CN111461734B - Service control method and device - Google Patents

Service control method and device Download PDF

Info

Publication number
CN111461734B
CN111461734B CN202010293859.1A CN202010293859A CN111461734B CN 111461734 B CN111461734 B CN 111461734B CN 202010293859 A CN202010293859 A CN 202010293859A CN 111461734 B CN111461734 B CN 111461734B
Authority
CN
China
Prior art keywords
service
client
preset
personal information
conversion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010293859.1A
Other languages
Chinese (zh)
Other versions
CN111461734A (en
Inventor
陈孟妮
丁先
马晶晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202010293859.1A priority Critical patent/CN111461734B/en
Publication of CN111461734A publication Critical patent/CN111461734A/en
Application granted granted Critical
Publication of CN111461734B publication Critical patent/CN111461734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/407Cancellation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a service control method and a service control device, which are used for receiving service information input by a user and verifying personal information according to a blacklist. And carrying out identity identification on the client according to the verification result and the target client list. And according to the preset corresponding relation, converting the service volume by using conversion factors corresponding to the identity and the service type to obtain a conversion result. And judging whether the service meets the preset requirement according to the conversion result. And if the service meets the preset requirement, executing the service and sending a service successful execution prompt to the user. And if the service does not meet the preset requirement, sending a service prohibition execution prompt to the user. Therefore, the identity of the client is identified according to the blacklist and the target client list, so that the user is helped to know the identity of the client, whether the business transacted by the client meets the preset requirement is judged according to the conversion result, and different prompts are sent to the user under different judgment results, so that the user is assisted in supervising the execution flow of the business.

Description

Service control method and device
Technical Field
The present application relates to the field of financial services, and in particular, to a business control method and apparatus.
Background
Personal foreign exchange business is business with dominant market competitiveness of banks, is basic business for serving and expanding cross-border customer groups, and also faces strict foreign exchange supervision requirements. For clients in the attention list provided by the national foreign exchange management office, the counter channel needs to limit the handling of corresponding foreign exchange business. Furthermore, the amount of foreign exchange transactions within a person's unit of time (e.g., each year) cannot exceed national regulations.
At present, in the current foreign exchange business execution process of the counter channel of the bank, when a counter person of the bank foreign exchange counter provides foreign exchange business service for a client, whether foreign exchange transactions of the client accord with national regulations cannot be monitored in real time.
Disclosure of Invention
The application provides a business control method and a business control device, which aim to assist a bank teller to supervise the execution flow of foreign exchange business.
In order to achieve the above object, the present application provides the following technical solutions:
a traffic control method, comprising:
receiving service information input by a user, wherein the service information comprises personal information of a client, and service type and service volume of the client handling service;
verifying the personal information according to the preloaded blacklist;
according to the verification result of the personal information and a preset target client list, carrying out identity identification on the client, wherein the preset target client list comprises the personal information of the target client;
according to a preset corresponding relation, converting the service volume by using conversion factors corresponding to the identity, the service type and the service type to obtain a conversion result, wherein the preset corresponding relation comprises the corresponding identity, the corresponding service type and the corresponding conversion factors;
judging whether the service meets the preset requirement according to the conversion result;
executing the service under the condition that the service meets the preset requirement, and sending a service successful execution prompt to the user; and sending a service prohibition prompt to the user under the condition that the service does not meet the preset requirement.
Optionally, the verifying the personal information according to the preloaded blacklist includes:
judging whether the personal information hits the blacklist or not;
in the case that the personal information hits the blacklist, the verification result of the personal information is failure;
and in the case that the personal information does not hit the blacklist, the verification result of the personal information is successful.
Optionally, the identifying the client according to the verification result of the personal information and a preset target client list includes:
under the condition that the verification result of the personal information is failure, the identity of the client is a blacklist client;
when the verification result of the personal information is successful and a preset target client list contains the personal information, the identity of the client is the target client;
and under the condition that the verification result of the personal information is successful and the personal information is not contained in the target client list, the identity of the client is a normal client.
Optionally, the converting the traffic with a conversion factor corresponding to the identity and the service type according to a preset correspondence to obtain a conversion result includes:
under the condition that the identity is a blacklist client or a normal client, converting the service volume by using a first conversion factor corresponding to the service type according to a preset first corresponding relation, so as to obtain a first conversion result, wherein the preset first corresponding relation comprises the corresponding service type and the first conversion factor;
and under the condition that the identity is a target client, converting the service volume by using a second conversion factor corresponding to the service type according to a preset second corresponding relation, so as to obtain a second conversion result, wherein the preset second corresponding relation comprises the corresponding service type and the second conversion factor.
Optionally, after receiving the service information input by the user, the method further includes:
and receiving a third conversion factor input by the user based on a preset interface.
Optionally, after verifying the personal information according to the preloaded blacklist, the method further includes:
under the condition that the personal information passes verification, the third conversion factor is used for converting the traffic to obtain a third conversion result;
and under the condition that the personal information verification is not passed, carrying out identity identification on the client according to the target client list.
Optionally, the determining whether the service meets the preset requirement according to the conversion result includes:
according to a preset third corresponding relation, converting the conversion result by using a conversion factor corresponding to the conversion type of the conversion result to obtain a conversion result, wherein the preset third corresponding relation comprises the corresponding conversion type and the conversion factor;
under the condition that the conversion result is larger than a preset threshold value, determining that the service does not meet the preset requirement;
and under the condition that the conversion result is not greater than the preset threshold value, determining that the service meets the preset requirement.
A traffic control apparatus comprising:
the receiving module is used for receiving service information input by a user, wherein the service information comprises personal information of a client, and service types and service volumes of service transacted by the client;
the verification module is used for verifying the personal information according to the preloaded blacklist;
the first identification module is used for identifying the client according to the verification result of the personal information and a preset target client list, wherein the preset target client list comprises the personal information of the target client;
the first conversion module is used for converting the service volume by using conversion factors corresponding to the identity and the service type according to a preset corresponding relation, so as to obtain a conversion result, wherein the preset corresponding relation comprises the corresponding identity, the corresponding service type and the corresponding conversion factor;
the judging module is used for judging whether the service meets the preset requirement according to the conversion result;
the prompting module is used for executing the service and sending a service successful execution prompt to the user under the condition that the service meets the preset requirement; and sending a service prohibition prompt to the user under the condition that the service does not meet the preset requirement.
A computer storage medium comprising a stored program, wherein the program performs the service control method.
An electronic device, comprising: a processor, a memory, and a bus; the processor is connected with the memory through the bus;
the memory is used for storing a program, and the processor is used for running the program, wherein the service control method is executed when the program runs.
According to the technical scheme provided by the application, the business information input by the user is received, and the personal information is verified according to the preloaded blacklist. And carrying out identity identification on the client according to the verification result of the personal information and a preset target client list. And according to the preset corresponding relation, converting the service volume by using conversion factors corresponding to the identity mark and the service type to obtain a conversion result. And judging whether the service meets the preset requirement according to the conversion result. And executing the service under the condition that the service meets the preset requirement, and sending a service successful execution prompt to the user. And sending a service prohibition execution prompt to the user under the condition that the service does not meet the preset requirement. It can be seen that the identity of the client is identified according to the blacklist and the target client list, so as to help the user to know the identity of the client, the service volume is converted by adopting a conversion factor corresponding to the identity, whether the service handled by the client meets the preset requirement is judged according to the conversion result, and different prompts are sent to the user under different judging results, so that the user is assisted to monitor the execution flow of the service.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a service control method according to an embodiment of the present application;
fig. 2 is a schematic diagram of a method for controlling a foreign exchange service according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a service control device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The flow provided by the embodiment of the application is applied to a banking service system and is used for assisting a banking teller to supervise the execution flow of foreign exchange business.
As shown in fig. 1, a schematic diagram of a service control method provided by an embodiment of the present application includes the following steps:
s101: and receiving service information input by the user.
The service information includes personal information of the customer (such as name and identification card number of the customer), and service type and service volume of the customer handling the service.
It should be noted that, the user in this embodiment specifically refers to a bank teller, and the client refers to a client who handles business at a bank.
S102: and verifying the personal information according to the preloaded blacklist.
The blacklist comprises preset personal information. The specific implementation process for verifying the personal information according to the preloaded blacklist comprises the following steps:
judging whether the personal information hits the blacklist (namely, the blacklist contains the personal information), and if the personal information hits the blacklist, the verification result of the personal information is failure. In the case where the personal information does not hit the blacklist, the authentication result of the personal information is successful.
S103: and carrying out identity identification on the client according to the verification result of the personal information and a preset target client list.
Wherein the target client list includes personal information of the target client.
It should be noted that, in this embodiment, the identity of the client includes, but is not limited to: target clients, normal clients, and blacklisted clients.
Optionally, in the case that the verification result of the personal information is failure, the identity of the client is a blacklist client.
And under the condition that the verification result of the personal information is successful and the personal information is contained in the target client list, the identity of the client is the target client.
And under the condition that the verification result of the personal information is successful and the target client list does not contain the personal information, the identity of the client is a normal client.
S104: and according to the preset corresponding relation, converting the service volume by using conversion factors corresponding to the identity mark and the service type to obtain a conversion result.
The preset corresponding relation comprises a corresponding identity mark, a service type and a conversion factor. The conversion factor is used to convert traffic, for example, in a foreign exchange business, the foreign exchange rate is used to convert the foreign exchange amount.
Optionally, under the condition that the identity is a blacklist client or a normal client, according to a preset first corresponding relation, converting the service volume by using a first conversion factor corresponding to the service type to obtain a first conversion result. It should be noted that, the preset first corresponding relationship includes a corresponding service type and a first conversion factor.
And under the condition that the identity is the target client, according to a preset second corresponding relation, converting the service volume by using a second conversion factor corresponding to the service type to obtain a second conversion result. It should be noted that the preset second corresponding relationship includes a corresponding service type and a second conversion factor.
Optionally, in this embodiment, if a third conversion factor input by the user based on the preset interface is received. After personal information is verified according to the preloaded blacklist, the third conversion factor is used for converting the traffic to obtain a third conversion result when the personal information passes verification. And under the condition that the personal information verification is not passed, carrying out identity identification on the client according to the target client list.
S105: and judging whether the service meets the preset requirement according to the conversion result.
The specific implementation process for judging whether the service meets the preset requirement according to the conversion result includes but is not limited to:
and according to a preset third corresponding relation, converting the conversion result by using a conversion factor corresponding to the conversion type of the conversion result to obtain a conversion result. And under the condition that the conversion result is larger than a preset threshold value, determining that the service does not meet the preset requirement. And under the condition that the conversion result is not greater than a preset threshold value, determining that the service meets the preset requirement.
It should be noted that, the preset third corresponding relationship includes a corresponding conversion type and a conversion factor, where the conversion factor is used to convert the conversion result, for example, in the foreign exchange business, a foreign currency of any currency is converted into a rmb.
In this embodiment, if the service meets the preset requirement, S106 is executed, otherwise S107 is executed.
S106: executing the service and sending a service success execution prompt to the user.
S107: and sending a service prohibition execution prompt to the user.
In summary, the business information input by the user is received, and the personal information is verified according to the preloaded blacklist. And carrying out identity identification on the client according to the verification result of the personal information and a preset target client list. And according to the preset corresponding relation, converting the service volume by using conversion factors corresponding to the identity mark and the service type to obtain a conversion result. And judging whether the service meets the preset requirement according to the conversion result. And executing the service under the condition that the service meets the preset requirement, and sending a service successful execution prompt to the user. And sending a service prohibition execution prompt to the user under the condition that the service does not meet the preset requirement. It can be seen that the identity of the client is identified according to the blacklist and the target client list, so as to help the user to know the identity of the client, the service volume is converted by adopting a conversion factor corresponding to the identity, whether the service handled by the client meets the preset requirement is judged according to the conversion result, and different prompts are sent to the user under different judging results, so that the user is assisted to monitor the execution flow of the service.
The flow of the business control method shown in fig. 1 is exemplified by the foreign exchange business transaction of the bank.
As shown in fig. 2, a schematic diagram of a method for controlling a foreign exchange service according to an embodiment of the present application includes the following steps:
s201: and receiving transaction information input by a user.
The transaction information at least includes personal information of the customer (for example, name and identification card number of the customer), account number (for example, account number 1231244 of the customer at XX bank), currency to be exchanged, target currency to be exchanged (for example, exchanging harbor currency for korea element), and transaction amount (for example, exchanging 5000 harbor currency for korea element).
Note that the currency to which the transaction amount belongs is the currency to be exchanged. In this embodiment, the user is specifically a bank teller on the side of the foreign exchange, and the client is specifically a client who handles the foreign exchange.
It should be emphasized that the transaction information is a specific expression of the service information shown in fig. 1, the combination of the to-be-exchanged currency and the target exchange currency (i.e., the to-be-exchanged currency is exchanged for the target exchange currency) is a specific expression of the service type shown in fig. 1, and the transaction amount is a specific expression of the service amount shown in fig. 1.
S202: and loading the blacklist, and judging whether the personal information of the client hits the blacklist.
Specific implementation processes for loading the blacklist include, but are not limited to: and accessing the national foreign exchange management office through the network, acquiring a concerned list provided by the national foreign exchange management office, and taking the concerned list as a blacklist.
If the personal information of the client hits the blacklist, S203 is performed, otherwise S205 is performed.
S203: the client is identified as a blacklisted client.
The specific implementation process for identifying the client as the blacklist client comprises the following steps: and displaying the identity of the client as a blacklist client to the user through an identity prompt box preset in a preset interface.
S204: and matching the reference exchange rate of the transaction amount based on a preset first corresponding relation, and calculating the foreign exchange amount of the transaction amount by using the reference exchange rate.
The first corresponding relation comprises the corresponding currency to be exchanged, the target exchange currency and the reference exchange rate, and the currency to which the foreign exchange amount belongs is the target exchange currency.
It should be noted that, the first correspondence shown in S204 is a specific expression of the preset first correspondence mentioned in the explanation of S104, and the reference exchange rate is a specific expression of the first conversion factor mentioned in the explanation of S104. The foreign exchange amount is one specific embodiment of the conversion result shown in S104.
The specific implementation process of calculating the exchange amount of the foreign exchange of the transaction amount by using the reference exchange rate is to convert the service volume by using the conversion factors corresponding to the identity and the service type shown in fig. 1, so as to obtain a specific expression mode of the conversion result.
After S204 is performed, S212 is continued.
S205: and acquiring the manual exchange rate input by the user in the preset interface, and judging whether the value of the manual exchange rate is not null.
Wherein, if the value of the manual exchange rate is not null, S206 is executed, otherwise S207 is executed. Further, the manual exchange rate is one embodiment of the third conversion factor mentioned in the explanation of S104 above.
It should be noted that, the specific implementation process of obtaining the manual exchange rate input by the user in the preset interface includes: and under the condition that the identity of the client is a non-blacklist client, displaying the identity of the client to a user through an identity prompt box preset in a preset interface. And under the condition that the user inputs a numerical value in the manual exchange rate field displayed in the preset interface based on the identity of the client, reading the value in the manual exchange rate field.
S206: the exchange amount of the transaction amount is calculated using the manual exchange rate.
The specific implementation process of calculating the foreign exchange amount of the transaction amount by using the manual exchange rate is another specific expression mode of converting the service volume by using the conversion factors corresponding to the identity and the service type shown in fig. 1.
After S206 is performed, S212 is continued.
S207: and judging whether the client is a target client or not based on a preset target client list.
The target client list comprises personal information of the target client, if the personal information of the client is contained in the target client list, the client is determined to be the target client, and if the personal information of the client is not contained in the target client list, the client is determined to be the normal client.
If the client is the target client, S208 is executed, otherwise S209.
S208: the client is identified as the target client.
The specific implementation process for identifying the client as the target client comprises the following steps: and displaying the identity of the client to the user as a target client through an identity prompt box preset in a preset interface.
After S208 is performed, S210 is continued.
S209: the customer is identified as a normal customer.
The specific implementation process for identifying the client as a normal client comprises the following steps: and displaying the identity of the client as a normal client to the user through an identity prompt box preset in a preset interface.
After S209 is performed, S211 is continued.
S210: and based on a preset second corresponding relation, matching the preferential exchange rate of the transaction amount, and calculating the foreign exchange amount of the transaction amount by using the preferential exchange rate.
The preferential exchange rate comprises the corresponding currency to be exchanged, the target exchange currency and the preferential exchange rate.
It should be noted that, the second correspondence shown in S210 is a specific expression of the preset second correspondence mentioned in the explanation of S104, and the preferential exchange rate is a specific expression of the second conversion factor mentioned in the explanation of S104.
The specific implementation process of calculating the exchange amount of the foreign exchange of the transaction amount by using the preferential exchange rate is to convert the service volume by using the conversion factors corresponding to the identity and the service type shown in fig. 1, so as to obtain another specific expression mode of the conversion result.
After S210 is performed, S212 is continued.
S211: and matching the reference exchange rate of the transaction amount based on a preset first corresponding relation, and calculating the foreign exchange amount of the transaction amount by using the reference exchange rate.
After S211 is performed, S212 is continued.
S212: and matching the conversion exchange rate of the foreign exchange amount based on a preset third corresponding relation, and calculating the conversion amount of the foreign exchange amount by using the conversion exchange rate.
The third corresponding relation includes a corresponding target exchange currency, a preset currency (for example, merloy or renmins), and a conversion exchange rate, and the currency to which the conversion amount belongs is the preset currency.
The third correspondence shown in S212 is a specific expression of the preset third correspondence mentioned in the explanation of S105, where the combination of the target exchange currency and the preset currency (i.e., the target exchange currency is exchanged for the preset currency) is a specific expression of the conversion type, the conversion exchange rate is a specific expression of the conversion factor, and the conversion amount is a specific expression of the conversion result.
The specific implementation process of calculating the conversion amount of the foreign exchange amount by using the conversion exchange rate is that the conversion result is converted by using the conversion factor corresponding to the conversion type of the conversion result mentioned in the explanation of S105, so as to obtain a specific expression mode of the conversion result.
S213: and judging whether the value of the converted amount is larger than a preset threshold value.
If the value of the converted amount is greater than the preset threshold, S214 is executed, otherwise S215 is executed.
The specific size of the preset threshold is set by a technician according to a rule formulated by the foreign exchange supervision department.
It should be emphasized that, in this embodiment, the preset threshold value may be displayed to the user through a preset threshold value prompt box in the preset interface, and of course, the converted amount may also be displayed to the user through a preset converted amount prompt box in the preset interface, and in addition, the converted amount may also be displayed to the user through a preset converted amount prompt box in the preset interface. Based on the preset threshold prompt box, the preset conversion amount prompt box and the preset conversion amount prompt box, a user can clearly know the execution flow of the foreign exchange business through a preset interface.
S214: a disallow transaction prompt is sent to the user.
Wherein, the disallowing transaction prompt is a specific implementation manner of the service prohibition execution prompt shown in S107.
S215: and carrying out transaction according to the exchange amount of the foreign exchange, and sending a transaction completion prompt to the user.
The transaction completion prompt is a specific implementation manner of the service success execution prompt shown in S106.
In summary, the clients are identified according to the blacklist and the target client list, so as to help the user to know the identity of the clients, and if the identity of the clients is the blacklist client or the normal client, the reference exchange rate is used to calculate the exchange amount of the foreign exchange of the transaction amount. If the user inputs the manual exchange rate based on the preset interface and the identity of the client is not a blacklist client, the manual exchange rate is used for calculating the foreign exchange amount of the transaction amount. And if the identity of the client is the target client, calculating the foreign exchange amount of the transaction amount by using the preferential exchange rate. And calculating the conversion amount of the foreign exchange amount by using the conversion exchange rate, judging whether the conversion amount is larger than a preset threshold, if the value of the conversion amount is larger than the preset threshold, sending a prompt for not allowing the transaction to the user, otherwise, carrying out the transaction according to the foreign exchange amount, and sending a prompt for completing the transaction to the user. Therefore, the identity of the client is identified according to the blacklist and the target client list, so that the user is helped to know the identity of the client, the conversion factor corresponding to the identity of the client and the service type of the processed service is used for converting the service volume, and whether the processed service of the client meets the preset requirement is judged according to the judging result, so that the effective supervision of the service flow is realized.
Corresponding to the service control method provided by the embodiment of the present application, as shown in fig. 3, a schematic structural diagram of a service control device provided by the embodiment of the present application includes:
the receiving module 100 is configured to receive service information input by a user, where the service information includes personal information of a client, and a service type and a service volume of a service handled by the client.
The receiving module 100 is further configured to receive a third conversion factor input by the user based on the preset interface.
The verification module 200 is configured to verify the personal information according to the preloaded blacklist.
The specific implementation process of verifying the personal information by the verification module 200 according to the preloaded blacklist includes: it is determined whether the personal information hits the blacklist. In the case where the personal information hits the blacklist, the verification result of the personal information is failure. In the case where the personal information does not hit the blacklist, the authentication result of the personal information is successful.
The first identification module 300 is configured to identify a client according to a verification result of personal information and a preset target client list, where the preset target client list includes personal information of a target client.
The specific implementation process of the identification module 300 for identifying the client according to the verification result of the personal information and the preset target client list includes: and under the condition that the verification result of the personal information is failure, the identity of the client is a blacklist client. And under the condition that the verification result of the personal information is successful and the preset target client list contains the personal information, the identity of the client is the target client. And under the condition that the verification result of the personal information is successful and the target client list does not contain the personal information, the identity of the client is a normal client.
The first scaling module 400 is configured to scale the traffic using scaling factors corresponding to the identity, the service type and the service type according to a preset correspondence, so as to obtain a scaling result, where the preset correspondence includes the corresponding identity, the corresponding service type and the corresponding scaling factor.
The scaling module 400 scales the traffic by using scaling factors corresponding to the identity and the service type according to a preset corresponding relationship, and the specific implementation process for obtaining the scaling result includes: and under the condition that the identity is a blacklist client or a normal client, converting the service volume by using a first conversion factor corresponding to the service type according to a preset first corresponding relation, so as to obtain a first conversion result, wherein the preset first corresponding relation comprises the corresponding service type and the first conversion factor. And under the condition that the identity is the target client, converting the service volume by using a second conversion factor corresponding to the service type according to a preset second corresponding relation, so as to obtain a second conversion result, wherein the preset second corresponding relation comprises the corresponding service type and the second conversion factor.
The judging module 500 is configured to judge whether the service meets a preset requirement according to the conversion result.
The specific implementation process of the judging module 500 for judging whether the service meets the preset requirement according to the conversion result includes: and according to a preset third corresponding relation, converting the conversion result by using a conversion factor corresponding to the conversion type of the conversion result to obtain a conversion result, wherein the preset third corresponding relation comprises the corresponding conversion type and the conversion factor. And under the condition that the conversion result is larger than a preset threshold value, determining that the service does not meet the preset requirement. And under the condition that the conversion result is not greater than a preset threshold value, determining that the service meets the preset requirement.
The prompt module 600 is configured to execute the service and send a prompt for successful execution of the service to the user when the service meets a preset requirement. And sending a service prohibition execution prompt to the user under the condition that the service does not meet the preset requirement.
And the second scaling module 700 is configured to scale the traffic volume by using the third scaling factor to obtain a third scaling result when the personal information verification passes.
The second identification module 800 is configured to identify the client according to the target client list if the personal information verification is not passed.
In summary, the business information input by the user is received, and the personal information is verified according to the preloaded blacklist. And carrying out identity identification on the client according to the verification result of the personal information and a preset target client list. And according to the preset corresponding relation, converting the service volume by using conversion factors corresponding to the identity mark and the service type to obtain a conversion result. And judging whether the service meets the preset requirement according to the conversion result. And executing the service under the condition that the service meets the preset requirement, and sending a service successful execution prompt to the user. And sending a service prohibition execution prompt to the user under the condition that the service does not meet the preset requirement. It can be seen that the identity of the client is identified according to the blacklist and the target client list, so as to help the user to know the identity of the client, the service volume is converted by adopting a conversion factor corresponding to the identity, whether the service handled by the client meets the preset requirement is judged according to the conversion result, and different prompts are sent to the user under different judging results, so that the user is assisted to monitor the execution flow of the service.
The application also provides a computer storage medium, which comprises a stored program, wherein the program executes the service control method provided by the application.
The application also provides an electronic device, comprising: a processor, a memory, and a bus. The processor is connected with the memory through a bus, the memory is used for storing a program, and the processor is used for running the program, wherein the service control method provided by the application is executed when the program runs.
The functions of the methods of embodiments of the present application, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored on a computing device readable storage medium. Based on such understanding, a part of the present application that contributes to the prior art or a part of the technical solution may be embodied in the form of a software product stored in a storage medium, comprising several instructions for causing a computing device (which may be a personal computer, a server, a mobile computing device or a network device, etc.) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (8)

1. A service control method, comprising:
receiving service information input by a user, wherein the service information comprises personal information of a client, and service type and service volume of the client handling service;
verifying the personal information according to the preloaded blacklist;
according to the verification result of the personal information and a preset target client list, carrying out identity identification on the client, wherein the preset target client list comprises the personal information of the target client;
according to a preset corresponding relation, converting the service volume by using conversion factors corresponding to the identity, the service type and the service type to obtain a conversion result, wherein the preset corresponding relation comprises the corresponding identity, the corresponding service type and the corresponding conversion factors;
judging whether the service meets the preset requirement according to the conversion result;
executing the service under the condition that the service meets the preset requirement, and sending a service successful execution prompt to the user; sending a service prohibition prompt to the user under the condition that the service does not meet the preset requirement;
wherein the verifying the personal information according to the preloaded blacklist includes:
judging whether the personal information hits the blacklist or not;
in the case that the personal information hits the blacklist, the verification result of the personal information is failure;
in the case that the personal information does not hit the blacklist, the verification result of the personal information is successful;
the step of identifying the client according to the verification result of the personal information and a preset target client list comprises the following steps:
under the condition that the verification result of the personal information is failure, the identity of the client is a blacklist client;
when the verification result of the personal information is successful and a preset target client list contains the personal information, the identity of the client is the target client;
if the verification result of the personal information is successful and the target client list does not contain the personal information, the identity of the client is a normal client;
the method comprises the steps of carrying out identity identification on a client according to a blacklist and a target client list to help the user to know the identity of the client, converting the service volume by adopting a conversion factor corresponding to the identity identification, judging whether the service handled by the client meets the preset requirement according to conversion results, and sending different prompts to the user under different judgment results to assist the user to monitor the execution flow of the service.
2. The method of claim 1, wherein the scaling the traffic using scaling factors corresponding to the identity and the traffic type according to a preset correspondence to obtain a scaling result includes:
under the condition that the identity is a blacklist client or a normal client, converting the service volume by using a first conversion factor corresponding to the service type according to a preset first corresponding relation, so as to obtain a first conversion result, wherein the preset first corresponding relation comprises the corresponding service type and the first conversion factor;
and under the condition that the identity is a target client, converting the service volume by using a second conversion factor corresponding to the service type according to a preset second corresponding relation, so as to obtain a second conversion result, wherein the preset second corresponding relation comprises the corresponding service type and the second conversion factor.
3. The method according to claim 1 or 2, further comprising, after receiving the service information input by the user:
and receiving a third conversion factor input by the user based on a preset interface.
4. A method according to claim 3, wherein said verifying said personal information in accordance with a preloaded blacklist further comprises:
under the condition that the personal information passes verification, the third conversion factor is used for converting the traffic to obtain a third conversion result;
and under the condition that the personal information verification is not passed, carrying out identity identification on the client according to the target client list.
5. The method of claim 1, wherein the determining whether the service meets the preset requirement according to the conversion result comprises:
according to a preset third corresponding relation, converting the conversion result by using a conversion factor corresponding to the conversion type of the conversion result to obtain a conversion result, wherein the preset third corresponding relation comprises the corresponding conversion type and the conversion factor;
under the condition that the conversion result is larger than a preset threshold value, determining that the service does not meet the preset requirement;
and under the condition that the conversion result is not greater than the preset threshold value, determining that the service meets the preset requirement.
6. A traffic control apparatus, comprising:
the receiving module is used for receiving service information input by a user, wherein the service information comprises personal information of a client, and service types and service volumes of service transacted by the client;
the verification module is used for verifying the personal information according to the preloaded blacklist;
the first identification module is used for identifying the client according to the verification result of the personal information and a preset target client list, wherein the preset target client list comprises the personal information of the target client;
the first conversion module is used for converting the service volume by using conversion factors corresponding to the identity and the service type according to a preset corresponding relation, so as to obtain a conversion result, wherein the preset corresponding relation comprises the corresponding identity, the corresponding service type and the corresponding conversion factor;
the judging module is used for judging whether the service meets the preset requirement according to the conversion result;
the prompting module is used for executing the service and sending a service successful execution prompt to the user under the condition that the service meets the preset requirement; sending a service prohibition prompt to the user under the condition that the service does not meet the preset requirement;
the verification module is specifically configured to determine whether the personal information hits the blacklist; in the case that the personal information hits the blacklist, the verification result of the personal information is failure; in the case that the personal information does not hit the blacklist, the verification result of the personal information is successful;
the first identification module is specifically configured to identify the client as a blacklist client when the verification result of the personal information is failure; when the verification result of the personal information is successful and a preset target client list contains the personal information, the identity of the client is the target client; if the verification result of the personal information is successful and the target client list does not contain the personal information, the identity of the client is a normal client;
the device carries out identity identification on the clients according to the blacklist and the target client list so as to help the users to know the identity of the clients, converts the service volume by adopting conversion factors corresponding to the identity identification, judges whether the service handled by the clients meets the preset requirements according to conversion results, and sends different prompts to the users under different judgment results so as to assist the users to monitor the execution flow of the service.
7. A computer storage medium, characterized in that the computer storage medium comprises a stored program, wherein the program performs the service control method of any one of claims 1-5.
8. An electronic device, comprising: a processor, a memory, and a bus; the processor is connected with the memory through the bus;
the memory is configured to store a program, and the processor is configured to execute the program, wherein the program executes the service control method according to any one of claims 1 to 5.
CN202010293859.1A 2020-04-15 2020-04-15 Service control method and device Active CN111461734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010293859.1A CN111461734B (en) 2020-04-15 2020-04-15 Service control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010293859.1A CN111461734B (en) 2020-04-15 2020-04-15 Service control method and device

Publications (2)

Publication Number Publication Date
CN111461734A CN111461734A (en) 2020-07-28
CN111461734B true CN111461734B (en) 2023-11-17

Family

ID=71685308

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010293859.1A Active CN111461734B (en) 2020-04-15 2020-04-15 Service control method and device

Country Status (1)

Country Link
CN (1) CN111461734B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114528053A (en) * 2022-02-28 2022-05-24 上海识装信息科技有限公司 Business function execution method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2405310A1 (en) * 2000-04-14 2001-10-25 E-Vantage International, Inc. Method and system for delivering foreign exchange risk management advisory solutions to a designated market
CN107886428A (en) * 2017-11-08 2018-04-06 中国银行股份有限公司 A kind of method and payment clearance system for determining to pay clearing rate
TWM565844U (en) * 2018-05-31 2018-08-21 臺灣土地銀行股份有限公司 Quota control system of fund transaction middle platform
CN109461083A (en) * 2018-11-19 2019-03-12 中国银行股份有限公司 A kind of determination method and device of preferential rate
CN109544293A (en) * 2018-11-20 2019-03-29 数贸科技(北京)有限公司 Trading limit processing method and processing device
CN109934702A (en) * 2019-03-17 2019-06-25 中国建设银行股份有限公司 A kind of method, system and the electronic equipment of personal foreign exchange's business processing
CN110458695A (en) * 2019-08-15 2019-11-15 中国银行股份有限公司 The risk control method and device of cross-border money transfer transactions
CN110992025A (en) * 2019-11-28 2020-04-10 中国银行股份有限公司 User amount adjusting method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2405310A1 (en) * 2000-04-14 2001-10-25 E-Vantage International, Inc. Method and system for delivering foreign exchange risk management advisory solutions to a designated market
CN107886428A (en) * 2017-11-08 2018-04-06 中国银行股份有限公司 A kind of method and payment clearance system for determining to pay clearing rate
TWM565844U (en) * 2018-05-31 2018-08-21 臺灣土地銀行股份有限公司 Quota control system of fund transaction middle platform
CN109461083A (en) * 2018-11-19 2019-03-12 中国银行股份有限公司 A kind of determination method and device of preferential rate
CN109544293A (en) * 2018-11-20 2019-03-29 数贸科技(北京)有限公司 Trading limit processing method and processing device
CN109934702A (en) * 2019-03-17 2019-06-25 中国建设银行股份有限公司 A kind of method, system and the electronic equipment of personal foreign exchange's business processing
CN110458695A (en) * 2019-08-15 2019-11-15 中国银行股份有限公司 The risk control method and device of cross-border money transfer transactions
CN110992025A (en) * 2019-11-28 2020-04-10 中国银行股份有限公司 User amount adjusting method and device

Also Published As

Publication number Publication date
CN111461734A (en) 2020-07-28

Similar Documents

Publication Publication Date Title
US10580009B2 (en) Mobile communications message verification of financial transactions
US10796310B2 (en) Apparatus including data bearing medium for reducing fraud in payment transactions using a black list
CN111461734B (en) Service control method and device
CN111160920A (en) Method and device for preventing bank card from being embezzled
CN116596536A (en) Internet financial secure payment method and system
CN114841698A (en) Transaction information processing method and device and computer readable storage medium
CN112950366B (en) Banking business handling method and device, electronic equipment and computer storage medium
CN108446907B (en) Safety verification method and device
CN113222303A (en) Method and device for predicting out-of-band risk of bank signature card
CN111639776A (en) Service control method and device
CN113191757A (en) Bank business control method, device, server and storage medium
CN112686666A (en) Electronic wallet transaction method and device for railway business system
CN111986024A (en) Transaction processing method and device and electronic terminal
CN111652596A (en) Credit service anti-fraud method, device, terminal equipment and storage medium
CN115936892A (en) Customer information management method and device and related products
CN112017029B (en) Information prompting method and device
CN115713339B (en) Data quantum computing management and control method, device, equipment and computer medium
CN111932800A (en) Security verification method and device
CN110167007B (en) Service processing method and system
CN114926293A (en) Method for confirming business handling risk, related device and storage medium
CN114119032A (en) Service processing method and device
CN116052344A (en) Blockless withdrawal method and device based on blockchain
CN116842251A (en) Recommendation method, device, equipment and storage medium of large-amount verification mode
CN114398599A (en) Method and system for protecting man-vehicle authentication information
CN115171301A (en) Identity verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant