Suspicious transaction automatic identification and processing method, terminal and server

A technology for automatic identification and processing methods, applied in data processing applications, instruments, payment systems, etc., to achieve the effect of reducing the risk of abnormal accounting and accurate accounting analysis

Active Publication Date: 2019-11-08
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] An object of the present invention is to provide a method for automatic identification and processing of suspicious transactions, which can effectively solve the problems of automatic analysis of suspicious transactions, identification of transaction granularity, and automatic processing of different types of transactions between heterogeneous systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Suspicious transaction automatic identification and processing method, terminal and server
  • Suspicious transaction automatic identification and processing method, terminal and server
  • Suspicious transaction automatic identification and processing method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0065] According to one aspect of the present invention, this embodiment discloses a suspicious transaction automatic identification and processing method (server side). Such as figure 1 As shown, in this embodiment, the suspicious transaction automatic identification and processing method includes:

[0066] S100: Obtain yesterday's transaction logs of all accounting processing systems, wherein the transaction log is a transaction initiation channel terminal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a suspicious transaction automatic identification and processing method, a terminal and a server. The suspicious transaction automatic identification and processing method comprises the following steps: obtaining yesterday transaction logs of all accounting processing systems, wherein the transaction log is a transaction request transmitted by a user and received by a transaction initiating channel terminal; forming a transaction number corresponding to the transaction request, and respectively transmitting the transaction request and the transaction number to a corresponding accounting processing system to enable the accounting processing system to perform accounting processing according to the transaction request, and forming a transaction log according to accounting processing information and the transaction number; and carrying out suspicious transaction automatic identification and processing according to the yesterday transaction log. According to the invention, the problems of suspicious transaction automatic analysis, transaction granularity identification and automatic processing of different types of transactions between heterogeneous systems can beeffectively solved.

Description

technical field [0001] The invention relates to the technical field of suspicious transaction processing, in particular to a suspicious transaction automatic identification and processing method, terminal and server. Background technique [0002] In recent years, with the rapid development of Internet finance, the fast payment and cash withdrawal services of third-party payment institutions have grown rapidly. The single reserve account of third-party payment institutions has the characteristics of high timeliness and sudden growth in transaction volume. Bank host systems bring certain performance and capacity risks. At present, many banks adopt the integrated architecture of mainframe + distributed open platform, and take advantage of the low-cost and easy-to-expand technical advantages of the platform to deal with the performance and capacity problems brought about by the rapid development of fast payment and other services. [0003] The host system has superior performan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/08G06Q20/40G06Q20/38
CPCG06Q20/0855G06Q20/4016G06Q20/382
Inventor 张凯谭汉清杨书雅
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products