Internet Finance SaaS Service Practice

     WeX Cloud Finance provides Internet financial service solutions for cooperative enterprises. With SaaS cloud technology solutions as the core, it provides one-stop Internet financial product services from system construction to service operation and maintenance, operation promotion and brand building. After completing the domain name resolution, point to the designated domain name provided by WeX Cloud Finance to have an exclusive mutual fund platform.

 

Service Mode:


 As can be seen from the above figure, WeX Cloud Finance supports two modes: cloud site and development platform. Merchants can choose and combine according to their own characteristics. While solving efficiency and cost, they also have the ability to expand independently.

  

Support content :

  • l Terminal presentation mode: WEB, WAP, APP; 
  • l Supported business: commodity-based account, regular financial management, current financial management, product crowdfunding;
  • l Support repayment methods: repayment of principal and interest at maturity, repayment of principal and interest at maturity, equal principal, equal principal and interest, equal principal and equal interest, early repayment of interest and principal repayment;
  • l Support marketing methods: subsidize income, send red envelopes, send in kind, etc.;
  • l Reminder content: notice of principal and interest repayment, reminder of repayment due, red envelope issuance, etc.

WeX cloud financial service adopts a distributed cluster model, which has good performance in terms of service security, stability and scalability. Through reasonable analysis and design, the functions of domain services are separated and abstracted, which greatly improves the scalability of services and isolates the mutual influence of different businesses.

 

System Architecture Diagram:



 
The following introduces how we improve security, stability and scalability from the aspects of network hardware architecture and system architecture.

 

Network hardware architecture perspective

 

  1. Dynamic and static separation, independent deployment of static resources, and CDN acceleration services;
  2. Internal and external network isolation, using hierarchical firewall to control access rights;
  3. Network segmentation is performed according to service core characteristics and core levels to improve security;
  4. The external channel service adopts the dedicated line mode to improve the response speed;
  5. Service cluster improves service stability and availability through intelligent load balancing;
  6. The database adopts read-write separation and independent storage cluster to improve data response efficiency and success rate;
  7. The remote disaster recovery of the computer room is adopted to ensure high service availability and data security.

 system architecture perspective

 

  1. Layer services: portals, business services, core services, basic support, network segmentation, and distribution of cluster services, etc., to improve service quality, security, and ability to adapt to changes;
  2. Abstract service is to separate common and essential features from services independently, so as to improve the reusability of services and speed up the ability to cope with expansion. Such as transaction process, strategy judgment, etc.;
  3. The synchronization chain is shortened, and the asynchronous reliable message queue can be used to complete the overall business chain for those with non-high synchronization requirements to improve the throughput;
  4. Reduce transaction blocks to reduce database connection time and lock time;
  5. Reduce hotspot competition. For resources with frequent competition, use buffer queue, partition and other modes to improve response speed. such as inventory control, etc.;
  6. Self-healing, self-promotion of business for abnormal scenarios, with automatic reconciliation service to ensure business availability and stability;
  7. Sensitive information is encrypted, using a unified encryption and decryption service that complies with PCI certification, and no sensitive information is retained in business data, including ciphertext information;
  8. Original voucher review, register the original voucher at the business entrance, and cooperate with the risk control service to complete the original voucher review in the entire business flow to ensure the authenticity and consistency of the information.

System construction stems from business needs. Only a system architecture that can adapt to business development is a good architecture. The WeX cloud financial system is accumulated from its own operating experience, with a deep understanding of the business, combined with the team's many years of third-party experience The experience in payment business has a better interpretation of the operation and security of the financial system.

 

Guess you like

Origin http://10.200.1.11:23101/article/api/json?id=326706746&siteId=291194637