Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Blacklist processing method and system

A processing method and blacklist technology, applied in the computer field, can solve the problems of lack of blacklist maintenance and application standards, inability to realize blacklist joint prevention and control, and confusion in blacklist management.

Active Publication Date: 2019-04-26
CHINA CONSTRUCTION BANK
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in large enterprises, each business department mainly formulates its own blacklist standards according to its own business needs, and stores the blacklist of its own business. Each department needs to maintain and manage its own blacklist system, and can only Invoking the blacklist formulated by each department, lack of uniform blacklist maintenance and application standards between systems, blacklist management is chaotic, and joint defense and joint control of blacklists in enterprises cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blacklist processing method and system
  • Blacklist processing method and system
  • Blacklist processing method and system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0083] Deploy a copy of the local blacklist in the card account and channel business processing system of the bank. The copy of the local blacklist stores blacklist information. The relevant business processing system enables the blacklist information of the local blacklist copy to be updated in quasi-real time with the update of the blacklist shared database.

[0084] In the bank's card account business process, for business processes with relatively simple business links and processing methods, when processing specific businesses, access the local blacklist copy to check whether the current customer is blacklisted, if the customer is blacklisted, then according to The business process uses corresponding processing methods to process the current business, and the processing methods are denial, execution control or suspension, and do not need to access the blacklist shared database. This method of applying the blacklist in the enterprise simplifies the business processing proc...

example 2

[0086]In the bank's card account business process, when processing specific businesses, access the copy of the local blacklist to check whether the current customer is blacklisted, if the customer is blacklisted, access the blacklist shared database through the blacklist management system, and according to Describe the customer's identity and the processing method corresponding to the business link query, and process the current business according to the processing method. In the specific business of an enterprise, the probability of a customer being blacklisted is very small. If you visit the blacklist shared database every time to judge whether the current customer is blacklisted, the workload of the blacklist shared database will be increased, and the business processing efficiency will be reduced. Establish a copy of the local blacklist, and judge whether the current customer is blacklisted by accessing the copy of the local blacklist, which reduces the workload of the blac...

example 3

[0088] In the customer business process of the bank, regardless of whether the customer is blacklisted or not when processing customer business, relevant personnel will access the customer information system, and inputting the relevant identity will return whether the customer is blacklisted. Among them, the customer An information system is a management information system in an enterprise.

[0089] In the specific business, it is necessary to check whether the transaction subject is blacklisted multiple times, and for transactions with high response time requirements, access the blacklist shared database through the blacklist management system, and query the customer's status in all business links according to the current customer's identity The processing method is to establish a local cache of the search results, and establish a mapping relationship between the application transaction code and the business link and processing method. The application transaction code is a num...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a blacklist processing method and system. The blacklist processing method includes: acquiring blacklist information generated during each of service flows of an enterprise, wherein the blacklist information includes identify identifications of blacklists and causes of the blacklists; determining a processing manner corresponding to every blacklist information in service stages of different service flows; and associating the blacklist information and the processing manner corresponding to the blacklist information in the service stages of the different service flows to a blacklist sharing database, and allowing each of the service flows to share the processing manner corresponding to every blacklist information in different service stages in the blacklist sharing database. Based on the blacklist processing method, the blacklists generated during each service flow of the enterprise can be managed uniformly, the standardized blacklist sharing database is established, and then all the service departments of the enterprise can call the blacklist sharing database, and joint defense and joint control of the enterprise for the blacklists can be achieved.

Description

technical field [0001] The present invention relates to the field of computers, and more specifically, to a blacklist processing method and system. Background technique [0002] In the process of business dealings between a customer and an enterprise, if the customer violates the contract signed with the enterprise to a certain extent, or the customer (or account, card, merchant, etc.) provided by the regulatory agency has a certain bad record, the enterprise will These customers (or accounts, cards, merchants, etc.) are blacklisted and will be restricted from conducting certain businesses. [0003] At present, in large enterprises, each business department mainly formulates its own blacklist standards according to its own business needs, and stores the blacklist of its own business. Each department needs to maintain and manage its own blacklist system, and can only Calling the blacklist formulated by each department lacks uniform blacklist maintenance and application stand...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/55
Inventor 林杨吴奇昌李雯邹浩李杨徐莉万竟龚正东
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products