CN111476659A - Business data processing method, system, component, computing device and storage medium - Google Patents

Business data processing method, system, component, computing device and storage medium Download PDF

Info

Publication number
CN111476659A
CN111476659A CN202010286149.6A CN202010286149A CN111476659A CN 111476659 A CN111476659 A CN 111476659A CN 202010286149 A CN202010286149 A CN 202010286149A CN 111476659 A CN111476659 A CN 111476659A
Authority
CN
China
Prior art keywords
verification
point
check
component
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010286149.6A
Other languages
Chinese (zh)
Other versions
CN111476659B (en
Inventor
吕功建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang eCommerce Bank Co Ltd
Original Assignee
Zhejiang eCommerce Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang eCommerce Bank Co Ltd filed Critical Zhejiang eCommerce Bank Co Ltd
Priority to CN202010286149.6A priority Critical patent/CN111476659B/en
Publication of CN111476659A publication Critical patent/CN111476659A/en
Application granted granted Critical
Publication of CN111476659B publication Critical patent/CN111476659B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Debugging And Monitoring (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

One or more embodiments of the present specification provide a business data processing method, a business data processing system, a computing device, and a computer-readable storage medium. The method is applied to a checking system, the checking system is used for pre-configuring a first component in a business system, and the method comprises the following steps: generating the check-to-point configuration information of the service system; sending the point-to-point configuration information to a first component; and the first component determines the verification point in the service system according to the verification point configuration information. By implementing the scheme of the embodiment of the specification, the invasion to the service system is weakened, the influence on the service system is reduced, and the working stability of the service system and the correctness of the original service are improved; meanwhile, the verification points can be flexibly configured outside the service system through the verification system to carry out subsequent verification processing, so that the verification points can be flexibly arranged for verification, and the verification flexibility is good.

Description

Business data processing method, system, component, computing device and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method for processing service data. The present specification also relates to a business data processing system, a first component, a computing device and a computer readable storage medium.
Background
With the development of internet technology, financial institutions and third party transaction platforms are becoming more and more diversified, so that transaction business data between financial institutions or between a third party transaction platform and a financial institution needs to be checked in real time or regularly to ensure correctness of business flow and financial statement.
In the related art, the check code is added to the transaction service system to check the service data, and the check code is released to be on-line along with the service system. However, the existing implementation mode has at least the following problems: the check code is coupled in the service system, so that the code is invaded strongly; the checking codes have certain risks and may affect a service system; the check code is released online along with the service system, cannot be dynamically adjusted, and has poor check flexibility.
Disclosure of Invention
In view of this, embodiments of the present specification provide a method for processing service data. The embodiment of the present specification also relates to a business data processing system, a first component, a computing device and a computer readable storage medium, so as to solve the technical defects existing in the prior art.
According to a first aspect of embodiments of the present specification, a business data processing method is provided, where the method is applied to a first system, and the first system configures a first component in a second system in advance; the method comprises the following steps:
the first system generates the verification point configuration information of the second system;
the first system sends the point-to-point configuration information to the first component;
the first component determines the verification point in the second system according to the verification point configuration information.
In one embodiment of the present specification, the step of the first system generating the peer-to-peer configuration information of the second system includes:
and generating the verification point configuration information according to the verification requirement information of the second system, wherein the verification point configuration information at least comprises the unique identification of the verification point and the service scene information to which the verification point associated with the unique identification belongs.
In an embodiment of the present specification, the step of determining, by the first component, the verification point in the second system according to the verification point configuration information includes:
and the first component determines one or more corresponding verification points in the second system according to the service scene information to which the verification points belong.
In one embodiment of the present specification, the service scenario information includes at least one piece of check-to-point location information;
the step that the first component determines one or more corresponding verification points in the second system according to the service scene information to which the verification points belong comprises the following steps:
and determining one or more corresponding verification points in the second system according to the at least one verification point position information.
In one embodiment of the present specification, the method further includes:
the first system receiving a reconciliation data stream obtained by the first component from the reconciliation point;
the first system collates the collation data stream to generate a collation result.
In one embodiment of the present specification, the method further includes:
the first system determining whether the checking result is abnormal;
throwing an exception notification to the second system in response to determining that the check result is an exception, so as to enable the second system to fuse a currently processed service; or
And sending out alarm prompt information in response to the fact that the checking result is determined to be abnormal.
In one embodiment of the present description, the first system includes a second component configured within the first system;
the step of the first system receiving a reconciliation data stream obtained by the first component from the reconciliation point comprises: receiving, by the second component, the collation data stream.
In one embodiment of the present specification, the core-to-core data stream of core-to-core points contains a unique identification of core-to-core points; the step of the first system collating the collated data stream to generate a collation result includes:
the second component inquires and determines a checking module corresponding to the checking point according to the unique identification of the checking point and a preset mapping table; the preset mapping table comprises a mapping relation between the unique identification of at least one check point and at least one corresponding check module;
and the second component forwards the check data stream to the determined check module so that the determined check module performs real-time check or delay check on the check data stream and outputs a check result.
In one embodiment of the present specification, the method further includes:
and when the second component does not inquire a check module corresponding to the check point according to the unique identification of the check point and a preset mapping table, writing and generating the check module matched with the check point so as to check the check data stream through the generated check module and output a check result.
In one embodiment of the present specification, the method further includes:
determining a service scene corresponding to the verification point according to the unique identification of the verification point contained in the verification data stream of the verification point;
judging whether the service scene is in a preset service scene list or not;
responding to the service scene in a preset service scene list, and checking the check data stream to generate a check result;
responding to the fact that the service scene is not in a preset service scene list, and sending a notification message to the first component through the second component; the notification message is used to instruct the first component to obtain a preset percentage of reconciliation data flow from reconciliation points configured in the second system.
According to a second aspect of embodiments of the present specification, there is provided a business data processing system including a configuration information generation unit, a configuration information processing unit, and a first component; wherein:
the configuration information generating unit is used for generating the verification point configuration information of the second system;
the configuration information processing unit is used for sending the check-to-point configuration information to the first component;
the first component is configured in the second system in advance and used for determining the verification point in the second system according to the verification point configuration information.
According to a third aspect of the embodiments of the present specification, there is provided a business data processing method applied to a first component pre-configured to a second system via a first system; the method comprises the following steps:
receiving the point-to-point configuration information of the second system generated by the first system;
and determining the verification point in the second system according to the verification point configuration information.
In one embodiment of the present specification, the collation requirement information of the second system is generated as collation requirement information of the second system; the configuration information of the core-to-core points at least comprises the unique identification of the core-to-core points and the business scene information which the core-to-core points related to the unique identification belong to.
In an embodiment of the present specification, the step of determining, in the second system, the peer-to-peer according to the peer-to-peer configuration information includes:
and determining one or more corresponding verification points in the second system according to the service scene information to which the verification points belong.
In one embodiment of the present specification, the service scenario information includes at least one piece of check-to-point location information; the step of determining one or more corresponding verification points in the second system according to the service scenario information to which the verification points belong includes:
and determining one or more corresponding verification points in the second system according to the at least one verification point position information.
According to a fourth aspect of embodiments herein, there is provided a first component, the first component being pre-configured in a second system via the first system; the first assembly includes:
a receiving unit, configured to receive the generated peer-to-peer configuration information of the second system by the first system;
and the determining unit is used for determining the verification point in the second system according to the verification point configuration information.
According to a fifth aspect of embodiments herein, there is provided a computing device comprising:
a memory and a processor;
the memory is used for storing computer-executable instructions, and the processor is used for executing the computer-executable instructions to implement the steps of the business data processing method in any one of the above embodiments.
According to a sixth aspect of the embodiments of the present specification, there is provided a computer-readable storage medium storing computer-executable instructions, which when executed by a processor, implement the steps of the business data processing method in any one of the above embodiments.
In the service data processing method, the system, the component, and the like provided in one or more embodiments of the present specification, a first system generates the peer-to-peer configuration information of a second system, the first system sends the peer-to-peer configuration information to a first component preset in the second system, and the first component determines a peer-to-peer in the second system according to the peer-to-peer configuration information. In this embodiment, the first component is arranged in the second system to determine the check point, and the check code is not added to the second system to directly check, so as to reduce the amount of check code added to the second system, reduce or even completely avoid the intrusion of the check code to the second system, reduce the influence on the second system, and improve the working stability and the service correctness of the second system. Meanwhile, the check points can be flexibly configured outside the second system through the first system to carry out subsequent check processing, so that the check points can be flexibly arranged for checking, and the check flexibility is good.
Drawings
Fig. 1 is a flowchart of a service data processing method provided in an embodiment of the present specification;
FIG. 2 is a schematic diagram of a business process checking system architecture provided by an embodiment of the present disclosure;
fig. 3 is a flowchart of a service data processing method provided in an embodiment of the present specification;
fig. 4 is a flowchart of a service data processing method provided in an embodiment of the present specification;
fig. 5 is a flowchart of a service data checking method provided in an embodiment of the present specification;
fig. 6 is a flowchart of a service data processing method provided in an embodiment of the present specification;
FIG. 7 is a schematic diagram of a business system data collation processing system provided by an embodiment of the present specification;
FIG. 8 is a block diagram of a business data processing system provided in an embodiment of the present specification;
FIG. 9 is a schematic diagram of a first assembly according to an embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of a computing device provided in an embodiment of the present specification.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present description. This description may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein, as those skilled in the art will be able to make and use the present disclosure without departing from the spirit and scope of the present disclosure.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It will be understood that, although the terms first, second, etc. may be used herein in one or more embodiments to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first can also be referred to as a second and, similarly, a second can also be referred to as a first without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
First, the noun terms to which one or more embodiments of the present invention relate are explained.
Assembly of: the components are simple packages of data and methods, have relatively independent functions, can be independently deployed, and can be assembled into software entities.
In the present specification, a business data processing method is provided, and the present specification simultaneously relates to a business data processing system, a first component, a computing device, and a computer-readable storage medium, which are described in detail one by one in the following embodiments.
Fig. 1 shows a flowchart of a business data processing method provided according to an embodiment of the present specification, which can be applied to the first system 10, i.e., can be executed by the first system 10, with reference to the schematic diagram of the business processing checking system architecture shown in fig. 2. The first system 10 pre-configures a first component 101 in a second system 20; the method may include steps S102 to S106.
Step S102: the first system generates point-to-point configuration information for the second system.
Step S104: the first system sends the point-to-point configuration information to the first component.
Step S106: the first component determines the verification point in the second system according to the verification point configuration information.
Specifically, in one embodiment of the present disclosure, the first system 10 may be a verification system for verifying business data, and the second system 20 may be a transaction business system, such as a third party payment platform system. The first system 10 is used to collate the traffic data of the second system 20. The verification point may be a position between adjacent business process steps when the second system 20 performs business processing, but is not limited thereto. The first component 101 is attributed to the first system 10 and has a relatively independent function for performing a corresponding independent function under the control of the first system 10. This function in this embodiment may include, but is not limited to, determining a checkpoint and subsequently obtaining a traffic data stream from a checkpoint replication.
In this embodiment, the second system 20 is directly checked without adding a check code, so as to reduce the amount of the check code added in the second system 20, reduce or even completely avoid the intrusion of the check code to the second system 20, reduce the influence on the second system 20, and improve the working stability and the service correctness of the second system 20. Meanwhile, the verification points can be flexibly configured outside the second system 20 through the first system 10 for subsequent verification processing, so that the verification points can be flexibly arranged for verification, and the verification flexibility is good.
In an embodiment of this specification, the step of generating, by the first system 10, the peer-to-peer configuration information of the second system 20 may specifically include: generating the verification point configuration information according to the verification requirement information of the second system 20, where the verification point configuration information at least includes the unique identifier of the verification point and the service scenario information to which the verification point associated with the unique identifier belongs.
For example, the checking requirement information may be customized in advance, but is not limited thereto. Specifically, the second system may be a third-party payment platform system, which relates to more service scenarios, the service scenario information may be a scenario name, such as a service scenario a, a service scenario B, a service scenario C, and the like, and the checking requirement information of different service scenarios may be different. Therefore, checking requirement information can be preset respectively for a service scene A, a service scene B, a service scene C and the like, and the checking requirement information is used for representing the service scene needing to be checked and corresponding checking points. Thus, during the checking, the first system 10 may generate the configuration information of the check point according to the checking requirement information, where the configuration information of the check point may include the unique identifier of the check point and the service scenario information to which the check point associated with the unique identifier belongs, for example, service scenario information such as a service scenario a, a service scenario B, and a service scenario C, and the unique identifier of the check point under each associated service scenario, such as a unique code. The unique identifier of the verification point can identify different service scenarios to which the verification point belongs differently, and the unique identifier of the verification point can be encapsulated in the verification data stream obtained from the verification point subsequently, so that the first system 10, i.e., the verification system, can identify the service scenario to which the received verification data stream belongs.
Optionally, in an embodiment of the present specification, the step of determining, by the first component 101, the peer to peer in the second system 20 according to the peer to peer configuration information may specifically include: the first component 101 determines one or more corresponding verification points in the second system 20 according to the service scenario information to which the verification points belong.
Specifically, in an embodiment of the present specification, the service scenario information may include at least one piece of point-to-point location information. The verification point position information is used for representing the specific position of the corresponding verification point in a plurality of service flow steps during service data processing under the service scene. The step of determining, by the first component 101, one or more corresponding verification points in the second system 20 according to the service scenario information to which the verification point belongs may specifically include: and determining one or more corresponding verification points in the second system 20 according to the at least one verification point position information.
It can be understood that, in a service scenario, data of more than one verification point may need to be verified in a service flow during service data processing, and therefore, when data at one or more verification points need to be verified, a specific position of the corresponding one or more verification points can be conveniently determined by verifying point position information. Therefore, the check data streams can be respectively acquired from the specific positions of the plurality of check points subsequently, and the check efficiency is improved.
Fig. 3 is a flowchart illustrating a business data processing method provided in an embodiment of the present specification, where the processing method may include steps S302 to S310:
step S302: the first system generates point-to-point configuration information for the second system.
Step S304: the first system sends the point-to-point configuration information to the first component.
Step S306: the first component determines the verification point in the second system according to the verification point configuration information.
Step S308: the first system receives a reconciliation data stream obtained by the first component from the reconciliation point.
Step S310: the first system collates the collation data stream to generate a collation result.
In steps S302 to S306, reference may be made to the corresponding description of steps S102 to S106 in the foregoing method embodiment, which is not described herein again.
In step S308, the first system 10 receives a verification data stream obtained by the first component 101 from the verification point. In this embodiment, referring to fig. 7, the check data stream acquired by the first component 101 from the check point P is a service data stream at a position between the service flow step 1 and the adjacent service flow step 2 in the duplicated service system 70, and does not substantially affect the second system, i.e., the service system 70. The traffic data stream may comprise, for example, transaction flow billing data and the like.
In step S310, the first system 10 checks the check data stream to generate a check result. I.e., the data reconciliation is performed by a second system 20, e.g., first system 10, outside of business system 70. It can be seen that, in the embodiment, the first component 101 is arranged in the second system 20 to determine the check point and obtain the check data, the check code is not added to the second system 20 for direct check, but the check data is obtained and then checked by the first system 10 outside the second system 20, so as to reduce the amount of the check code added to the second system 20, reduce the intrusion of the check code to the second system 20, reduce the influence on the second system 20, improve the working stability and the original service correctness of the second system 20, and make the second system 20, such as a service system, simpler. Meanwhile, the verification points can be flexibly configured outside the second system 20 through the first system 10 for subsequent verification processing, so that the verification points can be flexibly arranged for verification, and the verification flexibility is good.
Optionally, in an embodiment of the present specification, referring to fig. 4 in combination, after step S310, the processing method further includes the following steps S312 and S314:
step S312: the first system determines whether the collation result is abnormal.
Specifically, the check data stream acquired by the first component 101 may include, for example, transaction running bill data, and when checking, balance data and consumption amount before and after consumption of a user account in a bill may be checked to determine whether calculation of the transaction data is wrong, if so, it is determined that a check result is abnormal, and if so, it is determined that a check result is normal.
Step S314: and throwing an exception notice to the second system in response to determining that the check result is an exception so as to enable the second system to blow the current processing service.
Specifically, when it is determined that the check result is abnormal, the first system 10 throws an abnormal notification to the second system 20, for example, the abnormal notification may be fed back to the second system 20 by the second component 20 and the first component 10. Thus, the abnormality can be recognized and thrown out in time, the second system 20, such as a service system, can sense the abnormality and immediately and actively melt the current service, where the melting indicates that the system prevents the service system from continuing to execute the service flow through the abnormal throwing, so as to facilitate the implementation of subsequent remedial measures such as checking.
Optionally, in another embodiment of the present specification, the processing method further includes: and sending out alarm prompt information in response to the fact that the checking result is determined to be abnormal.
Specifically, when the check result is determined to be abnormal, an alarm prompt message is sent out to remind related personnel of paying attention. The alarm prompt information is used for prompting the second system 20 such as a service system only without stopping the continuous operation of the service system aiming at the prompt when the acceptable abnormality occurs in some service scenes, so as to improve the fault tolerance of the system.
In one embodiment of the present description, the first system 10 includes a second component 102 configured within the first system 10. Correspondingly, in step S308, the step of receiving, by the first system 10, the verification data stream acquired by the first component 101 from the verification point may specifically include: the reconciliation data stream is received by the second component 102. In this embodiment, the second component 102 may be a general collation component, and is used as an interface to collectively manage and distribute the collation data stream from the first component 101, so that the data processing efficiency of the first system 10 can be improved.
In one embodiment of the present specification, the core-to-core data stream of core-to-core points contains a unique identification of core-to-core points. Fig. 5 is a flowchart illustrating a business data checking method in an embodiment of the present specification, and describes step S310 in detail. Step S310, which is a step of the first system 10 performing the collation on the collation data stream to generate the collation result, may specifically include the following steps S3101 to S3103:
step S3101: the second component inquires and determines a checking module corresponding to the checking point according to the unique identification of the checking point and a preset mapping table; the preset mapping table comprises a mapping relation between the unique identification of at least one check point and at least one corresponding check module.
Illustratively, as shown in table 1 below, the reconciliation data stream received by the second component 102, for example, containing the unique identification 001 of the reconciliation point, may indicate that the reconciliation data stream is from a service scenario a in the second system 20, e.g., a service system, and the corresponding reconciliation module is the first reconciliation module, e.g., reconciliation module a shown in fig. 6.
TABLE 1
Unique identification of verification point Belonging service scene Correspondence checking module
001 Business scenario A First checking module
002 Business scenario B Second checking module
003 Business scenario C Third checking module
004 Business scenario D Fourth checking module
Step 3102: and the second component forwards the check data stream to the determined check module so that the determined check module performs real-time check or delay check on the check data stream and outputs a check result.
Specifically, after the checking module a is determined, the current checking data stream may be sent to the checking module a for checking. In the present embodiment, a plurality of collation modules may be provided, and fig. 7 exemplarily shows collation module a, collation module B, collation module C, and the number of collation modules is not limited thereto. In one example, processing logics of different checking modules can be different, so as to correspondingly process data checking under different service scenes, and thus, processing can be performed in a targeted manner, and the data checking processing efficiency is improved. The collation system in this embodiment has a host application of hot deployment, which carries the collation module. The checking module is a place for really realizing the checking capability and can be dynamically deployed into the checking system in real time. In addition, real-time checking or delay checking can be performed, dependence of a second system 20 such as a service system on a first system 10 such as a checking system can be avoided through asynchronization, performance of the service system is not affected basically, and correctness of original service of the service system is guaranteed.
In one embodiment of the present specification, the processing method further includes the following step S3103:
step S3103: and when the second component does not inquire a check module corresponding to the check point according to the unique identification of the check point and a preset mapping table, writing and generating the check module matched with the check point so as to check the check data stream through the generated check module and output a check result.
It can be understood that, in this embodiment, the checking module may be written by user, and after the checking module writes and checks specific contents, the checking module may be issued to the checking system in real time, so as to implement flexible checking of service data.
In this exemplary embodiment, a checking system capable of real-time hot deployment of a checking module, that is, the first system 10, may be implemented, and the first component 101 may be embedded in the second system 20, such as the service system 70, to achieve flexible arrangement and checking capability, reduce strong intrusion to the service system, implement various flexible checking capabilities with as little perception as possible to the original service system 70, and dynamically adjust the checking point, the checking module, and the like in real time.
Fig. 6 is a flowchart illustrating a business data processing method according to an embodiment of the present specification, including steps S601 to S604; wherein:
step S601: and determining the service scene corresponding to the verification point according to the unique identification of the verification point contained in the verification data stream of the verification point.
Illustratively, step 601 may begin after second component 102 receives a reconciliation data stream obtained by first component 101 from the reconciliation site. E.g. the unique identity of the check point is 002, it can be determined that the corresponding is the service scenario B, etc.
Step S602: and judging whether the service scene is in a preset service scene list or not.
Specifically, the preset service scene list may be preset, for example, the service scene list may include a service scene a, a service scene B, and a service scene C, but does not include a service scene D.
Step S603: and responding to the service scene in a preset service scene list, and checking the check data stream to generate a check result.
Specifically, for example, if it is currently determined that the service scenario is the service scenario B, and the service scenario is determined to be in the service scenario list after the determination, the check data stream is checked to generate a check result.
Step S604: responding to the fact that the service scene is not in a preset service scene list, and sending a notification message to the first component through the second component; the notification message is used to instruct the first component to obtain a preset percentage of reconciliation data flow from reconciliation points configured in the second system.
Specifically, for example, the unique identifier of the current verification point is 004, if it is determined that the current verification point is the service scenario D, and it is determined that the current verification point is not in the service scenario list after the determination, a notification message is sent to the first component 101 through the second component 102, so as to instruct the first component 101 to acquire a verification data stream with a preset percentage from the verification point configured in the second system 20. The preset percentage may be less than, for example, 60%. Therefore, the service scene blacklist/white list check is realized, and more flexible check capability can be realized by configuring the service scene blacklist/white list. Meanwhile, in this embodiment, the gray level cross-flow checking can be realized, and the checking data stream is subjected to the subsequent checking processing by copying and shunting at the checking point of the business process in the second system 20 to obtain a smaller proportion of checks, so that the checking capability is more diversified.
The following will further describe the service data processing method by taking an application of the service data processing method provided in this specification in a service system as an example with reference to fig. 7. Fig. 7 is a schematic diagram of a business system data collation processing system provided in an embodiment of this specification, and based on the business system data collation processing system shown in fig. 7, the method may include the following steps:
step 1): the verification point configuration unit in the first system 10 generates verification point configuration information of the service system 70 according to the verification requirement information of the service system 70.
For example, if the business data, such as the data of the transfer transaction, between step 1 and step 2 of the business process of a transaction in a business scenario needs to be checked by the business system 70, the point-to-point configuration information of the business system 70 may be generated accordingly, and the point-to-point configuration information may include the unique identification ID of the point-to-point and the business scenario information associated therewith.
Step 2): sending the point-to-point configuration information to the first component 101.
Step 3): the first component 101 determines the point of verification in the business system 70 according to the point of verification configuration information.
For example, the position determination between step 1 and step 2 may be used as the verification point P. The first component 101 can determine from the point-to-point configuration information where the data stream should be obtained, i.e. in this embodiment from a location between step 1 and step 2.
Step 4): the second component 102 of the first system 10 receives a reconciliation data stream obtained by the first component 101 from the reconciliation site.
For example, after determining the verification point P, the verification data stream is obtained by copying from the verification point P, for example, the verification data stream is obtained by copying from a position between step 1 and step 2 in the business process shown in fig. 7. The check data stream may carry a unique identification ID for the check point to identify which service scenario in service system 70 the check data stream came from.
Step 5): the first system 10 collates the collation data stream to generate a collation result.
Specifically, the second component 102 may receive the check data stream obtained from a position between step 1 and step 2 in the business process, and send the check data stream to the corresponding check module according to the unique identifier ID for performing the check processing, and the detailed description of the foregoing method embodiment may be referred to in a specific check processing procedure.
In this embodiment, only the first component 101 is set in the service system 70 to determine the verification point P and obtain the verification data, the verification code is not added to the service system 70 for direct verification, but the verification data is obtained and then verified by the first system 10 outside the service system 70, so as to reduce the amount of the verification code added to the service system 70, reduce the intrusion of the verification code on the service system 70, reduce the influence on the service system 70, improve the working stability and the original service correctness of the service system 70, and make the service system 70 simpler. Meanwhile, the first system 10 can flexibly configure the verification points outside the service system 70 for subsequent verification processing, so that the verification points can be flexibly arranged for verification, and the verification flexibility is good. Based on the scheme of the present embodiment, a more comprehensive monitoring means can be performed on the checking system 10 side, so as to provide a more comprehensive service prevention and control capability for the main system, i.e. the service system 70.
The embodiment of the present specification further provides a service data processing method, which is applied to a first component configured in advance in a second system via a first system; the method comprises the following steps:
receiving the point-to-point configuration information of the second system generated by the first system;
and determining the verification point in the second system according to the verification point configuration information.
In the service data processing method provided in the embodiment of the present specification, a first component receives, by a first system, the peer-to-peer configuration information of a second system, where the first component determines a peer in the second system according to the peer-to-peer configuration information. In this embodiment, the first component is arranged in the second system to determine the check point, and the check code is not added to the second system and is directly checked, so that the amount of the check code added to the second system is reduced, the intrusion of the check code to the second system is weakened, the influence on the second system is reduced, and the working stability of the second system is improved. Meanwhile, the check points can be flexibly configured outside the second system through the first system to carry out subsequent check processing, so that the check points can be flexibly arranged for checking, and the check flexibility is good.
In one embodiment of the present specification, the collation requirement information of the second system is generated as collation requirement information of the second system; the configuration information of the core-to-core points at least comprises the unique identification of the core-to-core points and the business scene information which the core-to-core points related to the unique identification belong to.
In an embodiment of the present specification, the step of determining, in the second system, the peer-to-peer according to the peer-to-peer configuration information includes:
and determining one or more corresponding verification points in the second system according to the service scene information to which the verification points belong.
In one embodiment of the present specification, the service scenario information includes at least one piece of check-to-point location information; the step of determining one or more corresponding verification points in the second system according to the service scenario information to which the verification points belong includes:
and determining one or more corresponding verification points in the second system according to the at least one verification point position information.
In this embodiment, the first component is taken as an execution subject to describe the steps of the service data processing method, and specific details refer to the corresponding detailed description in the foregoing embodiment of the service data processing method taking the first system as the execution subject, which is not described herein again.
Corresponding to the above method embodiment, this specification further provides a service data processing system embodiment, and fig. 8 shows a schematic structural diagram of a service data processing system provided in an embodiment of this specification. As shown in fig. 8, the system includes a configuration information generating unit 802, a configuration information processing unit 804, and a first component 101; wherein:
the configuration information generating unit 802 is configured to generate the peer-to-peer configuration information of the second system 20;
the configuration information processing unit 804 is configured to send the peer-to-peer configuration information to the first component 101;
the first component 101, which is configured in the second system in advance, is configured to determine the verification point in the second system according to the verification point configuration information.
In the service data processing system provided in the embodiment of the present specification, the verification-point configuration information of the second system is generated, the first system sends the verification-point configuration information to a first component preset in the second system, and the first component determines verification points in the second system according to the verification-point configuration information. In this embodiment, the first component is arranged in the second system to determine the check point, and the check code is not added to the second system and is directly checked, so that the amount of the check code added to the second system is reduced, the intrusion of the check code to the second system is weakened, the influence on the second system is reduced, and the working stability of the second system is improved. Meanwhile, the check points can be flexibly configured outside the second system through the first system to carry out subsequent check processing, so that the check points can be flexibly arranged for checking, and the check flexibility is good.
Optionally, in an embodiment of the present specification, the configuration information generating unit 802 is further configured to generate, according to the checking requirement information of the second system, checking-point configuration information, where the checking-point configuration information at least includes a unique identifier of a checking point and service scenario information to which the checking point associated with the unique identifier belongs.
Optionally, in an embodiment of the present specification, the first component is further configured to determine, in the second system, one or more corresponding verification points according to the service scenario information to which the verification points belong.
Optionally, in an embodiment of the present specification, the service scenario information includes at least one piece of check-to-point location information; the first component is further configured to determine, in the second system, a corresponding one or more verification points based on the at least one verification point location information.
Optionally, in an embodiment of the present specification, the apparatus further includes a data collation unit configured to receive a collation data stream acquired by the first component from the collation point, and collate the collation data stream to generate a collation result.
Optionally, in an embodiment of the present specification, an exception handling unit configured to determine whether the check result is abnormal; throwing an exception notification to the second system in response to determining that the check result is an exception, so as to enable the second system to fuse a currently processed service; or, in response to determining that the result of the check is abnormal, issuing an alarm prompt message.
Optionally, in one embodiment of the present description, the first system includes a second component configured within the first system. The data reconciliation unit further configured to receive the reconciliation data stream by the second component.
Optionally, in an embodiment of the present specification, the core-to-core data stream of the core-to-core point includes a unique identifier of the core-to-core point. The second component is configured to determine a checking module corresponding to the checking point according to the unique identification of the checking point and a preset mapping table query; the preset mapping table comprises a mapping relation between the unique identification of at least one check point and at least one corresponding check module;
the second component is further configured to forward the check data stream to the determined check module, so that the determined check module performs real-time check or delay check on the check data stream and outputs a check result.
Optionally, in an embodiment of this specification, the system further includes a compiling module configured to, when the second component does not query a checking module corresponding to the checking point according to the unique identifier of the checking point and a preset mapping table, compile and generate a checking module matching with the checking point, so that the generated checking module checks the checking data stream and outputs a checking result.
Optionally, in an embodiment of the present specification, the system further includes a grayscale checking unit, configured to determine, according to a unique identifier of a check point included in a check-pair data stream of the check point, a service scene corresponding to the check point; judging whether the service scene is in a preset service scene list or not; responding to the service scene in a preset service scene list, and checking the check data stream to generate a check result; responding to the fact that the service scene is not in a preset service scene list, and sending a notification message to the first component through the second component; the notification message is used to instruct the first component to obtain a preset percentage of reconciliation data flow from reconciliation points configured in the second system.
The foregoing is a schematic scheme of a service data processing system according to this embodiment. It should be noted that the technical solution of the service data processing system and the technical solution of the service data processing method belong to the same concept, and details that are not described in detail in the technical solution of the service data processing system can be referred to the description of the technical solution of the service data processing method.
Corresponding to the above method embodiments, the present specification further provides a first component, where the first component is configured in advance in a second system through a first system, that is, the first component belongs to the first system. As shown in fig. 9, the first assembly includes:
a receiving unit 902 configured to receive the generated peer-to-peer configuration information of the second system by the first system;
a determining unit 904 configured to determine the peer-to-peer in the second system according to the peer-to-peer configuration information.
Optionally, in an embodiment of the present specification, the verification-to-point configuration information is generated by verification requirement information of the second system; the configuration information of the core-to-core points at least comprises the unique identification of the core-to-core points and the business scene information which the core-to-core points related to the unique identification belong to.
Optionally, in an embodiment of the present specification, the determining unit 904 is further configured to determine, in the second system, one or more corresponding verification points according to the service scenario information to which the verification points belong.
Optionally, in an embodiment of the present specification, the service scenario information includes at least one piece of point-to-point location information. Correspondingly, the determining unit 904 is further configured to determine one or more corresponding verification points in the second system according to the at least one verification point position information.
The above is an illustrative scheme of a first component of the present embodiment. It should be noted that the technical solution of the first component and the technical solution of the service data processing method applied to the first component belong to the same concept, and details that are not described in detail in the technical solution of the first component can be referred to the description of the technical solution of the service data processing method applied to the first component.
Fig. 10 shows a block diagram of a computing device 1000 provided according to an embodiment of the present description. The components of the computing device 1000 include, but are not limited to, memory 1010 and a processor 1020. The processor 1020 is coupled to the memory 1010 via a bus 1030 and the database 1050 is used to store data.
Computing device 1000 also includes AN access device 1040, access device 1040 enabling computing device 1000 to communicate via one or more networks 1060, examples of which include a Public Switched Telephone Network (PSTN), a local area network (L AN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet access device 1040 may include one or more of any type of network interface, e.g., a Network Interface Card (NIC), whether wired or wireless, such as AN IEEE802.11 wireless local area network (W L AN) wireless interface, a global microwave internet access (Wi-MAX) interface, AN ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 1000 and other components not shown in FIG. 10 may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 10 is for purposes of example only and is not limiting as to the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 1000 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), a mobile phone (e.g., smartphone), a wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 1000 may also be a mobile or stationary server.
The processor 1020 is configured to execute computer-executable instructions to implement the steps of the service data processing method in any one of the above embodiments. The detailed steps can refer to the description in the foregoing method embodiments, and are not repeated herein.
The above is an illustrative scheme of a computing device of the present embodiment. It should be noted that the technical solution of the computing device and the technical solution of the service data processing method belong to the same concept, and details that are not described in detail in the technical solution of the computing device can be referred to the description of the technical solution of the service data processing method.
An embodiment of the present specification further provides a computer-readable storage medium, which stores computer instructions, and the computer instructions are executed by a processor to implement the steps of the service data processing method in any one of the above embodiments.
The above is an illustrative scheme of a computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium belongs to the same concept as the technical solution of the above-mentioned service data processing method, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the above-mentioned service data processing method.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The computer instructions comprise computer program code which may be in the form of source code, object code, an executable file or some intermediate form, or the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It should be noted that, for the sake of simplicity, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present disclosure is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present disclosure. Further, those skilled in the art should also appreciate that the embodiments described in this specification are preferred embodiments and that acts and modules referred to are not necessarily required for this description.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The preferred embodiments of the present specification disclosed above are intended only to aid in the description of the specification. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the specification and its practical application, to thereby enable others skilled in the art to best understand the specification and its practical application. The specification is limited only by the claims and their full scope and equivalents.

Claims (18)

1. A business data processing method is applied to a first system, wherein the first system is provided with a first component in advance in a second system; the method comprises the following steps:
the first system generates the verification point configuration information of the second system;
the first system sends the point-to-point configuration information to the first component;
the first component determines the verification point in the second system according to the verification point configuration information.
2. The method of claim 1, wherein the step of the first system generating the peer-to-peer configuration information of the second system comprises:
and generating the verification point configuration information according to the verification requirement information of the second system, wherein the verification point configuration information at least comprises the unique identification of the verification point and the service scene information to which the verification point associated with the unique identification belongs.
3. The method of claim 2, wherein the step of the first component determining the verification point in the second system according to the verification point configuration information comprises:
and the first component determines one or more corresponding verification points in the second system according to the service scene information to which the verification points belong.
4. The method of claim 3, wherein the service scenario information includes at least one piece of check-to-point location information;
the step that the first component determines one or more corresponding verification points in the second system according to the service scene information to which the verification points belong comprises the following steps:
and determining one or more corresponding verification points in the second system according to the at least one verification point position information.
5. The method of any of claims 1 to 4, further comprising:
the first system receiving a reconciliation data stream obtained by the first component from the reconciliation point;
the first system collates the collation data stream to generate a collation result.
6. The method of claim 5, further comprising:
the first system determining whether the checking result is abnormal;
throwing an exception notification to the second system in response to determining that the check result is an exception, so as to enable the second system to fuse a currently processed service; or
And sending out alarm prompt information in response to the fact that the checking result is determined to be abnormal.
7. The method of claim 5, wherein the first system comprises a second component configured within the first system;
the step of the first system receiving a reconciliation data stream obtained by the first component from the reconciliation point comprises: receiving, by the second component, the collation data stream.
8. The method of claim 7, wherein the core-to-core data stream of the core-to-core point contains a unique identifier of the core-to-core point;
the step of the first system collating the collated data stream to generate a collation result includes:
the second component inquires and determines a checking module corresponding to the checking point according to the unique identification of the checking point and a preset mapping table; the preset mapping table comprises a mapping relation between the unique identification of at least one check point and at least one corresponding check module;
and the second component forwards the check data stream to the determined check module so that the determined check module performs real-time check or delay check on the check data stream and outputs a check result.
9. The method of claim 8, further comprising:
and when the second component does not inquire a check module corresponding to the check point according to the unique identification of the check point and a preset mapping table, writing and generating the check module matched with the check point so as to check the check data stream through the generated check module and output a check result.
10. The method of claim 8, further comprising:
determining a service scene corresponding to the verification point according to the unique identification of the verification point contained in the verification data stream of the verification point;
judging whether the service scene is in a preset service scene list or not;
responding to the service scene in a preset service scene list, and checking the check data stream to generate a check result;
responding to the fact that the service scene is not in a preset service scene list, and sending a notification message to the first component through the second component; the notification message is used to instruct the first component to obtain a preset percentage of reconciliation data flow from reconciliation points configured in the second system.
11. A business data processing system comprises a configuration information generating unit, a configuration information processing unit and a first component; wherein:
the configuration information generating unit is used for generating the verification point configuration information of the second system;
the configuration information processing unit is used for sending the check-to-point configuration information to the first component;
the first component is configured in the second system in advance and used for determining the verification point in the second system according to the verification point configuration information.
12. A business data processing method is applied to a first component which is configured in a second system in advance through a first system, and comprises the following steps:
receiving the point-to-point configuration information of the second system generated by the first system;
and determining the verification point in the second system according to the verification point configuration information.
13. The method of claim 12, wherein the verification-peer configuration information is generated by verification requirement information of the second system; the configuration information of the core-to-core points at least comprises the unique identification of the core-to-core points and the business scene information which the core-to-core points related to the unique identification belong to.
14. The method of claim 13, wherein the step of determining the verification point in the second system according to the verification point configuration information comprises:
and determining one or more corresponding verification points in the second system according to the service scene information to which the verification points belong.
15. The method of claim 14, wherein the service scenario information includes at least one piece of point-to-point location information; the step of determining one or more corresponding verification points in the second system according to the service scenario information to which the verification points belong includes:
and determining one or more corresponding verification points in the second system according to the at least one verification point position information.
16. A first component pre-configured in a second system via a first system; the first assembly includes:
a receiving unit, configured to receive the generated peer-to-peer configuration information of the second system by the first system;
and the determining unit is used for determining the verification point in the second system according to the verification point configuration information.
17. A computing device, comprising:
a memory and a processor;
the memory is for storing computer-executable instructions for execution by the processor to perform the steps of the method of any one of claims 1 to 10 or any one of claims 11 to 15.
18. A computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the method of any one of claims 1 to 10 or any one of claims 11 to 15.
CN202010286149.6A 2020-04-13 2020-04-13 Service data processing method, system, component, computing device and storage medium Active CN111476659B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010286149.6A CN111476659B (en) 2020-04-13 2020-04-13 Service data processing method, system, component, computing device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010286149.6A CN111476659B (en) 2020-04-13 2020-04-13 Service data processing method, system, component, computing device and storage medium

Publications (2)

Publication Number Publication Date
CN111476659A true CN111476659A (en) 2020-07-31
CN111476659B CN111476659B (en) 2023-08-15

Family

ID=71751506

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010286149.6A Active CN111476659B (en) 2020-04-13 2020-04-13 Service data processing method, system, component, computing device and storage medium

Country Status (1)

Country Link
CN (1) CN111476659B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004234257A (en) * 2003-01-29 2004-08-19 Hitachi Ltd Detailed receipt transaction audit method, system and program, and recording medium
CN101075337A (en) * 2007-07-20 2007-11-21 中国建设银行股份有限公司 Method and system for verifying data
CN104573946A (en) * 2014-12-26 2015-04-29 北京奇虎科技有限公司 Processing method and system of business object data
CN108694664A (en) * 2018-06-05 2018-10-23 阿里巴巴集团控股有限公司 Checking method and device, the electronic equipment of operation system
US20190138384A1 (en) * 2017-11-06 2019-05-09 Tata Consultancy Services Limited Method and system for managing exceptions during reconciliation of transactions
CN110046153A (en) * 2018-11-19 2019-07-23 阿里巴巴集团控股有限公司 A kind of method, device and equipment of account fund verification
CN110213071A (en) * 2018-04-16 2019-09-06 腾讯科技(深圳)有限公司 Verification of data method, apparatus, system, computer equipment and storage medium
CN110750530A (en) * 2019-09-11 2020-02-04 口碑(上海)信息技术有限公司 Service system and data checking method thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004234257A (en) * 2003-01-29 2004-08-19 Hitachi Ltd Detailed receipt transaction audit method, system and program, and recording medium
CN101075337A (en) * 2007-07-20 2007-11-21 中国建设银行股份有限公司 Method and system for verifying data
CN104573946A (en) * 2014-12-26 2015-04-29 北京奇虎科技有限公司 Processing method and system of business object data
US20190138384A1 (en) * 2017-11-06 2019-05-09 Tata Consultancy Services Limited Method and system for managing exceptions during reconciliation of transactions
CN110213071A (en) * 2018-04-16 2019-09-06 腾讯科技(深圳)有限公司 Verification of data method, apparatus, system, computer equipment and storage medium
CN108694664A (en) * 2018-06-05 2018-10-23 阿里巴巴集团控股有限公司 Checking method and device, the electronic equipment of operation system
CN110046153A (en) * 2018-11-19 2019-07-23 阿里巴巴集团控股有限公司 A kind of method, device and equipment of account fund verification
CN110750530A (en) * 2019-09-11 2020-02-04 口碑(上海)信息技术有限公司 Service system and data checking method thereof

Also Published As

Publication number Publication date
CN111476659B (en) 2023-08-15

Similar Documents

Publication Publication Date Title
CN108764868B (en) Block chain node proxy reconciliation method and block reconciliation proxy node
CN110232565B (en) Resource clearing method, device, computer equipment and storage medium
US11410150B2 (en) Method, server, and readable storage medium for processing payment in offline scenario
CN108510276B (en) Data processing method, device and system
CN110572457B (en) Resource application method and device based on block chain, electronic equipment and storage medium
CN109493202A (en) Block chain account checking method, device, system, equipment and readable storage medium storing program for executing
CN110390525A (en) The direct access method and block chain node of block chain world state
CN113726890B (en) Federal prediction method and system for block chain data service
CN109857373A (en) Business data processing method, device, computer equipment and storage medium
CN111552942B (en) Identity authentication method, system, device and computer storage medium
CN112767113A (en) Account checking data processing method, device and system based on block chain
CN110209556B (en) Disaster tolerance testing method, payment method, device, medium and service equipment
CN110855688A (en) Block chain information processing method and related equipment
CN102136932B (en) Method, device and system for realizing service application
CN110034979A (en) A kind of proxy resources monitoring method, device, electronic equipment and storage medium
CN103188084B (en) Method, system and the broadcasting server of a kind of broadcasting user picture
CN111476659A (en) Business data processing method, system, component, computing device and storage medium
KR102107454B1 (en) System for multiplication of financial payment networks, method for financial services using the same and computer program for the same
CN110084568A (en) Demand management methods, devices and systems
CN115086046A (en) Intelligent interactive security deployment method and system
CN114677138A (en) Data processing method, data processing equipment and computer readable storage medium
CN114169895A (en) Payment information processing system, method, device, medium, product and equipment
CN105592013B (en) A kind of sensitive information processing method, device and client
CN113850683A (en) Car insurance inquiry request processing method and device, computer equipment and storage medium
CN113011962A (en) Resource allocation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant