CN114549205A - Transaction flow processing method and device, processor and electronic equipment - Google Patents
Transaction flow processing method and device, processor and electronic equipment Download PDFInfo
- Publication number
- CN114549205A CN114549205A CN202210169932.3A CN202210169932A CN114549205A CN 114549205 A CN114549205 A CN 114549205A CN 202210169932 A CN202210169932 A CN 202210169932A CN 114549205 A CN114549205 A CN 114549205A
- Authority
- CN
- China
- Prior art keywords
- transaction
- target
- nodes
- processing
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Debugging And Monitoring (AREA)
Abstract
The application discloses a transaction flow processing method. Relating to the field of financial science and technology, the method comprises the following steps: acquiring a plurality of transaction nodes in a transaction flow, wherein the transaction nodes in the transaction flow are executed according to a preset sequence; generating target identification information corresponding to a target transaction node under the condition that the working state of the target transaction node is a suspicious state in a plurality of transaction nodes, wherein the target transaction node is any one of the transaction nodes; and processing the suspicious state based on the target identification information, and executing other transaction nodes in the transaction flow after the suspicious state is released. Through the method and the device, the problems that manual checking errors are more, efficiency is low and labor cost is high when the transaction nodes in the transaction process are checked manually in the related technology are solved.
Description
Technical Field
The application relates to the field of financial science and technology, in particular to a transaction flow processing method, a transaction flow processing device, a transaction flow processor and electronic equipment.
Background
The merchant is the only contact point of the business bank order receiving merchant service internet channel, in order to improve competition and service capability of business bank order receiving merchants and better serve the business bank order receiving merchants, the merchant supports the payment refund of the merchant of a partner accessed by a GTCG external connection and a business bank API platform besides a PC and an APP, and in the process, order payment types are gradually increased. In the face of the demands of multiple channels and multiple order types, the service provided by merchants combines refunds of multiple orders such as bank, union pay, aggregation, electronic coupons and group purchase coupons, the transaction link is lengthened due to the fact that the service mode tends to be complex, the transaction amount is gradually increased, the transaction overtime caused by the fact that a certain node is abnormal is avoided in the online transaction process, at the moment, the account hanging situation occurs, in the related technology, transaction maintenance personnel and branch tellers need to manually inquire the account handling situation and manually handle the account hanging situation, the mode has the defects of manual checking errors, low efficiency and large workload, the timeliness of online transaction is affected, the transaction progress of the acquiring merchants is further affected, and the service demands of the multiple channels and the multiple order types cannot be adapted.
Aiming at the problems of many manual checking errors, low efficiency and high labor cost in the prior art that the transaction nodes in the transaction process are checked in a manual mode, an effective solution is not provided at present.
Disclosure of Invention
The present application mainly aims to provide a transaction flow processing method, a transaction flow processing device, a transaction flow processor, and an electronic device, so as to solve the problems of many errors, low efficiency, and high labor cost in the related art in which a transaction node is checked manually.
To achieve the above object, according to one aspect of the present application, a method for processing a transaction flow is provided. The method comprises the following steps: acquiring a plurality of transaction nodes in a transaction flow, wherein the transaction nodes in the transaction flow are executed according to a preset sequence; generating target identification information corresponding to a target transaction node under the condition that the working state of the target transaction node is a suspicious state in a plurality of transaction nodes, wherein the target transaction node is any one of the transaction nodes; and processing the suspicious state based on the target identification information, and executing other transaction nodes in the transaction flow after the suspicious state is released.
Optionally, the executing of other transaction nodes in the transaction flow includes: judging the working states of other transaction nodes in the transaction flow according to a preset sequence to obtain a judgment result; under the condition that the judgment result indicates that the working states of other transaction nodes are suspicious states, generating identification information of other transaction nodes; and processing the suspicious states of other transaction nodes based on the identification information, and processing the next transaction node of other transaction nodes after the suspicious states of other transaction nodes are released.
Optionally, determining that the working state of the target transaction node in the plurality of transaction nodes is a suspicious state includes: receiving a current state code of the target node returned by the third-party server; and under the condition that the current state code is consistent with the preset state code, determining that the working state of the target node is a suspicious state.
Optionally, determining that the working state of the target transaction node in the plurality of transaction nodes is a suspicious state, further includes: determining whether a response signal of a third-party server for a target node is received within a preset time length; and under the condition that the response signal is not received within the preset time, determining that the working state of the target transaction node is a suspicious state.
Optionally, the processing the suspicious state based on the target identification information includes: starting a processing thread, and inquiring a target application program interface corresponding to the target identification information; and calling a target application program interface to process the target transaction node, and removing the suspicious state after the target application program successfully processes the target transaction node.
Optionally, the method further includes: detecting whether the number of times of suspicious states of the target node in a preset time is greater than a preset threshold value or not; and under the condition that the detection result indicates that the times of the suspicious state of the target node is greater than a preset threshold value, displaying prompt information, wherein the prompt information is used for prompting the target object to process the suspicious state of the target node.
According to another aspect of the embodiments of the present application, there is also provided a method for processing a task, including: acquiring a plurality of processing nodes in a task flow, wherein the plurality of processing nodes in the task flow are executed according to a preset sequence; under the condition that the working state of a target processing node in the plurality of processing nodes is determined to be a target type, target identification information corresponding to the target processing node is generated, wherein the target processing node is any one of the plurality of processing nodes; and processing the working state of the target type based on the target identification information, and executing other nodes in the task flow after the working state of the target type is released.
According to another aspect of the embodiments of the present application, there is also provided a processing apparatus for a transaction flow, including: the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a plurality of transaction nodes in a transaction flow, and the transaction nodes in the transaction flow are executed according to a preset sequence; the system comprises a determining module, a processing module and a processing module, wherein the determining module is used for generating target identification information corresponding to a target transaction node under the condition that the working state of the target transaction node is a suspicious state in a plurality of transaction nodes, and the target transaction node is any one of the transaction nodes; and the processing module is used for processing the suspicious state based on the target identification information and executing other transaction nodes in the transaction flow after the suspicious state is released.
According to another aspect of the embodiments of the present application, there is also provided a processor, configured to execute a program, where the program executes a processing method of any transaction flow.
According to another aspect of embodiments of the present application, there is also provided an electronic device including one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement any one of the processing methods of the transaction flow.
Through the application, the following steps are adopted: acquiring a plurality of transaction nodes in a transaction flow, wherein the transaction nodes in the transaction flow are executed according to a preset sequence; generating target identification information corresponding to a target transaction node under the condition that the working state of the target transaction node is a suspicious state in a plurality of transaction nodes, wherein the target transaction node is any one of the transaction nodes; the suspicious state is processed based on the target identification information, and other transaction nodes in the transaction process are executed after the suspicious state is relieved, so that the problems that in the related technology, the transaction nodes are checked manually, errors are more, the efficiency is low, and the labor cost is high are solved. And then reached and improved the treatment effeciency to suspicious node, improved the degree of accuracy of handling to and the effect that reduces the cost of labor of checking.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
FIG. 1 is a flow chart of a method of processing a transaction flow provided according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an alternative transaction flow according to an embodiment of the present application;
FIG. 3 is a flowchart of the process when a UnionPay interface is called to enter a personal account as a suspicious state;
FIG. 4 is a flowchart illustrating a method for processing tasks according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a processing device for a transaction flow according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For convenience of description, some terms or expressions referred to in the embodiments of the present application are explained below:
suspicious state is an intermediate state with unknown result caused by timeout exception when the class interface is called and updated or submitted.
And (3) suspicious approval: and initiating active query to obtain a processing result aiming at the transaction with an unknown result, and continuing a subsequent process to form a service closed loop.
Instruction list: database table for recording detailed information of one-time transaction
The merchant's family: the business bank order-receiving merchant service platform provides services such as payment success message notification, detail inquiry, bill inquiry, refund and the like for the business bank order-receiving merchants.
GTCG external connection: and the system is responsible for communication between the application of the business administration and the off-line partner.
API platform: and operating a platform for providing an open API interface for a third party.
Merchant's home APP: a merchant bill receiving service mobile APP developed by a worker is downloaded and installed by a merchant through various large application markets, and services such as payment success message notification, detail inquiry, bill checking inquiry, refund and the like are provided for the merchant through a mobile phone.
And (3) Unionpay: china bank card union organization, each bank realizes interconnection and intercommunication among systems through a Unionpay cross-bank education clearing system.
Polymerization: and payment and refund of payment treasures and WeChat related orders are supported.
It should be noted that, the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for presentation, analyzed data, etc.) referred to in the present disclosure are information and data authorized by the user or sufficiently authorized by each party.
The present invention is described below with reference to preferred implementation steps, and fig. 1 is a flowchart of a processing method of a transaction flow provided according to an embodiment of the present application, as shown in fig. 1, the method includes the following steps:
s101, acquiring a plurality of transaction nodes in a transaction flow, wherein the transaction nodes in the transaction flow are executed according to a preset sequence;
s102, generating target identification information corresponding to a target transaction node under the condition that the working state of the target transaction node is a suspicious state in the transaction nodes, wherein the target transaction node is any one of the transaction nodes;
s103, the suspicious state is processed based on the target identification information, and other transaction nodes in the transaction process are executed after the suspicious state is relieved.
In the transaction flow processing method, a plurality of transaction nodes in a transaction flow are obtained, wherein the transaction nodes in the transaction flow are executed according to a preset sequence; generating target identification information corresponding to a target transaction node under the condition that the working state of the target transaction node is a suspicious state in a plurality of transaction nodes, wherein the target transaction node is any one of the transaction nodes; the suspicious state is processed based on the target identification information, and other transaction nodes in the transaction process are executed after the suspicious state is released, so that the problems of more errors, low efficiency and high labor cost caused by manual verification of the transaction nodes in the related technology are solved. And then the effects of improving the processing efficiency when the account is suspicious, improving the processing accuracy, providing the system reliability and reducing the checking labor cost are achieved.
It should be noted that, executing other transaction nodes in the transaction flow may be implemented by the following steps, specifically: judging the working states of other transaction nodes in the transaction flow according to a preset sequence to obtain a judgment result; under the condition that the judgment result indicates that the working states of other transaction nodes are suspicious states, generating identification information of other transaction nodes; and processing the suspicious states of other transaction nodes based on the identification information, and processing the next transaction node of other transaction nodes after the suspicious states of other transaction nodes are released. For any transaction node in the transaction process, when the transaction node has a suspicious state, the suspicious state is processed first, and after the suspicious state is released, the transaction node is continuously corresponded to the next transaction node.
In some embodiments of the present application, a method for determining that a working state of a target transaction node in a plurality of transaction nodes is a suspicious state includes: receiving a current state code of the target node returned by the third-party server; and under the condition that the current state code is consistent with the preset state code, determining that the working state of the target node is a suspicious state.
In other optional embodiments of the present application, the method for determining that an operating state of a target transaction node in a plurality of transaction nodes is a suspicious state further includes: determining whether a response signal of a third-party server for a target node is received within a preset time length; and under the condition that the response signal is not received within the preset time, determining that the working state of the target transaction node is a suspicious state.
In some optional embodiments of the present application, the suspicious state may be processed based on the target identification information, specifically, a processing thread is started, and a target application program interface corresponding to the target identification information is queried; and calling a target application program interface to process the target transaction node, and removing the suspicious state after the target application program successfully processes the target transaction node.
It should be noted that, in the related embodiment of the present application, whether the number of times of detecting the suspicious state of the target node within the predetermined time period is greater than a preset threshold value is detected; and under the condition that the detection result indicates that the times of the suspicious state of the target node is greater than a preset threshold value, displaying prompt information, wherein the prompt information is used for prompting the target object to process the suspicious state of the target node. For example, within 1 hour, if the number of times of suspicious states occurring in a certain node is greater than 5 times, a prompt message may be generated and displayed on the display device to prompt a developer or an operation and maintenance person to perform manual processing on the node.
In order to facilitate those skilled in the art to better understand the embodiments related to the present application, the embodiments related to the present application will now be described by taking the union pay electronic payment instrument as an example, and fig. 2 is a schematic diagram of an alternative transaction flow of the present application, as shown in fig. 2:
according to the concept of introducing intermediate state and final state by the transaction node, the following 3 state flows are flows that can reach the final state:
(1) the refund is successful: 6 → 7 → 8 → 9 → 10 → the terminal state, wherein the terminal state can be a failed state or a successful state, i.e. the terminal state is a definite failed or successful state.
(2) Refund failure caused by merchant account deduction failure: 6 → 11 → the final state.
(3) Refund failure due to failure to enter personal account: 6 → 7 → 8 → 12 → 13 → the final state.
And after each transaction node is suspicious, recording a suspicious state in the database, starting a background thread, scanning the suspicious record of the instruction list in the database by the background thread, and performing the next processing according to the suspicious state. Fig. 3 is a flowchart of a process for calling the unionpay interface to enter the personal account into the suspicious state, and as shown in fig. 3, when the suspicious state occurs in "calling the unionpay interface to enter the personal account", the online transaction may record that the suspicious state is 8. After the background thread scans the suspicious instruction, an active query interface provided by the UnionPay is called firstly, the account moving result is confirmed, and the next processing is carried out according to the account moving result. If the suspicious state appears again in the suspicious approval process, the support records the suspicious state of a certain node again, and waits for the next suspicious approval; the transaction process can support multiple channels, namely each channel accesses to a merchant to refund, can use the combined service of online transaction, and supports multiple order types, namely transaction nodes required by each order to complete refund are added into a suspicious state, and a suspicious batch process judges the next operation process according to the state and executes the next operation process.
It is easy to notice that through the processing method of the transaction node, the cost and the workload of manual processing of suspicious accounts can be reduced, the time efficiency of suspicious account processing is shortened, a business closed loop is quickly formed, the accuracy of suspicious account processing is improved, the reliability of the system is improved, and the processing of business process and in-line combination multi-channel and multi-order type does not need to be concerned by a bill receiving merchant.
Fig. 4 is a processing method of a task according to an embodiment of the present application, and as shown in fig. 4, the processing method includes:
s201, acquiring a plurality of processing nodes in a task flow, wherein the plurality of processing nodes in the task flow are executed according to a preset sequence;
s202, under the condition that the working state of a target processing node in the plurality of processing nodes is determined to be a target type, generating target identification information corresponding to the target processing node, wherein the target processing node is any one of the plurality of processing nodes;
and S203, processing the working state of the target type based on the target identification information, and executing other nodes in the task flow after the working state of the target type is released.
In the processing method, by acquiring a plurality of processing nodes in a task flow, wherein the plurality of processing nodes in the task flow execute according to a preset sequence, generating target identification information corresponding to a target processing node in the plurality of processing nodes when the working state of the target processing node is determined to be the target type, wherein the target processing node is any one of the plurality of processing nodes, processes the working state of the target type based on the target identification information, after the working state of the target type is released, other nodes in the task flow are executed, so that the problems of more errors, low efficiency and high labor cost of manually checking each node of the task flow in the related art are solved, and then reached and improved the treatment effeciency to suspicious node, improved the degree of accuracy of handling, reduced the effect of the cost of labor of checking.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
The embodiment of the present application further provides a processing device for a transaction flow, and it should be noted that the processing device for a transaction flow in the embodiment of the present application may be used to execute the processing method for a transaction flow provided in the embodiment of the present application. The following describes a processing apparatus of a transaction flow provided in an embodiment of the present application.
Fig. 5 is a schematic diagram of a processing device of a transaction flow according to an embodiment of the application. As shown in fig. 5, the apparatus includes:
an obtaining module 50, configured to obtain a plurality of transaction nodes in a transaction flow, where the transaction nodes in the transaction flow are executed according to a predetermined sequence;
the determining module 52 is configured to generate target identification information corresponding to a target transaction node when it is determined that a working state of the target transaction node is a suspicious state in the plurality of transaction nodes, where the target transaction node is any one of the plurality of transaction nodes;
and the processing module 54 is configured to process the suspicious state based on the target identification information, and execute other transaction nodes in the transaction flow after the suspicious state is released.
In the processing device of the transaction flow, an obtaining module 50 is used for obtaining a plurality of transaction nodes in the transaction flow, wherein the transaction nodes in the transaction flow are executed according to a predetermined sequence; the determining module 52 is configured to generate target identification information corresponding to a target transaction node when it is determined that a working state of the target transaction node is a suspicious state in the plurality of transaction nodes, where the target transaction node is any one of the plurality of transaction nodes; the processing module 54 is configured to process the suspicious state based on the target identification information, and execute other transaction nodes in the transaction flow after the suspicious state is resolved, so that the problems of many errors, low efficiency and high labor cost caused by manually checking the transaction nodes in the related art are solved. And then reached the treatment effeciency when improving the account suspicious, improved the degree of accuracy of handling to and the effect of the cost of labor who reduces checking.
According to another aspect of the embodiments of the present application, there is further provided a processor, configured to execute the program, where the program executes to perform any one of the processing methods of the transaction flows.
According to another aspect of embodiments of the present application, there is also provided an electronic device including one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement any one of the processing methods of the transaction flow.
The processing device of the transaction flow comprises a processor and a memory, wherein the acquisition module, the determination module and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, and the problems of more errors, low efficiency and high labor cost caused by manually checking the transaction nodes in the related technology by adjusting the kernel parameters are solved. And then reached the treatment effeciency when improving the account suspicious, improved the degree of accuracy of handling to and the effect of the cost of labor who reduces checking.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
An embodiment of the present invention provides a computer-readable storage medium, on which a program is stored, which, when executed by a processor, implements the processing method of the transaction flow.
The embodiment of the invention provides a processor, which is used for running a program, wherein the processing method of the transaction flow is executed when the program runs.
As shown in fig. 6, an embodiment of the present invention provides an electronic device, where the device includes a processor, a memory, and a program stored in the memory and executable on the processor, and the processor executes the program to implement the following steps: acquiring a plurality of transaction nodes in a transaction flow, wherein the transaction nodes in the transaction flow are executed according to a preset sequence; generating target identification information corresponding to a target transaction node under the condition that the working state of the target transaction node is a suspicious state in a plurality of transaction nodes, wherein the target transaction node is any one of the transaction nodes; and processing the suspicious state based on the target identification information, and executing other transaction nodes in the transaction flow after the suspicious state is released. The device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device: acquiring a plurality of transaction nodes in a transaction flow, wherein the transaction nodes in the transaction flow are executed according to a preset sequence; generating target identification information corresponding to a target transaction node under the condition that the working state of the target transaction node is a suspicious state in a plurality of transaction nodes, wherein the target transaction node is any one of the transaction nodes; and processing the suspicious state based on the target identification information, and executing other transaction nodes in the transaction flow after the suspicious state is released.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (10)
1. A method for processing a transaction flow, comprising:
acquiring a plurality of transaction nodes in a transaction flow, wherein the transaction nodes in the transaction flow are executed according to a preset sequence;
generating target identification information corresponding to a target transaction node under the condition that the working state of the target transaction node is determined to be a suspicious state in the transaction nodes, wherein the target transaction node is any one of the transaction nodes;
and processing the suspicious state based on the target identification information, and executing other transaction nodes in the transaction flow after the suspicious state is released.
2. The method of claim 1, wherein executing other trading nodes in the trading flow comprises:
judging the working states of the other transaction nodes in the transaction flow according to the preset sequence to obtain a judgment result;
under the condition that the judgment result indicates that the working states of the other transaction nodes are suspicious states, generating identification information of the other transaction nodes;
and processing the suspicious state of the other transaction nodes based on the identification information, and processing the next transaction node of the other transaction nodes after the suspicious state of the other transaction nodes is released.
3. The method of claim 1, wherein determining that the operational status of a target transaction node of the plurality of transaction nodes is a suspect status comprises:
receiving a current state code of the target node returned by the third-party server;
and under the condition that the current state code is consistent with a preset state code, determining that the working state of the target node is a suspicious state.
4. The method of claim 1, wherein determining the operational status of a target transaction node of the plurality of transaction nodes as a suspect state, further comprises:
determining whether a response signal of a third party server to the target node is received within a preset time length;
and under the condition that the response signal is not received within the preset time, determining that the working state of the target transaction node is the suspicious state.
5. The method of claim 1, wherein processing the suspicious state based on the target identification information comprises:
starting a processing thread, and inquiring a target application program interface corresponding to the target identification information;
and calling the target application program interface to process the target transaction node, and removing the suspicious state after the target application program successfully processes the target transaction node.
6. The method of claim 1, further comprising:
detecting whether the number of times of suspicious states of the target node in a preset time is greater than a preset threshold value;
and displaying prompt information under the condition that the detection result indicates that the times of the suspicious state of the target node is greater than the preset threshold, wherein the prompt information is used for prompting a target object to process the suspicious state of the target node.
7. A method for processing a task, comprising:
acquiring a plurality of processing nodes in a task flow, wherein the plurality of processing nodes in the task flow are executed according to a preset sequence;
under the condition that the working state of a target processing node in the plurality of processing nodes is determined to be a target type, generating target identification information corresponding to the target processing node, wherein the target processing node is any one of the plurality of processing nodes;
and processing the working state of the target type based on the target identification information, and executing other nodes in the task flow after the working state of the target type is released.
8. A transaction flow processing apparatus, comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a plurality of transaction nodes in a transaction flow, and the transaction nodes in the transaction flow are executed according to a preset sequence;
the system comprises a determining module, a processing module and a processing module, wherein the determining module is used for generating target identification information corresponding to a target transaction node under the condition that the working state of the target transaction node is determined to be a suspicious state in the transaction nodes, and the target transaction node is any one of the transaction nodes;
and the processing module is used for processing the suspicious state based on the target identification information and executing other transaction nodes in the transaction flow after the suspicious state is released.
9. A processor, wherein the processor is configured to run a program, wherein the program is configured to execute the processing method of the transaction flow according to any one of claims 1 to 6 when running.
10. An electronic device comprising one or more processors and memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of processing a transaction flow of any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210169932.3A CN114549205A (en) | 2022-02-23 | 2022-02-23 | Transaction flow processing method and device, processor and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210169932.3A CN114549205A (en) | 2022-02-23 | 2022-02-23 | Transaction flow processing method and device, processor and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114549205A true CN114549205A (en) | 2022-05-27 |
Family
ID=81678111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210169932.3A Pending CN114549205A (en) | 2022-02-23 | 2022-02-23 | Transaction flow processing method and device, processor and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114549205A (en) |
-
2022
- 2022-02-23 CN CN202210169932.3A patent/CN114549205A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107230092B (en) | Accounting processing method and device and server | |
US10530868B2 (en) | System and method for processing context data for interaction sessions | |
AU2020201684B2 (en) | Method of processing a transaction request | |
CN110458688A (en) | A kind of method for processing business, device and equipment | |
CN113971560A (en) | Transaction processing method and device | |
CN112286790A (en) | Full link test method, device, equipment and storage medium | |
WO2020243904A1 (en) | Refund method, transaction system, account system, and storage medium | |
CN113724077A (en) | Loan approval method, device and system | |
CN107180030B (en) | Method and device for generating relational data on network | |
CN109255616B (en) | Processing method and device for refused task | |
US11593743B2 (en) | Risk management system interface | |
US20230050176A1 (en) | Method of processing a transaction request | |
CN114549205A (en) | Transaction flow processing method and device, processor and electronic equipment | |
US20190164162A1 (en) | System to perform identity verification | |
CN112990811B (en) | Block chain-based warehouse receipt processing method and warehouse receipt processing system | |
CN114693358A (en) | Data processing method and device, electronic equipment and storage medium | |
US11244322B2 (en) | Methods and apparatus for chargebacks of push payment transactions | |
US8977305B1 (en) | Initiation of wireless service | |
CN114757768A (en) | Account management method and related equipment | |
US20160012425A1 (en) | Systems and Methods for Processing Transactions Between Customers and Merchants | |
CN111429132B (en) | Service processing method and device | |
KR102475662B1 (en) | Method and system for managing point using blockchain based on distributed ledger | |
CN118411241A (en) | Account information detection method and device, computer storage medium and electronic equipment | |
CN116993402A (en) | Transaction processing method, device, electronic equipment and computer readable medium | |
CN113487413A (en) | Accounting processing method and device, electronic equipment and computer readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |