction information; the authorization identification data is used for judging whether the peripheral system is about to execute authorization operation or not, and the front-end system generates the authorization identification data according to first authorization information acquired from the peripheral system;
the second sending module is used for sending the second authorization information to the front-end system;
the transaction module is used for acquiring the combined authorization information and carrying out transaction according to the combined authorization information; the combined authorization information is acquired by the front-end system according to the first authorization information and the second authorization information.
10. The apparatus of claim 9, wherein the second acquisition module is specifically configured to:
judging whether the peripheral system is to execute authorization operation according to the identification data;
if yes, judging whether the core system needs to execute authorization operation according to the transaction information;
if the core system does not need to execute the authorization operation, generating an empty authorization packet, and taking the empty authorization packet as second authorization information;
if the core system needs to execute the authorization operation, generating second authorization information according to the transaction information;
if not, generating second authorization information according to the transaction information.
11. A transaction system, the system comprising: a front-end system, a core system, and at least one peripheral system; the front-end system is in communication connection with each peripheral system; the front-end system is in communication connection with the core system;
the front-end system comprising the transaction device of claim 7;
the core system comprising the transaction device of claim 9.
12. A computer device comprising a memory, a processor, the memory having stored therein a computer program executable on the processor, characterized in that the processor, when executing the computer program, implements the steps of the method of any of the preceding claims 1 to 6.
13. A computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the method of any one of the preceding claims 1 to 6.
CN201911418098.1A 2019-12-31 2019-12-31 Transaction method, device and system Active CN111178850B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911418098.1A CN111178850B (en) 2019-12-31 2019-12-31 Transaction method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911418098.1A CN111178850B (en) 2019-12-31 2019-12-31 Transaction method, device and system

Publications (2)

Publication Number Publication Date
CN111178850A CN111178850A (en) 2020-05-19
CN111178850B true CN111178850B (en) 2023-07-21

Family

ID=70654350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911418098.1A Active CN111178850B (en) 2019-12-31 2019-12-31 Transaction method, device and system

Country Status (1)

Country Link
CN (1) CN111178850B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114881659A (en) * 2022-05-19 2022-08-09 中国银行股份有限公司 Transaction processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107958551A (en) * 2017-12-29 2018-04-24 福建省农村信用社联合社 A kind of full channel remote centralized authoring system of the expansible bank of business
CN109101840A (en) * 2018-08-17 2018-12-28 中国建设银行股份有限公司 A kind of authorization business rule structuring conversion method and device
CN109272404A (en) * 2018-09-04 2019-01-25 中国建设银行股份有限公司 Business authorization method and device
CN110458705A (en) * 2019-08-15 2019-11-15 中国银行股份有限公司 A kind of processing system and method for authorization message

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1783709A1 (en) * 2005-10-06 2007-05-09 First Data Corporation System and method for executing electronic transactions
EP2624190A1 (en) * 2012-02-03 2013-08-07 Pieter Dubois Authentication of payment transactions using an alias

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107958551A (en) * 2017-12-29 2018-04-24 福建省农村信用社联合社 A kind of full channel remote centralized authoring system of the expansible bank of business
CN109101840A (en) * 2018-08-17 2018-12-28 中国建设银行股份有限公司 A kind of authorization business rule structuring conversion method and device
CN109272404A (en) * 2018-09-04 2019-01-25 中国建设银行股份有限公司 Business authorization method and device
CN110458705A (en) * 2019-08-15 2019-11-15 中国银行股份有限公司 A kind of processing system and method for authorization message

Also Published As

Publication number Publication date
CN111178850A (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN101706933A (en) Method and background system for realizing joint account service operation
CN107133788B (en) Refund processing method and device
US9972172B2 (en) Assisted approval of denied self-service transactions
CN105719140A (en) Method and device for user information verification
CN113554509A (en) Processing method, device, medium and electronic equipment for online payment service
CN106034148B (en) Rapid information interaction method, local server, remote server and system
CN109727015A (en) Method of payment and device
CN111047307B (en) Payment transaction processing system, payment transaction processing method and device
CN111178850B (en) Transaction method, device and system
CN111105224A (en) Payment feedback information processing method and device, electronic equipment and storage medium
CN109426961B (en) Card binding risk control method and device
US20190034927A1 (en) Payment transaction processing systems and methods
CN116703395B (en) Digital RMB payment method, device, equipment, system and medium
CN107194678B (en) Abnormal final state setting method and device for network payment
CN112330323A (en) Method for generating token seed and two-dimensional code, payment method and payment device
CN116823238A (en) Data transmission method, device, equipment and storage medium in cross-border set-up money transfer
CN115829556A (en) Payment method, device, apparatus, medium and product
CN112308543A (en) Data transfer method, device and equipment and computer storage medium
CN113988844A (en) Service subscription method, device and system
US10217087B2 (en) Multicomputer processing of client device request data using centralized event orchestrator
CN113837741A (en) Counter business handling method and device based on mobile banking
CN111784346A (en) User interception method and device based on unmanned selling equipment and server
CN113656415B (en) Payment method, payment device, payment apparatus, and storage medium
CN111752724B (en) Customer information modification system and method
CN111260472B (en) Virtual currency fund management method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant