CN111639962B - Two-level law pedestrian society demand sharing and confidentiality system - Google Patents

Two-level law pedestrian society demand sharing and confidentiality system Download PDF

Info

Publication number
CN111639962B
CN111639962B CN202010311345.4A CN202010311345A CN111639962B CN 111639962 B CN111639962 B CN 111639962B CN 202010311345 A CN202010311345 A CN 202010311345A CN 111639962 B CN111639962 B CN 111639962B
Authority
CN
China
Prior art keywords
requirement
demand
finger
man
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010311345.4A
Other languages
Chinese (zh)
Other versions
CN111639962A (en
Inventor
马胜蓝
周金蓉
伊瑞华
陈兆雁
章雪峰
曾蓉
林倩
陈茂
谢宇君
陈鑫
刘益程
郭超年
王桐森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Rural Credit Union
Original Assignee
Fujian Rural Credit Union
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Rural Credit Union filed Critical Fujian Rural Credit Union
Priority to CN202010311345.4A priority Critical patent/CN111639962B/en
Publication of CN111639962A publication Critical patent/CN111639962A/en
Application granted granted Critical
Publication of CN111639962B publication Critical patent/CN111639962B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • G06Q30/0202Market predictions or forecasting for commercial activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/31Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/38Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Artificial Intelligence (AREA)
  • Human Computer Interaction (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Computation (AREA)
  • Game Theory and Decision Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Multimedia (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Library & Information Science (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a system for sharing and keeping secret of requirements of a second-level legal people society in the field of computer system application, which comprises a first repeated judgment module, a requirement proposing module, a second repeated judgment module, a normal evaluation module, a requirement development module and a warehousing module, wherein fingerprints of a requirement r, fingerprints of an original requirement r-ser of a requirement service platform, fingerprints of an original requirement r-man of a requirement management platform and fingerprints of an original requirement r-ass of a requirement asset library are respectively calculated by utilizing a fingerprint matching algorithm, so that the similarity of the fingerprints at each stage is calculated, similar common requirements are avoided being repeatedly proposed as much as possible, and the product requirements of a second-level legal person bank are subjected to full-life-cycle personalized management; the individual requirements of the second-level legal bank are kept secret by setting the public policy of the requirements to be completely public, partially public, only a title is disclosed or not disclosed, namely a mechanism and a process for sharing and keeping secret in the whole life cycle from requirement proposing, accepting, analyzing, compiling to production are established.

Description

Two-level law people and society demand sharing and confidentiality system
Technical Field
The invention relates to the field of computer system application, in particular to a two-level law human society demand sharing and confidentiality system.
Background
With the increasing market competition, banks need to optimize systems and launch new products to meet the market demands. The demand is used as a source of product development, describes the conditions or capabilities that a product or a system must meet, and the quality of demand management determines the efficiency, quality and cost of bank product development and even influences the success or failure of the product. Under the second-level legal system, the first-level legal bank comprehensively builds the individual requirements and the common requirements of the second-level legal banks.
On one hand, each second-level legal bank is in profit and loss, and competitive relations exist among second-level legal banks; for the common demand, the secondary legal bank expects to quickly find out related common demand data through a demand platform (comprising a demand service platform and a demand management platform); for personalized needs, the second-level legal bank expects to keep secret; on the other hand, the first-level legal bank needs to avoid repeated propositions of similar demands as much as possible. Under the background of coexistence of personalized demands and common demands, some demand management tools and methods are used by some banks to improve the level of demand fine management.
However, for demand management, traditionally, only analysis of a certain stage of the demand life cycle is focused, and the full life cycle is not considered, and the sharing and confidentiality of the demand under the second-level legal system are not considered. For example, chinese patent application No. CN201810236047.6, having application No. 2018.03.21, discloses a method and apparatus for matching demand, a storage medium, and a terminal, which mainly solve the problem that a conventional matching method requires that a keyword input by retrieval is completely consistent with a name provided in a library to query a result, that is, a demand matching method from the perspective of obtaining user demand; the Chinese invention patent with the application date of 2019.09.03 and the application number of CN201910837657.6 discloses a method and a system for managing bank service demand assets, mainly solves the problems of insufficient reuse of the demand assets and the like, and improves the reuse rate of the demand by managing the demand assets in a standardized way; the Chinese invention patent with the application date of 2018.06.09 and the application number of CN201810590693.2 discloses a modeling and data privacy protection method based on a data map, an information map and a knowledge map, and mainly solves the problem that the information privacy which cannot be directly found can still be obtained by analyzing data, associated information and analysis information by combining the relevant data and the like because the existing demand modeling method does not distinguish typed resources and various privacy resources are mutually interwoven, namely only a demand modeling confidentiality solution based on the knowledge map is considered, and the confidentiality problem of the demand in different life cycles is not considered.
Therefore, how to provide a system for sharing and keeping secret the requirements of the second-level legal people society to realize the personalized management of the product requirements of the second-level legal people bank in the whole life cycle, avoid the similar common requirements being repeatedly proposed as much as possible, keep secret the personalized requirements, and become a problem to be solved urgently.
Disclosure of Invention
The invention aims to solve the technical problem of providing a system for sharing and keeping secret of requirements of a second-level legal people society, realizing the personalized management of the product requirements of a second-level legal bank in the whole life cycle, avoiding similar common requirements from being repeatedly proposed as much as possible, and keeping secret of the personalized requirements.
The invention is realized by the following steps: a two-level law-based human society requirement sharing and confidentiality system comprises the following modules:
the first repeated judgment module is used for sending a repeated judgment request of the requirement r to the requirement service platform by the requirement presenter through a second-level legal person bank, judging whether the requirement r is repeated with the original requirement r-ser of the requirement service platform or not and generating a repeated judgment result;
the requirement proposing module is used for deciding whether to propose a requirement application of a requirement r or not by a requirement propositor based on the repeated judgment result, if so, the requirement application is sent to a requirement service platform through a second-level legal bank, the requirement application comprises a public strategy, and the requirement application enters a second repeated judgment module; if not, ending the flow;
the second repeated judgment module is used for judging whether the requirement r is repeated with the original requirement r-man of the requirement management platform and the original requirement r-ass of the requirement asset library by the acceptors of the requirement service platform, and if so, entering the first repeated judgment module; if not, entering a normal evaluation module;
the normal evaluation module is used for performing a normal evaluation process on the requirement r by the acceptors, and entering the requirement development module if the evaluation is passed; if the evaluation is not passed, ending the process;
the demand development module is used for the acceptors to send the demand r to the demand management platform through the demand service platform, and the demand engineers develop the product of the demand r; setting a first privacy rule of a requirement r by utilizing the public strategy;
and the warehousing module is used for sending the demand r to the demand asset library for storage by the demand management platform after the demand r is put on production and is set to correspond to a second confidentiality rule of the catalogue of the demand asset library by the public strategy.
Further, in the first repeated judgment module, the judging whether the requirement r is repeated with the original requirement r-ser of the requirement service platform, and generating a repeated judgment result specifically includes:
the method comprises the steps that a threshold value is set by a demand service platform, the original demand of the demand service platform is set to be r-ser, and the fingerprint finger of r is respectively calculated by the demand service platform through a fingerprint matching algorithmrFinger print finger of r-serr-serCalculating fingerrAnd fingerr-serAnd determining whether the first similarity is smaller than a threshold, if not, generating a non-repeated determination result; if yes, generating repeated judgment results.
Further, the fingerprint matching algorithm specifically includes:
finger={f1:cf1,......,fn,cfn};
n=ns+nt+nk;
finger represents fingerprint, and refers to a required keyword set; f. ofnRepresenting the nth keyword, wherein n is a positive integer; cfnRepresenting the importance of the nth keyword; ns represents the number of bank systems, nt represents the number of common keywords of bank requirements, nk represents the number of newly-added keywords of bank requirements, and ns, nt and nk are positive integers.
Further, in the requirement proposing module, the disclosure strategy is fully disclosed, partially disclosed, only a title is disclosed, or not disclosed.
Further, in the second repeated determination module, the specific step of judging whether the requirement r is repeated with the original requirement r-man of the requirement management platform and the original requirement r-ass of the requirement asset library by the acceptors of the requirement service platform is as follows:
acquiring original requirements r-man of a requirement management platform and original requirements r-ass of a requirement asset library, and respectively calculating fingerprint fingers of the r-man by using a fingerprint matching algorithmr-manAnd fingerprint finger of r-assr-assSeparately calculate fingerrAnd fingerr-manAnd fingerr-assAnd determining whether the second similarity or the third similarity is less than a thresholdIf yes, description is not repeated; if not, the description is repeated.
Further, the computing fingerrAnd fingerr-serCalculating fingerr2And fingerr-manSecond similarity of (2), calculating fingerr3And fingerr-assThe third similarity specifically is:
Figure BDA0002457953190000041
Figure BDA0002457953190000042
Figure BDA0002457953190000043
where cos θ1Denotes a first degree of similarity, cos θ2Representing a second degree of similarity, cos θ3Represents a third similarity; w represents a weight vector of the keyword set, and W ═ WFNS, WFNT, WFNK };
WFNS={w1,w2,......,wns},WFNT={w1,w2,......,wnt},WFNK={w1,w2,......,wnk},wns、wnt、wnkweight vector, w, representing a keywordns≥wnt>wnk(ii) a FNS means [1, ns ]]A set formed by bank system names corresponding to the keywords; FNT represents [ ns +1, ns + nt]A set formed by common bank demand keywords corresponding to the keywords; FNK represents [ ns + nt +1, ns + nt + nk]The bank requirement corresponding to each keyword is newly added with a set formed by the keywords.
Further, in the requirement development module, the first privacy rule specifically includes:
for any r-man, if the publication policy is not, all requirements associated with that r-man are set to be publication-only headings; if the publication policy is partial publication, then the requirement engineer confirms whether to completely disclose or only disclose the title; if the publication policy is to disclose completely or only to disclose the title, then set as disclosure; if there are more than 1 r-man publication strategies that are not published, then it is confirmed by the requirements engineer that they are fully published, only the title is published, or not published.
Further, in the warehousing module, the second security rule specifically is:
if the public strategy of the directory is not public, setting the public strategies of the r-man and the r-ass as not public; if the disclosure policy of the directory is only disclosure title, then the disclosure policies of r-man and r-ass are set to only disclosure title; if the disclosure strategy of the directory is completely disclosed, setting the disclosure strategies of r-man and r-ass as completely disclosed;
if the public strategy of more than or equal to 1 r-man is not disclosed, setting the public strategy of the directory as not disclosed; if the disclosing policy of more than or equal to 1 r-man exists as the disclosure-only title, setting the disclosing policy of the directory as the disclosure-only title; if the r-man publication policy is fully published, then the directory publication policy is set to fully published.
The invention has the advantages that:
respectively calculating fingerprint finger of r by using fingerprint matching algorithmrFinger print finger of r-serr-serR-man fingerprint fingerr-manFinger print finger of r-assr-assThen, the similarity of fingerprints at each stage is calculated, similar common requirements are prevented from being repeatedly proposed as much as possible, and the product requirements of a second-level legal bank are subjected to full-life-cycle personalized management; through setting the public strategy, the privacy of the personalized requirements of the second-level legal bank is realized, namely a mechanism and a process from requirement proposing, acceptance, analysis, writing and production to full life cycle sharing and privacy are established.
The method has the advantages that the second-level legal bank keeps personalized requirements secret to a certain extent according to the wish of the second-level legal bank, the competitive advantage of the second-level legal bank is maintained, meanwhile, through a fingerprint matching algorithm, the common requirements are reduced and are repeatedly proposed, the management mode that the requirements are widely dispersed is changed, the time and labor cost for accepting and analyzing the requirements of the first-level legal bank are reduced, a good atmosphere shared by the common requirements of all the second-level legal banks is formed, and more scientific, efficient and refined requirement management is further achieved.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
FIG. 1 is a schematic block diagram of a two-level legal community demand sharing and security system of the present invention.
Fig. 2 is a hardware architecture diagram of a system for two-level law enforcement agency requirement sharing and security of the present invention.
FIG. 3 is a flow chart of a system for two-level legal community demand sharing and privacy of the present invention.
Detailed Description
The technical scheme in the embodiment of the application has the following general idea: respectively calculating fingerprints required at all stages of the full life cycle through a fingerprint matching algorithm, and further calculating similarity through the fingerprints, eliminating the requirement of high similarity, and avoiding the similar common requirement from being repeatedly proposed; and setting a privacy rule according to the requirement by a public strategy to realize privacy of the personalized requirement of the second-level legal bank, and further establishing a sharing and privacy mechanism.
Referring to fig. 1 to fig. 3, a preferred embodiment of a system for sharing and securing requirements of a second-level legal community of the present invention includes the following modules:
the first repeated judgment module is used for sending a repeated judgment request of a demand r to the demand service platform by a demand provider through a second-level legal bank, judging whether the demand r is repeated with the original demand r-ser of the demand service platform, generating a repeated judgment result and listing links of similar demands; the requirement r can be divided into a requirement list or a requirement item according to the refinement degree;
the requirement proposing module is used for deciding whether to propose a requirement application of a requirement r or not by a requirement propositor based on the repeated judgment result, if so, the requirement application is sent to a requirement service platform through a second-level legal bank, the requirement application comprises a public strategy, and the requirement application enters a second repeated judgment module; if not, ending the flow;
the second repeated judgment module is used for judging whether the requirement r is repeated with the original requirement r-man of the requirement management platform and the original requirement r-ass of the requirement asset library by the acceptors of the requirement service platform, and if so, entering the first repeated judgment module; if not, entering a normal evaluation module;
the normal evaluation module is used for performing a normal evaluation process on the requirement r by the acceptors, and entering the requirement development module if the evaluation is passed; if the evaluation is not passed, ending the process;
the demand development module is used for the acceptors to send the demand r to the demand management platform through the demand service platform, and the demand engineers develop the product of the demand r; setting a first security rule of the requirement r by utilizing the public strategy; when a demand engineer of the demand management platform accepts the demand r, all contents of the demand r can be seen; after the product development is finished, the similarity needs to be recalculated, and the requirement with the highest similarity is replaced;
and the warehousing module is used for sending the demand r to the demand asset library for storage by the demand management platform after the demand r is put on production and is set to correspond to a second confidentiality rule of the catalogue of the demand asset library by the public strategy.
The demand service platform is used for accepting user demands or business demands submitted by all secondary legal banks; the demand management platform is used for refining user demands or business demands of the demand service platform, compiling functional/non-functional demands, forming a plurality of demand cases (for example, single account transfer and batch account transfer in online bank transfer and remittance belong to different cases respectively), and summarizing to form a complete demand case specification; after the demand is realized, the demand specification date is filed in the demand asset library according to different use cases and different catalogues (one catalogue contains one or more use cases, for example, a transfer remittance catalogue in an online bank comprises two use cases of single transfer and batch transfer) in the demand asset library to form a plurality of entries; the relation among the demand catalogue, the demand use case and the keyword is as follows: there are N demand use cases (i.e., entries) and M keywords under a demand directory in the demand asset library. While different directories in the demand asset library configure different publication policies.
In the first repeated judgment module, the judging whether the requirement r is repeated with the original requirement r-ser of the requirement service platform, and the generating of the repeated judgment result specifically comprises:
the method comprises the steps that a threshold value is set by a demand service platform, the original demand of the demand service platform is set to be r-ser, and the fingerprint finger of r is respectively calculated by the demand service platform through a fingerprint matching algorithmrFinger print finger of r-serr-serCalculating fingerrAnd fingerr-serAnd determining whether the first similarity is smaller than a threshold, if not, generating a non-repeated determination result; if yes, generating repeated judgment results.
The fingerprint matching algorithm specifically comprises the following steps:
finger={f1:cf1,......,fn,cfn};
n=ns+nt+nk;
finger represents a fingerprint, refers to a required keyword set, and is described as a node of functional operation of a system according to a required use case; f. ofnRepresenting the nth keyword, wherein n is a positive integer; cfnExpressing the importance of the nth keyword, and calculating by adopting a TF-IDF algorithm, wherein TF is the number of times the keyword appears in the requirement/the total word number of the requirement, IDF is lg (the total number of the requirement items of the requirement asset library/the number of the requirement items containing the keyword +1), TF expresses the word frequency, and IDF expresses the inverse text frequency index; the TF-IDF algorithm is a common weighting technique used for information retrieval and data mining; ns represents the number of bank systems, nt represents the number of common keywords of bank requirements, nk represents the number of newly-added keywords of bank requirements, and ns, nt and nk are positive integers.
For the requirements of different life cycles, because the granularity and the integrity degree are different, the keywords corresponding to the calculated fingerprints are different; for the demand in the demand service platform, keywords are extracted from the title; for the requirements in the requirement management platform, keywords are extracted from titles, descriptions, processes, inputs and outputs of requirement use cases; for the requirement in the requirement asset library, keywords are extracted from the catalog, title, description of requirement use case, flow, input and output of the requirement asset library.
In the requirement proposing module, the disclosure strategy is fully disclosed, partially disclosed, only a title is disclosed, or not disclosed. The information is completely disclosed, so all users can view the information; partial disclosure, then the requirements engineer confirms whether to disclose the title completely or only; only the title is disclosed, all users can see the disclosed title only; if the bank is not published, only the bank of the second-level legal person who proposes the requirement has the right to check, and the banks of other second-level legal persons have no right to check; for full disclosure and disclosure of headings only, the time range of disclosure may be set as desired.
In the second repeated judging module, the step of judging whether the requirement r is repeated with the original requirement r-man of the requirement management platform and the original requirement r-ass of the requirement asset library by the acceptors of the requirement service platform specifically comprises the following steps:
acquiring original requirements r-man of a requirement management platform and original requirements r-ass of a requirement asset library, and respectively calculating fingerprint fingers of the r-man by utilizing a fingerprint matching algorithmr-manAnd fingerprint finger of r-assr-assSeparately calculate fingerrAnd fingerr-manAnd fingerr-assJudging whether the second similarity or the third similarity is smaller than a threshold value, if so, indicating no repetition; if not, the description is repeated.
The computing fingerrAnd fingerr-serFirst similarity of (2), calculating fingerr2And fingerr-manSecond similarity of (2), calculating fingerr3And fingerr-assThe third similarity specifically is:
Figure BDA0002457953190000081
Figure BDA0002457953190000082
Figure BDA0002457953190000083
where cos θ1Denotes the first degree of similarity, cos θ2Representing a second degree of similarity, cos θ3Represents a third similarity; w represents a weight vector of the keyword set, and W ═ WFNS, WFNT, WFNK };
WFNS={w1,w2,......,wns},WFNT={w1,w2,......,wnt},WFNK={w1,w2,......,wnk},wns、wnt、wnkweight vector, w, representing a keywordns≥wnt>wnk(ii) a FNS means [1, ns ]]A set formed by bank system names corresponding to the keywords, such as a core system, a counter system and the like; FNT represents [ ns +1, ns + nt]A set formed by common key words of bank requirements corresponding to the key words, such as a certificate, a deposit, a clearing and the like; FNK represents [ ns + nt +1, ns + nt + nk]The bank requirement corresponding to each keyword is newly added with a set formed by the keywords. The FNS and FNT are a set formed by keywords corresponding to the catalogue in the demand asset library, and have higher authority than FNK, so that wns≥wnt>wnk
In the requirement development module, the first privacy rule specifically includes:
for any r-man, if the disclosure policy is not, all requirements associated with the r-man are set to disclose only the title (i.e. a certain requirement is private, such as a special interface of a second-level legal bank, only the title can be displayed, but the required content of the privacy cannot be viewed in an associated manner); if the publication policy is partial publication, then the requirements engineer confirms whether the title is fully published or only published (i.e., the requirement itself is published, but some of the details are private); if the publication policy is to disclose completely or only to disclose the title, then set as disclosure; if there are more than 1 r-man publication strategies that are private, then it is confirmed by the requirements engineer that they are either fully public, only the title is public, or private.
In the warehousing module, the second security rule is specifically as follows:
if the public strategy of the directory is not public, setting the public strategies of r-man and r-ass as not public; if the disclosure policy of the directory is only disclosure title, then the disclosure policies of r-man and r-ass are set to only disclosure title; if the disclosure strategy of the directory is completely disclosed, setting the disclosure strategies of r-man and r-ass as completely disclosed;
if the disclosing strategy of more than or equal to 1 r-man is not disclosed and the requirement of not disclosing exists, the disclosing strategy of the catalog is set to be not disclosed; if the disclosing strategy of more than or equal to 1 r-man is the disclosing-only title, setting the disclosing strategy of the catalogue to the disclosing-only title; if the r-man publication policy is fully published, then the directory publication policy is set to fully published.
In summary, the invention has the advantages that:
respectively calculating fingerprint finger of r by using fingerprint matching algorithmrFinger print finger of r-serr-serR-man fingerprint fingerr-manFinger print finger of r-assr-assThen, the similarity of fingerprints at each stage is calculated, similar common requirements are prevented from being repeatedly proposed as much as possible, and the product requirements of a second-level legal bank are subjected to full-life-cycle personalized management; through setting the public strategy, the privacy of the personalized requirements of the second-level legal bank is realized, namely a mechanism and a process from requirement proposing, acceptance, analysis, writing to production and full life cycle sharing and privacy are established.
The method has the advantages that the second-level legal bank keeps personalized requirements secret to a certain extent according to the wish of the second-level legal bank, the competitive advantage of the second-level legal bank is maintained, meanwhile, through a fingerprint matching algorithm, the common requirements are reduced and are repeatedly proposed, the management mode that the requirements are widely dispersed is changed, the time and labor cost for accepting and analyzing the requirements of the first-level legal bank are reduced, a good atmosphere shared by the common requirements of all the second-level legal banks is formed, and more scientific, efficient and refined requirement management is further achieved.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.

Claims (4)

1. A two-level law-based human society requirement sharing and confidentiality system is characterized in that: the system comprises the following modules:
the first repeated judgment module is used for sending a repeated judgment request of a demand r to the demand service platform by a demand provider through a second-level legal bank, judging whether the demand r is repeated with an original demand r-ser of the demand service platform or not and generating a repeated judgment result;
the requirement proposing module is used for deciding whether to propose a requirement application of a requirement r or not by a requirement proposing person based on the repeated judgment result, if so, the requirement application is sent to a requirement service platform through a second-level legal person bank, the requirement application comprises a public strategy, and the second repeated judgment module is entered; if not, ending the flow;
the second repeated judgment module is used for judging whether the requirement r is repeated with the original requirement r-man of the requirement management platform and the original requirement r-ass of the requirement asset library by the acceptors of the requirement service platform, and if so, entering the first repeated judgment module; if not, entering a normal evaluation module;
the normal evaluation module is used for performing a normal evaluation process on the requirement r by the acceptors, and entering the requirement development module if the evaluation is passed; if the evaluation is not passed, ending the process;
the demand development module is used for the acceptors to send the demand r to the demand management platform through the demand service platform, and the demand engineers develop the product of the demand r; setting a first privacy rule of a requirement r by utilizing the public strategy;
the warehousing module is used for sending the demand r to a demand asset library for storage by the demand management platform after the demand r is put into production and is on line, and setting a second confidentiality rule of a catalogue of the demand asset library corresponding to the demand r by using the public strategy;
in the first repeated judgment module, the judging whether the requirement r is repeated with the original requirement r-ser of the requirement service platform, and the generating of the repeated judgment result specifically comprises:
the method comprises the steps that a threshold value is set by a demand service platform, the original demand of the demand service platform is set to be r-ser, and the fingerprint finger of r is respectively calculated by the demand service platform through a fingerprint matching algorithmrFinger print finger of r-serr-serCalculating fingerrAnd fingerr-serAnd determining whether the first similarity is smaller than a threshold, if not, generating a non-repeated determination result; if yes, generating a repeated judgment result;
the fingerprint matching algorithm specifically comprises the following steps:
finger={f1:cf1,……,fn: cfn};
n=ns+nt+nk;
finger represents a fingerprint and refers to a keyword set of a demand; f. ofnRepresenting the nth keyword, wherein n is a positive integer; cfnRepresenting the importance of the nth keyword; ns represents the number of bank systems, nt represents the number of common keywords of bank requirements, nk represents the number of newly-added keywords of bank requirements, and ns, nt and nk are positive integers;
in the second repeated judging module, the step of judging whether the requirement r is repeated with the original requirement r-man of the requirement management platform and the original requirement r-ass of the requirement asset library by the acceptors of the requirement service platform specifically comprises the following steps:
acquiring original requirements r-man of a requirement management platform and original requirements r-ass of a requirement asset library, and respectively calculating fingerprint fingers of the r-man by utilizing a fingerprint matching algorithmr-manAnd fingerprint finger of r-assr-assSeparately calculate fingerrAnd fingerr-manAnd fingerr-assJudging whether the second similarity or the third similarity is smaller than a threshold value, if so, indicating no repetition; if not, repeating the description;
the computing fingerrAnd fingerr-serCalculating fingerrAnd fingerr-manSecond similarity of (2), calculating fingerrAnd fingerr-assThe third similarity specifically is:
Figure FDA0003594103530000021
Figure FDA0003594103530000022
Figure FDA0003594103530000023
where cos θ1Denotes a first degree of similarity, cos θ2Representing a second degree of similarity, cos θ3Represents a third similarity; w represents a weight vector of the keyword set, and W ═ WFNS, WFNT, WFNK };
WFNS={w1,w2,......,wns},WFNT={w1,w2,......,wnt},WFNK={w1,w2,......,wnk},wns、wnt、wnkweight vector, w, representing a keywordns≥wnt>wnk(ii) a FNS means [1, ns ]]A set formed by bank system names corresponding to the keywords; FNT represents [ ns +1, ns + nt]A set formed by common bank demand keywords corresponding to the keywords; FNK represents [ ns + nt +1, ns + nt + nk]The bank requirement corresponding to each keyword is newly added with a set formed by the keywords.
2. The system for two-level legal societies demand sharing and privacy of claim 1, wherein: in the requirement proposing module, the disclosure strategy is fully disclosed, partially disclosed, only a title is disclosed, or not disclosed.
3. The system for two-level legal societies demand sharing and privacy of claim 1, wherein: in the requirement development module, the first privacy rule specifically includes:
for any r-man, if the publication policy is not, all requirements associated with that r-man are set to be publication-only headings; if the publication policy is partial publication, then the requirement engineer confirms whether to completely disclose or only disclose the title; if the publication policy is to disclose completely or only to disclose the title, then set as disclosure; if there are more than 1 r-man publication strategies that are not published, then it is confirmed by the requirements engineer that they are fully published, only the title is published, or not published.
4. The system for two-level legal societies demand sharing and privacy of claim 1, wherein: in the warehousing module, the second security rule is specifically as follows:
if the public strategy of the directory is not public, setting the public strategies of r-man and r-ass as not public; if the disclosure policy of the directory is only disclosure title, then the disclosure policies of r-man and r-ass are set to only disclosure title; if the disclosure strategy of the directory is completely disclosed, setting the disclosure strategies of r-man and r-ass as completely disclosed;
if the public strategy of more than or equal to 1 r-man is not disclosed, setting the public strategy of the directory as not disclosed; if the disclosing policy of more than or equal to 1 r-man exists as the disclosure-only title, setting the disclosing policy of the directory as the disclosure-only title; if the r-man publication policy is fully published, then the directory publication policy is set to fully published.
CN202010311345.4A 2020-04-20 2020-04-20 Two-level law pedestrian society demand sharing and confidentiality system Active CN111639962B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010311345.4A CN111639962B (en) 2020-04-20 2020-04-20 Two-level law pedestrian society demand sharing and confidentiality system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010311345.4A CN111639962B (en) 2020-04-20 2020-04-20 Two-level law pedestrian society demand sharing and confidentiality system

Publications (2)

Publication Number Publication Date
CN111639962A CN111639962A (en) 2020-09-08
CN111639962B true CN111639962B (en) 2022-06-10

Family

ID=72331737

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010311345.4A Active CN111639962B (en) 2020-04-20 2020-04-20 Two-level law pedestrian society demand sharing and confidentiality system

Country Status (1)

Country Link
CN (1) CN111639962B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108089843A (en) * 2018-01-18 2018-05-29 福建省农村信用社联合社 A kind of intelligentized banking establishments grade requirement management systems
CN109002729A (en) * 2018-07-09 2018-12-14 福建省农村信用社联合社 A kind of customer privacy data managing method based on financial block chain
CN110704574A (en) * 2019-09-03 2020-01-17 福建省农村信用社联合社 Method and system for managing bank business demand assets

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9727911B2 (en) * 2012-02-10 2017-08-08 New York University Systems, method and computer-accessible mediums for providing secure paper transactions using paper fiber identifiers
US10496638B2 (en) * 2016-12-07 2019-12-03 City University Of Hong Kong Systems and methods for privacy-assured similarity joins over encrypted datasets

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108089843A (en) * 2018-01-18 2018-05-29 福建省农村信用社联合社 A kind of intelligentized banking establishments grade requirement management systems
CN109002729A (en) * 2018-07-09 2018-12-14 福建省农村信用社联合社 A kind of customer privacy data managing method based on financial block chain
CN110704574A (en) * 2019-09-03 2020-01-17 福建省农村信用社联合社 Method and system for managing bank business demand assets

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于二级法人体制的银行信息系统优化方法论分析与实践;周金蓉;《中国金融电脑》;20180430(第04期);第63-66页 *
银行系统大数据共享隐私保护问题研究;袁凤霞;《无线互联科技》;20180228(第03期);第38-39页 *

Also Published As

Publication number Publication date
CN111639962A (en) 2020-09-08

Similar Documents

Publication Publication Date Title
US20210117417A1 (en) Real-time content analysis and ranking
US10922367B2 (en) Method and system for providing real time search preview personalization in data management systems
US20210009381A1 (en) Online identity reputation
Cosley et al. SuggestBot: using intelligent task routing to help people find work in wikipedia
CN109255586B (en) Online personalized recommendation method for e-government affairs handling
US20100169337A1 (en) Identity analysis and correlation
US20100169314A1 (en) Content analysis and correlation
Waltl et al. Predicting the outcome of appeal decisions in Germany’s tax law
Sokolovska et al. Integrating technical and legal concepts of privacy
Chifu et al. Query performance prediction focused on summarized letor features
Gadepally et al. Recommender systems for the department of defense and intelligence community
US11734360B2 (en) Methods and systems for facilitating classification of documents
US8386475B2 (en) Attribution analysis and correlation
Chang et al. Predicting political affiliation of posts on Facebook
TWI524719B (en) A system and method for identifying and linking users having matching confidential information
Tan The missing piece: the link between blockchain and public policy design
US20230342822A1 (en) Method and system of sentiment-based tokenization and secure deployment thereof
CN111639962B (en) Two-level law pedestrian society demand sharing and confidentiality system
US20230325857A1 (en) Method and system of sentiment-based selective user engagement
CN111209403A (en) Data processing method, device, medium and electronic equipment
US20220261863A1 (en) Method and system for transitory sentiment community- based digital asset valuation
Garrie et al. Electronic discovery and the challenge posed by the Sarbanes-Oxley act
US20090319505A1 (en) Techniques for extracting authorship dates of documents
CN111753538A (en) Method and device for extracting document elements of divorce dispute referee
Bibi Cryptocurrency world identification and public concerns detection via social media: Student research abstract

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant