CN117273742A - Transaction outbound verification method, device, equipment and medium - Google Patents

Transaction outbound verification method, device, equipment and medium Download PDF

Info

Publication number
CN117273742A
CN117273742A CN202311212318.1A CN202311212318A CN117273742A CN 117273742 A CN117273742 A CN 117273742A CN 202311212318 A CN202311212318 A CN 202311212318A CN 117273742 A CN117273742 A CN 117273742A
Authority
CN
China
Prior art keywords
verification
transaction
verified
information
outbound
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311212318.1A
Other languages
Chinese (zh)
Inventor
王鹏鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311212318.1A priority Critical patent/CN117273742A/en
Publication of CN117273742A publication Critical patent/CN117273742A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a transaction outbound verification method, device, equipment and medium, which can be applied to the field of big data or the field of finance, and in the process of carrying out a transaction, target information to be verified corresponding to the transaction is determined. And calling an intelligent outbound module to perform intelligent outbound verification on the target information to be verified to obtain a first verification node, and calling the artificial outbound module to perform artificial outbound verification on the target information to be verified to obtain a second verification result in response to a manual verification application initiated by a target user corresponding to the transaction. And finally, processing the transaction by using the first verification result and the second verification result. The intelligent outbound verification is adopted, so that the efficiency of the outbound verification is improved, and the accuracy of the outbound verification is improved by combining manual outbound verification on the basis of the intelligent outbound verification. Based on the method, the transaction outbound verification requirement of the target user can be better met, and the user experience is improved.

Description

Transaction outbound verification method, device, equipment and medium
Technical Field
The present application relates to the field of big data, and in particular, to a transaction outbound verification method, apparatus, device, and medium.
Background
In banking systems, various types of transactions in various transaction scenarios may be involved. For example, transactions involving large funds accounting, transactions involving bill payments, and the like.
In practice, the banking system needs to verify the relevant information (such as transaction information) in order to make a transaction again without any error. Based on the method, the account asset security of the user is guaranteed.
However, the outbound verification method adopted in the related art has the problems of low efficiency, poor user experience and the like.
Disclosure of Invention
In order to solve the technical problems, the application provides a transaction outbound verification method, device, equipment and medium, which firstly adopt intelligent outbound verification, thereby being beneficial to improving the outbound verification efficiency, and simultaneously combine manual outbound verification on the basis of intelligent outbound verification, thereby being beneficial to improving the outbound verification accuracy.
The embodiment of the application discloses the following technical scheme:
in one aspect, embodiments of the present application provide a transaction outbound verification method, the method including:
in the process of carrying out the transaction, determining target information to be verified corresponding to the transaction;
calling an intelligent outbound module to perform intelligent outbound verification on the information to be verified of the target to obtain a first verification result;
Responding to a manual verification application initiated by a target user corresponding to the transaction, and calling a manual outbound module to perform manual outbound verification on the target information to be verified to obtain a second verification result;
and processing the transaction by using the first verification result and the second verification result.
In one possible implementation manner, the transaction includes a plurality of transactions, and the determining the target to-be-verified information corresponding to the transaction includes:
acquiring information to be verified corresponding to each of the plurality of transactions;
and merging the information to be verified, which corresponds to the transactions respectively, to obtain the target information to be verified.
In one possible implementation manner, the merging the information to be verified corresponding to each of the plurality of transactions to obtain the target information to be verified includes:
determining the transaction belonging to the same target user in the plurality of transactions as a first target transaction;
and merging the information to be verified corresponding to the first target transaction respectively to obtain target information to be verified corresponding to the same target user.
In one possible implementation manner, the merging the information to be verified corresponding to each of the plurality of transactions to obtain the target information to be verified includes:
Determining the transaction belonging to the same transaction type in the plurality of transactions as a second target transaction;
and merging the information to be verified corresponding to the second target transaction respectively to obtain target information to be verified corresponding to the same transaction type.
In one possible implementation, the processing the transaction using the first verification result and the second verification result includes:
respectively analyzing the first verification result and the second verification result to obtain verification results respectively corresponding to the plurality of transactions;
and processing each transaction in the plurality of transactions by utilizing the verification result corresponding to each transaction.
In one possible implementation manner, the calling the intelligent outbound module to perform intelligent outbound verification on the target information to be verified to obtain a first verification result includes:
in the process of intelligent outbound verification, the intelligent outbound module is utilized to complete intelligent outbound verification of first information to be verified in the target information to be verified, and the first verification result is obtained; the first verification result is used for indicating a verification result corresponding to the first information to be verified;
The manual outbound verification is carried out on the target information to be verified by calling a manual outbound module to obtain a second verification result, and the method comprises the following steps:
sending second information to be verified to the manual outbound module; the second information to be verified is information to be verified except the first information to be verified in the target information to be verified;
the manual outbound module is called to perform manual outbound verification on the second information to be verified, and the second verification result is obtained; the second verification result is used for indicating a verification result corresponding to the second information to be verified.
In one possible implementation, the target to-be-verified information includes user information of a target user corresponding to the transaction, account information of a target account corresponding to the transaction, and transaction information corresponding to the transaction.
In another aspect, an embodiment of the present application provides a transaction outbound verification device, including a determining unit, a verification unit, and a processing unit:
the determining unit is used for determining target information to be verified corresponding to the transaction in the process of carrying out the transaction;
the verification unit is used for calling an intelligent outbound module to perform intelligent outbound verification on the target information to be verified to obtain a first verification result;
The verification unit is further used for calling a manual outbound module to perform manual outbound verification on the target information to be verified in response to a manual verification application initiated by a target user corresponding to the transaction, so as to obtain a second verification result;
the processing unit is configured to process the transaction using the first verification result and the second verification result.
In a possible implementation, the transaction comprises a plurality of transactions, and the determining unit is further configured to:
acquiring information to be verified corresponding to each of the plurality of transactions;
and merging the information to be verified, which corresponds to the transactions respectively, to obtain the target information to be verified.
In a possible implementation, the determining unit is further configured to:
determining the transaction belonging to the same target user in the plurality of transactions as a first target transaction;
and merging the information to be verified corresponding to the first target transaction respectively to obtain target information to be verified corresponding to the same target user.
In a possible implementation, the determining unit is further configured to:
determining the transaction belonging to the same transaction type in the plurality of transactions as a second target transaction;
And merging the information to be verified corresponding to the second target transaction respectively to obtain target information to be verified corresponding to the same transaction type.
In a possible implementation, the determining unit is further configured to:
respectively analyzing the first verification result and the second verification result to obtain verification results respectively corresponding to the plurality of transactions;
and processing each transaction in the plurality of transactions by utilizing the verification result corresponding to each transaction.
In a possible implementation, the verification unit is further configured to:
in the process of intelligent outbound verification, the intelligent outbound module is utilized to complete intelligent outbound verification of first information to be verified in the target information to be verified, and the first verification result is obtained; the first verification result is used for indicating a verification result corresponding to the first information to be verified;
sending second information to be verified to the manual outbound module; the second information to be verified is information to be verified except the first information to be verified in the target information to be verified;
the manual outbound module is called to perform manual outbound verification on the second information to be verified, and the second verification result is obtained; the second verification result is used for indicating a verification result corresponding to the second information to be verified.
In one possible implementation, the target to-be-verified information includes user information of a target user corresponding to the transaction, account information of a target account corresponding to the transaction, and transaction information corresponding to the transaction.
In yet another aspect, embodiments of the present application provide a computer device comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the transaction outbound verification method of the above aspects according to instructions in the program code.
In yet another aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program for performing the transaction outbound verification method described in the above aspects.
According to the technical scheme, in the process of carrying out the transaction, the target information to be verified corresponding to the transaction can be determined first. Then, the intelligent outbound module can be called to carry out intelligent outbound verification on the target information to be verified to obtain a first verification node, and can be called to carry out manual outbound verification on the target information to be verified to obtain a second verification result in response to a manual verification application initiated by a target user corresponding to the transaction. Finally, the transaction may be processed using the first verification result and the second verification result. Therefore, the intelligent outbound verification is adopted firstly, so that the efficiency of the outbound verification is improved, and meanwhile, the artificial outbound verification is combined on the basis of the intelligent outbound verification, so that the accuracy of the outbound verification is improved. And the triggering time of the manual outbound verification in the application is the manual verification application actively initiated by the target user, so that the transaction outbound verification requirement of the target user can be better met, and the user experience is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the related art, the drawings that are required to be used in the embodiments or the related technical descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to the drawings without inventive effort for a person having ordinary skill in the art.
FIG. 1 is a flow chart of a transaction outbound verification method provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of a transaction outbound verification system according to an embodiment of the present application;
FIG. 3 is a flow chart of outbound verification for a single transaction provided in an embodiment of the present application;
FIG. 4 is a flow chart of outbound verification for multiple transactions provided in an embodiment of the present application;
fig. 5 is a block diagram of a transaction outbound verification device according to an embodiment of the present application.
Detailed Description
In order to make the present application solution better understood by those skilled in the art, the following description will clearly and completely describe the technical solution in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The transaction outbound verification method provided by the embodiment of the application can be implemented through computer equipment, wherein the computer equipment can be terminal equipment or a server, the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and a cloud server for providing cloud computing service. The terminal equipment comprises, but is not limited to, mobile phones, computers, intelligent voice interaction equipment, intelligent household appliances, vehicle-mounted terminals and the like. The terminal device and the server may be directly or indirectly connected through wired or wireless communication, which is not limited in this application.
It should be noted that, the transaction outbound verification method, device, equipment and medium provided by the application can be used in big data field or financial field. The foregoing is merely exemplary, and is not intended to limit the application of the present application to a method, apparatus, device, and medium for transaction outbound verification.
The following examples are provided to illustrate the invention:
fig. 1 is a flowchart of a transaction outbound verification method according to an embodiment of the present application, taking a server as an example of the foregoing computer device, where the method includes S101-S104:
S101: and in the process of carrying out the transaction, determining target information to be verified corresponding to the transaction.
In the process of conducting a transaction, target to-be-verified information corresponding to the transaction may be first determined. The target to-be-verified information may refer to relevant information that needs to be verified, which after being determined may be verified in order to guide subsequent processing of the transaction, etc.
In practical applications, the target information to be verified may include user information of a target user corresponding to the transaction, account information of a target account corresponding to the transaction, and transaction information corresponding to the transaction. The target user corresponding to the transaction may refer to a user initiating the transaction, the user information may refer to related information of a user dimension (such as information of a user name, etc.), the target account corresponding to the transaction may refer to a target account aimed at by the transaction, specifically may be a certain account under the target user name, and the transaction information corresponding to the transaction may refer to specific content of the transaction. For example: the target user is user A, the target account can be account a under the name of user A, and the transaction information can be account assets with transfer asset value B.
It should be noted that, the present application does not limit how to determine the target to be verified information corresponding to the transaction. For ease of understanding, embodiments of the present application provide the following two ways as examples:
In practical applications, the transaction process may be performed in a single transaction manner, that is, one process may be performed only for a single transaction. Thus, in one possible implementation, the relevant information to be verified corresponding to a single transaction may be directly determined as the target information to be verified. Based on this, verification can be performed for any one transaction.
In practical applications, the transaction process may be processed in a manner of parallel processing of multiple transactions, that is, one process may be performed for multiple transactions. It can be understood that each transaction corresponds to information to be verified, and in order to improve verification efficiency, in another possible implementation manner, the information to be verified corresponding to each transaction may be combined, and the combined information is used as information to be verified to perform subsequent verification. Based on this, the verification information corresponding to a plurality of transactions can be verified at one time, thereby improving the verification efficiency. In a specific implementation, the foregoing transaction may include a plurality of transactions, and the information to be verified corresponding to each of the plurality of transactions may be obtained first. And then, combining the information to be verified corresponding to the transactions respectively to obtain the target information to be verified. Based on the above, for the case of multiple transactions, the information to be verified corresponding to the multiple transactions can be combined together in a combining manner, so that in the subsequent verification, the verification of the information to be verified corresponding to the multiple transactions respectively can be completed by one verification, and the efficiency is higher.
In practical application, an outbound merging module can be developed and designed, and the outbound merging module is utilized to merge information to be verified, which corresponds to a plurality of transactions respectively.
It should be noted that, the embodiment of the present application does not limit how to combine the information to be verified corresponding to each of the plurality of transactions. For ease of understanding, the present embodiments provide the following two combinations as examples:
in practical applications, the transaction system of the bank is oriented to all users of the bank, so that in one process, multiple transactions may be initiated by multiple target users. In order to improve user experience, in one possible implementation manner, transactions of the same target user can be combined together, and based on the combination, the combination in the user dimension is realized, so that for any user's transaction, verification of all transactions of the user can be completed in one verification, multiple times of disturbing the user are not needed, and the user experience is improved. In the specific implementation, the transaction belonging to the same target user in the multiple transactions can be determined as a first target transaction, and then the information to be verified corresponding to the first target transaction respectively can be combined to obtain the target information to be verified corresponding to the same target user. Based on the information, the target information to be verified can be obtained through merging in the dimension of the user, so that verification of all transactions of one user can be completed at one time without disturbing the user for multiple times, and the user experience is improved.
In general, for any transaction, the information to be verified may generally include the user information of the target user, the account information of the target account, and the transaction information described above. It will be appreciated that for multiple transactions of the same target user, there may be repeated information to be verified, e.g. the user information is the same, so that when the user dimensions are combined, the user information may be deduplicated, and based on this, it is advantageous to save the outbound cost by removing repeated information to be verified. For example, for the group clients and the clients with larger transaction amount, the number of outbound times of a plurality of transactions can be effectively reduced by adopting a merging mode, the outbound time and the outbound cost can be correspondingly reduced, and meanwhile, the method is beneficial to improving the user experience and reducing the outbound cost.
In practice, the specific content (e.g., the details of the outbound call in real time) for verification may vary for transactions of different transaction types. Thus, in yet another possible implementation, transactions of the same transaction type may also be consolidated together, based on which consolidation in the transaction type dimension is achieved, so that verification of all transactions of any transaction type may be completed at one time for transactions of that transaction type, facilitating improved verification efficiency. In the specific implementation, the transaction belonging to the same transaction type in the multiple transactions can be determined as the second target transaction, and then the information to be verified corresponding to the second target transaction respectively can be combined to obtain the target information to be verified corresponding to the same transaction type. Based on the information, the target information to be verified can be obtained by combining the information in the dimension of the transaction type, so that verification of all transactions of the same transaction type can be completed at one time, and verification efficiency is improved. Meanwhile, by adopting a merging mode, the number of outbound times of a plurality of transactions can be effectively reduced, the outbound time and the outbound cost can be correspondingly reduced, and the outbound cost can be reduced.
S102: and calling an intelligent outbound module to perform intelligent outbound verification on the information to be verified of the target, and obtaining a first verification result.
S103: and responding to a manual verification application initiated by a target user corresponding to the transaction, calling a manual outbound module to perform manual outbound verification on the target information to be verified, and obtaining a second verification result.
After the target information to be verified is determined, an intelligent outbound module can be called to carry out intelligent outbound verification on the target information to be verified, and a first verification result is obtained. That is, the first verification result may be a result of intelligent outbound verification. And the manual outbound module is called to perform manual outbound verification on the target information to be verified in response to a manual verification application initiated by the target user corresponding to the transaction, so as to obtain a second verification result. That is, the second verification result may be a result of manual outbound verification. Firstly, intelligent outbound verification is adopted, so that the efficiency of outbound verification is improved, and meanwhile, artificial outbound verification is combined on the basis of intelligent outbound verification, so that the accuracy of outbound verification is improved. And the triggering time of the manual outbound verification in the application is the manual verification application actively initiated by the target user, and compared with the mode that the manual mode is switched into when the outbound verification fails in the related art, the method and the device can better meet the transaction outbound verification requirement of the target user, and are beneficial to improving the user experience.
It will be appreciated that outbound verification may refer to a process of conducting a dialogue with the target user prompting the target user to verify the target information to be verified. By adopting the method, the system and the device, an interactive mode is provided, based on which, the target user can actively apply for manual outbound verification, and at any moment of actual outbound verification, the target user can initiate a manual verification application at any time. Compared with the mode that the manual mode is switched to when the intelligent outbound cannot be processed, namely the outbound fails, adopted in the related art, the method and the device are beneficial to improving user experience.
It should be noted that, the present application is not limited in any way as to how to perform the intelligent outbound verification to obtain the first verification result and perform the manual outbound verification to obtain the second verification result. For ease of understanding, the present embodiments provide the following as examples:
in practical application, the intelligent outbound verification and the manual outbound verification can be respectively carried out on the target information to be verified, namely the target information to be verified needs to be verified in the two outbound verification processes. Based on the method, verification of the target information to be verified can be completed from two dimensions of intelligent outbound verification and manual outbound verification, and accuracy of verification results is improved.
In addition, in order to improve verification efficiency, verification of part of the information in the target information to be verified can be accomplished by using intelligent outbound verification and manual outbound verification, respectively. Specifically, in the implementation of S102, during the process of intelligent outbound verification, the intelligent outbound module may be utilized to complete intelligent outbound verification of the first to-be-verified information in the target to-be-verified information, so as to obtain a first verification node, and the first verification result obtained based on the first verification node may be used to indicate a verification result corresponding to the first to-be-verified information. In the implementation of S103, the second information to be verified may be first sent to the manual outbound module, where the second information to be verified is information to be verified except the first information to be verified in the target information to be verified. Then, the manual outbound module can be called to perform manual outbound verification on the second information to be verified, a second verification result is obtained, and the second verification result obtained based on the second verification result can be used for indicating a verification result corresponding to the second information to be verified. Based on the information, the first information to be verified is verified by intelligent outbound verification, and the second information to be verified is verified by manual outbound verification, so that the verification efficiency is improved.
In practical applications, the second information to be verified may refer to information related to the failure to complete verification in the intelligent outbound verification, that is, the second information to be verified may be the part of information that fails the intelligent outbound verification.
It should be noted that, the application is not limited in any way, for the process of calling the intelligent outbound module to perform intelligent outbound verification on the information to be verified, and the process of calling the manual outbound module to perform manual outbound verification on the information to be verified. For ease of understanding, the present embodiments provide the following as examples:
first, for the intelligent outbound procedure, the intelligent outbound module may be invoked. That is, the intelligent outbound module may be provided with intelligent outbound verification functionality, which may include outbound task receipt and queuing, task parsing, intelligent verification, verification result logging and return, and the like. Firstly, an outbound verification task request corresponding to the information to be verified can be received and analyzed, then a voice-text conversion module can be called to convert the information to be verified into a voice file, the voice call module is called to perform query verification of the voice file one by one on a target user, a voice file record in the verification process is stored, after the intelligent outbound is completed, the voice-text conversion module is called to convert the voice file into a text verification result, and the recorded text verification result is the first verification result.
Secondly, aiming at the manual outbound process, the manual outbound module is called to carry out. That is, the manual outbound module may be provided with a function of manual outbound verification, and specifically may include outbound task reception and queuing for target information to be verified, information review, manual verification, verification result recording and return, and the like. For example, the outbound verification task request combined by the outbound combining module may be received. And then, referring to the target information to be verified by the outbound personnel, calling the voice call module to perform query verification on the target information to be verified on the target user, storing the voice file record and the verification text result in the verification process, and generating the second verification result based on the recorded voice file and the verification text after the outbound is completed.
In practical application, the time for triggering the manual outbound verification can be automatically triggered when the intelligent outbound verification fails, besides the initiative of the target user, based on the time, the manual outbound verification can be automatically triggered once the intelligent outbound verification fails, so that the outbound verification of the information to be verified of the target can be orderly performed.
S104: the transaction is processed using the first verification result and the second verification result.
After the outbound verification is completed, the transaction may be processed using the first verification result and the second verification result. Based thereon, in order to complete the transaction. For example, if the first verification result and the second verification result both indicate that the target information to be verified is correct, indicating that the transaction is a normal transaction, at this time, subsequent processing of the transaction may be continued, for example, the transaction is a transfer transaction, and then subsequent transfer processing may be performed. Otherwise, if the first verification result and/or the second verification result indicate that the target information to be verified is abnormal, the transaction is indicated to be abnormal, and at this time, in order to ensure the safety of the asset and the like, the transaction can be interrupted, and early warning and the like can be performed on the transaction.
It should be noted that the present application is not limited in any way as to how the transaction is processed by the first verification result and the second verification result. For ease of understanding, embodiments of the present application are still exemplified by the foregoing transactions including a plurality of transactions, provided as examples in the following manner:
first, the first verification result and the second verification result can be respectively analyzed to obtain verification results respectively corresponding to a plurality of transactions. For any one transaction, the verification result corresponding to the transaction can be used for indicating whether the information to be verified corresponding to the transaction is correct or not. Then, for each of the plurality of transactions, each transaction may be processed using the verification result corresponding to each transaction. Based on the above, for the case of multiple transactions, after the verification of the multiple transactions is completed by one verification, each transaction can be subjected to subsequent processing by using the verification result corresponding to each transaction, so as to complete the multiple transactions.
According to the technical scheme, in the process of carrying out the transaction, the target information to be verified corresponding to the transaction can be determined first. Then, the intelligent outbound module can be called to carry out intelligent outbound verification on the target information to be verified to obtain a first verification node, and can be called to carry out manual outbound verification on the target information to be verified to obtain a second verification result in response to a manual verification application initiated by a target user corresponding to the transaction. Finally, the transaction may be processed using the first verification result and the second verification result. Therefore, the intelligent outbound verification is adopted firstly, so that the efficiency of the outbound verification is improved, and meanwhile, the artificial outbound verification is combined on the basis of the intelligent outbound verification, so that the accuracy of the outbound verification is improved. And the triggering time of the manual outbound verification in the application is the manual verification application actively initiated by the target user, so that the transaction outbound verification requirement of the target user can be better met, and the user experience is improved.
For ease of understanding, embodiments of the present application also provide an architectural diagram of a transaction outbound verification system, which may be seen in fig. 2. Fig. 2 shows a schematic architecture of a transaction outbound verification system, specifically:
And the interaction module can provide interaction access functions including interaction functions of a target user in the processes of transaction, intelligent outbound, manual outbound and the like in a transaction system of a bank.
The transaction system can provide transaction functions, for example, the target user can conduct transaction through the transaction system, and specifically can comprise user information of the target user corresponding to the transaction, account information of the target account corresponding to the transaction and transaction information corresponding to the transaction. Based on this, when the outbound verification is required (for example, when the transaction flow is executed to the link that the outbound verification is required), the target to-be-verified information can be obtained from the transaction system.
Outbound merging, a merging function may be provided. For example, the information to be verified corresponding to each of a plurality of transactions belonging to the same target user may be combined. Specifically, the combination can be realized by adopting a mode of integrating and packaging the information to be verified, which corresponds to the transactions respectively.
The intelligent outbound can provide the functions of intelligent outbound verification, and can comprise an outbound queue, task analysis, intelligent verification and verification results. Specifically, an outbound verification task request corresponding to the information to be verified can be received and analyzed, then the voice-text conversion module can be called to convert the information to be verified into a voice file, the voice call module is called to perform query verification of the voice file one by one on the target user, the voice file record in the verification process is stored, after the intelligent outbound is completed, the voice-text conversion module is called to convert the voice file into a text verification result, and the recorded text verification result is the first verification result.
The manual outbound can provide the function of manual outbound verification, and can comprise an outbound queue, information consulting, manual verification and verification results. Specifically, the outbound verification task request after the merging of the outbound merging modules is received may be received. And then, referring to the target information to be verified by the outbound personnel, calling the voice call module to perform query verification on the target information to be verified on the target user, storing the voice file record and the verification text result in the verification process, and generating the second verification result based on the recorded voice file and the verification text after the outbound is completed.
The voice call can be provided with a voice call function, so that the intelligent outbound module and the manual outbound module can call conveniently, and the voice call is carried out with a target client to complete outbound verification.
The voice-text conversion can provide the functions of converting voice into text and converting text into voice, and is convenient for recording and generating verification results.
And the log can provide the functions of log recording and viewing. Specifically, the condition of each outbound verification can be recorded in a log form, so that the method is convenient to check and trace back.
The basic resources can specifically comprise computing, storage, network and other resources, and can be used for supporting the implementation of the application, such as supporting the operation of the transaction system, supporting intelligent outbound, manual outbound and the like.
For a better understanding of the present application, embodiments of the present application will be further described with reference to the foregoing outbound verification for a single transaction and outbound verification for multiple transactions, respectively.
Specific:
outbound verification for a single transaction may be seen in fig. 3. Fig. 3 shows a flow chart of outbound verification for a single transaction, specifically, a transaction may be initiated (e.g., a transfer transaction initiated by a target user using the transaction system described above) first, followed by the transaction processing element described above (e.g., information filling, etc.), and then verification is triggered to initiate the outbound verification. When the outbound verification is performed, the intelligent outbound verification as shown in (1) in fig. 3 is preferably performed, and specifically, the intelligent outbound module is called to receive the outbound task and perform outbound queuing. If the queuing times out (such as the queuing times out caused by the unavailable resources, etc.), a timeout prompt message is returned and outbound verification is restarted. If the voice call is not overtime, the outbound verification is performed, the task information may be parsed first to determine the target information to be verified, then the target information to be verified may be processed by converting the information text to speech, the target information to be verified may be converted into speech information, then the speech call verification may be performed, for example, the speech call module is called to initiate the speech verification to the target user, after the call is ended, the recorded verification speech may be converted into text to obtain the corresponding text, and finally the verification result (for example, the first verification result may be generated and returned). To facilitate subsequent transaction processing sessions (e.g., for transfer transactions, the subsequent transaction processing session may be an asset transfer process). In addition, the manual outbound call as shown in (2) in fig. 3 can be performed, specifically, the manual outbound call module is called to receive the outbound call task and perform outbound call queuing. Queuing timeout (such as queuing timeout caused by resource unavailability, etc.), timeout prompt information is returned and outbound verification is reinitiated. If the voice call is not timed out, the outbound verification is performed, firstly, task information analysis is performed to determine target to be verified information to be verified, then voice call verification is performed, specifically, a voice call module is called to initiate voice verification to a target user, an outbound person refers to the analyzed target to be verified information, inquires the target user, records a verification result, and finally a verification result (such as the second verification result) can be generated and returned. So as to facilitate the subsequent transaction processing link. Finally, after the transaction is completed, the transaction may be performed.
Outbound verification for multiple transactions may be seen in fig. 4. Fig. 4 shows a flow chart of outbound verification for multiple transactions, specifically, for example, N transactions initiated by multiple transactions including scenario 1, scenario 2, and scenario N (N is an integer greater than 1). First, for each transaction, a transaction pre-processing link may be first performed. For example, for the transaction initiated in scenario 1, a scenario 1 transaction pre-processing link may be performed, for the transaction initiated in scenario 2, a scenario 2 transaction pre-processing link may be performed, … …, for the transaction initiated in scenario N, a scenario N transaction pre-processing link may be performed. The verification may then be triggered, which may include trigger verification 1, trigger verification 2, … …, and trigger verification N, and may correspondingly receive information to be verified corresponding to each transaction, which may include user information, account information, and transaction information. And then, for a plurality of transactions under the same client, if the fact that a plurality of transactions exist under the same client is determined, integrating information to be verified of the plurality of transactions under the client, and then performing verification outbound packaging. If it is determined that there are no more than one transaction under the same customer, the individual transactions of the customer are verified and outbound packaged. Subsequently, outbound verification may be initiated. When the outbound verification is performed, the intelligent outbound verification as shown in (1) in fig. 4 is preferably performed, and specifically, the intelligent outbound module is called to receive the outbound task and perform outbound queuing. If the queuing times out (such as the queuing times out caused by the unavailable resources, etc.), a timeout prompt message is returned and outbound verification is restarted. If the voice call is not overtime, the outbound verification is performed, the task information may be parsed first to determine the target information to be verified, then the target information to be verified may be processed by converting the information text to speech, the target information to be verified may be converted into speech information, then the speech call verification may be performed, for example, the speech call module is called to initiate the speech verification to the target user, after the call is ended, the recorded verification speech may be converted into text to obtain the corresponding text, and finally the verification result (for example, the first verification result may be generated and returned). . In addition, the manual outbound call as shown in (2) in fig. 4 can be performed, specifically, the manual outbound call module is called to receive the outbound call task and perform outbound call queuing. Queuing timeout (such as queuing timeout caused by resource unavailability, etc.), timeout prompt information is returned and outbound verification is reinitiated. If the voice call is not timed out, the outbound verification is performed, firstly, task information analysis is performed to determine target to be verified information to be verified, then voice call verification is performed, specifically, a voice call module is called to initiate voice verification to a target user, an outbound person refers to the analyzed target to be verified information, inquires the target user, records a verification result, and finally a verification result (such as the second verification result) can be generated and returned. In practical application, after the verification result is obtained, the verification result obtained by intelligent outbound and the verification result obtained by manual outbound can be analyzed and returned to the transaction system, so that the transaction system can obtain the verification result for each transaction. Finally, for the transaction initiated by scenario 1, a scenario 1 subsequent transaction processing link may be performed, then the scenario 1 transaction is executed to end, for the transaction initiated by scenario 2, a scenario 2 subsequent transaction processing link may be performed, then the scenario 2 transaction is executed to end, … …, for the transaction initiated by scenario N, a scenario N subsequent transaction processing link may be performed, and then the scenario N transaction is executed to end.
It is to be understood that this corresponds substantially to the method embodiments, so that reference is made to the partial description of the method embodiments for relevant reasons.
Fig. 5 is a block diagram of a transaction outbound verification device according to an embodiment of the present application, where the device includes a determining unit 501, a verification unit 502, and a processing unit 503:
the determining unit 501 is configured to determine, during a transaction, target information to be verified corresponding to the transaction;
the verification unit 502 is configured to invoke an intelligent outbound module to perform intelligent outbound verification on the target information to be verified, so as to obtain a first verification result;
the verification unit 502 is further configured to, in response to a manual verification application initiated by a target user corresponding to the transaction, invoke a manual outbound module to perform manual outbound verification on the target information to be verified, and obtain a second verification result;
the processing unit 503 is configured to process the transaction using the first verification result and the second verification result.
In a possible implementation, the transaction comprises a plurality of transactions, and the determining unit is further configured to:
acquiring information to be verified corresponding to each of the plurality of transactions;
and merging the information to be verified, which corresponds to the transactions respectively, to obtain the target information to be verified.
In a possible implementation, the determining unit is further configured to:
determining the transaction belonging to the same target user in the plurality of transactions as a first target transaction;
and merging the information to be verified corresponding to the first target transaction respectively to obtain target information to be verified corresponding to the same target user.
In a possible implementation, the determining unit is further configured to:
determining the transaction belonging to the same transaction type in the plurality of transactions as a second target transaction;
and merging the information to be verified corresponding to the second target transaction respectively to obtain target information to be verified corresponding to the same transaction type.
In a possible implementation, the determining unit is further configured to:
respectively analyzing the first verification result and the second verification result to obtain verification results respectively corresponding to the plurality of transactions;
and processing each transaction in the plurality of transactions by utilizing the verification result corresponding to each transaction.
In a possible implementation, the verification unit is further configured to:
in the process of intelligent outbound verification, the intelligent outbound module is utilized to complete intelligent outbound verification of first information to be verified in the target information to be verified, and the first verification result is obtained; the first verification result is used for indicating a verification result corresponding to the first information to be verified;
Sending second information to be verified to the manual outbound module; the second information to be verified is information to be verified except the first information to be verified in the target information to be verified;
the manual outbound module is called to perform manual outbound verification on the second information to be verified, and the second verification result is obtained; the second verification result is used for indicating a verification result corresponding to the second information to be verified.
In one possible implementation, the target to-be-verified information includes user information of a target user corresponding to the transaction, account information of a target account corresponding to the transaction, and transaction information corresponding to the transaction.
According to the technical scheme, in the process of carrying out the transaction, the target information to be verified corresponding to the transaction can be determined first. Then, the intelligent outbound module can be called to carry out intelligent outbound verification on the target information to be verified to obtain a first verification node, and can be called to carry out manual outbound verification on the target information to be verified to obtain a second verification result in response to a manual verification application initiated by a target user corresponding to the transaction. Finally, the transaction may be processed using the first verification result and the second verification result. Therefore, the intelligent outbound verification is adopted firstly, so that the efficiency of the outbound verification is improved, and meanwhile, the artificial outbound verification is combined on the basis of the intelligent outbound verification, so that the accuracy of the outbound verification is improved. And the triggering time of the manual outbound verification in the application is the manual verification application actively initiated by the target user, so that the transaction outbound verification requirement of the target user can be better met, and the user experience is improved.
In yet another aspect, embodiments of the present application provide a computer device comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the transaction outbound verification method provided in the foregoing embodiments according to instructions in the program code.
The computer device may comprise a terminal device or a server, in which the aforementioned transaction outbound verification means may be arranged.
In yet another aspect, the present application further provides a storage medium, where the storage medium is used to store a computer program, where the computer program is used to execute the transaction outbound verification method provided in the foregoing embodiment.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, where the above program may be stored in a computer readable storage medium, and when the program is executed, the program performs steps including the above method embodiments; and the aforementioned storage medium may be at least one of the following media: read-only Memory (ROM), RAM, magnetic disk or optical disk, etc.
For the device embodiments, reference is made to the description of the method embodiments for the relevant points, since they essentially correspond to the method embodiments. The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
It should be noted that in this document, relational terms such as "first" and "second", and the like, if any, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing has outlined some of the more detailed description of the method, apparatus, device and medium for transaction outbound verification in accordance with the embodiments of the present application, wherein specific examples have been provided herein to illustrate the principles and implementations of the present application, and wherein the above examples are provided to assist in the understanding of the methods of the present application. Also, as will be apparent to one of ordinary skill in the art, there are variations in the specific embodiments and the scope of the application of the method according to the present application.
In view of the foregoing, the disclosure should not be construed as limiting the application, and any changes or substitutions that would be easily recognized by those skilled in the art within the technical scope of the disclosure of the present application are intended to be encompassed within the scope of the present application. Further combinations of the implementations provided in the above aspects may be made to provide further implementations.

Claims (10)

1. A transaction outbound verification method, the method comprising:
in the process of carrying out the transaction, determining target information to be verified corresponding to the transaction;
calling an intelligent outbound module to perform intelligent outbound verification on the information to be verified of the target to obtain a first verification result;
Responding to a manual verification application initiated by a target user corresponding to the transaction, and calling a manual outbound module to perform manual outbound verification on the target information to be verified to obtain a second verification result;
and processing the transaction by using the first verification result and the second verification result.
2. The method of claim 1, wherein the transaction comprises a plurality of transactions, and the determining target to-be-verified information corresponding to the transactions comprises:
acquiring information to be verified corresponding to each of the plurality of transactions;
and merging the information to be verified, which corresponds to the transactions respectively, to obtain the target information to be verified.
3. The method according to claim 2, wherein the merging the information to be verified corresponding to the plurality of transactions respectively to obtain the target information to be verified includes:
determining the transaction belonging to the same target user in the plurality of transactions as a first target transaction;
and merging the information to be verified corresponding to the first target transaction respectively to obtain target information to be verified corresponding to the same target user.
4. The method according to claim 2, wherein the merging the information to be verified corresponding to the plurality of transactions respectively to obtain the target information to be verified includes:
Determining the transaction belonging to the same transaction type in the plurality of transactions as a second target transaction;
and merging the information to be verified corresponding to the second target transaction respectively to obtain target information to be verified corresponding to the same transaction type.
5. The method of claim 2, wherein said processing said transaction using said first verification result and said second verification result comprises:
respectively analyzing the first verification result and the second verification result to obtain verification results respectively corresponding to the plurality of transactions;
and processing each transaction in the plurality of transactions by utilizing the verification result corresponding to each transaction.
6. The method of claim 1, wherein the calling the intelligent outbound module to perform intelligent outbound verification on the target information to be verified to obtain a first verification result comprises:
in the process of intelligent outbound verification, the intelligent outbound module is utilized to complete intelligent outbound verification of first information to be verified in the target information to be verified, and the first verification result is obtained; the first verification result is used for indicating a verification result corresponding to the first information to be verified;
The manual outbound verification is carried out on the target information to be verified by calling a manual outbound module to obtain a second verification result, and the method comprises the following steps:
sending second information to be verified to the manual outbound module; the second information to be verified is information to be verified except the first information to be verified in the target information to be verified;
the manual outbound module is called to perform manual outbound verification on the second information to be verified, and the second verification result is obtained; the second verification result is used for indicating a verification result corresponding to the second information to be verified.
7. The method of claim 1, wherein the target to-be-verified information includes user information of a target user corresponding to the transaction, account information of a target account corresponding to the transaction, and transaction information corresponding to the transaction.
8. A transaction outbound verification device, the device comprising a determination unit, a verification unit, and a processing unit:
the determining unit is used for determining target information to be verified corresponding to the transaction in the process of carrying out the transaction;
the verification unit is used for calling an intelligent outbound module to perform intelligent outbound verification on the target information to be verified to obtain a first verification result;
The verification unit is further used for calling a manual outbound module to perform manual outbound verification on the target information to be verified in response to a manual verification application initiated by a target user corresponding to the transaction, so as to obtain a second verification result;
the processing unit is configured to process the transaction using the first verification result and the second verification result.
9. A computer device, the computer device comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the method of any of claims 1-7 according to instructions in the program code.
10. A computer readable storage medium, characterized in that the computer readable storage medium is for storing a computer program for executing the method of any one of claims 1-7.
CN202311212318.1A 2023-09-19 2023-09-19 Transaction outbound verification method, device, equipment and medium Pending CN117273742A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311212318.1A CN117273742A (en) 2023-09-19 2023-09-19 Transaction outbound verification method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311212318.1A CN117273742A (en) 2023-09-19 2023-09-19 Transaction outbound verification method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN117273742A true CN117273742A (en) 2023-12-22

Family

ID=89220758

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311212318.1A Pending CN117273742A (en) 2023-09-19 2023-09-19 Transaction outbound verification method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN117273742A (en)

Similar Documents

Publication Publication Date Title
CN110740103A (en) Service request processing method and device, computer equipment and storage medium
CN112163946A (en) Accounting processing method and device based on distributed transaction system
CN112446786A (en) Abnormal transaction processing method and device, electronic equipment and readable storage medium
CN113673978A (en) Transaction method, system, computer device and storage medium based on SWIFT system
CN111415146A (en) Resource data processing method, device and equipment
CN106612263B (en) Method and equipment for processing application access request
CN110083694A (en) A kind of electrical network business integrated approach, device and memory based on webhook
CN105184559A (en) System and method for payment
CN110233843B (en) User request processing method and device
KR101270760B1 (en) System and method of managing automatic withdrawal
CN110689442A (en) Method and system for underwriting
CN117273742A (en) Transaction outbound verification method, device, equipment and medium
CN111414567A (en) Data processing method and device
CN109492034A (en) Batch processing system, method, apparatus and storage medium
CN115168203A (en) Interface simulation method, device, system, computer equipment and storage medium
CN117407388A (en) Idempotent control method and device and electronic equipment
CN114428723A (en) Test system, system test method, related device and storage medium
CN111415245A (en) Account opening method and device
CN110942298A (en) Payment data transmission control method and device, electronic equipment and storage medium
CN116132248B (en) Information pushing method and computer readable storage medium
CN111242592B (en) Resource transfer detection method, device, server and computer readable storage medium
CN112037796B (en) Data processing method, device, equipment and medium
CN115311076A (en) Method and system for returning housing loan in advance based on block chain technology and 5G message
CN116418873A (en) Service processing method and device and electronic equipment
CN116760928A (en) Incoming call reason analysis method, system and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination