CN115760411A - Cross-border transaction method and device, computer equipment and storage medium - Google Patents

Cross-border transaction method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN115760411A
CN115760411A CN202211485399.8A CN202211485399A CN115760411A CN 115760411 A CN115760411 A CN 115760411A CN 202211485399 A CN202211485399 A CN 202211485399A CN 115760411 A CN115760411 A CN 115760411A
Authority
CN
China
Prior art keywords
virtual resource
cross
border
user
border transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211485399.8A
Other languages
Chinese (zh)
Inventor
王美莲
于东东
刘雅君
辛佳佳
杨恩峰
黄培
邢利菲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202211485399.8A priority Critical patent/CN115760411A/en
Publication of CN115760411A publication Critical patent/CN115760411A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present disclosure relates to the field of financial technologies, and in particular, to a cross-border transaction method, apparatus, computer device, and storage medium. The cross-border transaction method comprises the steps of determining a cross-border transaction requesting user identifier, a remittance user identifier and a virtual resource value according to a received cross-border transaction request; verifying the user identification, the remittance user identification and the virtual resource numerical value of the request cross-border transaction respectively; and under the condition that the request cross-border transaction user identification, the remittance user identification and the virtual resource numerical value are confirmed to pass the verification, updating a first virtual resource total numerical value corresponding to the request cross-border transaction user identification and a second virtual resource total numerical value corresponding to the remittance user identification on the basis of the virtual resource numerical value. By using the embodiment of the specification, cross-border transaction is carried out under the condition that the user identification requesting cross-border transaction, the remittance user identification and the virtual resource value are verified, so that rapid cross-border transaction is realized in the same group.

Description

Cross-border transaction method and device, computer equipment and storage medium
Technical Field
The specification relates to the technical field of finance, in particular to a cross-border transaction method, a cross-border transaction device and computer equipment.
Background
At present, cross-border transactions need to be subjected to more auditing processes and procedures so as to avoid transaction risks. Often, each sub-company within a cross-border enterprise generates a redundant situation of funds due to an emergency, and in such a situation, the transaction risk is small. Under the condition, the cross-border transaction can be realized only by carrying out the auditing process and procedure, and the instantaneity cannot be met.
How to satisfy timeliness of cross-border transactions in cross-border enterprises on the basis of controlling transaction risks is a problem to be solved urgently in the prior art.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present specification provide a cross-border transaction method, apparatus, computer device, and storage medium, where a cross-border transaction is performed when a user identifier, an importing user identifier, and a virtual resource value of a request for the cross-border transaction all pass verification, thereby implementing a fast cross-border transaction within the same group.
In order to solve the above technical problems, the specific technical solution of the present specification is as follows:
in one aspect, the present specification provides a cross-border transaction method, including,
determining a cross-border transaction request user identifier, a remittance user identifier and a virtual resource numerical value according to a received cross-border transaction request;
determining a first verification rule and a remittable user identifier set according to the request cross-border transaction user identifier;
in the case that it is determined that the requesting cross-border transaction user identification passes the verification of the first verification rule, determining whether a target remittance user identification matching the remittance user identification exists in the set of remittance user identifications;
under the condition that the target remittance user identification exists, verifying the virtual resource numerical value by using a second verification rule; and
and under the condition that the virtual resource value is determined to pass the verification of the second verification rule, updating a first virtual resource total value corresponding to the request cross-border transaction user identifier and a second virtual resource total value corresponding to the remitted user identifier based on the virtual resource value.
Further, in a case where it is determined that the cross-border transaction requesting user identifier is an identifier corresponding to an intra-border user, determining the content of the first validation rule and the content remittable into the set of user identifiers further includes:
acquiring a first virtual resource library and a second virtual resource library based on the request cross-border transaction user identifier, wherein the first virtual resource library comprises an intra-border private account identifier, and the second virtual resource library comprises an overseas sub-account identifier;
determining whether the requesting cross-border transaction user identification matches the domestic tenant identification;
under the condition that the request cross-border transaction user identification is matched with the domestic professional identification, the request cross-border transaction user identification is verified through the first verification rule; and
and constructing the remittance user identification set based on the overseas sub-account identification.
Further, the process of building the first virtual resource pool and the second virtual resource pool further comprises,
determining the internal special account identifier, a plurality of sub-account identifiers and a threshold value for limiting the value of the tradeable virtual resource according to the received account opening request;
acquiring a template operation item based on the account opening request;
updating the template operation items respectively based on the domestic special account identification, the sub-account identification and the limiting tradeable virtual resource numerical value threshold value to obtain operable items; and
executing the actionable item to determine an outbound sub-account identification from the sub-account identifications, and building the first virtual resource pool based on the inbound private account identification and the second virtual resource pool based on the outbound sub-account identification.
Further, after said executing said plurality of actionable items to determine a plurality of overseas sub-account identities from said sub-account identities, and building said first pool of virtual resources based on said domestic patent account identity and said second pool of virtual resources based on said overseas sub-account identity, further comprising:
after the operable item is executed, acquiring execution result information corresponding to the operable item; and
under the condition that the execution result information is determined to be success state information indicating a success state, the success state information is sent to the user terminal which sends the account opening request;
determining a correction rule according to the failure state information and a target operable item corresponding to the failure state information under the condition that the execution result information is determined to be the failure state information indicating the failure state;
correcting the target operable item by using the correction rule to obtain a corrected operable item;
executing the corrected operable item to obtain re-execution result information corresponding to the corrected operable item; and
and under the condition that the re-execution result information is determined to be success state information indicating a success state, sending the success state information to the user terminal sending the account opening request.
Further, in the case where it is determined that the requesting cross-border transaction user identifier is an identifier corresponding to an overseas user, determining the contents of the first validation rule and the contents remittable into the set of user identifiers further comprises,
matching the request cross-border transaction user identification with an off-border sub-account identification in a preset off-border virtual resource library;
under the condition that the identification of the user requesting the cross-border transaction is matched with the identification of the target overseas sub-account in the preset overseas virtual resource library, the identification of the user requesting the cross-border transaction is verified through the first verification rule;
acquiring a target internal virtual resource library corresponding to the target overseas sub-account identifier, wherein the target internal virtual resource library comprises an internal private account identifier; and
and constructing the remittance user identification set based on the domestic private user identification.
Further, the validating the virtual resource value using a second validation rule upon determining that the target importable user identity exists further comprises,
determining a threshold value for limiting the tradable virtual resource value based on the cross-border trading user identifier and/or the target remittance user identifier;
if the virtual resource value is not larger than the threshold value of the limiting tradeable virtual resource value, determining whether the first total virtual resource value corresponding to the requesting cross-border trading user identification is not smaller than the virtual resource value; and
and determining that the virtual resource value passes the verification of the second verification rule under the condition that the first virtual resource total value is determined to be not smaller than the virtual resource value.
In another aspect, an embodiment of the present disclosure further provides a cross-border transaction apparatus, including,
the first determining unit is used for determining a cross-border transaction requesting user identifier, a remittance user identifier and a virtual resource value according to the received cross-border transaction request;
the second determining unit is used for determining a first verification rule and an incorporable user identifier set according to the request cross-border transaction user identifier;
a third determining unit, configured to determine whether a target remittance user identifier matching the remittance user identifier exists in the remittance user identifier set or not, if it is determined that the request cross-border transaction user identifier passes the verification of the first verification rule;
the verification unit is used for verifying the virtual resource value by using a second verification rule under the condition that the target importable user identifier is determined to exist; and
and the updating unit is used for updating a first virtual resource total value corresponding to the request cross-border transaction user identifier and a second virtual resource total value corresponding to the remitted user identifier based on the virtual resource value under the condition that the virtual resource value is confirmed to pass the verification of the second verification rule.
In another aspect, the present specification further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the method when executing the computer program.
In another aspect, the present specification further provides a computer readable storage medium, on which computer instructions are stored, and the computer instructions, when executed by a processor, implement the method described above.
By utilizing the embodiment of the specification, after a cross-border transaction request is received, a cross-border transaction request user identifier, a remittance user identifier and a virtual resource numerical value are determined according to the cross-border transaction request; and respectively determining whether the cross-border transaction request user identification can carry out cross-border transfer-out transaction or not aiming at the cross-border transaction request user identification, and under the condition that the cross-border transfer-out transaction can be carried out, gathering user identification sets which can be transferred to the cross-border transfer-out user identification. And determining whether the remittance user identification is one of the remittance user identifications, verifying the virtual resource value under the condition that the remittance user identification is determined to be one of the remittance user identifications, and executing cross-border transaction under the condition that the virtual resource value passes the verification. Therefore, the verification of the internal cross-border transaction of the cross-border enterprise is completed, and the timeliness of the internal cross-border transaction of the cross-border enterprise is met on the basis of controlling transaction risks.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the description below are only some embodiments of the present specification, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic diagram of a system for implementing a cross-border transaction method according to an embodiment of the present disclosure;
FIG. 2 is a flow chart illustrating a cross-border transaction method according to an embodiment of the present disclosure;
FIG. 3 is a flow chart illustrating a first authentication method according to an embodiment of the present disclosure;
FIG. 4 is a flow chart of a first authentication method according to another embodiment of the present disclosure;
FIG. 5 is a flowchart illustrating a method for building a virtual resource pool according to an embodiment of the present disclosure;
FIG. 6 is a schematic structural diagram illustrating a cross-border transaction apparatus according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a computer device according to an embodiment of the present disclosure.
[ description of reference ]
101. A user terminal;
102. a server;
610. a first determination unit;
620. a second determination unit;
630. a third determination unit;
640. a verification unit;
650. an update unit;
702. a computer device;
704. a processing device;
706. a storage resource;
708. a drive mechanism;
710. an input/output module;
712. an input device;
714. an output device;
716. a presentation device;
718. a graphical user interface;
720. a network interface;
722. a communication link;
724. a communication bus.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without any creative effort belong to the protection scope of the present specification.
It should be noted that the terms "first," "second," and the like in the description and claims of this specification and the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the specification described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or device.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
In the technical scheme of the specification, the collection, storage, use, processing, transmission, provision, disclosure, application and other processing of the related user personal information and the personal routing address information of the user are all in accordance with the regulations of related laws and regulations, necessary security measures are taken, and the public order and good custom are not violated.
Fig. 1 is a schematic diagram of an implementation system of a cross-border transaction method according to an embodiment of the present disclosure, which may include: the user terminal 101 and the server 102 communicate with each other through a Network, which may include a Local Area Network (LAN), a Wide Area Network (WAN), the internet, or a combination thereof, and is connected to a website, a user device (e.g., a computing device), and a backend system. The user may send a cross-border transaction request to the server 102 through the user terminal 101, where the cross-border transaction request includes a user identifier requesting cross-border transaction, a remittance user identifier, and a virtual resource value. After receiving the cross-border transaction request, the server 102 verifies the user identifier requesting the cross-border transaction, the remittance user identifier and the virtual resource value, executes the cross-border transaction if the verification is passed, and sends state information representing the success of the cross-border transaction to the user terminal 101. And sending the state information representing the cross-border transaction failure to the user terminal 101 under the condition that the verification of the request cross-border transaction user identifier, the remittance user identifier and the virtual resource numerical value is not passed. Alternatively, the servers 102 may be nodes of a cloud computing system (not shown), or each server 102 may be a separate cloud computing system comprising multiple computers interconnected by a network and operating as a distributed processing system.
In an alternative embodiment, the user terminal 101 may include electronic devices of the type not limited to smartphones, acquisition devices, desktop computers, tablet computers, laptop computers, smart speakers, digital assistants, augmented Reality (AR)/Virtual Reality (VR) devices, smart wearable devices, and the like. Optionally, the operating system running on the electronic device may include, but is not limited to, an android system, an IOS system, linux, windows, and the like.
In addition, it should be noted that fig. 1 is only one application environment provided in this specification, and in practical applications, a plurality of user terminals 101 may also be included, and this specification is not limited.
Fig. 2 is a flowchart illustrating a cross-border transaction method according to an embodiment of the present disclosure. The cross-border transaction process is depicted in this figure, but may include more or fewer operational steps based on routine or non-creative efforts. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual system or apparatus product executes, it can execute sequentially or in parallel according to the method shown in the embodiment or the figures. Specifically, as shown in fig. 2, the method may include:
s210, determining a cross-border transaction request user identifier, a remittance user identifier and a virtual resource value according to the received cross-border transaction request;
s220, determining a first verification rule and a remittable user identifier set according to the request cross-border transaction user identifier;
s230, under the condition that the cross-border transaction user identification is confirmed to pass the verification of the first verification rule, whether a target remittance user identification matched with the remittance user identification exists in the remittance user identification set or not is confirmed;
s240, under the condition that the target remittance user identification exists, verifying the virtual resource numerical value by using a second verification rule;
and S250, under the condition that the virtual resource value is verified through the second verification rule, updating a first virtual resource total value corresponding to the user identifier requesting the cross-border transaction and a second virtual resource total value corresponding to the user identifier importing the cross-border transaction based on the virtual resource value.
By utilizing the embodiment of the specification, after a cross-border transaction request is received, a cross-border transaction requesting user identifier, a remittance user identifier and a virtual resource value are determined according to the cross-border transaction request; and respectively determining whether the cross-border transaction request user identification can carry out cross-border transfer-out transaction or not aiming at the cross-border transaction request user identification, and under the condition that the cross-border transfer-out transaction can be carried out, gathering user identification sets which can be transferred to the cross-border transfer-out user identification. And determining whether the remittance user identification is one of the remittance user identifications, verifying the virtual resource value under the condition that the remittance user identification is determined to be one of the remittance user identifications, and executing cross-border transaction under the condition that the virtual resource value passes the verification. Therefore, the verification of the internal cross-border transaction of the cross-border enterprise is completed, and the timeliness of the internal cross-border transaction of the cross-border enterprise is met on the basis of controlling transaction risks.
According to one embodiment of the present description, the cross-border transaction request includes a request cross-border transaction user identification, an import user identification, and a virtual resource value. The cross-border transaction requesting user identification is a unique identification characterizing a corresponding user who wants to perform cross-border transaction. The remittance user identification is a unique identification which is characterized and corresponds to a user which the cross-border transaction user wants to transfer into. For example, if the overseas user A6 wants to transfer X elements to the domestic user a, the cross-border transaction user identifier is A6, the import user identifier is a, and the virtual resource value is X.
When the user wants to perform cross-border transaction, a cross-border transaction request is sent to the server. And when the server receives the cross-border transaction request, determining the cross-border transaction user identification. According to the request cross-border transaction user identification, a first verification rule for verifying whether the request cross-border transaction user identification has cross-border transaction authority or not and an object set which can be transacted by the request cross-border transaction user identification are determined, and the object set is used as a user identification set which can be imported. It should be noted that, when the cross-border transaction user identifier is an inbound user identifier and an outbound user identifier, the first validation rule may not be the same. That is, the first validation rule for validating the domestic user identifier as the requesting cross-border transaction user identifier and the first validation rule for validating the domestic user identifier as the requesting cross-border transaction user identifier may be different. Similarly, the set of importable user identifications for inbound user identifications as requesting cross-border transaction user identifications and the set of importable user identifications for outbound user identifications as requesting cross-border transaction user identifications may not be the same.
And utilizing the determined first verification rule to verify whether the authority of the active transaction exists or not aiming at the cross-border transaction requesting user identifier, and determining that the cross-border transaction requesting user identifier passes the verification of the first verification rule under the condition that the cross-border transaction requesting user identifier has the authority of the active transaction.
And under the condition that the request cross-border transaction user identification is determined to pass the verification of the first verification rule, determining whether the remittance user identification is a user identification which can perform transaction with the request cross-border transaction user identification. The determination of whether the remittance user identifier is a user identifier that can transact with the request cross-border transaction user identifier may be, for example, to perform consistency matching between the remittance user identifier and each remittance user identifier in the determined remittance user identifier set, and in a case where it is determined that there is consistency matching between the target remittance user identifier and the remittance user identifier, determine that the remittance user identifier is a user identifier that can transact with the request cross-border transaction user identifier.
And verifying the virtual resource value by using a second verification rule under the condition that the remittance user identifier is determined to be a user identifier which can perform transaction with the cross-border transaction request user identifier, namely, the target remittance user identifier exists. The second validation rule may be any validation rule that determines whether the two parties to the transaction can trade the target virtual resource value, for example. For example, the second validation rule may be whether the first total virtual resource value corresponding to the requesting cross-border transaction user identifier is not less than the virtual resource value. And under the condition that the first virtual resource total value is determined to be not smaller than the virtual resource value, determining that the virtual resource value passes the verification of a second verification rule. Similarly, in the case that the first total virtual resource value is determined to be smaller than the virtual resource value, it is determined that the virtual resource value does not pass the verification of the second verification rule.
And executing the cross-border transaction under the condition that the virtual resource value is determined to pass the verification of the second verification rule. The cross-border transaction may be executed by updating a first virtual resource total value corresponding to the user identifier requesting the cross-border transaction and a second virtual resource total value corresponding to the user identifier importing the cross-border transaction to obtain the updated first virtual resource total value and the updated second virtual resource total value corresponding to the user identifier importing the cross-border transaction.
According to another embodiment of the present specification, in case it is determined that the target importable user identity exists, verifying the virtual resource value using the second verification rule comprises: determining a threshold value for limiting the tradable virtual resource value based on the cross-border trading user identifier and/or the target remittance user identifier; under the condition that the virtual resource value is not larger than the threshold value of the limiting tradable virtual resource value, judging whether a first virtual resource total value corresponding to the cross-border transaction requesting user identification is not smaller than the virtual resource value; and if the total value of the first virtual resource is not less than the value of the virtual resource, determining that the value of the virtual resource passes the verification of the second verification rule.
And configuring a corresponding preset limiting tradeable virtual resource value threshold value aiming at the user identification with the cross-border trading authority in advance. The preset limited tradable virtual resource value threshold may be a virtual resource value threshold at which both parties of a transaction can trade within a certain time limit, for example, every natural day, both parties of the transaction can trade at most Y elements, and the preset limited tradable virtual resource value threshold is X. The preset limited tradable virtual resource value threshold may also be a virtual resource value threshold at which both parties can trade at a single time, for example, each time, both parties can trade at most Z-ary, the preset limited tradable virtual resource value threshold is Z.
A pre-set limited tradable virtual resource value threshold associated with the cross-border trading user identification and the target tradable user identification is determined. And under the condition that the cross-border transaction user identification and the target remittance user identification both have the corresponding preset threshold value of the limited tradable virtual resource, taking the smaller one of the cross-border transaction user identification and the target remittance user identification as the threshold value of the limited tradable virtual resource. And when only one corresponding preset limiting tradeable virtual resource value threshold exists in the cross-border trading user identification and the target tradeable user identification, determining the preset limiting tradeable virtual resource value threshold as the limiting tradeable virtual resource value threshold.
After determining the threshold value of the limited tradable virtual resource, comparing the value of the virtual resource with the threshold value of the limited tradable virtual resource, and determining whether the total value of the first virtual resource corresponding to the user identifier requesting the cross-border transaction is not less than the value of the virtual resource under the condition that the value of the virtual resource is not greater than the threshold value of the limited tradable virtual resource. And under the condition that the total value of the first virtual resource is determined to be not less than the value of the virtual resource, determining that the value of the virtual resource passes the verification of a second verification rule.
Fig. 3 is a flowchart illustrating a first verification method according to an embodiment of the present disclosure. A first rule validation component methodology is depicted in this figure, but may include more or fewer operational steps based on conventional or non-inventive labor. Specifically, as shown in fig. 3, the method may include:
s321, acquiring a first virtual resource library and a second virtual resource library based on the cross-border transaction request user identifier, wherein the first virtual resource library comprises an intra-border private account identifier, and the second virtual resource library comprises an overseas sub-account identifier;
s322, determining whether the cross-border transaction request user identification is matched with the domestic special user identification;
s323, under the condition that the cross-border transaction requesting user identification is matched with the private home identification, the cross-border transaction requesting user identification is verified through a first verification rule;
s324, based on the overseas sub-account identification, an importable user identification set is constructed.
By using the embodiment of the specification, under the condition that the cross-border transaction requesting user identifier is the identifier corresponding to the domestic user, whether the cross-border transaction requesting user identifier is the domestic private user identifier is determined. And further, under the condition that the request cross-border transaction user identification is determined to be the domestic professional identification, the request cross-border transaction user identification passes the verification of the first verification rule. Therefore, cross-border transaction is realized only by domestic special users, and transaction risk is controlled.
According to another embodiment of the present specification, it is determined whether the identification of the user requesting the cross-border transaction is an identification corresponding to an inbound user or an identification corresponding to an outbound user. And under the condition that the request cross-border transaction user identification is determined to be the identification corresponding to the in-border user, acquiring a first virtual resource library and a second virtual resource library according to the request cross-border transaction user identification.
The first virtual resource library and the second virtual resource library are two virtual resource libraries which are constructed aiming at a cross-border enterprise in advance, the first virtual resource library comprises an intra-border private account identifier, and the second virtual resource library comprises an overseas sub-account identifier. The in-house special account mark represents a user mark corresponding to a cross-border enterprise headquarter, and the sub-account mark represents a user mark corresponding to a cross-border enterprise branch or a handling office.
Only the domestic special account identifier and the overseas sub-account identifier are preset to actively initiate cross-border transaction. Therefore, when the identification corresponding to the domestic user is received as the request cross-border trading user identification, whether the request cross-border trading user identification is matched with the domestic professional identification included in the first virtual resource library in a consistent mode is determined. And under the condition that the consistency of the request cross-border transaction user identification is determined to be matched with the in-border special user identification, determining that the request cross-border transaction user identification has the right to carry out cross-border transaction, thereby determining that the request cross-border transaction user identification passes the verification of the first verification, and constructing an importable user identification set by using the out-border sub-account identification included in the second virtual resource library.
Fig. 4 is a flowchart illustrating a first authentication method according to another embodiment of the present disclosure. Another first rule validation component methodology is depicted in this figure, but may include more or fewer operational steps based on conventional or non-inventive labor. Specifically, as shown in fig. 4, the method may include:
s421, matching the cross-border transaction request user identification with the out-border sub-account identification in the preset out-border virtual resource library;
s422, under the condition that the identification of the user requesting the cross-border transaction is matched with the identification of the target overseas sub-account in the preset overseas virtual resource library, the identification of the user requesting the cross-border transaction is verified through a first verification rule;
s423, acquiring a target internal virtual resource library corresponding to the target overseas sub-account identifier, wherein the target internal virtual resource library comprises an internal private account identifier;
s424, based on the domestic private user identification, a remittance user identification set is constructed.
By using the embodiment of the specification, under the condition that the request cross-border transaction user identifier is the identifier corresponding to the overseas user, whether the request cross-border transaction user identifier is one of the overseas sub-account identifiers included in the preset overseas virtual resource library is determined. And further, under the condition that the request cross-border transaction user identification is determined to be one of the overseas sub-account identifications included in the preset overseas virtual resource library, the request cross-border transaction user identification passes the verification of the first verification rule. Therefore, cross-border transaction is only authorized to be carried out by the overseas sub-account of the domestic specialized user, and transaction risk is controlled.
According to another embodiment of the present specification, a preset inbound virtual resource pool (first virtual resource pool) and a preset outbound virtual resource pool (second virtual resource pool) that can perform cross-border transactions exist in advance in a database, and the preset inbound virtual resource pool and the preset outbound virtual resource pool are associated, where the preset inbound virtual resource pool includes an inbound private account identifier and the preset outbound virtual resource pool includes an outbound sub-account identifier. The in-house special account mark represents a user mark corresponding to a cross-border enterprise headquarter, and the sub-account mark represents a user mark corresponding to a cross-border enterprise branch or a handling office.
And under the condition that the request cross-border transaction user identification is determined to be the identification corresponding to the overseas user, carrying out consistency matching on the request cross-border transaction user identification and the overseas sub-account identifications included in all the existing preset overseas virtual resource libraries. And under the condition that the target foreign sub-account identifier which is matched with the consistency of the request cross-border transaction user identifier exists in the foreign sub-account identifiers included in all the preset foreign virtual resource libraries, determining that the request cross-border transaction user identifier has the authority of cross-border transaction, thereby determining that the request cross-border transaction user identifier passes the verification of the first verification.
And determining a related target internal virtual resource library based on a preset external virtual resource library comprising the target external sub-account identifier, and constructing an internal private account identifier set capable of being imported into the user identifier set by using the internal private account identifier included in the target internal virtual resource library.
Fig. 5 is a flowchart illustrating a method for building a virtual repository according to an embodiment of the present disclosure. The virtual resource library building method process is described in the figure, but may include more or fewer operation steps based on conventional or non-creative labor. Specifically, as shown in fig. 5, the method may include:
s510, determining an internal special account identifier, a sub-account identifier and a threshold value for limiting the value of the tradable virtual resource according to the received account opening request;
s520, acquiring a template operation item based on the account opening request;
s530, updating the template operation items respectively based on the domestic special account identification, the sub-account identification and the limiting tradeable virtual resource numerical value threshold value to obtain operable items;
s540, executing the operable item to determine the overseas subaccount identifier from the subaccount identifiers, and constructing the first virtual resource library based on the domestic account identifier and the second virtual resource library based on the overseas subaccount identifier.
By using the embodiment of the specification, before the simple cross-border transaction of the cross-border enterprise, a first virtual resource library comprising the identifier corresponding to the internal user and a second virtual resource library comprising the identifier corresponding to the overseas user need to be constructed. And then, cross-border transaction is verified aiming at the interior of the cross-border enterprise based on the first virtual resource library and the second virtual resource library, so that verification of the interior cross-border transaction aiming at the cross-border enterprise is completed, and timeliness of the cross-border transaction in the cross-border enterprise is met on the basis of controlling transaction risks.
According to another embodiment of the present specification, a cross-border enterprise that wants to open a cross-border transaction easily and quickly may send an account opening request to a server. The account opening request comprises the domestic account identification, the sub-account identification and the threshold value of the virtual resource capable of limiting trading. The in-house special account mark represents a user mark corresponding to a cross-border enterprise headquarter, and the sub-account mark represents a user mark corresponding to a cross-border enterprise branch or a handling office.
The threshold value of the limited tradable virtual resource value may be a threshold value of a virtual resource value at which both parties of the tradable transaction can perform the tradable transaction within a certain time limit, for example, every natural day, when both parties of the tradable transaction can perform the tradable transaction for at most Y elements, the threshold value of the limited tradable virtual resource value is X. The threshold value of the limited tradable virtual resource value may also be a threshold value of a virtual resource value at which both parties can perform a transaction in a single transaction, for example, each time both parties can perform a transaction for at most Z-th, the threshold value of the limited tradable virtual resource value is Z.
And a plurality of corresponding template operation items are prepared for each service in advance. The services may be, for example, transfer services, account opening services, account cancellation services, loss reporting services, and the like. Each of these services may trigger an online transaction. In the past, when this service was handled, multiple interfaces were invoked in succession based on online transactions. In the past, the processing mode of online transaction needs to call a plurality of interfaces continuously to execute the service, so that the time consumption is long. In addition, when one of the plurality of interfaces fails to execute, the service fails to execute, and an administrator can only look up the information of the service execution failure, but cannot obtain the error of the interface (link), so that the repairing time is long, manpower and material resources are wasted, and the user experience is poor.
The template operation item is to divide the service into a plurality of links, configure a corresponding template program for executing the link for each link, and take the template program as a corresponding template operation item. For example, in an account opening business, the link comprises a link (1) and a user for determining an intraspecific account identifier, a subaccount identifier and a threshold value for limiting a value of a transactable virtual resource, and a link (2) for determining an intraspecific account representation and an overseas subaccount identifier from the subaccount identifiers; and a link (3) builds a first virtual resource library and a second virtual resource library. Then there is a corresponding template operation item for link (1), a corresponding template operation item for link (2), and a corresponding template operation item for link (3).
Filling corresponding template operation items into the domestic special account identification, the sub-account identification and the limiting tradeable virtual resource numerical threshold received from the user terminal respectively to obtain corresponding operable items. The operable item is a computer program for implementing a corresponding link function.
After determining the actionable item, the actionable item is executed such that an outbound sub-account identification is determined from the sub-account identifications, and a first virtual resource pool is built based on the inbound private account identification and a second virtual resource pool is built based on the outbound sub-account identification.
It should be noted that the first virtual repository may further include an in-context sub-account identifier, and the second virtual repository may further include an outbound private account identifier. The in-home sub-account identifier is an identifier corresponding to an in-home part or office of the cross-border enterprise, and the out-of-home sub-account identifier is an identifier corresponding to an out-of-home part or office of the cross-border enterprise. The domestic private identity is an identity corresponding to the home headquarter of the cross-border enterprise in the domestic environment, and the overseas private identity is an identity corresponding to the shadow account corresponding to the domestic private identity.
It should be noted that, in the case that the request cross-border transaction user identifier is an identifier corresponding to an in-border user, if the first total virtual resource value corresponding to the request cross-border transaction user identifier is smaller than the virtual resource value, a target value of the sub-total virtual resource values corresponding to the plurality of in-border sub-account identifiers in the first virtual resource library corresponding to the cross-border transaction user identifier may be called, so that the first total virtual resource value is not smaller than the virtual resource value. That is, if the total value of the first virtual resource of the domestic headquarters is smaller than the value of the virtual resource to be traded, the target value of the virtual resource is called from the child virtual resources of the domestic branches to the first virtual resource, and the total value of the first virtual resource is updated so that the total value of the first virtual resource is not smaller than the value of the virtual resource. Therefore, simple, convenient and quick cross-border transaction is more intelligently realized.
According to another embodiment of the present specification, after executing the operational items to determine an outbound sub-account identification from the sub-account identifications, and to construct the first virtual resource pool based on the inbound private account identification and to construct the second virtual resource pool based on the outbound sub-account identification, further comprising: after the execution of the plurality of operable items is finished, acquiring execution result information corresponding to each operable item; and sending the success status information to the user terminal sending the account opening request under the condition that the execution result information is determined to be success status information indicating a success status; determining a correction rule according to the failure state information and a target operable item corresponding to the failure state information under the condition that the execution result information is determined to be the failure state information indicating the failure state; correcting the target operable item by using a correction rule to obtain a corrected operable item; executing the corrected operable item to obtain re-execution result information corresponding to the corrected operable item; and sending the success status information to the user terminal sending the account opening request under the condition that the re-execution result information is determined to be success status information indicating a success status.
After the execution of each operable item is completed, corresponding sub-execution result information is generated, and the sub-execution result information has two states, specifically, a success state and a failure state. And the operational item runs smoothly by the success state representation, and the established function target corresponding to the operational item is realized. Otherwise, the failure status representation does not achieve the established functional goal corresponding to the actionable item.
After the plurality of actionable items are executed, sub-execution result information corresponding to each actionable item is acquired. It is determined whether all of the plurality of sub-execution result information is success status information of an execution success status. And under the condition that all the information is determined to be the successful state information, determining that the execution result information is the successful state information indicating the successful state, and sending the successful state information to the user terminal sending the account opening request.
In a case where it is determined that the plurality of pieces of sub-execution result information include failure state information indicating a failure state, it is determined that the execution result information is the failure state information indicating the failure state. Further, an actionable item included with the failure status information is determined, and the actionable item is taken as a target actionable item. It should be noted that the failure status information also includes failure reason information. And pre-configuring corresponding preset correction rules aiming at each link in advance and aiming at possible failure reasons of the operable item corresponding to the link.
And determining a corresponding target link according to the target operable item. And determining a correction rule from a plurality of preset correction rules by using the failure reason information included in the failure state information. And correcting the target operable item by using the correction rule to obtain a corrected operable item.
And executing the corrected operable item, and acquiring re-execution result information corresponding to the corrected operable item. And under the condition that the re-execution result information is determined to be success state information, sending the success state information to the user terminal sending the account opening request. And if the re-execution result information is the failure state information, determining a correction rule according to the failure state information and the target operable item corresponding to the failure state information by the re-execution step so as to obtain the re-execution result information again until the obtained re-execution result information is the success state information.
Fig. 6 is a schematic structural diagram of a cross-border transaction apparatus according to an embodiment of the present disclosure. As shown in fig. 6, including,
a first determining unit 610, configured to determine a cross-border transaction requesting user identifier, a remittance user identifier, and a virtual resource value according to a received cross-border transaction request;
a second determining unit 620, configured to determine the first validation rule and the set of importable user identifiers according to the user identifier requesting the cross-border transaction;
a third determining unit 630, configured to determine whether there is a target importable user identifier matching the importable user identifier in the importable user identifier set in the case that it is determined that the cross-border transaction user identifier is requested to pass the verification of the first verification rule;
the verifying unit 640 is configured to verify the virtual resource value by using a second verification rule when it is determined that the target importable user identifier exists; and
an updating unit 650, configured to update, based on the virtual resource value, a first total virtual resource value corresponding to the user identifier requesting the cross-border transaction and a second total virtual resource value corresponding to the importing user identifier when it is determined that the virtual resource value passes the verification of the second verification rule.
Because the principle of the device for solving the problems is similar to that of the method, the implementation of the device can be referred to the implementation of the method, and repeated details are not repeated.
Fig. 7 is a schematic structural diagram of a computer device according to an embodiment of the present disclosure, and an apparatus in the present disclosure may be a computer device according to the present disclosure, and perform the method in the present disclosure. Computer device 702 may include one or more processing devices 704, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The computer device 702 may also include any storage resources 706 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, the storage resources 706 may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any storage resource may use any technology to store information. Further, any storage resource may provide volatile or non-volatile reservation of information. Further, any storage resources may represent fixed or removable components of computer device 702. In one case, when the processing device 704 executes associated instructions that are stored in any storage resource or combination of storage resources, the computer device 702 can perform any of the operations of the associated instructions. The computer device 702 also includes one or more drive mechanisms 708, such as a hard disk drive mechanism, an optical disk drive mechanism, or the like, for interacting with any storage resource.
Computer device 702 can also include an input/output module 710 (I/O) for receiving various inputs (via input device 712) and for providing various outputs (via output device 714). One particular output mechanism may include a presentation device 716 and an associated Graphical User Interface (GUI) 718. In other embodiments, input/output module 710 (I/O), input device 712, and output device 714 may not be included, but merely as a computer device in a network. Computer device 702 can also include one or more network interfaces 720 for exchanging data with other devices via one or more communication links 722. One or more communication buses 724 couple the above-described components together.
Communication link 722 may be implemented in any manner, such as over a local area network, a wide area network (e.g., the Internet), a point-to-point connection, etc., or any combination thereof. Communication link 722 may include any combination of hardwired links, wireless links, routers, gateway functions, name servers, etc., governed by any protocol or combination of protocols.
Embodiments of the present specification also provide a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the method.
Embodiments of the present specification also provide a computer program product, which includes a computer program, and when being executed by a processor, the computer program implements the method.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The description has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above embodiments are provided to further explain the purpose, technical solutions and advantages of the present specification in detail, and it should be understood that the above embodiments are merely exemplary embodiments of the present specification and are not intended to limit the scope of the present specification, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present specification should be included in the scope of the present specification.

Claims (10)

1. A cross-border transaction method, comprising:
determining a cross-border transaction request user identifier, a remittance user identifier and a virtual resource value according to a received cross-border transaction request;
determining a first verification rule and a remittable user identifier set according to the request cross-border transaction user identifier;
determining whether a target remittance user identification matched with the remittance user identification exists in the remittance user identification set under the condition that the request cross-border transaction user identification is determined to pass the verification of the first verification rule;
under the condition that the target remittance user identification exists, verifying the virtual resource value by using a second verification rule; and
and under the condition that the virtual resource value is determined to pass the verification of the second verification rule, updating a first virtual resource total value corresponding to the request cross-border transaction user identifier and a second virtual resource total value corresponding to the remitted user identifier based on the virtual resource value.
2. The method of claim 1, wherein in the event that the requesting cross-border transaction user identifier is determined to correspond to an intra-border user, determining the content of the first validation rule and the content of the set of importable user identifiers comprises:
acquiring a first virtual resource library and a second virtual resource library based on the request cross-border transaction user identifier, wherein the first virtual resource library comprises an intra-border private account identifier, and the second virtual resource library comprises an overseas sub-account identifier;
determining whether the requesting cross-border transaction user identification matches the domestic professional identification;
under the condition that the request cross-border transaction user identification is matched with the domestic professional identification, the request cross-border transaction user identification is verified through the first verification rule; and
and constructing the remittance user identification set based on the overseas sub-account identification.
3. The method of claim 2, wherein the building process of the first and second virtual resource pools comprises:
determining the internal special account identification, the sub-account identification and the limiting tradeable virtual resource value threshold value according to the received account opening request;
acquiring a template operation item based on the account opening request;
updating the template operation items respectively based on the domestic special account identification, the sub-account identification and the limiting tradeable virtual resource numerical value threshold value to obtain operable items; and
executing the actionable item to determine an outbound sub-account identification from the sub-account identifications, and building the first virtual resource pool based on the inbound private account identification and the second virtual resource pool based on the outbound sub-account identification.
4. The method as recited in claim 3, wherein after said executing the actionable item to determine an overseas sub-account identity from the sub-account identities, and to construct the first virtual resource pool based on the domestic private account identity and the second virtual resource pool based on the overseas sub-account identity, further comprising:
after the operable item is executed, acquiring execution result information corresponding to the operable item; and
under the condition that the execution result information is determined to be success state information indicating a success state, the success state information is sent to the user terminal which sends the account opening request;
determining a correction rule according to the failure state information and a target operable item corresponding to the failure state information under the condition that the execution result information is determined to be the failure state information indicating the failure state;
correcting the target operable item by using the correction rule to obtain a corrected operable item;
executing the corrected operable item to obtain re-execution result information corresponding to the corrected operable item; and
and under the condition that the re-execution result information is determined to be success state information indicating a success state, sending the success state information to the user terminal sending the account opening request.
5. The method of claim 1, wherein in the event that the requesting cross-border transaction user identifier is determined to correspond to an overseas user, determining the content of the first validation rule and the content importable into a set of user identifiers comprises:
matching the request cross-border transaction user identification with an off-border sub-account identification in a preset off-border virtual resource library;
under the condition that the identification of the user requesting the cross-border transaction is matched with the identification of the target overseas sub-account in the preset overseas virtual resource library, the identification of the user requesting the cross-border transaction is verified through the first verification rule;
acquiring a target intra-environment virtual resource library corresponding to the target overseas sub-account identifier, wherein the target intra-environment virtual resource library comprises an intra-environment special account identifier; and
and constructing the remittance user identification set based on the domestic private user identification.
6. The method of claim 1, wherein verifying the virtual resource value using a second verification rule if it is determined that the target importable user identifier exists comprises:
determining a threshold value for limiting tradable virtual resource values based on the cross-border trading user identification and/or the target remittance user identification;
under the condition that the virtual resource value is not larger than the threshold value of the limiting tradable virtual resource value, judging whether the first total virtual resource value corresponding to the request cross-border transaction user identifier is not smaller than the virtual resource value or not; and
and if the first virtual resource total value is not smaller than the virtual resource value, determining that the virtual resource value passes the verification of the second verification rule.
7. A cross-border transaction device, comprising:
the first determining unit is used for determining a cross-border transaction requesting user identifier, a remittance user identifier and a virtual resource value according to the received cross-border transaction request;
the second determining unit is used for determining a first verification rule and an incorporable user identifier set according to the request cross-border transaction user identifier;
a third determining unit, configured to determine whether a target remittance user identifier matching the remittance user identifier exists in the remittance user identifier set or not, if it is determined that the request cross-border transaction user identifier passes the verification of the first verification rule;
the verification unit is used for verifying the virtual resource value by using a second verification rule under the condition that the target importable user identifier is determined to exist; and
and the updating unit is used for updating a first virtual resource total value corresponding to the request cross-border transaction user identifier and a second virtual resource total value corresponding to the remitted user identifier based on the virtual resource value under the condition that the virtual resource value is confirmed to pass the verification of the second verification rule.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of the preceding claims 1-6 when executing the computer program.
9. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, is adapted to carry out the method of any of the preceding claims 1-6.
10. A computer program product comprising computer programs/instructions, characterized in that the computer programs/instructions, when executed by a processor, implement the steps of the method according to any of claims 1-6.
CN202211485399.8A 2022-11-24 2022-11-24 Cross-border transaction method and device, computer equipment and storage medium Pending CN115760411A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211485399.8A CN115760411A (en) 2022-11-24 2022-11-24 Cross-border transaction method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211485399.8A CN115760411A (en) 2022-11-24 2022-11-24 Cross-border transaction method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115760411A true CN115760411A (en) 2023-03-07

Family

ID=85337366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211485399.8A Pending CN115760411A (en) 2022-11-24 2022-11-24 Cross-border transaction method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115760411A (en)

Similar Documents

Publication Publication Date Title
CN110417558B (en) Signature verification method and device, storage medium and electronic device
CN106504094B (en) Transaction matching method and system of distributed general ledger system based on block chain technology
AU2020261982B2 (en) Extracting data from a blockchain network
US20200241929A1 (en) Distributed ledger for monitoring quality of services provided by cloud service providers
WO2020051540A1 (en) System and method for a hybrid contract execution environment
US20180183687A1 (en) System and Method for Managing Services and Licenses Using a Blockchain Network
US20200257776A1 (en) Request authorization using recipe-based service coordination
US20230037932A1 (en) Data processing method and apparatus based on blockchain network, and computer device
US11270030B2 (en) System and method for consensus management
CN112291372B (en) Asynchronous posting method, device, medium and electronic equipment for block chain
CN108615195B (en) Resource transfer information transmission method and device, storage medium and electronic device
US11238448B1 (en) Efficient network service provisioning
CN110572457B (en) Resource application method and device based on block chain, electronic equipment and storage medium
US11929892B2 (en) Network service activation system
CN112613877A (en) Intelligent contract triggering method and device applied to block chain network and related equipment
Nguyen et al. A blockchain-based iterative double auction protocol using multiparty state channels
JP2020184330A (en) Method and apparatus for continuous delivery of permissioned blockchain application
CN115760411A (en) Cross-border transaction method and device, computer equipment and storage medium
EP4365808A1 (en) Data verification method and apparatus
CN112926981B (en) Transaction information processing method, device and medium for block chain and electronic equipment
CN116997895A (en) Reducing transaction aborts in an execution ordering validation blockchain model
CN110135803B (en) Item management method and block chain link point equipment
CN113781230A (en) Transaction processing method and device based on block chain
WO2024066749A1 (en) Blockchain transaction execution method and apparatus, program product, device, and medium
US20240104558A1 (en) Blockchain transaction execution method and apparatus, program product, device, and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination